Last update: Wed Nov 8 12:49:02 MST 2023
Volume 43, Number 1, January, 2000Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Celestial backbone; Foreign hands off China's net; Women and the web; DOE says no nuke access; Worst net nightmare; Sidebar: Ethics quiz . . . . 9--9 Diane Crawford and Brian K. E. Balke and Steve Wilstrom and Jef Raskin and Pat McGee Forum: Tackling OO Design Principles; Educational Concerns; Building LEGO Robots . . . . . . . . . . . . . . . . . 11--13 Brock N. Meeks Electronic frontier: bugging out: Y2K fallout or business as usual? . . . . . 15--15 Elliot Soloway and Cathleen Norris and Phyllis Blumenfeld and Barry Fishman and Joseph Krajcik and Ronald Marx Log on Education: K--12 and the Internet 19--19 Tom Porter and Galyn Susman On site: creating lifelike characters in Pixar movies . . . . . . . . . . . . . . 25--25 Barbara Simons From the President: building Big Brother 31--31 Prabhudev Konana and Nirup M. Menon and Sridhar Balasubramanian The implications of online investing . . 34--34 Cecilia M. Gorriz and Claudia Medina Engaging girls with computers through software games . . . . . . . . . . . . . 42--42 Eszter Hargittai Radio's lessons for the Internet . . . . 50--50 Mark S. Ackerman and Christine A. Hadverson Reexamining organizational memory . . . 58--58 Mike Robinson and Mikko Kovalainen and Esa Auramäki Diary as dialogue in papermill process control . . . . . . . . . . . . . . . . 65--65 Jagdish Chandra and Salvatore T. March and Satyen Mukherjee and Will Pape and R. Ramesh and H. Raghav Rao and Ray O. Waddoups Information systems frontiers . . . . . 71--71 Srinarayan Sharma and Arun Rai CASE deployment in IS organizations . . 80--80 Ruben Gonzalez and Greg Cranitch and Jun Jo Academic directions of multimedia education . . . . . . . . . . . . . . . 89--89 Carl Ellison and Bruce Schneier Inside risks: risks of PKI: Secure Email 160--160
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: More pay now; Euro net use; The cursor who spied me; Robot wheelchair climbs stairs.; The boss knows; Y2K aftermath; High tech, hold the computer . . . . . . . . . . . . . . 9--9 Diane Crawford and Terry D. Decker and Francisco M. De La Vega and Jeffrey Shallit and John A. Wills and Dennis J. Frailey and Brad Montgomery and Carole M. Milazzo and W. J. Liederbach and David Mould and Ewen McNeill Forum: Debating Distance Learning . . . 11--15 Hal Berghel Identity theft, Social Security Numbers, and the Web . . . . . . . . . . . . . . 17--17 Andrew Grosso Legally speaking: the promise and problems of the No Electronic Theft Act 23--23 F. Castel Viewpoint: exploring virtuality . . . . 27--27 Fran Allen and Paula Hawthorn and Barbara Simons Viewpoint: not now, not like this . . . 29--29 Mark Maybury News on demand: introduction . . . . . . 32--32 Stanley Boykin and Andrew Merlino Machine learning of event segmentation for news on demand . . . . . . . . . . . 35--35 Howard D. Wactlar and Alexander G. Hauptmann and Michael G. Christel and Ricky A. Houghton and Andreas M. Olligschlaeger Complementary video and audio analysis for broadcast news archives . . . . . . 42--42 Francis Kubala and Sean Colbath and Daben Liu and Amit Srivastava and John Makhoul Integrated technologies for indexing spoken language . . . . . . . . . . . . 48--48 The SRI MAESTRO Team MAESTRO: conductor of multimedia analysis technologies . . . . . . . . . 57--57 Jean-Luc Gauvain and Lori Lamel and Gilles Adda Transcribing broadcast news for audio and video indexing . . . . . . . . . . . 64--64 Sadaoki Furui and Katsutoshi Ohtsuki and Zhi-Peng Zhang Japanese broadcast news transcription and information extraction . . . . . . . 71--71 David S. Pallett and John S. Garofolo and Jonathan G. Fiscus Measurements in support of research accomplishments . . . . . . . . . . . . 75--75 Varun Grover and Pradeep Vaswani Partnerships in the U.S. telecommunications industry . . . . . . 80--80 Anil Jain and Lin Hong and Sharath Pankanti Biometric identification . . . . . . . . 90--90 Rudy Hirschheim and Mary Lacity The myths and realities of information technology insourcing . . . . . . . . . 99--99 Kai R. T. Larsen and Peter A. Bloniarz A cost and performance model for Web service investment . . . . . . . . . . . 109--109 David Gillibrand Technical opinion: essential business object design . . . . . . . . . . . . . 117--117 Carl Ellison and Bruce Schneier Inside risks: risks of PKI: e-commerce 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: A Future Space Odyssey; Calculating DNA; Rapid Tracking of diseases; Hunting Meteorites; ``Millennium'' Banished; English dominates Web; Top selling software; The Human Face of E-Commerce . . . . . . . . 9--10 Diane Crawford and Richard H. Veith and Lauri Pirttiaho and Ralph Miller and Hal Berghel and Paul E. McKenney and Tom Moran and Antanas V. Dundzila and Frank Cuccias Forum: Planning for Software Project Success; The Manhattan Project and Info-czars; Mastering the Basics the Highest Priority; More Net May Not Yield More Votes; Are IBM 3083s Vacuum Tube Systems . . . . . . . . . . . . . . . . 11--15 Robert L. Glass Practical programmer: Y2K and believing in software practice . . . . . . . . . . 17--18 James A. Rodger and Parag C. Pendharkar On site: using telemedicine in the Department of Defense . . . . . . . . . 19--20 Roy Rada and John Ketchell Sharing standards: standardizing the European information society . . . . . . 21--25 Barbara Simons From the president: trademarking the Net 27--28 Mohamed Khalifa and Robert Davison Viewpoint: exploring the telecommuting paradox . . . . . . . . . . . . . . . . 29--31 Matthew Turk and George Robertson Perceptual user interfaces (introduction) . . . . . . . . . . . . . 32--34 Alex Pentland Perceptual user interfaces: perceptual intelligence . . . . . . . . . . . . . . 35--44 Hong Z. Tan Perceptual user interfaces: haptic interfaces . . . . . . . . . . . . . . . 40--41 Sharon Oviatt and Philip Cohen Perceptual user interfaces: multimodal interfaces that process what comes naturally . . . . . . . . . . . . . . . 45--53 Rosalind W. Picard Perceptual user interfaces: affective perception . . . . . . . . . . . . . . . 50--51 James L. Crowley and Joëlle Coutaz and François Bérard Perceptual user interfaces: things that see . . . . . . . . . . . . . . . . . . 54--54 Aaron F. Bobick and Stephen S. Intille and James W. Davis and Freedom Baird and Claudio S. Pinhanez and Lee W. Campbell and Yuri A. Ivanov and Arjan Schütte and Andrew Wilson Perceptual user interfaces: the KidsRoom 60--61 Byron Reeves and Clifford Nass Perceptual user interfaces: perceptual bandwidth . . . . . . . . . . . . . . . 65--70 Henry Lieberman Programming by example (introduction) 72--74 David Canfield Smith and Allen Cypher and Larry Tesler Programming by example: novice programming comes of age . . . . . . . . 75--81 Brad A. Myers and Richard McDaniel and David Wolber Programming by example: intelligence in demonstrational interfaces . . . . . . . 82--89 Alexander Repenning and Corrina Perrone Programming by example: programming by analogous examples . . . . . . . . . . . 90--97 Mathias Bauer and Dietmar Dengler and Gabriele Paul and Markus Meyer Programming by example: programming by demonstration for information agents . . 98--103 Ken Kahn Programming by example: generalizing by removing detail . . . . . . . . . . . . 104--106 Robert St. Amant and Henry Lieberman and Richard Potter and Luke Zettlemoyer Programming by example: visual generalization in programming by example 107--114 Mohamed E. Fayad and Mauri Laitinen and Robert P. Ward Thinking objectively: software engineering in the small . . . . . . . . 115--118 Peter G. Neumann Inside risks: a tale of two thousands 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Merger Marriages; Call for Security; Gigahertz and beyond; Morphing Robotoys for X-mas; Plasma Display; Domain Name Stakes Upped; Olfactory Opt In; China's Email Shanghaid . . . . . . 9--10 Diane Crawford and Paul Abrahams and Bill Patterson and Anthony Fedzano Forum: Securing User Passwords; Combining OM and OG . . . . . . . . . . 11--12 Rosemary McGuinness ACM fellows . . . . . . . . . . . . . . 13--14 Neil Munro From Washington: a patchwork of legislation and regulation . . . . . . . 15--17 Meg McGinity Staying connected: surfing the turf . . 19--21 Kuldeep Kumar and Jos van Hillegersberg Enterprise resource planning: introduction . . . . . . . . . . . . . . 22--26 Yvonne van Everdingen and Jos van Hillegersberg and Eric Waarts Enterprise resource planning: ERP adoption by European midsize companies 27--31 Leslie P. Willcocks and Richard Sykes Enterprise resource planning: the role of the CIO and IT function in ERP . . . 32--38 Irma Becerra-Fernandez and Kenneth E. Murphy and Steven J. Simon Enterprise resource planning: integrating ERP in the business school curriculum . . . . . . . . . . . . . . . 39--41 M. Lynne Markus and Cornelis Tanis and Paul C. van Fenema Enterprise resource planning: multisite ERP implementations . . . . . . . . . . 42--46 Christina Soh and Sia Siew Kien and Joanne Tay-Yap Enterprise resource planning: cultural fits and misfits: is ERP a universal solution? . . . . . . . . . . . . . . . 47--51 Mark Kremers and Han van Dissel Enterprise resource planning: ERP system migrations . . . . . . . . . . . . . . . 53--56 August-Wilhelm Scheer and Frank Habermann Enterprise resource planning: making ERP a success . . . . . . . . . . . . . . . 57--61 David Sprott Enterprise resource planning: componentizing the enterprise application packages . . . . . . . . . . 63--69 Justine Cassell Embodied conversational interface agents+ . . . . . . . . . . . . . . . . 70--78 Albert Semtner Ocean and climate modeling . . . . . . . 80--89 Jonathan Bowen The ethics of safety-critical systems 91--97 Tim Bass Intrusion detection systems and multisensor data fusion . . . . . . . . 99--105 Munindar P. Singh and Mona Singh Technical Opinion: deconstructing the ``any'' key . . . . . . . . . . . . . . 107--108 Jerzy W. Grzymala-Busse and Wojciech Ziarko Data mining and rough set theory . . . . 108--109 Friedrich Steimann Abstract class hierarchies, factories, and stable designs . . . . . . . . . . . 109--111 Peter G. Neumann Inside Risks: denial-of-service attacks 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Flying the rails; Logging online hours at work; Top prize: embedded encryption; Digital Nose knows; Walking again via chip implant; Cell-phone-free class; Another node in the crowd . . . . . . . . . . . . . . . 9--9 Diane Crawford and Nancy Mead and Thomas W. Moran and Jason Steffler and Anonymous and William Dan Terry and Merrill Warkentin and John Michael Williams and Vir V. Phoha and Vic Basili and Fred Brooks and Tom DeMarco and Ernst Denert and Koichi Kishida and Manny Lehman and Elliot Soloway Forum: Much Ado About Licensing and Electronic Identity Theft and Email-Only Classes and Sign-Off on Y2K . . . . . . 11--15 Larry Press Personal computing: from P-books to E-books . . . . . . . . . . . . . . . . 17--17 Hal Berghel Digital village: predatory disintermediation . . . . . . . . . . . 23--23 Barbara Simons From the president: to DVD or not to DVD 31--31 Steve Mann Viewpoint: existential education in the era of personal cybernetics . . . . . . 33--33 Deborah Estrin and Ramesh Govindan and John Heidemann Embedding the Internet: introduction . . 38--38 David Tennenhouse Embedding the Internet: proactive computing . . . . . . . . . . . . . . . 43--43 G. J. Pottie and W. J. Kaiser Embedding the Internet: wireless integrated network sensors . . . . . . . 51--51 Gaetano Borriello and Roy Want Embedding the Internet: embedded computation meets the World Wide Web . . 59--59 Gaurav S. Sukhatme and Maja J. Mataric Embedding the Internet: embedding robots into the Internet . . . . . . . . . . . 67--67 Harold Abelson and Don Allen and Daniel Coore and Chris Hanson and George Homsy and Thomas F. Knight and Radhika Nagpal and Erik Rauch and Gerald Jay Sussman and Ron Weiss Embedding the Internet: amorphous computing . . . . . . . . . . . . . . . 74--74 Ben Shneiderman Universal usability . . . . . . . . . . 84--84 John P. Baron and Michael J. Shaw and Andrew D. Bailey Web-based E-catalog systems in B2B procurement . . . . . . . . . . . . . . 93--93 Marshall Cline and Mike Girou Enduring business themes . . . . . . . . 101--101 Laurie A. Williams and Robert R. Kessler All I really need to know about pair programming I learned in kindergarten 108--108 Susan Landau Technical opinion: designing cryptography for the new century . . . . 115--115 Lauren Weinstein and Peter G. Neumann Inside risks: Internet risks . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: The Supreme Court Goes Online; Coffee? Tea? Email?; Political Coffers; Smart Scalpel; Office Cube-icles; Law Preview; Piracy Rages; Wireless Rules; The Name Game . . . . . 9--10 Diane Crawford and Morton Grosser and Don Walter and Steve Grief and Bernard Abramson and Robert LeMay and Rob DuWors Forum: A Plea for Dumb Computers; Gloom-and-Doom Predictions; Expanding the SE View . . . . . . . . . . . . . . 11--14 Anthony M. Townsend and Robert J. Aalberts and Steven A. Gibson Legally speaking: libel and slander on the Internet . . . . . . . . . . . . . . 15--17 Brock N. Meeks Electronic frontier: Bad moon rising . . 19--21 Elliot Soloway and Henry J. Becker and Cathleen Norris and Neal Topp Log on education: teachers and technology: easing the way . . . . . . . 23--26 Richard Stallman Viewpoint: Why we must fight UCITA . . . 27--28 Tim O'Reilly Viewpoint: The Internet patent land grab 29--31 Wilhelm Hasselbring Information system integration . . . . . 32--38 Jian Yang and Mike P. Papazoglou Interoperation support for electronic business . . . . . . . . . . . . . . . . 39--47 Jane Grimson and William Grimson and Wilhelm Hasselbring The SI challenge in health care . . . . 48--55 Elke A. Rundensteiner and Andreas Koeller and Xin Zhang Maintaining data warehouses over changing information sources . . . . . . 57--62 Nabil R. Adam and Vijayalakshmi Atluri and Igg Adiwijaya SI in digital libraries . . . . . . . . 64--72 Upkar Varshney and Ron Vetter Emerging mobile and wireless networks 73--81 Thomas A. Phelps and Robert Wilensky Multivalent documents . . . . . . . . . 82--90 Terry L. Huston and Janis L. Huston Is telemedicine a practical reality? . . 91--95 Richard T. Watson and George M. Zinkhan and Leyland F. Pitt Integrated Internet marketing . . . . . 97--102 Gerard Parr and Kevin Curran A paradigm shift in the distribution of multimedia . . . . . . . . . . . . . . . 103--109 Detlef Schoder and Torsten Eymann Technical opinion: The real challenges of mobile agents . . . . . . . . . . . . 111--112 Lauren Weinstein Inside risks: Risks of Internet voting 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: E-Tending the farm; Latest agricultural stats; Myanmar cuts net; Video Games, violence linked; Flying the Web-connected skies; Intricate politics of weaving; Girls and computers; Wall of Tetris . . . . . . . . . . . . . . . . . 9--10 Diane Crawford and Mark Wallace and Albert Semter and Alireza Ebrahimi and Pat McGee and Rommert J. Casimir and Frank Land Forum: Global Warning in Ocean and Climate Modeling; Add PBE to Conventional Languages; Abbreviation Hijacking; More to ERP than Org Issues 11--14 Robert L. Glass Practical programmer: On personal technical obsolescence . . . . . . . . . 15--17 Phillip Ein-Dor and Seymour E. Goodman and Peter Wolcott International perspectives: From Via Maris to electronic highway: the Internet in Canaan . . . . . . . . . . . 19--23 Dori Kornfeld On site: Deliberating on ICANN . . . . . 25--26 Les Earnest Viewpoint: E2A is worse than Y2K . . . . 27--28 Andrew Rosenbloom Introduction . . . . . . . . . . . . . . 30--32 Chris Hecker Physics in computer games . . . . . . . 34--39 John Funge Cognitive modeling for games and animation . . . . . . . . . . . . . . . 40--48 Zoran Popovi\'c Controlling physics in realistic character animation . . . . . . . . . . 50--58 Nick Foster and Dimitris Metaxas Modeling water for computer animation 60--67 James F. O'Brien and Jessica K. Hodgins Animating fracture . . . . . . . . . . . 68--75 Jos Stam Interacting with smoke and fire in real time . . . . . . . . . . . . . . . . . . 76--83 Przemyslaw Prusinkiewicz Simulation modeling of plants and plant ecosystems . . . . . . . . . . . . . . . 84--93 Torsten Fröhlich The virtual oceanarium . . . . . . . . . 94--101 Jakub Segen and Senthil Kumar Look ma, no mouse! . . . . . . . . . . . 102--109 Deborah K. Smith and David B. Paradice and Steven M. Smith Prepare your mind for creativity . . . . 110--116 Veda C. Storey and Detmar W. Straub and Kathy A. Stewart and Richard J. Welke A conceptual investigation of the e-commerce industry . . . . . . . . . . 117--123 Gurpreet Dhillon and James Backhouse Technical opinion: Information system security management in the new millennium . . . . . . . . . . . . . . . 125--128 Peter G. Neumann Inside risks: risks in retrospect . . . 144--144
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Everybody Must Get Cloned; A Step Beyond Cookies; The Chicken and the Chip; Air Communication Breakdown; No Sale; Intestinal Pillage; Sidebar: Top 10 Signals You're Tired of the Internet Business . . . . . . . . . . . . . . . . 9--10 Diane Crawford and Robert Levine and John A. Wills and James L. Rash Forum: The Other Side of Embedding the Internet; A Cure for Lost Programming Companionship;l Licensing Software Developers . . . . . . . . . . . . . . . 11--14 Andrew Grosso Legally Speaking: the economic espionage act: touring the minefields . . . . . . 15--18 Phillip G. Armour The Business of Software: the case for a new business model . . . . . . . . . . . 19--22 Daniel Berleant On Site: does typography affect proposal assessment? . . . . . . . . . . . . . . 24--25 Doug Riecken Introduction: personalized views of personalization . . . . . . . . . . . . 26--28 Nigel Wells and Jeff Wolfers The business of personalization: finance with a personalized touch . . . . . . . 30--34 Udi Manber and Ash Patel and John Robison The business of personalization: experience with personalization of Yahoo! . . . . . . . . . . . . . . . . . 35--39 Doug Riecken The business of personalization: personalized communication networks . . 41--42 Joseph Kramer and Sunil Noronha and John Vergo The human element: a user-centered design approach to personalization . . . 44--48 John Karat and Clare-Marie Karat and Jacob Ukelson The human element: affordances, motivation, and the design of user interfaces . . . . . . . . . . . . . . . 49--51 Edith Schonberg and Thomas Cofino and Robert Hoch and Mark Podlaseck and Susan L. Spraragen The human element: measuring success . . 53--57 Nicolas J. Belkin The human element: helping people find what they don't know . . . . . . . . . . 58--61 Linda Candy and Ernest Edmonds The human element: creativity enhancement with emerging technologies 62--65 Marvin Minsky Deep issues: commonsense-based interfaces . . . . . . . . . . . . . . . 66--73 John McCarthy Deep issues: phenomenal data mining . . 75--79 Edwin P. D. Pednault Deep issues: representation is everything . . . . . . . . . . . . . . . 80--83 Eugene Volokh Deep issues: personalization and privacy 84--88 Doug Riecken Deep issues: personal end-user tools . . 89--91 David Canfield Smith Deep issues: building personal tools by programming . . . . . . . . . . . . . . 92--95 Paul Maglio and Rob Barrett Enabling technologies: intermediaries personalize information streams . . . . 96--101 Haym Hirsh and Chumki Basu and Brian D. Davison Enabling technologies: learning to personalize . . . . . . . . . . . . . . 102--106 Barry Smyth and Paul Cotter Enabling technologies: a personalized television listings service . . . . . . 107--111 Paul B. Kantor and Endre Boros and Benjamin Melamed and Vladimir Meñkov and Bracha Shapira and David J. Neu Enabling technologies: capturing human intelligence in the Net . . . . . . . . 112--115 Wlodek Zadrozny and M. Budzikowska and J. Chai and N. Kambhatla and S. Levesque and N. Nicolov Enabling technologies: natural language dialogue for personalized interaction 116--120 Maurice D. Mulvenna and Sarabjot S. Anand and Alex G. Büchner Personalization on the Net using Web mining: introduction . . . . . . . . . . 122--125 Myra Spiliopoulou Web usage mining for Web site evaluation 127--134 Ibrahim Cingil and Asuman Dogac and Ayca Azgin A broader approach to personalization 136--141 Bamshad Mobasher and Robert Cooley and Jaideep Srivastava Automatic personalization based on Web usage mining . . . . . . . . . . . . . . 142--151 Mike Perkowitz and Oren Etzioni Adaptive Web sites . . . . . . . . . . . 152--158 Barbara Simons Inside risks: shrink-wrapping our rights 168--168
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Prioritizing privacy; End of dot-com days; Online ivory tickling; Privacy fortress; Asteroids by the numbers . . . . . . . . . . . . . . . . 9--10 Diane Crawford and John Letaw and Mark Wallace and Les Earnest and Peter Neely Forum: Is AOL--Time Warner a Closed System? Repeating SDI Myths; Better Word Processors for the Vision Impaired . . . 11--12 Neil Munro From Washington: Ethics, schmethics . . 13--15 Meg McGinity Staying Connected: Body of technology 17--19 Andrew W. Appel and Edward W. Felten Viewpoint: Technological access control interferes with noninfringing scholarship . . . . . . . . . . . . . . 21--23 Jennifer Lai Conversational interfaces . . . . . . . 24--27 Susan J. Boyce Natural spoken dialogue systems for telephony applications . . . . . . . . . 29--34 Clifford Nass and Li Gong Speech interfaces from an evolutionary perspective . . . . . . . . . . . . . . 36--43 Sharon Oviatt Taming recognition errors with a multimodal interface . . . . . . . . . . 45--51 Bruce Lucas VoiceXML for Web-based distributed conversational applications . . . . . . 53--57 Mark Lucente Conversational interfaces for e-commerce applications . . . . . . . . . . . . . . 59--61 Ben Shneiderman The limits of speech recognition . . . . 63--65 Judith A. Markowitz Voice biometrics . . . . . . . . . . . . 66--73 Kenneth P. Fishkin and Anuj Gujar and Beverly L. Harrison and Thomas P. Moran and Roy Want Embodied user interfaces for really direct manipulation . . . . . . . . . . 74--80 Ram D. Gopal and G. Lawrence Sanders Global software piracy: you can't get blood out of a turnip . . . . . . . . . 82--89 David Ferraiolo Integrating RBAC into workflow and collaborative environments (panel session) . . . . . . . . . . . . . . . . 89--90 Robert M. Davison and Robert O. Briggs GSS for presentation support . . . . . . 91--97 Antonis C. Stylianou and Ram L. Kumar An integrative framework for IS quality management . . . . . . . . . . . . . . . 99--104 Mauri Laitinen and Mohamed E. Fayad and Robert P. Ward Thinking Objectively: The problem with scalability . . . . . . . . . . . . . . 105--107 Peter G. Neumann Inside Risks: Missile defense . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Tech sector hot for teachers; Overhaul still lacking; Spy cooperative; E-casinos hit jackpot; Driving out counterfeiters; Polly wants a Web link . . . . . . . . . . . . . . . 9--10 Diane Crawford and Michael Gardner and Andrew Bender and Frank Linton and Pete Patton and David Parnas and Fran Allen and Paula Hawthorn and Barbara Simons Forum: what defines a programming relic? 11--12 Brock N. Meeks Being blank in bright waters . . . . . . 13--16 Phillip G. Armour The five orders of ignorance . . . . . . 17--20 Edmund M. A. Ronald and Moshe Sipper What use is a Turing chatterbox? Continuing the debate on machine intelligence . . . . . . . . . . . . . . 21--23 Grant Larsen Component-based enterprise frameworks 24--26 Jon Hopkins Component primer . . . . . . . . . . . . 27--30 Cris Kobryn Modeling components and frameworks with UML . . . . . . . . . . . . . . . . . . 31--38 Mohamed E. Fayad and David S. Hamu and Davide Brugali Enterprise frameworks characteristics, criteria, and challanges . . . . . . . . 39--46 Michael Sparling Lessons learned: through six years of component-based development . . . . . . 47--53 Lu Jian and Li Yingjun and Ma Xiaoxing and Cai Min and Tao Xianping and Zhang Guanqun and Liu Jianzhong A hierarchical framework: for parallel seismic applications . . . . . . . . . . 55--59 Peter Fingar Component-based frameworks for e-commerce . . . . . . . . . . . . . . . 61--67 Richard A. Johnson The ups and downs of object-oriented systems development . . . . . . . . . . 68--73 Sudip Bhattacharjee and R. Ramesh Enterprise computing environments and cost assessment . . . . . . . . . . . . 74--82 Ritu Agarwal and Prabuddha De and Atish P. Sinha and Mohan Tanniru On the usability of OO representations 83--89 Garland Brown and Marshall Fisher and Ned Stoll and Dave Beeksma and Mark Black and Ron Taylor and Choe Seok Yon and Aaron J. Williams and William Bryant and Bernard J. Jansen Using the lessons of Y2K to improve information systems architecture . . . . 90--97 Zakaria Maamar and Jeff Sutherland Toward intelligent business objects . . 99--102 Matt Blaze and Steven M. Bellovin Inside risks: Tapping on my network door 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Fed Sites Fail on Privacy; Memory-chip Sandwich; Better X-Ray Tech; Paper Still King; Tricky Restoration; Going Coffin Shopping; Sidebar: Engineering Grads Rankings . . . . . . . 9--10 Diane Crawford and John Bashinski and Eugene Volokh and Brian Balke and John Michael Williams and Neville Holmes and Daniel Berleant and John J. Bosley and Jeffrey Rosenwald and Christopher G. Prince and Chris Hecker and Terry Denton Forum: The Ethics of Personalization; The Economic Espionage Act: A Lawyer's Perspective; Proposal Typography Deserves Fuller Treatment; Superficial Ethical Rant; Who is Worthy; A Point About Flight Simulators; Predatory Disintermediation in the Travel Industry 11--15 Hal Berghel Digital village: digital politics 2000 17--22 Seymour Goodman and Timothy Kelly and Michael Minges and Larry Press International perspectives: computing at the top of the world . . . . . . . . . . 23--27 Jason W. Fouts On site: an ``out-of-box'' experience 28--29 Steven Clift Viewpoint: an Internet of democracy . . 31--32 Lambertus Hesselink Ultra-high-density data storage: introduction . . . . . . . . . . . . . . 33--34 Garth A. Gibson and Rodney Van Meter Network attached storage architecture 37--45 Sergei S. Orlov Volume holographic data storage . . . . 46--54 Terry McDaniel Magneto-optical data storage . . . . . . 56--63 Henk van Houten and Wouter Leibbrandt Phase change recording . . . . . . . . . 64--71 L. Richard Carley and Gregory R. Ganger and David F. Nagle MEMS-based integrated-circuit mass-storage systems . . . . . . . . . . 72--80 Ming Fan and Jan Stallaert and Andrew B. Whinston The Internet and the future of financial markets . . . . . . . . . . . . . . . . 82--88 Philip Ginzboorg Seven comments on charging and billing 89--92 Ziming Liu and David G. Stork Is paperless really more? . . . . . . . 94--97 Amit Bhatnagar and Sanjog Misra and H. Raghav Rao On risk, convenience, and Internet shopping behavior . . . . . . . . . . . 98--105 Ned Kock Benefits for virtual organizations from distributed groups . . . . . . . . . . . 107--112 Robert P. Ward and Mauri Laitinen and Mohamed E. Fayad Thinking objectively: management in the small . . . . . . . . . . . . . . . . . 113--116 Anonymous Career opportunities . . . . . . . . . . 117--168 Anonymous Calendar . . . . . . . . . . . . . . . . 169--174 Rebecca Mercuri Inside risks: voting automation (early and often?) . . . . . . . . . . . . . . 176--176
Diane Crawford Editorial . . . . . . . . . . . . . . . Ritu Agarwal and Jayesh Prasad and Mohan Tanniru and John Lynch Risks of rapid application development Zafar Ali and Arif Ghafoor Synchronized delivery of multimedia information over ATM networks . . . . . Elisa Bertino and Elena Pagani and Gian Paolo Rossi and Pierangela Samarati Protecting information on the Web . . . Joseph Blackburn and Gary Scudder and Luk N. Van Wassenhove Concurrent software development . . . . Susanne Bòdker Coordinating technical support platforms Manhoi Choy and Hong Va Leong and Man Hon Wong Disaster recovery techniques for database systems . . . . . . . . . . . . Deborah A. Dahl and Lewis M. Norton and K. W. Scholz Commercialization of natural language processing technology . . . . . . . . . David E. Douglas and Bill C. Hardgrave Object-oriented curricula in academic programs . . . . . . . . . . . . . . . . Ajit Kambil and Arnold Kamis and Marios Koufaris and Henry C. Lucas Influences on the corporate adoption of Web technology . . . . . . . . . . . . . D. W. Loveland Automated deduction: achievements and future directions . . . . . . . . . . . Daniel E. O'Leary and Peter Selfridge Knowledge management for best practices Derek Partridge Non-programmed computation . . . . . . . Arik Ragowsky and Niv Ahituv and Seev Neumann The benefits of using information systems . . . . . . . . . . . . . . . . Louis Scott and Levente Horvath and Donald Day Characterizing case constraints . . . . Vijayan Sugumaran and Mohan Tanniru and Veda C. Storey Supporting reuse in systems analysis . .
Diane Crawford Editorial . . . . . . . . . . . . . . . 5--5 Robert Fox News Track: Cut kids computer time; Computers killed the radio; 3D Orthodonture; Denial of isolation; You've got Braille; All's fare; Sidebar: Connecting the dots . . . . . . . . . . 9--10 Diane Crawford and David Davenport and Michael P. Conlon and Wallace Koehler and Henry Gladney and Andrew W. Appel and Edward W. Felten and Mark Wallace and Fred Ballard and Rich Morin and Steve Green Forum: Software Piracy Is Not Just Economics Anymore; Need Stronger Argument for Access Control; Most Enlightening Ever . . . . . . . . . . . 11--13 Elliot Soloway and Cathleen Norris and Phyllis Blumenfeld and Ron Marx and Joe Krajcik and Barry Fishman Log on education: the three Ts of elementary education . . . . . . . . . . 15--19 Roy Rada and John Craparo Sharing standards: standardizing software projects . . . . . . . . . . . 21--25 Boaz Gelbord Viewpoint: signing your 011001010 . . . 27--28 Andrew Rosenbloom Trusting technology . . . . . . . . . . 31--32 Batya Friedman and Peter H. Khan and Daniel C. Howe Trust online . . . . . . . . . . . . . . 34--40 Judith S. Olson and Gary M. Olson i2i trust in e-commerce . . . . . . . . 41--44 Paul Resnick and Ko Kuwabara and Richard Zeckhauser and Eric Friedman Reputation systems . . . . . . . . . . . 45--48 Justine Cassell and Timothy Bickmore External manifestations of trustworthiness in the interface . . . . 50--56 Ben Shneiderman Designing trust into online experiences 57--59 Eric M. Uslaner Social capital and the net . . . . . . . 60--64 Jennifer Kreie and Timothy Paul Cronan Making ethical decisions . . . . . . . . 66--71 Detlef Schoder and Pai-Ling Yin Building firm trust online . . . . . . . 73--79 Sara Jones and Marc Wilikens and Philip Morris and Marcelo Masera Trust requirements in e-business . . . . 81--87 Trevor Moores and Gurpreet Dhillon Software piracy: a view from Hong Kong 88--93 Masud Ahmad Malik Technical opinion: On the perils of programming . . . . . . . . . . . . . . 95--97 Bruce Schneier Inside risks: semantic network attacks 168--168
Diane Crawford Editorial . . . . . . . . . . . . . . . 5--5 Robert Fox News Track: Code-breaking software officially illegal; Clogging sky channels; Info-tech giant Japan; Global dot-cons; Salmon sensoring; Boots made for walking; Sidebar: Top 10 Fastest Growing, High-Tech Metro Areas in the U.S. . . . . . . . . . . . . . . . . . . 9--10 Robert L. Glass Practical programmer: an embarrassing, yet rewarding, ending to a previous column . . . . . . . . . . . . . . . . . 11--11 Phillip G. Armour The business of software: the laws of software process . . . . . . . . . . . . 15--15 Lenny Foner Viewpoint: fixing a flawed domain name system . . . . . . . . . . . . . . . . . 19--19 Åke Grönlund Democracy in an IT-framed society: introduction . . . . . . . . . . . . . . 22--22 Richard T. Watson and Bryan Mundy A strategic perspective of electronic democracy . . . . . . . . . . . . . . . 27--27 Ari-Veikko Anttiroiko Toward the European information society 31--31 Per-Olof Ågren Is online democracy in the EU for professionals only? . . . . . . . . . . 36--36 Ted Becker Rating the impact of new technologies on democracy . . . . . . . . . . . . . . . 39--39 Ignace Snellen ICTs, bureaucracies, and the future of democracy . . . . . . . . . . . . . . . 45--45 Joachim Åström Should democracy online be quick, strong, or thin? . . . . . . . . . . . . 49--49 Doug Schuler Computer professionals and the next culture of democracy . . . . . . . . . . 52--52 John A. Taylor and Eleanor Burt Not-for-profits in the democratic polity 58--58 Todd M. La Porte and Chris C. Demchak and Christian Friis Webbing governance: global trends across national-level public agencies . . . . . 63--63 Lance J. Hoffman and Lorrie Cranor Internet voting for public officials: introduction . . . . . . . . . . . . . . 69--69 Joe Mohen and Julia Glidden The case for Internet voting . . . . . . 72--72 Deborah M. Phillips and Hans A. von Spakovsky Gauging the risks of Internet elections 73--73 Gordon Bell A personal digital store . . . . . . . . 86--86 Thomas M. Chen Increasing the observability of Internet behavior . . . . . . . . . . . . . . . . 93--93 Abhijit Chaudhury and Debasish Mallick and H. Raghav Rao Web channels in e-commerce . . . . . . . 99--99 Simon N. Foley and Robert Dumigan Are handheld viruses a significant threat? . . . . . . . . . . . . . . . . 105--105 Rebecca T. Mercuri and Peter G. Neumann Inside risks: system integrity revisited 160--160
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Crash-free consortium; Pooh Corner; Bedside matters; Silver lining; No home work; Ear shot; Quick Picks . . 9--10 Diane Crawford and Mick Zraly and Hal Berghel and Ken Pugh and Mat H. West and Conrad Weisert and Terry Steyaert and Richard Johnson Forum: How Can the Web Advance Western Democracies? Who Needs Digital Signatures; Misinformation and the Emulex Hoax; OOSCD Not Really So Unified; Go Back to Non-OOSD . . . . . . 11--13 Peter J. Denning The profession of IT: who are we? . . . 15--19 Meg McGinity Staying connected: name is the game . . 21--23 Steven Bellman and Eric J. Johnson and Gerald L. Lohse On site: opt-in or opt-out?: it depends on the question . . . . . . . . . . . . 25--27 Imran Bashir and Enrico Serafini and Kevin Wall Securing network software applications: introduction . . . . . . . . . . . . . . 28--30 John Viega and Tadayoshi Kohno and Bruce Potter Trust (and mistrust) in secure applications . . . . . . . . . . . . . . 31--36 James B. D. Joshi and Walid G. Aref and Arif Ghafoor and Eugene H. Spafford Security models for Web-based applications . . . . . . . . . . . . . . 38--44 Richard M. Smith and Michael Brittain and Ivan Fetch and Hailin Wu and David M. Martin The privacy practices of Web browser extensions . . . . . . . . . . . . . . . 45--50 Anup K. Ghosh and Tara M. Swaminatha Software security and privacy risks in mobile e-commerce . . . . . . . . . . . 51--57 Chris Dalton and Tse Huong Choo An operating system approach to securing e-services . . . . . . . . . . . . . . . 58--64 Pamela Samuelson Intellectual property for an information age: introduction . . . . . . . . . . . 66--68 Dan L. Burk Copyrightable functions and patentable speech . . . . . . . . . . . . . . . . . 69--75 Randall Davis The digital dilemma . . . . . . . . . . 77--83 Yochai Benkler The battle over the institutional ecosystem in the digital environment . . 84--90 A. Michael Froomkin The collision of trademarks, domain names, and due process in cyberspace . . 91--97 Maureen A. O'Rourke Is virtual trespass an apt analogy? . . 98--103 Peter G. Neumann Inside risks: what to know about . . . . 136--136
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5 Robert Fox News Track: The Future of the Tech Workplace and From the Desk of Rage and Smarty Pants and Toddlers and Computers Don't Mix and Dot-Com Graveyard and Monkeying Around and Mating Call . . . . 9--10 Phillip G. Armour The Business of Software: Software as Currency . . . . . . . . . . . . . . . . 13--14 Hal Berghel Digital Village: A Cyberpublishing Manifesto . . . . . . . . . . . . . . . 17--20 Gordon Bell and Jim Gray Digital immortality . . . . . . . . . . 28--30 Rita R. Colwell Closing the circle of information technology . . . . . . . . . . . . . . . 31--34 Norman I. Badler Virtual beings . . . . . . . . . . . . . 33--35 Donald A. Norman Cyborgs . . . . . . . . . . . . . . . . 36--37 Ramesh Jain Digital experience . . . . . . . . . . . 38--40 Joseph Jacobson The desktop fab . . . . . . . . . . . . 41--43 Dan Bricklin Look to the past to envision the future 44--44 Ted Selker Affecting humanity . . . . . . . . . . . 45--45 Leon Kappelman The future is ours . . . . . . . . . . . 46--47 V. Michael Bove Astronauts and mosquitoes . . . . . . . 48--49 Andries van Dam User interfaces: disappearing, dissolving, and evolving . . . . . . . . 50--52 Eric A. Brewer When everything is searchable . . . . . 53--54 Martin Cooper Bandwidth and the creation of awareness 55--57 Thomas A. Horan The paradox of place . . . . . . . . . . 58--59 Ron Vetter The wireless web . . . . . . . . . . . . 60--61 Usama Fayyad The digital physics of data mining . . . 62--65 Jennifer Lai When computers speak, hear, and understand . . . . . . . . . . . . . . . 66--67 Jim Waldo When the network is everything . . . . . 68--69 Steven J. Schwartz Wearables in 2048 . . . . . . . . . . . 70--71 Cameron Miner Pushing functionality into even smaller devices . . . . . . . . . . . . . . . . 72--73 Christopher R. Johnson Computational bioimaging for medical diagnosis and treatment . . . . . . . . 74--75 Jacques Cohen Computers and biology . . . . . . . . . 76--79 Thomas Sterling Continuum computer architecture for exaflops computation . . . . . . . . . . 78--80 Jon Crowcroft Never lost, never forgotten . . . . . . 81--81 Michael J. Muller and Ellen Christiansen and Bonnie Nardi and Susan Dray Spiritual life and information technology . . . . . . . . . . . . . . . 82--83 Whitfield Diffie Ultimate cryptography . . . . . . . . . 84--86 Ray Kurzweil Promise and peril-the deeply intertwined poles of 21st century technology . . . . 88--91 Edsger W. Dijkstra The end of computing science? . . . . . 92--92 Hal R. Varian The computer-mediated economy . . . . . 93--93 Robert X. Cringely Be absolute for death: life after Moore's law . . . . . . . . . . . . . . 94--94 Brock N. Meeks Accountability through transparency: life in 2050 . . . . . . . . . . . . . . 96--97 Pamela Samuelson Toward a new politics of intellectual property . . . . . . . . . . . . . . . . 98--99 Dennis Tsichritzis Forget the past to win the future . . . 100--101 Andrew Grosso The demise of sovereignty . . . . . . . 102--103 Anthony M. Townsend and James T. Bennett Electronic empire . . . . . . . . . . . 104--105 Ari Schwartz A larger role in the public policy process for user control . . . . . . . . 106--107 Karen Holtzblatt Inventing the future . . . . . . . . . . 108--110 Richard Stallman Can freedom withstand e-books? . . . . . 111--111 Peter J. Denning Many zeros ahead . . . . . . . . . . . . 112--112 Bruce Schneier Insurance and the computer industry . . 114--115 Kilnam Chon The future of the Internet digital divide . . . . . . . . . . . . . . . . . 116--117 Grady Booch Developing the future . . . . . . . . . 118--121 Henry Lieberman and Christopher Fry Will software ever work? . . . . . . . . 122--124 Mark Gorenberg and Ann Winblad A just-in-time software-based world . . 125--125 Larry L. Constantine Back to the future . . . . . . . . . . . 126--126 Cherri Pancake The ubiquitous beauty of user-aware software . . . . . . . . . . . . . . . . 130--130 Steven M. Bellovin Computer security --- an end state? . . 131--132 Doug Riecken A commonsense opportunity for computing 133--133 Ravi Ganesan Keep (over) reaching for the stars . . . 134--135 John Glenn Education is the key to future dreams 136--138 Anita Borg Universal literacy --- a challenge for computing in the 21st Century . . . . . 139--141 Roger C. Schank The computer isn't the medium, it's the message . . . . . . . . . . . . . . . . 142--143 Mitchel Resnick Closing the fluency gap . . . . . . . . 144--145 Peter G. Neumann and David L. Parnas Inside risks: Computers: Boon or Bane? 168--168
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5 Robert Fox News Track: ICANN's Domain Name Experiment; Paper Voting Prevails; Printed-On Battery Power; Campus Net Access Rethought; Who Let The Robots Out?; U.S. Patent Lead; Taste The Web; Have Virus, Will Work For Mayor . . . . 9--10 Diane Crawford and Thomas Tiahrt and Moti Ben-Ari and Matt West and Hans A. von Spakovsky and Deborah Phillips Forum: Participatory Vs. Representative Democracy; Why Store Everything?; Emulex Hoax; Correction . . . . . . . . . . . . 13--15 Robert L. Glass Practical programmer: academics, and the scarlet letter ``A'' . . . . . . . . . . 17--18 Peter J. Denning The profession of IT: crossing the chasm 21--25 David Lanning Viewpoint: on bias, science, equal protection, and liability . . . . . . . 27--29 Sahin Albayrak Agent-oriented technology for telecommunications: introduction . . . . 30--33 Nicholas R. Jennings An agent-based approach for building complex software systems . . . . . . . . 35--41 Stefan Fricke and Karsten Bsufka and Jan Keiser and Torge Schmidt and Ralf Sesseler and Sahin Albayrak Agent-based telematic services and telecom applications . . . . . . . . . . 43--48 Munindar P. Singh and Bin Yu and Mahadevan Venkatraman Community-based service location . . . . 49--54 Marcus Brunner and Bernhard Plattner and Rolf Stadler Service creation and management in active telecom networks . . . . . . . . 55--61 Francisco Valera and Jorge E. López de Vergara and José I. Moreno and Víctor A. Villagrá and Julio Berrocal Communication management experiences in e-commerce . . . . . . . . . . . . . . . 63--69 Mike P. Papazoglou Agent-oriented technology in support of e-business . . . . . . . . . . . . . . . 71--77 Varun Grover and James T. C. Teng E-commerce and the information market 79--86 Mark Keil and Daniel Robey Blowing the whistle on troubled software projects . . . . . . . . . . . . . . . . 87--93 Tanya L. Cheyne and Frank E. Ritter Targeting audiences on the Internet . . 94--98 G. Kappel and S. Rausch-Schott and W. Retschitzegger and M. Sakkinen Bottom-up design of active object-oriented databases . . . . . . . 99--104 Robert P. Ward and Mohamed E. Fayad and Mauri Laitinen Thinking objectively: software process improvement in the small . . . . . . . . 105--107 Diane Crawford Career opportunities . . . . . . . . . . 109--124 Diane Crowford Calendar of events . . . . . . . . . . . 125--125 Bruce Schneier Inside risks: cyber underwriters lab . . 128--128
Diane Crawford Editorial . . . . . . . . . . . . . . . 5--5 Robert Fox News Track: Euro Net Access Exceeds U.S.; In-Dash MP3; Poll on the Future; Beam of Pain; Laundry Made Easier; Detecting Schizophrenia; Internet Earthquake Warnings; Patron Net Saint 9--10 Diane Crawford and John F. Dalphin and Andy Oram and Louis A. Russ and Peter Denning Forum: Evolving commitment to the profession of computer science . . . . . 11--12 Neil Munro From Washington: The unhappy but beneficial coexistence of the FBI and the tech elite . . . . . . . . . . . . . 15--18 Hal Berghel Digital Village: Caustic cookies . . . . 19--22 Alan Howard On site: Software engineering project management . . . . . . . . . . . . . . . 23--24 Krzysztof R. Apt Viewpoint: One more revolution to make: free scientific publishing . . . . . . . 25--28 Edward A. Fox and Gary Marchionini Digital libraries: Introduction . . . . 30--32 Gregory Crane and Robert F. Chavez and Anne Mahoney and Thomas L. Milbank and Jeffrey A. Rydberg-Cox and David A. Smith and Clifford E. Wulfman Drudgery and deep thought . . . . . . . 34--40 Craig Nevill-Manning The biological digital library . . . . . 41--42 Alan S. Inouye A digital strategy for the library of congress . . . . . . . . . . . . . . . . 43--43 Paul Jones Open (source)ing the doors for contributor-run digital libraries . . . 45--46 Ian H. Witten and David Bainbridge and Stefan Boddie Greenstone: Open-source DL software . . 47--47 Alexa T. McCray and Marie E. Gallagher Principles for digital library development . . . . . . . . . . . . . . 48--54 Catherine C. Marshall and Gene Golovchinsky and Morgan N. Price Digital libraries and mobility . . . . . 55--56 Michael S. Brown and W. Brent Seales and Stephen B. Webb and Christopher O. Jaynes Building large-format displays for digital libraries . . . . . . . . . . . 57--59 Michael L. Nelson and Kurt Maly Buckets: smart objects for digital libraries . . . . . . . . . . . . . . . 60--62 H. M. Gladney and Arthur Cantu Authorization management for digital libraries . . . . . . . . . . . . . . . 63--65 Christine L. Borgman Where is the librarian in the digital library? . . . . . . . . . . . . . . . . 66--68 William Y. Arms Uniform resource names: handles, PURLs, and digital object identifiers . . . . . 68--68 Helen R. Tibbo Archival perspectives on the emerging digital library . . . . . . . . . . . . 69--70 Erik Duval and Eddy Forte and Kris Cardinaels and Bart Verhoeven and Rafael Van Durm and Koen Hendrikx and Maria Wentland Forte and Norbert Ebel and Maciej Macowicz and Ken Warkentyne and Florence Haenni The Ariadne knowledge pool system . . . 72--78 David McArthur and Sarah Giersch and Bill Graves and Charles R. Ward and Richard Dillaman and Russell Herman and Gabriel Lugo and James Reeves and Ron Vetter and Deborah Knox and Scott Owen Toward a sharable digital library of reusable teaching resources . . . . . . 79--79 Mary Marlino and Tamara Sumner and David Fulker and Cathryn Manduca and David Mogk The digital library for Earth system education: building community, building the library . . . . . . . . . . . . . . 80--81 Ian H. Witten and Michel Loots and Maria F. Trujillo and David Bainbridge The promise of digital libraries in developing countries . . . . . . . . . . 82--85 Lee L. Zia The NSF national science, mathematics, engineering, and technology education digital library program . . . . . . . . 83--83 Mark Apperley and Sally Jo Cunningham and Te Taka Keegan and Ian H. Witten NIUPEPA: a historical newspaper collection . . . . . . . . . . . . . . . 86--87 Shalini R. Urs and K. S. Raghavan Vidyanidhi: Indian digital library of electronic theses . . . . . . . . . . . 88--89 Bernard Rous The ACM digital library . . . . . . . . 90--91 Greg Baster and Prabhudev Konana and Judy E. Scott Business components: a case study of Bankers Trust Australia Limited . . . . 92--98 Mark Astley and Daniel Sturman and Gul Agha Customizable middleware for modular distributed software . . . . . . . . . . 99--107 J. McGrath Cohoon Toward improving female retention in the computer science major . . . . . . . . . 108--114 Lauren Weinstein Inside risks: be seeing you! . . . . . . 128--128
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5 Robert Fox News track: Security Stats; Robotic Insect; Disposable Phones; Scientific Oath; Simulating Dripped Drops; An Aviation First; Coffee-Cam to Go Black 9--10 Diane Crawford and Ilya Yakovlev and Yochai Benkler and Paul McKenney and Donn B. Parker Forum: More than One Way to Product Quality Information; Hope for Educational Sea Change; A Consistent Definition of Information Security . . . 11--14 Elliot Soloway and Cathleen Norris and Phyllis Blumenfeld and Barry Fishman and Joseph Krajcik and Ron Marx Log on education: Handheld devices are ready-at-hand . . . . . . . . . . . . . 15--20 Seymour E. Goodman and James B. Gottstein and Diane S. Goodman International perspectives: Wiring the wilderness in Alaska and the Yukon . . . 21--26 Paul de Palma Viewpoint: Why women avoid computer science . . . . . . . . . . . . . . . . 27--30 Rajiv Dewan and Abraham Seidmann Current issues in e-banking: introduction . . . . . . . . . . . . . . 31--32 Kemal Saatcioglu and Jan Stallaert and Andrew B. Whinston Design of a financial portal . . . . . . 33--38 Yoram (Jerry) Wind The challenge of ``customerization'' in financial services . . . . . . . . . . . 39--44 Kermal Altinkemer Bundling e-banking services . . . . . . 45--47 Niv Ahituv The open information society . . . . . . 48--52 Christopher P. Holland and John B. Westwood Product-market and technology strategies in banking . . . . . . . . . . . . . . . 53--57 Kuldeep Kumar Technology for supporting supply chain management: introduction . . . . . . . . 58--61 Steve John Simon The art of military logistics . . . . . 62--66 Bill Welty and Irma Becerra-Fernandez Managing trust and commitment in collaborative supply chain relationships 67--73 Jos van Hillegersberg and Rob Zuidwijk and Jo van Nunen and Diane van Eijk Supporting return flows in the supply chain . . . . . . . . . . . . . . . . . 74--79 Girish Ramachandran and Sanjay Tiwari Challenges in the air cargo supply chain 80--82 R. Krishnan Technology in the Indian retail supply chain . . . . . . . . . . . . . . . . . 83--87 David Schuff and Robert St. Louis Centralization vs. decentralization of application software . . . . . . . . . . 88--94 Gary Klein and James J. Jiang and Marion G. Sobol A new view of IS personnel performance evaluation . . . . . . . . . . . . . . . 95--102 Terry Shepard and Margaret Lamb and Diane Kelly More testing should be taught . . . . . 103--108 Michael McCormick Technical opinion: Programming extremism 109--119 Richard Forno and William Feinbloom Inside risks: PKI: a question of trust and value . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Net Population's Newest Numbers; Brush-on Smart Paint; Losses in the Face of Piracy; Losses in the Name of Quality; Hear the Earth's Patter; Radio Frequency Fries Electronics; Click, Drag, Plagiarize, Gotcha; Web as Close as Your Wrist . . . . . . . . . . 9--9 Diane Crawford and Richard G. Canning and Todd Hodes and Bill Leal and George Nagy and Alan Knight and G. Kappel and S. Rausch-Schott and W. Retschitzegger and M. Sakkinen and Luke Hohmann and Nils Jensen Forum: Reviewer Bias vs. Review Validity; Millennium Reflections; Unfashionable Smalltalk; Don't Forget Existing Customers; The ``Character'' of Software . . . . . . . . . . . . . . . . 11--13 John White ACM Opens portal . . . . . . . . . . . . 14--16, 28 Andrew Grosso Legally speaking: the individual in the new age . . . . . . . . . . . . . . . . 17--17 Phillip G. Armour The business of software: Matching process to types of teams . . . . . . . 21--21 Quentin Stafford-Fraser On site: The life and times of the first Web Cam . . . . . . . . . . . . . . . . 25--25 Scott Hazelhurst Viewpoint: Developing IT skills internationally: who's developing whom? 27--27 David Arnold and Fred Niederman The global IT work force: introduction 30--30 Lawrence A. West and Walter A. Bogumil Immigration and the global IT work force 34--34 Phalguni Gupta Growth scenario of IT industries in India . . . . . . . . . . . . . . . . . 40--40 Keith Mander The decline and fall of the American programmer . . . . . . . . . . . . . . . 43--43 Liisa von Hellens and Sue Nielsen Australian women in IT . . . . . . . . . 46--46 Philip J. Sallis Some thoughts on IT employment in New Zealand . . . . . . . . . . . . . . . . 53--53 Diane Crawford ACM general elections . . . . . . . . . 54--54 Linda Marshall A perspective on the IT industry in South Africa . . . . . . . . . . . . . . 55--55 Ritu Agarwal and Thomas W. Ferratt Crafting an HR strategy to meet the need for IT workers . . . . . . . . . . . . . 58--58 Kam-Fai Wong Labor shortfall in Hong Kong's IT industry . . . . . . . . . . . . . . . . 65--65 Maria Klawe Refreshing the nerds . . . . . . . . . . 67--67 Jo Ellen Moore and Susan E. Yager and Mary Sumner and Galen B. Crow Facilitating career changes into IT . . 70--70 Eileen M. Trauth Mapping information-sector work to the work force . . . . . . . . . . . . . . . 74--74 Wang Shan The IT work force in China . . . . . . . 76--76 Uladzimir Anishchanko The IT staffing situation in Belarus . . 77--77 Steve Benford and Chris Greenhalgh and Tom Rodden and James Pycock Collaborative virtual environments . . . 79--79 Karim K. Hirji Exploring data mining implementation . . 87--87 Vincent S. Lai Intraorganizational communication with intranets . . . . . . . . . . . . . . . 95--95 Jim Horning Inside risks: Learning from experience 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Sensing Global Vibrations; The Big Four Online; Gender Gap Perceptions; Portion of the World Offline; Cat \ldots and Mouse; 20 Gigahertz Chip 3 Atoms Thick; Apple Motto Exorcised . . . . . . . . . . . . 9--10 Diane Crawford and Richar Hill and George Ellingham and Lawrence C. Paulson and Adriano Comai and Bill Brykczynski and Saul I. Gass and Ferdinand Wagner and Peter Wolstenholme Forum: The ICANN Framework Better Than Going to Court; Drop the Adjective [Digital Library]; Keep E-Journals Affordable; Needs and Adoption of Process; Give Security Accreditation a Chance; Keeping Out Cookies; The Joy of Coding . . . . . . . . . . . . . . . . . 11--13 Hal Berghel Digital: The Y2K e-commerce tumble . . . 15--15 Peter J. Denning The profession of IT: The IT schools movement . . . . . . . . . . . . . . . . 19--19 David S. Touretzky Viewpoint: Free speech rights for programmers . . . . . . . . . . . . . . 23--23 Eric M. Freedman Viewpoint: Pondering pixelized pixies 27--27 Nahum Gershon and Ward Page What storytelling can do for information visualization . . . . . . . . . . . . . 31--31 Daniel A. Keim Visual exploration of large data sets 38--38 Stephen G. Eick Visualizing online activity . . . . . . 45--45 Fred Mintzer and Gordon W. Braudaway and Francis P. Giordano and Jack C. Lee and Karen A. Magerlein and Silvana D'Auria and Amnon Ribak and Gil Shapir and Fabio Schiattarella and John Tolva and Andrey Zelenkov Populating the Hermitage Museum's new Web site . . . . . . . . . . . . . . . . 52--52 Calvin K. M. Lam and Bernard C. Y. Tan The Internet is changing the music industry . . . . . . . . . . . . . . . . 62--62 Henry Lieberman and Christopher Fry and Louis Weitzman Exploring the Web with reconnaissance agents . . . . . . . . . . . . . . . . . 69--69 Nong Ye and Joseph Giordano and John Feldman A process control approach to cyber attack detection . . . . . . . . . . . . 76--76 John Benamati and Albert L. Lederer Coping with rapid changes in IT . . . . 83--83 Albert Levi and Çetin Kaya Koç Inside risks: Risks in email security 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Telecommuting Loses Appeal; Privacy Issue for DNA Database; No Copying, No Warning; Big `Boss' Is Watching; Men Outperform Women in Virtual World; Cell Phone Radio Waves Made Public; The Mystery of the Sucking Shower Curtain . . . . . . . . . . . . . 9--10 Diane Crawford and Oleg Dulin and David Arnold and Fred Niederman and Ralpha Castain and Bill Rivera Forum: How to Address the Global IT Worker Shortage; Proposals for Attracting Women Back into IT . . . . . 11--11 Robert L. Glass Practical programmer: of model changeovers, style, and fatware . . . . 17--20 Meg McGinity Staying connected: suit yourself . . . . 21--24 Jane C. Ginsberg Viewpoint: what to know before reissuing old titles as e-books . . . . . . . . . 25--25 Nikolaos A. Mylonopoulos and Vasilis Theoharakis On site: global perceptions of IS journals . . . . . . . . . . . . . . . . 29--33 Vinton Cerf Beyond the post-PC Internet . . . . . . 34--37 Adrian Hooke The interplanetary Internet . . . . . . 38--40 Leonard Kleinrock Breaking loose . . . . . . . . . . . . . 41--46 José A. Corrales An Asturian view of networking 2015 . . 47--54 Lada A. Adamic and Bernardo A. Huberman The Web's hidden order . . . . . . . . . 55--60 Mark Weiser Whatever happened to the next-generation Internet? . . . . . . . . . . . . . . . 61--69 Lawrence A. Gordon and Martin P. Loeb Using information security as a response to competitor analysis systems . . . . . 70--75 Alvin T. S. Chan and Jiannong Cao and Henry Chan and Gilbert Young A Web-enabled framework for smart card applications in health services . . . . 76--82 Glenn B. Bell and Anil Sethi Matching records in a national medical patient index . . . . . . . . . . . . . 83--88 Terry Huston Security issues for implementation of e-medical records . . . . . . . . . . . 89--94 Mohammed E. Fayad and Adam Altman Thinking objectively: an introduction to software stability . . . . . . . . . . . 95--95 Emil Sit and Kevin Fu Inside Risks: Web cookies: not just a privacy risk . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: ACM Files Declaration; Taking a Bite Out of Shark Attacks; China Web Growth; Photomapping Technology; Simulating Mercury's Wobble; Cell Phone Impact on Wildlife; Wile E. Coyote Doesn't Stand a Chance . . . . . 9--10 Diane Crawford and Ted Mihalsin and William Bogstad and Daniel Kiem and J. William Cupp and Sandy Ressler Forum: How Big is ``Big'' When it Comes to Data Sets? Similar Figures for Women Math Majors; Commendation . . . . . . . 11--12 Phillip Armour The business of software: Zeppelins and jet planes: a metaphor for modern software projects . . . . . . . . . . . 13--15 Neil Munro From Washington: considering the broadband debate . . . . . . . . . . . . 17--19 Keith Devlin Viewpoint: the real reason why software engineers need math . . . . . . . . . . 21--22 Barbara Simons Viewpoint: the ACM declaration in Felten v. RIAA . . . . . . . . . . . . . . . . 23--26 Tzilla Elrad and Robert E. Filman and Atef Bader Aspect-oriented programming: Introduction . . . . . . . . . . . . . . 29--32 Tzilla Elrad and Mehmet Aksits and Gregor Kiczales and Karl Lieberherr and Harold Ossher Discussing aspects of AOP . . . . . . . 33--38 Karl Lieberherr and Doug Orleans and Johan Ovlinger Aspect-oriented programming with adaptive methods . . . . . . . . . . . . 39--41 Harold Ossher and Peri Tarr Using multidimensional separation of concerns to (re)shape evolving software 43--50 Lodewijk Bergmans and Mehmet Aksits Composing crosscutting concerns using composition filters . . . . . . . . . . 51--57 Gregor Kiczales and Erik Hilsdale and Jim Hugunin and Mik Kersten and Jeffrey Palm and William Griswold Getting started with ASPECTJ . . . . . . 59--65 J. Andrés Díaz Pace and Marcelo R. Campo Analyzing the role of aspects in software design . . . . . . . . . . . . 66--73 Gail C. Murphy and Robert J. Walker and Elisa L. A. Baniassad and Martin P. Robillard and Albert Lai and Mik A. Kersten Does aspect-oriented programming work? 75--77 Yvonne Coady and Gregor Kiczales and Mike Feeley and Norm Hutchinson and Joon Suan Ong Structuring operating system aspects: using AOP to improve OS structure modularity . . . . . . . . . . . . . . . 79--82 Paniti Netinant and Tzilla Elrad and Mohamed E. Fayad A layered approach to building open aspect-oriented systems: a framework for the design of on-demand system demodularization . . . . . . . . . . . . 83--85 Jeff Gray and Ted Bapty and Sandeep Neema and James Tuck Handling crosscutting constraints in domain-specific modeling . . . . . . . . 87--93 Gregory T. Sullivan Aspect-oriented programming using reflection and metaobject protocols . . 95--97 Cherri Pancake and Christian Lengauer High-performance Java . . . . . . . . . 98--101 José E. Moreira and Samuel P. Midkiff and Manish Gupta and Pedro V. Artigas and Peng Wu and George Almasi The NINJA project . . . . . . . . . . . 102--109 Thilo Kielmann and Philip Hatcher and Luc Bougé and Henri E. Bal Enabling Java for high-performance computing . . . . . . . . . . . . . . . 110--117 Vladimir Getov and Gregor von Laszewski and Michael Philippsen and Ian Foster Multiparadigm communications in Java for grid computing . . . . . . . . . . . . . 118--125 Henry F. Ledgard Technical opinion: The emperor with no clothes . . . . . . . . . . . . . . . . 126--128 Ralph Westfall Technical opinion: Hello, world considered harmful . . . . . . . . . . . 129--130 Stephan Somogyi and Bruce Schneier Inside Risks: The perils of port 80 . . 168--168
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: NSA's Data Overload Slows Intelligence; Disaster Plans, Thanks to Y2K; Simulating the Birth of the Moon; Looking for a Few Good Hackers; GPS for Plane Navigation; Free Medical Journal Access; Music to Live By; Tracking Employee Trust . . . . . . . . . . . . . 9--10 Diane Crawford and Scott E. Hamilton and David Touretzky and Raymond Michiels and David Parnas and Peter Denning and Alan Creak Forum: Simple Copyright Violation or Unlawful Circumvention? Outlawing Numbers Impractical; Defining Information; Special Needs and Sound Scholarship . . . . . . . . . . . . . . 11--15 Brock N. Meeks Electronic Frontier: Blanking on rebellion: where the future is ``Nabster'' . . . . . . . . . . . . . . 17--20 Peter J. Denning and Robert Dunham The Profession of IT: The core of the third-wave professional . . . . . . . . 21--25 Fran Berman Viewpoint: From TeraGrid to knowledge grid . . . . . . . . . . . . . . . . . . 27--28 Albert Huang On Site: Innovative use of email for teaching . . . . . . . . . . . . . . . . 29--32 Brad A. Myers Using handhelds and PCs together . . . . 34--41 Ravi Bapna and Paulo Goes and Alok Gupta Insights and analyses of online auctions 42--50 Michael Ettredge and Vernon J. Richardson and Susan Scholz A Web site design model for financial information . . . . . . . . . . . . . . 51--56 Alina M. Chircu and Robert J. Kauffman and Doug Keskey Maximizing the value of Internet-based corporate travel reservation systems . . 57--63 John Gray The end of career . . . . . . . . . . . 65--69 John Backus Funding the computing revolution's third wave . . . . . . . . . . . . . . . . . . 70--76 Nicholas Carriero and David Gelernter A computational model of everything . . 77--81 Mark Burgin How we know what technology can do . . . 82--88 Henry C. Lucas Information technology and physical space . . . . . . . . . . . . . . . . . 89--96 Steve Sawyer A market-based perspective on information systems development . . . . 97--102 Lauren Weinstein and Peter G. Neumann Inside Risks: Risks of panic . . . . . . 152--152
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Privacy Tradeoff Fighting Terrorism; Information Removal; Military-Issue Handhelds; Haptic Tug-of-War; Turning Back 10 Billion (Web) Pages of Time; Brainy Baboons; Grunt Work . . . . . . . . . . . . . . . 9--10 Diane Crawford and Scott W. Ambler and John Jaros and Jim Highsmith and Kurt Guntheroth and Eric A. Weiss and Steven Pothier Forum: One Sure Thing if Good Clean Code; Exposing Agency Injustices; Targeting Software Project Goals; Taking a Stand on Copyright . . . . . . . . . . 11--13 Hal Berghel Digital Village: The Code Red Worm . . . 15--19 Roger C. Schank Log on Education: Revolutionizing the Traditional Classroom Course . . . . . . 21--24 Ka-Ping Yee On Site: Operating an Emergency Information Service . . . . . . . . . . 25--28 Jon M. Peha On Site: The Growing Debate Over Science and Technology Advice for Congress . . . 29--31 Vir V. Phoha Viewpoint: The DMCA Needs Fixing . . . . 33--34 Zakaria Maamar and Eric Dorion and Catherine Daigle Technical Opinion: Toward Virtual Marketplaces for E-Commerce Support . . 35--38 James M. Ragusa and Grace M. Bochenek Collaborative Virtual Design Environments: Introduction . . . . . . . 40--43 Randall C. Smith Shared Vision . . . . . . . . . . . . . 45--48 R. Bowen Loftin Design Engineering in Virtual Environments . . . . . . . . . . . . . . 49--50 Mark Maybury Collaborative Virtual Environments for Analysis and Decision Support . . . . . 51--54 Mark Maybury and Ray D'Amore and David House Expert Finding for Collaborative Virtual Environments . . . . . . . . . . . . . . 55--56 Simon Su and R. Bowen Loftin A Shared Virtual Environment for Exploring and Designing Molecules . . . 57--58 Imre Horváth and Zoltán Rusák Collaborative Shape Conceptualization in Virtual Design Environments . . . . . . 59--63 Cristian Luciano and Pat Banerjee and Sanjay Mehrotra 3$D$ Animation of Telecollaborative Anthropomorphic Avatars . . . . . . . . 64--67 Robert Davison and Gert-Jan De Vreede Global Applications of Collaborative Technology: Introduction . . . . . . . . 68--70 Line Dubé and Guy Paré Global Virtual Teams . . . . . . . . . . 71--73 Sue Newell and Shan L. Pan and Robert D. Galliers and Jimmy C. Huang The Myth of the Boundaryless Organization . . . . . . . . . . . . . . 74--76 Séamas Kelly and Matthew Jones Groupware and the Social Infrastructure of Communication . . . . . . . . . . . . 77--79 Gerardine DeSanctis and Matthew Wright and Lu Jiang Building a Global Learning Community . . 80--82 Anne P. Massey and Mitzi Montoya-Weiss and Caisy Hung and V. Ramesh Cultural Perceptions of Task-Technology Fit . . . . . . . . . . . . . . . . . . 83--84 Sajda Qureshi and Ilze Zigurs Paradoxes and Prerogatives in Global Virtual Collaboration . . . . . . . . . 85--88 Roberto Evaristo Nonconsensual Negotiation in Distributed Collaboration . . . . . . . . . . . . . 89--89 Ram D. Gopal and Zhiping Walter and Arvind K. Tripathi Admediation: New Horizons in Effective Email Advertising . . . . . . . . . . . 91--96 Eric J. Glover and Steve Lawrence and Michael D. Gordon and William P. Birmingham and C. Lee Giles Web Search---Your Way . . . . . . . . . 97--102 J. Leon Zhao and Vincent H. Resh Internet Publishing and Transformation of Knowledge Processes . . . . . . . . . 103--109 Peter G. Neumann and Lauren Weinstein Inside Risks: Risks of National Identity Cards . . . . . . . . . . . . . . . . . 176--176
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Working Shadow; Hold That Thought; Access Advantage; Tuned Out or In?; Strength in Numbers; Research Salaries; Bye Big Blues; Sidebar: Hooked U. . . . . . . . . . . . . . . . . . . . 9--10 Phillip G. Armour The business of software: The spiritual life of projects . . . . . . . . . . . . 11--14 Neil Munro From Washington: Too much of a good thing . . . . . . . . . . . . . . . . . 15--17 Lloyd W. Bartholome and David H. Olsen On site: A practical approach for implementing e-commerce programs in business schools . . . . . . . . . . . . 19--21 Anthony M. Townsend and Anthony R. Hendrickson and Samuel M. DeMarie Viewpoint: Meeting the virtual work imperative . . . . . . . . . . . . . . . 23--26 Michael Lewis and Jeffrey Jacobson Game engines in scientific research: Introduction . . . . . . . . . . . . . . 27--31 Michael Lewis The new cards . . . . . . . . . . . . . 30--31 John E. Laird Research in human-level AI using computer games . . . . . . . . . . . . . 32--35 Wayne Piekarski and Bruce Thomas ARQuake: the outdoor augmented reality gaming system . . . . . . . . . . . . . 36--38 Jeffrey Jacobson and Zimmy Hwang Unreal tournament for immersive interactive theater . . . . . . . . . . 39--42 Gal A. Kaminka and Manuela M. Veloso and Steve Schaffer and Chris Sollitto and Rogelio Adobbati and Andrew N. Marshall and Andrew Scholer and Sheila Tejada GameBots: a flexible test bed for multiagent team research . . . . . . . . 43--45 Markus Bylund and Fredrik Espinoza Testing and demonstrating context-aware services with Quake III Arena . . . . . 46--48 CACM Staff The ACM annual report FY01 . . . . . . . 49--52 Murugan Anandarajan Internet abuse in the workplace: Introduction . . . . . . . . . . . . . . 53--54 Jeffrey M. Stanton Company profile of the frequent Internet user . . . . . . . . . . . . . . . . . . 55--59 Jo Ann Oravec Constructive approaches to Internet recreation in the workplace . . . . . . 60--63 France Belanger and Craig Van Slyke Abuse or learning? . . . . . . . . . . . 64--65 Vivien K. G. Lim and Thompson S. H. Teo and Geok Leng Loo How do I loaf here? Let me count the ways . . . . . . . . . . . . . . . . . . 66--70 Claire A. Simmers Aligning Internet usage with business priorities . . . . . . . . . . . . . . . 71--74 Keng Siau and Fiona Fui-Hoon Nah and Limei Teng Acceptable Internet use policy . . . . . 75--79 Andrew Urbaczewski and Leonard M. Jessup Does electronic monitoring of employee Internet usage work? . . . . . . . . . . 80--83 Raymond R. Panko and Hazel Glenn Beh Monitoring for pornography and sexual harassment . . . . . . . . . . . . . . . 84--87 Upkar Varshney and Andy Snow and Matt McGivern and Christi Howard Voice over IP . . . . . . . . . . . . . 89--96 Chittibabu Govindarajulu The status of helpdesk support . . . . . 97--100 Julie Smith David and David Schuff and Robert St. Louis Managing your total IT cost of ownership 101--106 Cris Kobryn Technical opinion: Will UML 2.0 be agile or awkward? . . . . . . . . . . . . . . 107--110 Mohamed Fayad Thinking objectively: Accomplishing software stability . . . . . . . . . . . 111--115 Robert E. Filman and Stuart Barrett and Diana D. Lee and Ted Linden Inserting ilities by controlling communications . . . . . . . . . . . . . 116--122 Rebecca Mercuri Inside risks: Uncommon criteria . . . . 172--172
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6 Robert Fox News Track: A Blessing and a Curse; Jacked-In Jersey; Not Just Music; Infectious Glow; All-Seeing; On Your Mark; Brain Waves; Diabolical Degree . . 9--10 Diane Crawford and Byron Weber Becker and Jaime Nino and Hugh McGuire and Gil Colgate and Mark Lutton and Vladimir Safonov and Ralph Westfall and Bradley K. Sherman and Ed Lowry and Kurt Guntheroth Forum: `Hello, World' Gets Mixed Greetings; Westfall Responds; The Emperor's Wardrobe; Targeting Zeppelins 11--17 Andrew Grosso Legally speaking: Why the Digital Millennium Copyright Act is a failure of reason . . . . . . . . . . . . . . . . . 19--23 Robert L. Glass Practical programmer: Stodgy by design, and the notion of `dumbing up' . . . . . 25--27 Felipe Castel Ontological computing . . . . . . . . . 29--30 Ben Shneiderman Viewpoint: ACM's computing professionals face new challenges . . . . . . . . . . 31--34 Qing Bian Zhang and Patrick Y. K. Chau On site: Creating e-commerce courses with regional intent . . . . . . . . . . 35--37 Michael Gruninger and Jintae Lee Ontology applications and design: Introduction . . . . . . . . . . . . . . 39--41 Clyde W. Holsapple and K. D. Joshi A collaborative approach to ontology design . . . . . . . . . . . . . . . . . 42--47 Henry Kim Predicting how ontologies for the semantic Web will evolve . . . . . . . . 48--54 John O. Everett and Daniel G. Bobrow and Reinhard Stolle and Richard Crouch and Valeria de Paiva and Cleo Condoravdi and Martin van den Berg and Livia Polanyi Making ontologies work for resolving redundancies across documents . . . . . 55--60 Nicola Guarino and Christopher Welty Evaluating ontological decisions with OntoClean . . . . . . . . . . . . . . . 61--65 Bert J. Dempsey and Debra Weiss and Paul Jones and Jane Greenberg Who is an open source software developer? . . . . . . . . . . . . . . . 67--72 Jo Ellen Moore and Lisa A. Burke How to turn around `turnover culture' in IT . . . . . . . . . . . . . . . . . . . 73--78 William J. Kettinger and Choong C. Lee Understanding the IS-user divide in IT innovation . . . . . . . . . . . . . . . 79--84 Delvin Grant A wider view of business process reengineering . . . . . . . . . . . . . 85--90 Gordon Bell and Jim Gray What's next in high-performance computing? . . . . . . . . . . . . . . . 91--95 Richard T. Snodgrass Rights and responsibilities in ACM publishing: Progress on ACM's becoming the Preferred Publisher . . . . . . . . 97--101 Thomas Erickson Technical opinion: Some problems with the notion of context-aware computing 102--104 Evgeniy Gabrilovich and Alex Gontmakher Inside risks: The homograph attack . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Boosting Military Tech Spending; Press `Eject' Button and Call Security; Identity Tops Theft List; Pashto-Phonics; Talk to the (Gloved) Hand; Winning Over Girls on the Gadget Front; A Robot to Do a Nano-Crab's Work; When Web Surfing Turns to Googlewhacking 9--10 Diane Crawford and Richard Staehli and Donald J. Reifer and Anonymous and William L. Anderson and Atanas Radenski and Rick Simkin and Ram D. Gopal and Zhiping Walter and Arvind K. Tripathi and Phil Armour Forum: Doubts and Hopes for AOP; Social and Technical Aspects of Information Systems Design and Deployment; Classroom Teaching vs. Online Courses; No Unsolicited Email Ads for Me, Please; A Chilling Virus . . . . . . . . . . . . . 11--14 Peter Denning Internet time out . . . . . . . . . . . 15--18 Meg McGinity Call it techonomics . . . . . . . . . . 19--21 The Stanford Student Computer and Network Privacy Project A study of student privacy issues at Stanford University . . . . . . . . . . 23--25 Ananda Mitra Trust, authenticity, and discursive power in cyberspace . . . . . . . . . . 27--29 Gaurav S. Sukhatme and Maja J. Matari\'c Robots: Intelligence, Versatility, Adaptivity . . . . . . . . . . . . . . . 30--32 Rodney Brooks Humanoid robots . . . . . . . . . . . . 33--38 Daniela Rus and Zack Butler and Keith Kotay and Marsette Vona Self-reconfiguring robots . . . . . . . 39--45 Oussama Khatib and Oliver Brock and Kyong-Sok Chang and François Conti and Diego Ruspini and Luis Sentis Robotics and interactive simulation . . 46--51 Sebastian Thrun Probabilistic robotics . . . . . . . . . 52--57 Manuela M. Veloso Entertainment robotics . . . . . . . . . 59--63 Richard T. Grenci and Peter A. Todd Solutions-driven marketing . . . . . . . 64--71 John Cameron Configurable development processes . . . 72--77 Leysia Palen Mobile telephony in a connected life . . 78--82 Huaiqing Wang and John Mylopoulos and Stephen Liao Intelligent agents and financial risk monitoring systems . . . . . . . . . . . 83--88 Vincent S. Lai and Wingyan Chung Managing international data communications . . . . . . . . . . . . . 89--93 Ruzena Bajcsy and Craig Reynolds Computer science: the science of and about information and computation . . . 94--98 Peter J. Denning and James J. Horning Inside Risks: Risks of linear thinking 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Security Boom; Line-of-Sight Laser Communication; Toxic Tech Exports; Internet Not Ready for Public Elections; Chip Implant for Positive ID; Clicking Overseas to the Movies; Finland? How About Nokialand? . . . . . . . . . . . . 9--10 Diane Crawford and Edward J. Beroset and John Jaros and C. J. Date and Robert Plotkin and Rick Simkin and Thomas W. Moran and Hugh Kawabata and Neil Munro and Jason Funk and Pal Valckenaers and Bob Rinker and Brock Meeks and Dennis de Champeaux and John A. Wills and Gabriel Mateescu Forum: Don't Take Civil Liberties in the Name of National Security; Spare Me the Paranoia; Taking Responsibility for Worms and Viruses; Who's Research is Unethical?; Dual Parallelism in the Grid 11--16 Mark Guzdial and Elliot Soloway Log on education: Teaching the Nintendo generation to program . . . . . . . . . 17--21 Hal Berghel Digital village: Hijacking the Web: Cookies revisited: Continuing the dialogue on personal security and underlying privacy issues . . . . . . . 23--27 Murray Turoff On site: Past and future emergency response information systems . . . . . . 29--32 David Davenport Viewpoint: Anonymity on the Internet: why the price may be too high . . . . . 33--35 Jenny Preece Introduction: Supporting community and building social capital . . . . . . . . 37--39 Thomas Erickson and Christine Halverson and Wendy A. Kellogg and Mark Laff and Tracee Wolf Social translucence: designing social infrastructures that make collective activity visible . . . . . . . . . . . . 40--44 Judith Donath A semantic approach to visualizing online conversations . . . . . . . . . . 45--49 Marc Smith Tools for navigating large social cyberspaces . . . . . . . . . . . . . . 51--55 Starr Roxanne Hiltz and Murray Turoff What makes learning networks effective? 56--59 Amy Bruckman The future of e-learning communities . . 60--63 Dorine C. Andrews Audience-specific online community design . . . . . . . . . . . . . . . . . 64--68 David R. Millen and Michael A. Fontaine and Michael J. Muller Understanding the benefit and costs of communities of practice . . . . . . . . 69--73 Judy E. Scott and Iris Vessey Managing risks in enterprise systems implementations . . . . . . . . . . . . 74--81 Thomas Schambach and J. Ellis Blanton The professional development challenge for IT professionals . . . . . . . . . . 83--87 Bonnie A. Nardi and Steve Whittaker and Ellen Isaacs and Mike Creech and Jeff Johnson and John Hainsworth Integrating communication and information through ContactMap . . . . . 89--95 Mordechai Ben-Menachem and Roy Gelbard Integrated IT management tool kit . . . 96--102 Arnd Weber Enabling crypto: how radical innovations occur . . . . . . . . . . . . . . . . . 103--107 Mohamed E. Fayad Thinking objectively: How to deal with software stability . . . . . . . . . . . 109--112 David W. J. Stringer-Calvert Inside Risks: Digital evidence . . . . . 128--128
Marie-Mich\`ele Boulet and Faouzi Ben Jebara and Fathi Bemmira and Serge Boudreault A Comparison of Three Delivery Systems for Teaching an Information Technology Course . . . . . . . . . . . . . . . . . 129--135 Vladan Deved\vzi\'c Understanding Ontological Engineering 136--144 Christos J. Georgiou and Petros S. Stefaneas Strategies for Accelerating the Worldwide Adoption of E-Commerce . . . . 145--151 T. Dean Hendrix and Michelle P. Schneider NASA's TReK Project: A Case Study in Using the Spiral Model of Software Development . . . . . . . . . . . . . . 152--159 William Hibbard and Curtis Rueden and Steve Emmerson and Tom Rink and David Glowacki and Tom Whittaker and Don Murray and David Fulker and John Anderson Java Distributed Objects for Numerical Visualization in VisAD . . . . . . . . . 160--170 Gretchen L. Robertson and Deborah Hix Making the Computer Accessible to Mentally Retarded Adults . . . . . . . . 171--183 Beverly K. Kahn and Diane M. Strong and Richard Y. Wang Information Quality Benchmarks: Product and Service Performance . . . . . . . . 184--192 Anandasivam Gopal and Tridas Mukhopadhyay and Mayuram S. Krishnan The Role of Software Processes and Communication in Offshore Software Development . . . . . . . . . . . . . . 193--200 Ravi Patnayakuni and Arun Rai Development Infrastructure Characteristics and Process Capability 201--210 Leo L. Pipino and Yang W. Lee and Richard Y. Wang Data Quality Assessment . . . . . . . . 211--218 Moshe Zviran Securing PC Applications: The Relay Race Approach . . . . . . . . . . . . . . . . 219--227
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Part Cyborg, Part Human; Airline (Web) Revenue Soars; Cutting Work Privileges; Slight Change in High-Tech Hirings; Monkey Think, Monkey Do; Campus File-Swapping Truce; Love Found, Love Lost . . . . . . . . . . . . 9--10 Diane Crawford and Steven Warshawsky and Kamesh Balasubramanian and H. Paul Zeiger and Richard Ho and David Cymbala and John C. Nash and Bertrand Meyer and Mordechai Ben-Menachem Forum: The Spirited Sides of a Story; Strength in Stability; Total Picture; A Readable Plea; The More Things Change\ldots . . . . . . . . . . . . . . 11--13 Robert L. Glass Searching for the holy grail of software engineering . . . . . . . . . . . . . . 15--16 Phillip G. Armour The organism and the mechanism of projects . . . . . . . . . . . . . . . . 17--20 Pratyush Bharati and Peter Tarasewich Global perceptions of journals publishing e-commerce research . . . . . 21--26 Wei-Lung Wang Beware the engineering metaphor . . . . 27--29 Peter Brusilovsky and Mark T. Maybury From adaptive hypermedia to the adaptive Web . . . . . . . . . . . . . . . . . . 30--33 Daniel Billsus and Clifford A. Brunk and Craig Evans and Brian Gladish and Michael Pazzani Adaptive interfaces for ubiquitous Web access . . . . . . . . . . . . . . . . . 34--38 Barry Smyth and Keith Bradley and Rachael Rafter Personalization techniques for online recruitment services . . . . . . . . . . 39--40 Josef Fink and Jürgen Koenemann and Stephan Noller and Ingo Schwab Putting personalization into practice 41--42 Elisabeth André and Thomas Rist From adaptive hypertext to personalized Web companions . . . . . . . . . . . . . 43--46 Keith Cheverst and Keith Mitchell and Nigel Davies The role of adaptive hypermedia in a context-aware tourist GUIDE . . . . . . 47--51 Liliana Ardissono and Anna Goy and Giovanna Petrone and Marino Segnan Personalization in business-to-customer interaction . . . . . . . . . . . . . . 52--53 Marc Light and Mark T. Maybury Personalized multimedia information access . . . . . . . . . . . . . . . . . 54--59 Paul De Bra Adaptive educational hypermedia on the Web . . . . . . . . . . . . . . . . . . 60--61 Diana Bental and Alison Cawsey Personalized and adaptive systems for medical consumer applications . . . . . 62--63 Alfred Kobsa Personalized hypermedia and international privacy . . . . . . . . . 64--67 Edieal J. Pinker and Abraham Seidmann and Reginald C. Foster Strategies for transitioning `old economy' firms to e-business . . . . . . 76--83 Christian Wagner and Efraim Turban Are intelligent e-commerce agents partners or predators? . . . . . . . . . 84--90 Barry Wellman Designing the Internet for a networked society . . . . . . . . . . . . . . . . 91--96 John J. Helly and T. Todd Elvins and Don Sutton and David Martinez and Scott E. Miller and Steward Pickett and Aaron M. Ellison Controlled publication of digital scientific data . . . . . . . . . . . . 97--101 Ned Kock Managing with Web-based IT in mind . . . 102--106 Michael Tow Cheung and Ziqi Liao Time-asymmetry in business processes . . 107--108 Lauren Weinstein Inside Risks: Risks of inaction . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Floating Transponders; Gonzo Journalism Redefined; China Second in Web Use; Household Appliances, Lend Me Your Ears; GPS as Prison Guard; Newest Hack: Blinking Lights; Its Name Is ASIMO; Beware Net Spirituality . . . . . 9--10 Diane Crawford and Peter Magsig and Marc Shapiro and Paul Zeiger and Pete McDougall and Earl Furman and James Bach and Sandy Ressler and Daniel Savarese Forum: Weighing in on the notion of `dumbing up' . . . . . . . . . . . . . . 11--13 Peter J. Denning The profession of IT: Flatlined . . . . 15--19 Meg McGinity Staying connected: Broadband to go . . . 21--24 Harold W. Lawson Viewpoint: Rebirth of the computer industry . . . . . . . . . . . . . . . . 25--29 Gul A. Agha Introduction: Adaptive Middleware . . . 30--32 Fabio Kon and Fabio Costa and Gordon Blair and Roy H. Campbell The case for reflective middleware . . . 33--38 Anand Tripathi Challenges designing next-generation middleware systems . . . . . . . . . . . 39--42 Douglas C. Schmidt Middleware for real-time and embedded systems . . . . . . . . . . . . . . . . 43--48 Nalini Venkatasubramanian Safe `composability' of middleware services . . . . . . . . . . . . . . . . 49--52 Valérie Issarny and Christos Kloukinas and Apostolos Zarras Systematic aid for developing middleware architectures . . . . . . . . . . . . . 53--58 Jean Bacon and Ken Moody Toward open, secure, widely distributed services . . . . . . . . . . . . . . . . 59--64 Diane Crawford ACM fellows . . . . . . . . . . . . . . 65--65 Michael Ettredge and Vernon J. Richardson and Susan Scholz \em Timely financial reporting at corporate Web sites? . . . . . . . . . . 67--71 Kai Lung Hui and Patrick Y. K. Chau Classifying digital products . . . . . . 73--79 Gary Klein and James J. Jiang and Debbie B. Tesch Wanted: project teams with a blend of is professional orientations . . . . . . . 81--87 Gloria Mark Extreme collaboration . . . . . . . . . 89--93 Raquel Benbunan-Fich Improving education and training with IT 94--99 James A. Aries and Subhankar Banerjee and Marc S. Brittan and Eric Dillon and Janusz S. Kowalik and John P. Lixvar Capacity and performance analysis of distributed enterprise systems . . . . . 100--105 Patrick P. Gelsinger Technical opinion: Power play . . . . . 106--106 Ross Anderson Inside Risks: Free speech online and offline . . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track: Eye on Sensitive Student Visas; E-Tooling Government IT Recruiting; Remote Control Ratbots; More Hack Attacks in Israel; Felt-Tipped Pen Mightier Than CD Copy Protection; Need a Screen? Paint One; Where High-Tech CEOs See Growth; All Thumbs in Japan . . . . 9--10 Diane Crawford and Aram Gharib and Ken Kahn and B. Jagannathan and Richard Stallman and Jim Densmore Forum: In Praise of Work's Human Dimension; Make it Visible, Tangible, Graphical; Justifying Anonymity; Free Software Reality v. Deception; Already Maxed Out . . . . . . . . . . . . . . . 11--12 Brock N. Meeks Electronic frontier: True blue and vigilante, too . . . . . . . . . . . . . 13--15 Neil Munro From Washington: The ever-expanding network of local and federal databases 17--19 Shai Simonson On site: A post-baccalaureate undergraduate-level program in computer science . . . . . . . . . . . . . . . . 21--24 Maris G. Martinsons and Valdis Martinsons Viewpoint: Rethinking the value of IT, again . . . . . . . . . . . . . . . . . 25--26 Andrew Rosenbloom How the virtual inspires the real . . . 28--31 W. Daniel Hillis The power to shape the world . . . . . . 32--35 Alvy Ray Smith The reality of simulated actors . . . . 36--39 Theresa-Marie Rhyne Computer games and scientific visualization . . . . . . . . . . . . . 40--44 Clemens Wagner and Markus Schill and Reinhard Männer Intraocular surgery on a virtual eye . . 45--49 Marc Pollefeys and Luc Van Gool From images to $3$D models . . . . . . . 50--55 Norman I. Badler and Charles A. Erignac and Ying Liu Virtual humans for validating maintenance procedures . . . . . . . . . 56--63 Mark Billinghurst and Hirokazu Kato Collaborative augmented reality . . . . 64--70 Gordon Bell and Jim Gemmell A call for the home media network . . . 71--75 Toru Ishida Digital city Kyoto . . . . . . . . . . . 76--81 Katherine M. Shelfer and J. Drew Procaccino Smart card evolution . . . . . . . . . . 83--88 John M. Gallaugher E-commerce and the undulating distribution channel . . . . . . . . . . 89--95 Snehamay Banerjee and Ram L. Kumar Managing electronic interchange of business documents . . . . . . . . . . . 96--102 Jonathon N. Cummings and Brian Butler and Robert Kraut The quality of online social relationships . . . . . . . . . . . . . 103--108 Robert Davison Technical opinion: Cultural complications of ERP . . . . . . . . . . 109--111 Donald A. Norman Inside risks: Beyond the computer industry . . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News tracks . . . . . . . . . . . . . . 9--10 Diane Crawford and Srinivas Nedunuri and Adrian Bowyer and Arnd Weber and Greg A. Woods and Mark Adler Forum: Embrace the Engineering Metaphor; Credit for Crypto's Parallel Development; Enough PDF: Give me HTML 11--14 Cathleen Norrisand and Elliot Soloway and Terry Sullivan Log on education: Examining 25 years of technology in U.S. education . . . . . . 15--18 Robert L. Glass Practical programmer: The proof of correctness wars . . . . . . . . . . . . 19--21 Christof Teuscher and Moshe Sipper Viewpoint: Hypercomputation: hype or computation? . . . . . . . . . . . . . . 23--24 Ross A. Malaga On site: Additional methods when using email for teaching . . . . . . . . . . . 25--27 Usama Fayyad and Ramasamy Uthurusamy Evolving data into mining solutions for insights . . . . . . . . . . . . . . . . 28--31 Padhraic Smyth and Daryl Pregibon and Christos Faloutsos Data-driven evolution of data mining algorithms . . . . . . . . . . . . . . . 33--37 Paul Bradley and Johannes Gehrke and Raghu Ramakrishnan and Ramakrishnan Srikant Scaling mining algorithms to large databases . . . . . . . . . . . . . . . 38--43 Ron Kohavi and Neal J. Rothleder and Evangelos Simoudis Emerging trends in business analytics 45--48 Chidanand Apte and Bing Liu and Edwin P. D. Pednault and Padhraic Smyth Business applications of data mining . . 49--53 Jiawei Han and Russ B. Altman and Vipin Kumar and Heikki Mannila and Daryl Pregibon Emerging scientific applications in data mining . . . . . . . . . . . . . . . . . 54--58 Robert L. Grossman and Mark F. Hornick and Gregor Meyer Data mining standards initiatives . . . 59--61 Peter Tarasewich and Patrick R. McMullen Swarm intelligence: power in numbers . . 62--67 Tim Coltman and Timothy M. Devinney and Alopi S. Latukefu and David F. Midgley Keeping e-business in perspective . . . 69--73 Clayton A. Looney and Debabroto Chatterjee Web-enabled transformation of the brokerage industry . . . . . . . . . . . 75--81 Craig Van Slyke and Christie L. Comunale and France Belanger Gender differences in perceptions of Web-based shopping . . . . . . . . . . . 82--86 George Chin and James Myers and David Hoyt Social networks in the virtual science laboratory . . . . . . . . . . . . . . . 87--92 M. A. Quaddus and Lai Lai Tung Explaining cultural differences in decision conferencing . . . . . . . . . 93--98 Lawrence G. Jones and Arthur L. Price Changes in computer science accreditation . . . . . . . . . . . . . 99--103 Nick Ourosoff Technical opinion: Primitive types in Java considered harmful . . . . . . . . 105--106 Tolga Acar and John R. Michener Inside risks: Risks in features vs. assurance . . . . . . . . . . . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track: Symbols for Vagabond Users; Chipped Tooth; Pixel Fix on Visual Intelligence; Blinking Bumper; Virtual House Calls; More Than One Billion Served; Math and Science Teachers Wanted; Crash Test Dummy . . . . . . . . 9--10 Diane Crawford and Al Endres and Jason Funk and John Florentin and Gregg Irwin and Bud Lawson and Alvin P. Mullery and Christian Wagner and Efraim Turban Forum: Influencing Factors in the Computer Industry; The Difference Between Intelligent Agents and Mobile Agents . . . . . . . . . . . . . . . . . 11--14 Hal Berghel Digital Village: Responsible Web caching 15--20 Peter J. Denning The Profession of IT: Career redux . . . 21--26 Paul F. Ross On Site: Whatever became of integrity? 27--28 Maria M. Klawe Letter from the President: Making a difference through computing communities 29--30 Ralph R. Miller Viewpoint: Information management in the aftermath of 9/11 . . . . . . . . . . . 31--33 Simon Davies A year after 9/11: where are we now? . . 35--39 Eric A. Brewer Introduction: The Consumer Side of Search . . . . . . . . . . . . . . . . . 40--41 Marti Hearst and Ame Elliott and Jennifer English and Rashmi Sinha and Kirsten Swearingen and Ka-Ping Yee Finding the flow in Web site search . . 42--49 James Pitkow and Hinrich Schütze and Todd Cass and Rob Cooley and Don Turnbull and Andy Edmonds and Eytan Adar and Thomas Breuel Personalized search . . . . . . . . . . 50--55 Abbe Mowshowitz and Akira Kawaguchi Bias on the Web . . . . . . . . . . . . 56--60 James Gerlach and Bruce Neumann and Edwin Moldauer and Martha Argo and Daniel Frisby Determining the cost of IT services . . 61--67 Ellen Isaacs and Alan Walendowski and Dipti Ranganathan Mobile instant messaging through Hubbub 68--72 Ritu Agarwal and Thomas W. Ferratt Enduring practices for managing IT professionals . . . . . . . . . . . . . 73--79 Mike Morrison and Joline Morrison and Anthony Keys Integrating Web sites and databases . . 81--86 Craig K. Tyran and Joey F. George Improving software inspections with group process support . . . . . . . . . 87--92 William R. King and Peter V. Marks, Jr. and Scott McCoy The most important issues in knowledge management . . . . . . . . . . . . . . . 93--97 Nikolay V. Shilov and Kwangkeun Yi Engaging students with theory through ACM Collegiate Programming Contests . . 98--101 Mohamed Fayad and Shasha Wu Thinking Objectively: Merging multiple conventional models in one stable model 102--106 Mark Stamp Inside Risks: Risks of digital rights management . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track: Liquid Light; Let Your Finging Do the Paying; IT Professional Pressure Cooker; A Spot in the Clouds; Must See Floppy TV; Mainframe Skill Shortage; Moore's Law and Cyronic Suspension . . . . . . . . . . . . . . . 9--10 Rebecca T. Mercuri Security Watch: Computer security: quality rather than quantity . . . . . . 11--14 Pamela Samuelson Legally Speaking: Reverse engineering under siege . . . . . . . . . . . . . . 15--20 R. S. Boyer and W. Feijen and D. Gries and C. A. R. Hoare and J. Misra and J. Moore and H. Richards In memoriam: Edsger W. Dijkstra 1930--2002 . . . . . . . . . . . . . . . 21--22 Rafael Palacios On Site: Remote automatic doorman via the Internet . . . . . . . . . . . . . . 23--25 Alan Howard Viewpoint: Rapid Application Development: rough and dirty or value-for-money engineering? . . . . . . 27--29 Ali Arsanjani Introduction: Developing and Integrating Enterprise Components and Services . . . 30--34 Ivica Crnkovic and Brahim Hnich and Torsten Jonsson and Zeynep Kiziltan Specification, implementation, and deployment of components . . . . . . . . 35--40 Erik Meijer and Clemens Szyperski Overcoming independent extensibility challenges . . . . . . . . . . . . . . . 41--44 Keith Levi and Ali Arsanjani A goal-driven approach to enterprise component identification and specification . . . . . . . . . . . . . 45--52 Ricardo Jardim-Gonçalves and Adolfo Steiger-Garção Implicit multilevel modeling in flexible business environments . . . . . . . . . 53--57 Jeff Sutherland and Willem-Jan van den Heuvel Enterprise application integration and complex adaptive systems . . . . . . . . 59--64 Aniruddha Gokhale and Douglas C. Schmidt and Balachandran Natarajan and Nanbor Wang Applying model-integrated computing to component middleware and enterprise applications . . . . . . . . . . . . . . 65--70 Michael Stal Web services: beyond component-based computing . . . . . . . . . . . . . . . 71--76 Paul Fremantle and Sanjiva Weerawarana and Rania Khalaf Enterprise services . . . . . . . . . . 77--82 Soo Dong Kim Lessons learned from a nationwide CBD promotion project . . . . . . . . . . . 83--87 Winslow Burleson and Ted Selker Introduction: Creativity and Interface 88--90 Ernest Edmonds and Linda Candy Creativity, art practice, and knowledge 91--95 Lena Mamykina and Linda Candy and Ernest Edmonds Collaborative creativity . . . . . . . . 96--99 Sharon L. Greene Characteristics of applications that support creativity . . . . . . . . . . . 100--104 Michael Terry and Elizabeth D. Mynatt Supporting experimentation with Side-Views . . . . . . . . . . . . . . . 106--108 Chris Roast and Innes Ritchie and Stephanie Thomas Re-creating the reader: supporting active reading in literary research . . 109--111 John C. Thomas and Alison Lee and Catalina Danis Enhancing creative design via software tools . . . . . . . . . . . . . . . . . 112--115 Ben Shneiderman Creativity support tools . . . . . . . . 116--120 E. Vance Wilson Email winners and losers . . . . . . . . 121--126 Ali F. Farhoomand and Don H. Drury Managerial information overload . . . . 127--131 H. James Nelson and Deborah J. Armstrong and Mehdi Ghods Old dogs and new tricks . . . . . . . . 132--137 Patrick Y. K. Chau and Melissa Cole and Anne P. Massey and Mitzi Montoya-Weiss and Robert M. O'Keefe Cultural differences in the online behavior of consumers . . . . . . . . . 138--143 Rajeswari Malladi and Dharma P. Agrawal Technical Opinion: Current and future applications of mobile and wireless networks . . . . . . . . . . . . . . . . 144--146 Fred B. Schneider Inside Risks: Secure systems conundrum 160--160
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track: A Thousand Points of Light; Typing with Your Eyes; Cleaning Crustacean; The E-Bay of Argentina; Online Abduction Alerts; Fighting Airport Noise; Happy Birthday :-) . . . 9--10 Diane Crawford and Sherif Yacoub and John Stracke and Gordon Bell and Jim Gemmell and Bob Ellis and Myles Losch and Ronnie Ward and Anthony Ralston and Rich Henders and Steve Arnold and Mark Lutton Forum: I Want My Home Network; Consumer-Created Content Key to Broadband; Still Living Off Y2K Spending; Grading Education; Objective Opinion; PDF Peeves; Homemade Hypercomputation . . . . . . . . . . . . 11--14 Phillip Armour Business of Software: Ten unmyths of project estimation . . . . . . . . . . . 15--18 Robert L. Glass Practical Programmer: Sorting out software complexity . . . . . . . . . . 19--21 Boaz Gelbord and Gert Roelofsen Viewpoint: New surveillance techniques raise privacy concerns . . . . . . . . . 23--24 Zakaria Maamar and Weiming Shen Introduction: Computer-Supported Cooperative Work in Design . . . . . . . 25--26 Mark Klein and Hiroki Sayama and Peyman Faratin and Yaneer Bar-Yam A complex systems perspective on computer-supported collaborative design technology . . . . . . . . . . . . . . . 27--31 Soroush Sedaghat and Josef Pieprzyk and Ehsan Vossough On-the-fly Web content integrity check boosts users' confidence . . . . . . . . 33--37 Federico Bergenti and Agostino Poggi and Matteo Somacher A collaborative platform for fixed and mobile networks . . . . . . . . . . . . 39--44 Lihui Wang and Brian Wong and Weiming Shen and Sherman Lang A Java 3D-enabled cyber workspace . . . 45--49 Jim Gray and Alex Szalay The World-Wide Telescope . . . . . . . . 50--55 David P. Anderson and Jeff Cobb and Eric Korpela and Matt Lebofsky and Dan Werthimer SETI@home: an experiment in public-resource computing . . . . . . . 56--61 Jon Genetti Volume-rendered galactic animations . . 62--66 Joaquin Miller Introduction: What UML Should Be . . . . 67--69 Bran Selic and Guus Ramackers and Cris Kobryn Evolution, not revolution . . . . . . . 70--72 Keith Duddy UML2 must enable a family of languages 73--75 Stephen J. Mellor Make models be assets . . . . . . . . . 76--78 William Frank and Kevin P. Tyson Be clear, clean, concise . . . . . . . . 79--81 Dov Dori Why significant UML change is unlikely 82--85 John C. Knight and Nancy G. Leveson Should software engineers be licensed? 87--90 John White and Barbara Simons ACM's position on the licensing of software engineers . . . . . . . . . . . 91--91 Donald J. Bagert Texas licensing of software engineers: all's quiet, for now . . . . . . . . . . 92--94 Ken Kennedy and Moshe Y. Vardi A Rice University perspective on software engineering licensing . . . . . 94--95 David Lorge Parnas Licensing software engineers in Canada 96--98 Gord McCalla Software engineering requires individual professionalism . . . . . . . . . . . . 98--101 Dennis de Champeaux Technical opinion: Software engineering considered harmful . . . . . . . . . . . 102--104 Rebecca Mercuri Inside Risks: Florida 2002: sluggish systems, vanishing votes . . . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track: Software to Combat Terror; Translating the Art of War; Pressing Flesh for Transmission; Ripping and Burning DNA; New Meaning of ``PDA''; Advanced Electronics Second Guesses Umps; Sports in the Dark Possible . . . 9--10 Diane Crawford and C. W. Neville and James H. Fetzer and Rodney M. Bates and Paul E. McKenney and Ann Sobel and Michael Clarkson and Todd Palino and Hal Berghel Forum: Resolving the Program-Verification Debate; Handling Web Content . . . . . . . . . . . . . . 11--15 Victor Mbarika and Mike Jensen and Peter Meso International Perspectives: Cyberspace across sub-Saharan Africa . . . . . . . 17--21 Jens Palsberg and Scott J. Baxter On Site: Teaching reviewing to graduate students . . . . . . . . . . . . . . . . 22--24 Felipe Castel Viewpoint: Theory, theory on the wall 25--26 Upkar Varshney Multicast over wireless networks . . . . 31--37 Aviel D. Rubin Security considerations for remote electronic voting . . . . . . . . . . . 39--44 Troy J. Strader and Sridhar N. Ramaswami The value of seller trustworthiness in C2C online markets . . . . . . . . . . . 45--49 Christoph Schlueter-Langdon and Michael J. Shaw Emergent patterns of integration in electronic channel systems . . . . . . . 50--55 Wullianallur Raghupathi and Joseph Tan Strategic IT applications in health care 56--61 Kalle Lyytinen and Youngjin Yoo Introduction: Issues and challenges in ubiquitous computing . . . . . . . . . . 62--65 Gordon B. Davis Anytime/anyplace computing and the future of knowledge work . . . . . . . . 67--73 Jonathan Grudin Group dynamics and ubiquitous computing 74--78 Daniel P. Siewiorek New frontiers of application design . . 79--82 Andrew Fano and Anatole Gershman The future of business services in the age of ubiquitous computing . . . . . . 83--87 Leonard M. Jessup and Daniel Robey The relevance of social issues in ubiquitous computing environments . . . 88--91 Guruduth Banavar and Abraham Bernstein Software infrastructure and design challenges for ubiquitous computing applications . . . . . . . . . . . . . . 92--96 Fernando Berzal and Ignacio Blanco and Juan-Carlos Cubero and Nicolas Marin Technical opinion: Component-based data mining frameworks . . . . . . . . . . . 97--100 Avishai Wool Inside risks: Why security standards sometimes fail . . . . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News tracks: Incredible Shrinking Computing; Super-size Telescope; Global Reach Around; Gastric Simulation; Filipino Text-Message TV; Caging Hackers; Japan's Singing, Dancing Robot 9--10 Diane Crawford and Barbara Simons and Eugene H. Spafford and Christof Schmalenbach and László Karafiát and Dave Isaacs and Ken Kennedy and Moshe Vardi Forum: A Lawful Way to Acquire a Trade Secret; Criteria for Integration Technology; The Current State of Hypercomputation; Still No Licensing in Texas . . . . . . . . . . . . . . . . . 11--12 Meg McGinity Staying connected: Hibernating during telecom winter . . . . . . . . . . . . . 13--15 Rebecca T. Mercuri Security watch: On auditing audit trails 17--20 Alan H. Karp Viewpoint: Making money selling content that others are giving away . . . . . . 21--22 Gary Marchionini and Hanan Samet and Larry Brandt Introduction: Digital government . . . . 24--27 Hsinchun Chen and Daniel Zeng and Homa Atabakhsh and Wojciech Wyzga and Jenny Schroeder COPLINK: managing law enforcement data and knowledge . . . . . . . . . . . . . 28--34 Steve Goddard and Sherri K. Harms and Stephen E. Reichenbach and Tsegaye Tadesse and William J. Waltman Geospatial decision support for drought risk management . . . . . . . . . . . . 35--37 Lois Delcambre and Timothy Tolle and The Forest Project Team Harvesting information to sustain forests . . . . . . . . . . . . . . . . 38--39 Sharon S. Dawes and Lise Préfontaine Understanding new models of collaboration for delivering government services . . . . . . . . . . . . . . . . 40--42 Jane E. Fountain Prospects for improving the regulatory process using e-rulemaking . . . . . . . 43--44 Sarah Nusser and Leslie Miller and Keith Clarke and Michael Goodchild Geospatial IT for mobile field data collection . . . . . . . . . . . . . . . 45--46 Eduard Hovy Using an ontology to simplify data access . . . . . . . . . . . . . . . . . 47--49 Leana Golubchik and William C. Cheng and Cheng-Fu Chou and Samir Khuller and Hanan Samet and C. Justin Wan Bistro: a scalable and secure data transfer service for digital government applications . . . . . . . . . . . . . . 50--51 Carol A. Hert and Elizabeth D. Liddy and Ben Shneiderman and Gary Marchionini Supporting statistical electronic table usage by citizens . . . . . . . . . . . 52--54 Cathryn Dippo FedStats: the gateway to federal statistics . . . . . . . . . . . . . . . 55--55 Alan F. Karr and Adrian Dobra and Ashish P. Sanil Table servers protect confidentiality in tabular data releases . . . . . . . . . 57--58 Alan M. MacEachren and Frank Hardisty and Xiping Dai and Linda Pickle Supporting visual analysis of federal geospatial statistics . . . . . . . . . 59--60 Hanan Samet and Houman Alborzi and Franti\vsek Brabec and Claudio Esperança and Gísli R. Hjaltason and Frank Morgan and Egemen Tanin Use of the SAND spatial browser for digital government applications . . . . 61--64 Peggy Agouris and Anthony Stefanidis Efficient summarization of spatiotemporal events . . . . . . . . . 65--66 William L. Scherlis and Jon Eisenberg IT research, innovation, and e-government . . . . . . . . . . . . . . 67--68 Melvyn Ciment A personal history of the NSF digital government program . . . . . . . . . . . 69--70 Diomidis Spinellis The decay and failures of Web references 71--77 David E. Avison and Guy Fitzgerald Where now for development methodologies? 78--82 Ken Peffers and Charles E. Gengler How to identify new high-payoff information systems for the organization 83--88 Mario Cannataro and Domenico Talia The knowledge grid . . . . . . . . . . . 89--93 Pak Chung Wong and Kwong-kwok Wong and Harlan Foote Organic data memory using the DNA approach . . . . . . . . . . . . . . . . 95--98 Kevin C. Desouza Technical opinion: Barriers to effective use of knowledge management systems in software engineering . . . . . . . . . . 99--101 Michael Lesk Inside risks: The mindset of dependability . . . . . . . . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track: NET Works for Volunteers; Lights Out Back In; China Holds Tightest Net Reins; Hints of Recovery; Talk is Hardly Cheap; '02 Views . . . . . . . . 9--10 Diane Crawford and Simon Bennett and Lesley Clark and Dan Klarmann and Gernot Salzer and Dan Hestand and Richard Molpus and Rebecca Mercuri Forum: Why Projects As Knowledge Acquisition Work; Complex, But Not That Complex; Blame the Process, Not the Parties . . . . . . . . . . . . . . . . 11--13 Brock N. Meeks Electronic frontier: Conspicuous in their silence . . . . . . . . . . . . . 15--16 Phillip Armour The business of software: The reorg cycle . . . . . . . . . . . . . . . . . 19--22 Jessica Brazelton and G. Anthony Gorry On site: Creating a knowledge-sharing community: if you build it, will they come? . . . . . . . . . . . . . . . . . 23--25 Diane Crawford ACM Fellows . . . . . . . . . . . . . . 26--26 Detlef Schoder and Kai Fischbach Viewpoint: Peer-to-peer prospects . . . 27--29 Richard Lethin Introduction: Technical and social components of peer-to-peer computing . . 30--32 John Kubiatowicz Extracting guarantees from chaos . . . . 33--38 Philip E. Agre P2P and the promise of Internet equality 39--42 Hari Balakrishnan and M. Frans Kaashoek and David Karger and Robert Morris and Ion Stoica Looking up data in P2P systems . . . . . 43--48 Jintae Lee An end-user perspective on file-sharing systems . . . . . . . . . . . . . . . . 49--53 Jinyoul Lee and Keng Siau and Soongoo Hong Enterprise integration with ERP and EAI 54--60 Bay Arinze and Murugan Anandarajan A framework for using OO mapping methods to rapidly configure ERP systems . . . . 61--65 Amitava Dutta and Rahul Roy Anticipating Internet diffusion . . . . 66--71 James J. Jiang and Gary Klein and Debbie Tesch and Hong-Gee Chen Closing the user and provider service quality gap . . . . . . . . . . . . . . 72--76 Ravindra Krovi and Akhilesh Chandra and Balaji Rajagopalan Information flow parameters for managing organizational processes . . . . . . . . 77--82 Xinping Shi and Philip C. Wright E-commercializing business operations 83--87 Nayeem Islam and Mohamed Fayad Thinking objectively: Toward ubiquitous acceptance of ubiquitous computing . . . 89--92 Peter G. Neumann Inside risks: Gambling on system accountability . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track: Thanks, But No Thanks; Still Choking on Spam; Cameras, Cameras, Everywhere; Rat's Sense; One Person's Garbage; Easy Dot-Com and Go . . . . . . 9--10 Diane Crawford and Dennis de Champeaux and David Lorge Parnas and Craig Partridge and Julio Lerm and Oladokun Olajoyegbe Forum: Extending and Shrinking UML; Give Meaning to the Status of Software Engineer; The Art of the Paper Review; No Waiting for Enterprise-Integration Products; Mathematical Rigor for the Social Sciences . . . . . . . . . . . . 11--13 Michael Cusumano Technology strategy and management: Finding your balance in the products and services debate . . . . . . . . . . . . 15--17 Peter J. Denning and Robert Dunham The profession of IT: The missing customer . . . . . . . . . . . . . . . . 19--23 Mohammad Rob On site: The rise and fall of an e-commerce program . . . . . . . . . . . 25--26 Bob Besaha Viewpoint: Bounty hunting in the patent base . . . . . . . . . . . . . . . . . . 27--29 Roel Vertegaal Introduction: Attentive User Interfaces 30--33 Shumin Zhai What's in the eyes for attentive input 34--39 Jeffrey S. Shell and Ted Selker and Roel Vertegaal Interacting with groups of computers . . 40--46 Paul P. Maglio and Christopher S. Campbell Attentive agents . . . . . . . . . . . . 47--51 Eric Horvitz and Carl Kadie and Tim Paek and David Hovel Models of attention in computing and communication: from principles to applications . . . . . . . . . . . . . . 52--59 Patrick Baudisch and Doug DeCarlo and Andrew T. Duchowski and Wilson S. Geisler Focusing on the essential: considering attention in display design . . . . . . 60--66 D. Scott McCrickard and C. M. Chewar Attuning notification design to user goals and attention costs . . . . . . . 67--72 José del R. Millán Adaptive brain interfaces . . . . . . . 74--80 Lawrence A. Gordon and Martin P. Loeb and Tashfeen Sohail A framework for using insurance for cyber-risk management . . . . . . . . . 81--85 Gustavo da Rocha Barreto Pinto and Sergio Palma J. Medeiros and Jano Moreira de Souza and Julia Celia Mercedes Strauch and Carlete Rosana Ferreira Marques Spatial data integration in a collaborative design framework . . . . . 86--90 Mark C. Anderson and Rajiv D. Banker and Sury Ravindran The new productivity paradox . . . . . . 91--94 Roger Evernden and Elaine Evernden Third-generation information architecture . . . . . . . . . . . . . . 95--98 David Chadwick Deficiencies in LDAP when used to support PKI . . . . . . . . . . . . . . 99--104 Gary F. Templeton Technical opinion: Object-oriented programming of integrated circuits . . . 105--108 Barbara Simons and Eugene H. Spafford Inside risks: Risks of total surveillance . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track: More Tech Dollars for Defense; No Hands, No Break; More Net $=$ Less TV; Brain Scan; A Word to the Hip; Smart Dresser . . . . . . . . . . . 9--10 Diane Crawford and Sandy Ressler and Michael DeBellis and Mark Wallace and Arthur M. Rosenberg and Robert Levine and Barry I. Soroka Forum: The `Terrible Price' of the DMCA; The Patriot Act Is Only the Beginning; Communicating vs. Computing; Don't Tag Living Organisms . . . . . . . . . . . . 11--14 Hal Berghel and Kim Womack Digital village: Anonymizing the net . . 15--20 Jeff Grove Viewpoint: Legal and technological efforts to lock up content threaten innovation . . . . . . . . . . . . . . . 21--22 Meg McGinity Staying connected: Getting real . . . . 23--26 Ramesh Jain Viewpoint: Folk computing . . . . . . . 27--29 Deirdre K. Mulligan Introduction: Digital Rights Management and Fair Use by Design . . . . . . . . . 30--33 John S. Erickson Fair use, DRM, and trusted computing . . 34--39 Pamela Samuelson DRM and, or, vs. the law . . . . . . . . 41--45 Julie E. Cohen DRM and privacy . . . . . . . . . . . . 46--49 Séverine Dusollier Fair use by design in the European Copyright Directive of 2001 . . . . . . 51--55 Edward W. Felten A skeptical view of DRM and fair use . . 56--59 Barbara L. Fox and Brian A. LaMacchia Encouraging recognition of fair uses in DRM systems . . . . . . . . . . . . . . 61--63 Brian Fitzgerald and Nancy L. Russo and Tom O'Kane Software development method tailoring at Motorola . . . . . . . . . . . . . . . . 64--70 François Pachet Content management for electronic music distribution . . . . . . . . . . . . . . 71--75 Susan A. Brown and Viswanath Venkatesh Bringing non-adopters along: the challenge facing the PC industry . . . . 76--80 Julia B. Earp and David Baumer Innovative Web use to learn about consumer behavior and online privacy . . 81--83 Ali F. Farhoomand and Pauline S. P. Ng and William L. Conley Building a successful e-business: the FedEx story . . . . . . . . . . . . . . 84--89 Keng Siau and Zixing Shen Building customer trust in mobile commerce . . . . . . . . . . . . . . . . 91--94 Shan L. Pan and Jae-Nam Lee Using e-CRM for a unified view of the customer . . . . . . . . . . . . . . . . 95--99 Peter Wegner and Dina Goldin Technical opinion: Computation beyond Turing machines . . . . . . . . . . . . 100--102 Andrew Wright Inside risks: On Sapphire and type-safe languages . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track: Antiterror Gizmos; Grayer Days Ahead; Take Your Receipt; Gramr CWOT; Dot.con; Work Free on Free Time; Cyber Arches . . . . . . . . . . . . . . 9--10 Diane Crawford and Urs Hoelzle and Michael Lewchuk and Lawrence A. Stabile and Donn B. Parker and Lawrence A. Gordon and Martin P. Loeb and Tashfeen Sohail and Harry Rudin Forum: Archiving the Web is Feasible Today; Stop the Reorg Cycle; Customer Found; Cyber-Risk Management Not Feasible; Dear Life . . . . . . . . . . 11--13 Phillip Armour The business of software: In the zone: the need for flexible roles . . . . . . 15--19 Robert L. Glass Practical programmer: One giant step backward . . . . . . . . . . . . . . . . 21--23 Dennis Tsichritzis Viewpoint: Life beyond the bubbles . . . 25--27 Aviel D. Rubin Introduction: Wireless Networking Security . . . . . . . . . . . . . . . . 28--30 Russ Housley and William Arbaugh Security problems in 802.11-based networks . . . . . . . . . . . . . . . . 31--34 Nancy Cam-Winget and Russ Housley and David Wagner and Jesse Walker Security flaws in 802.11 data link protocols . . . . . . . . . . . . . . . 35--39 Simon Byers and Dave Kormann 802.11b access point mapping . . . . . . 41--46 Terry Schmidt and Anthony Townsend Why Wi-Fi wants to be free . . . . . . . 47--52 Amir Herzberg Payments and banking with mobile personal devices . . . . . . . . . . . . 53--58 Jae Kyu Lee and Mye M. Sohn The eXtensible Rule Markup Language . . 59--64 Julie Smith David and William E. McCarthy and Brian S. Sommer Agility: the key to survival of the fittest in the software market . . . . . 65--69 Leah Graham and Panagiotis Takis Metaxas ``Of course it's true; I saw it on the Internet!'': critical thinking in the Internet era . . . . . . . . . . . . . . 70--75 Amrit Tiwana Affinity to infinity in peer-to-peer knowledge platforms . . . . . . . . . . 76--80 Ziqi Liao Real-time taxi dispatching using Global Positioning Systems . . . . . . . . . . 81--83 Jae-Nam Lee and Minh Q. Huynh and Ron Chi-Wai Kwok and Shih-Ming Pi IT outsourcing evolution: past, present, and future . . . . . . . . . . . . . . . 84--89 George Marsaglia Technical opinion: Seeds for random number generators: Techniques for choosing seeds for social and scientific applications of random number generators 90--93 Peter G. Neumann Inside risks: E-epistemology and misinformation . . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM staff News track: Federal Red Flag; Proof in Numbers; Bots for What?; Spell Checked; Now You See It; Profiles in Trouble . . 9--10 Diane Crawford and Mark Strefik and Rory Short and Simone Santinie and Peter Wegner and Dina Goldin Forum: In DRM, Rethink Business Practices, Not Just Technology and the Law; Don't Forget Mental Models in Systems Development; What the Turing Machine Doesn't Model . . . . . . . . . 11--13 Rebecca T. Mercuri Security watch: Analyzing security costs 15--18 Pamela Samuelson Legally speaking: Trade secrets vs. free speech . . . . . . . . . . . . . . . . . 19--23 Tom DeMarco Viewpoint: The McCarthy protocols . . . 24--25 Thomas F. Stafford Introduction: E-Services . . . . . . . . 26--28 Heather Kreger Fulfilling the Web services promise . . 29--30 Christopher Ferris and Joel Farrell What are Web services? . . . . . . . . . 31--31 Roland T. Rust and P. K. Kannan E-service: a new paradigm for business in the electronic environment . . . . . 36--42 Ruth N. Bolton Marketing challenges of e-services . . . 43--44 Hongjun Song E-services at FedEx . . . . . . . . . . 45--46 M. Kathryn Brohman and Richard T. Watson and Gabriele Piccoli and A. Parasurama Data completeness: a key to effective net-based customer service systems . . . 47--51 K. Douglas Hoffman Marketing + MIS $=$ e-service . . . . . 53--55 Neal G. Shaw and Christopher W. Craighead Technology enablers to recover from failures in e-services . . . . . . . . . 56--57 Joseph Williams The Web services debate: J2EE vs. .NET 58--63 Gerry Miller The Web services debate: .NET vs. J2EE 64--67 Walid Ben-Ameur and Hervé Kerivin New Economical Virtual Private Networks 69--73 Huaiqing Wang and Chen Wang Taxonomy of security considerations and software quality . . . . . . . . . . . . 75--78 E. Vance Wilson Asynchronous health care communication 79--84 Kevin C. Desouza Facilitating tacit knowledge exchange 85--88 Fay Cobb Payton Rethinking the digital divide . . . . . 89--91 Peter E. Hart and Ziming Liu Trust in the preservation of digital information . . . . . . . . . . . . . . 93--97 James Backhouse and Carol Hsu and Aidan McDonnell Technical opinion: Toward public-key infrastructure interoperability . . . . 98--100 Diomidis Spinellis Inside risks: Reflections on trusting trust revisited . . . . . . . . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Cinematic Watermark; Eye-Opening Education; Roaming Time; Stand By Me; Savings Bonds Fade to Net; Phone Home . . . . . . . . . . . . . . . 9--10 Diane Crawford and Simone Santini and Ralph Castain and William F. Dowling and John Cook and Simon Dobson and Peter J. Denning and Robert Dunham and Jef Raskin and Dennis Tsichritzis Forum: When Is a Computer More Like a Guitar than a Washing Machine?; Corroboration the Only Way to Determine Web Accuracy; How to Teach Critical Thinking about Web Content; Create a Random Number Service Based on the Mersenne Twister; Make Fair Uses a Legal Requirement in DRM Systems; ``The Missing Customer'' Redux; Enthusiasm, Drive, Wisdom, Patience Not Tied to Age 11--13 Michael Cusumano Technology strategy and management: Beware the lure of the horizontal . . . 15--17 Peter J. Denning The profession of IT: Accomplishment . . 19--23 Rita R. Colwell Viewpoint: From terabytes to insights 25--27 Andrew Rosenbloom Introduction: A Game Experience in Every Application . . . . . . . . . . . . . . 28--31 William Swartout and Michael van Lent Making a game of system design . . . . . 32--39 Mary C. Whitton Making virtual environments compelling 40--47 Ramesh Jain Experiential computing . . . . . . . . . 48--55 Michael Tsang and George Fitzmaurice and Gord Kurtenbach and Azam Khan Game-like navigation and responsiveness in non-game applications . . . . . . . . 56--61 Joseph A. Paradiso Tracking contact and free gesture across large interactive surfaces . . . . . . . 62--69 Carlo Tomasi and Abbas Rafii and Ilhami Torunoglu Full-size projection keyboard for handheld devices . . . . . . . . . . . . 70--75 Cynthia Breazeal and Andrew Brooks and Jesse Gray and Matt Hancher and John McBean and Dan Stiehl and Joshua Strickon Interactive robot theatre . . . . . . . 76--85 Paul Vickers and James L. Alty Siren songs and swan songs debugging with music . . . . . . . . . . . . . . . 86--93 Daniel May and Paul Taylor Knowledge management with patterns . . . 94--99 Jackie Rees and Subhajyoti Bandyopadhyay and Eugene H. Spafford PFIRES: a policy framework for information security . . . . . . . . . . 101--106 Sudip Bhattacharjee and Ram D. Gopal and G. Lawrence Sanders Digital music and online sharing: software piracy 2.0? . . . . . . . . . . 107--111 Alan H. Karp E-speak e-xplained . . . . . . . . . . . 112--118 Varun Grover and Khawaja Saeed The telecommunication industry revisited: the changing pattern of partnerships . . . . . . . . . . . . . . 119--125 Timon C. Du and Eldon Y. Li and An-Pin Chang Mobile agents in distributed network management . . . . . . . . . . . . . . . 127--132 D. Scott Brandt and Lorna Uden Insight into mental models of novice Internet searchers . . . . . . . . . . . 133--136 Younghwa Lee and Zoonky Lee and Kai R. T. Larsen Coping with Internet channel conflict 137--142 Zakaria Maamar and Paul Labbé Technical opinion: Moving vs. inviting software agents . . . . . . . . . . . . 143--144 Albert Levi Inside risks: How secure is secure Web browsing? . . . . . . . . . . . . . . . 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 ACM Staff News track; Blood Spills Builds Skills; Canary in a Chip; PlayStation Superpower; Personal Shopper; Learner and Meaner; Get Me Rewrite! . . . . . . 9--10 Diane Crawford and Ralph Castain and Viktor Decyk and Ben Schwarz and Michael Metcalf and Rob Dublin and Robert L. Glass and Bob Morrison and Frans Swaalf and Martin Henz Forum: Backward and Forward with the Practical Programmer; Don't Forget Experience in Role Definition; Correct Me If I'm Wrong; Article or Ad? . . . . 11--13 Hal Berghel Digital village: The discipline of Internet forensics . . . . . . . . . . . 15--20 Robert L. Glass Practical programmer: A mugwump's-eye view of Web work . . . . . . . . . . . . 21--23 William W. Agresti Viewpoint: Discovery informatics . . . . 25--28 David L. Dill and Bruce Schneier and Barbara Simons Viewpoint: Voting and technology: who gets to count your vote? Paperless voting machines threaten the integrity of democratic process by what they \em don't do . . . . . . . . . . . . . . . . 29--31 Bjorn De Sutter and Koen De Bosschere Introduction: Software techniques for program compaction . . . . . . . . . . . 32--34 Frank Tip and Peter F. Sweeney and Chris Laffra Extracting library-based Java applications . . . . . . . . . . . . . . 35--40 Bruno De Bus and Daniel Kästner and Dominique Chanet and Ludo Van Put and Bjorn De Sutter Post-pass compaction techniques . . . . 41--46 Arvind Krishnaswamy and Rajiv Gupta Mixed-width instruction sets . . . . . . 47--52 Saumya Debray and William S. Evans Cold code decompression at runtime . . . 54--60 William S. Evans and Christopher W. Fraser Grammar-based compression of interpreted code . . . . . . . . . . . . . . . . . . 61--66 Padmal Vitharana Risks and challenges of component-based software development . . . . . . . . . . 67--72 Richard E. Potter How CIOs manage their superiors' expectations . . . . . . . . . . . . . . 74--79 Thomas W. Jackson and Ray Dawson and Darren Wilson Understanding email interaction increases organizational productivity 80--84 Bruce Russell and Sangit Chatterjee Relationship quality: the undervalued dimension of software quality . . . . . 85--89 Michael E. Whitman Enemy at the gate: threats to information security . . . . . . . . . . 91--95 Gert-Jan de Vreede and Robert M. Davison and Robert O. Briggs How a silver bullet may lose its shine 96--101 Kenneth R. Walsh Analyzing the application ASP concept: technologies, economies, and strategies 103--107 T. Ravichandran and Marcus A. Rothenberger Software reuse strategies and component markets . . . . . . . . . . . . . . . . 109--114 Zhou Zhiying CMM in uncertain environments . . . . . 115--119 P. Nicopolitidis and G. I. Papadimitriou and M. S. Obaidat and A. S. Pomportsis Technical opinion: Third generation and beyond wireless systems . . . . . . . . 120--124 Lauren Weinstein Inside risks: Spam wars . . . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 7--7 CACM staff News track: Juggling Outsourcing Stats; He Said, She Said; Royal E-Flush; Plane Precision; Email Evidence; VCR RIP? Driver to Distraction . . . . . . . . . 11--12 Diane Crawford and Richard M. Stallman and Richard Proudfoot and Sudip Bhattacharjee and Ram D. Gopal and G. Lawrence Sanders and Tom Pittman and Richard R. Brooks and Dennis E. Hamilton Forum: Legalize Music Sharing Now; Hold the Games; Give Up Trying to Halt the Flow of Information; Praise for Denning's Powerful Chord of Professionalism . . . . . . . . . . . . 13--15 Meg McGinity Staying connected: Power to the people 17--20 Seymour Goodman International perspectives: The origins of digital computing in Europe . . . . . 21--25 Phillip Armour The business of software: Closing the learning application gap . . . . . . . . 27--31 Yigal Arens and Paul S. Rosenbloom Viewpoint: Responding to the unexpected 33--35 Keith Devlin Introduction: Why universities require computer science students to take math 36--39 Kim B. Bruce and Robert L. Scot Drysdale and Charles Kelemen and Allen Tucker Why math? . . . . . . . . . . . . . . . 40--44 Peter B. Henderson Mathematical reasoning in software engineering education . . . . . . . . . 45--50 Vicki L. Almstrum What is the attraction to computing? . . 51--55 Alfred W. Loo The future of peer-to-peer computing . . 56--61 Michiel Ronsse and Koen De Bosschere and Mark Christiaens and Jacques Chassin de Kergommeaux and Dieter Kranzlmüller Record/replay for nondeterministic program executions . . . . . . . . . . . 62--67 Atreyi Kankanhalli and Fransiska Tanudidjaja and Juliana Sutanto and Bernard C. Y. Tan The role of IT in successful knowledge management initiatives . . . . . . . . . 69--73 Roberto Di Pietro and Luigi V. Mancini Security and privacy issues of handheld and wearable wireless devices . . . . . 74--79 Ali F. Farhoomand and Pauline S. P. Ng Creating sustainable competitive advantage through internetworked communities . . . . . . . . . . . . . . 83--88 G. Prem Premkumar Alternate distribution strategies for digital music . . . . . . . . . . . . . 89--95 Robert G. Fichman and Mary J. Cronin Information-rich commerce at a crossroads: business and technology adoption requirements . . . . . . . . . 96--102 Ziqi Liao and Michael Tow Cheung Concurrent-convergent strategy in IT consulting . . . . . . . . . . . . . . . 103--104 Stefan Baldi and Hauke Heier and Anett Mehler-Bicher Technical opinion: Open courseware and open source software . . . . . . . . . . 105--107 Peter G. Neumann Inside risks: Risks in trusting untrustworthiness . . . . . . . . . . . 120--120 Ari-Veikko Anttiroiko Building strong e-democracy: the role of technology in developing democracy for the information age . . . . . . . . . . 121--128 Patrick Y. K. Chau and Simpson Poon Octopus: an e-cash payment system success story . . . . . . . . . . . . . 129--133 John Erickson and Keng Siau E-ducation . . . . . . . . . . . . . . . 134--140 Kiran J. Fernandes and Vinesh Raja and Julian Eyre Cybersphere: the fully immersive spherical projection system . . . . . . 141--146 Lee A. Freeman A refresher in data flow diagramming: an effective aid for analysts . . . . . . . 147--151 Chittibabu Govindarajulu End users: who are they? . . . . . . . . 152--159 Ernest Goss and Uma Gupta Women and the Internet: is there an economic payoff? . . . . . . . . . . . . 160--166 Kathleen Hartzel How self-efficacy and gender issues affect software adoption and use . . . . 167--171 Richard D. Holowczak and Nabil R. Adam and Francisco J. Artigas and Irfan Bora Data warehousing in environmental digital libraries . . . . . . . . . . . 172--178 Ned Kock and Camille Auspitz and Brad King Web-supported course partnerships: bringing industry and academia together 179--183 Sarv Devaraj and Ming Fan and Rajiv Kohli E-loyalty: elusive ideal or competitive edge? . . . . . . . . . . . . . . . . . 184--191 James M. Laffey and Dale Musser and Herbert Remidez and Josh Gottdenker Networked systems for schools that learn 192--200 William Lewis, Jr. and Richard T. Watson and Ann Pickren An empirical assessment of IT disaster risk . . . . . . . . . . . . . . . . . . 201--206 Trevor T. Moores The effect of national culture and economic wealth on global software piracy rates . . . . . . . . . . . . . . 207--215 Scott L. Schneberger and Ephraim R. McLean The complexity cross: implications for practice . . . . . . . . . . . . . . . . 216--225 Jeff Hoi Yan Yeung and J. P. Shim and Andy Yin Kit Lai Current progress of e-commerce adoption: small and medium enterprises in Hong Kong . . . . . . . . . . . . . . . . . . 226--232 Kunihiko Higa and Bongsik Shin The telework experience in Japan . . . . 233--242 Nitin Singh Emerging technologies to support supply chain management . . . . . . . . . . . . 243--247 Ritu Agarwal and Atish P. Sinha Object-oriented modeling with UML: a study of developers' perceptions . . . . 248--256 Jarke J. van Wijk and Frank van Ham and Huub van de Wetering Rendering hierarchical data . . . . . . 257--263 Kevin Zhu and Bryan MacQuarrie The economics of digital bundling: the impact of digitization and bundling on the music industry . . . . . . . . . . . 264--270
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 ACM Staff News track: Salt in the Wound; Coming into Focus; Study in Slime; That's Courriel, S'il Vous Pla\^\it; A Healthy Spritz; How Does That Make You Feel?; Dial-A-Dolphin . . . . . . . . . . . . . 9--10 Diane Crawford and Peter Sommers and Hal Berghel and W. Terry Hardgrave and Chris Morris and Jim Haynes Forum: Tell It to the Judge; What Software Engineering Can Do for Web Development . . . . . . . . . . . . . . 11--13 Pamela Samuelson Legally speaking: Unsolicited communications as trespass? . . . . . . 15--20 Michael Cusumano Technology strategy and management: Company character and the software business . . . . . . . . . . . . . . . . 21--23 M. P. Papazoglou and D. Georgakopoulos Introduction: Service-Oriented Computing 24--28 Francisco Curbera and Rania Khalaf and Nirmal Mukhi and Stefan Tai and Sanjiva Weerawarana The next step in Web services . . . . . 29--34 Jian Yang Web service componentization . . . . . . 35--40 L. G. Meredith and Steve Bjorg Contracts and types . . . . . . . . . . 41--47 Mark Little Transactions and Web services . . . . . 49--54 Fabio Casati and Eric Shan and Umeshwar Dayal and Ming-Chien Shan Business-oriented management of Web services . . . . . . . . . . . . . . . . 55--60 Dov Dori Introduction: Conceptual Modeling and System Architecting . . . . . . . . . . 62--65 Nathan R. Soderborg and Edward F. Crawley and Dov Dori System function and architecture: OPM-based definitions and operational templates . . . . . . . . . . . . . . . 67--72 Brian Henderson-Sellers Method engineering for OO systems development . . . . . . . . . . . . . . 73--78 Andrew Gemino and Yair Wand Evaluating modeling techniques based on models of learning . . . . . . . . . . . 79--84 Graeme Shanks and Elizabeth Tansley and Ron Weber Using ontology to validate conceptual models . . . . . . . . . . . . . . . . . 85--89 Hans Moravec Robots, after all . . . . . . . . . . . 90--97 Sai Ho Kwok Watermark-based copyright protection system security . . . . . . . . . . . . 98--101 Willem-Jan Van Den Heuvel and Zakaria Maamar Intelligent Web services moving toward a framework to compose . . . . . . . . . . 103--109 Pairin Katerattanakul and Bernard Han and Soongoo Hong Objective quality ranking of computing journals . . . . . . . . . . . . . . . . 111--114 Cong-cong Xing and Boumediene Belkhouche Technical opinion: On pseudo object-oriented programming considered harmful . . . . . . . . . . . . . . . . 115--117 Peter G. Neumann Inside risks: Information system security redux . . . . . . . . . . . . . 136--136
Diane Crawford Editoral pointers . . . . . . . . . . . 5--5 ACM Staff News track: Security holes; Don't Look Back; Developing PC Nations; Hari Today, Brain Surgery Tomorrow?; IMing at Work; Now Speak . . . . . . . . . . . . . . . 9--10 Diane Crawford and Joseph F. Traub and Reidar Conradi and Steve Johnson and Clinton Mah and Frédéric Guéron and David lowe and Bill Willcox and Rommert J. Casimir and Kevin Mackie and Mark Wallace and Andries van Dam Forum: CS Student's Need Other Kinds of Math, Too; Web Development Not So Different After All; For Responsible Spam, Pay As You Go; No Innovation Means No Customers; Computer Allure Moves East 11--13 Peter J. Denning The profession of IT: Great principles of computing . . . . . . . . . . . . . . 15--20 Robert L. Glass Practical programmer: A sociopolitical look at open source . . . . . . . . . . 21--23 Geoffrey Sampson Viewpoint: The myth of diminishing firms 25--28 Maxine D. Brown Introduction: Blueprint for the future of high-performance networking . . . . . 30--33 Tom DeFanti and Cees de Laat and Joe Mambretti and Kees Neggers and Bill St. Arnaud TransLight: a global-scale LambdaGrid for e-science . . . . . . . . . . . . . 34--41 Aaron Falk and Ted Faber and Joseph Bannister and Andrew Chien and Robert Grossman and Jason Leigh Transport protocols for high performance 42--49 Ian Foster and Robert L. Grossman Data integration in a bandwidth-rich world . . . . . . . . . . . . . . . . . 50--57 Larry L. Smarr and Andrew A. Chien and Tom DeFanti and Jason Leigh and Philip M. Papadopoulos The OptIPuter . . . . . . . . . . . . . 58--67 Harvey B. Newman and Mark H. Ellisman and John A. Orcutt Data-intensive e-science frontier research . . . . . . . . . . . . . . . . 68--77 Stuart J. Barnes and Sid L. Huff Rising sun: iMode and the wireless Internet . . . . . . . . . . . . . . . . 78--84 Daniel P. Lorence The perils of data misreporting . . . . 85--88 Robert F. Easley and John G. Michel and Sarv Devaraj The MP3 open standard and the music industry's response to Internet piracy 90--96 Padmal Vitharana and Fatemah Mariam Zahedi and Hemant Jain Design, retrieval, and assembly in component-based software development . . 97--102 A. Graham Peace Balancing free speech and censorship: academia's response to the Internet . . 104--109 Narasimhaiah Gorla Features to consider in a data warehousing system . . . . . . . . . . . 111--115 Jeffrey P. Landry and J. Harold Pardue and Herbert E. Longenecker, Jr. and David F. Feinstein A common theme for IT degree programs 117--120 Donald Anselmo and Henry Ledgard Measuring productivity in the software industry . . . . . . . . . . . . . . . . 121--125 David Nordfors and Michel Bajuk and Lena Norberg and Jochen Brinkmann and Dan Forbush Introducing a country to Internet-enabled expert networks . . . . 127--132 Rebecca T. Mercuri and Peter G. Neumann Inside risks: Security by obscurity . . 160--160
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 ACM Staff News track: Pay as You Go Plan; You Say ``Potato''; Who Types There?; Homework and the Web; \`A la Cart; Shattering Net Speeds; Gift Bots . . . . . . . . . . . 9--10 Diane Crawford and Simone Santini and Bill Buxton and Joanna Wolfe and Carl J. Mueller and Halina Kaminski Forum: Keep the Pedagogical Ahead of the Technological; Minds Over Math; Requirements vs. Components; Mark Every Vote Count . . . . . . . . . . . . . . . 11--13 ACM Nominating Committee Nominees for elections and report of the ACM Nominating Committee . . . . . . . . 14--14 Hal Berghel Digital Village: Malware month . . . . . 15--19 Rebecca T. Mercuri Security Watch: Standards insecurity . . 21--25 Alan H. Karp Viewpoint: Enforce POLA on processes to control viruses . . . . . . . . . . . . 27--29 Andrew Urbaczewski and Joseph S. Valacich and Leonard M. Jessup Introduction: Mobile Commerce: Opportunities and Challenges . . . . . . 30--32 Thomas F. Stafford and Mark L. Gillenson Mobile commerce: what it is and what it could be . . . . . . . . . . . . . . . . 33--34 Suprateek Sarker and John D. Wells Understanding mobile handheld device use and adoption . . . . . . . . . . . . . . 35--40 Sirkka L. Jarvenpaa and Karl Reiner Lang and Yoko Takeda and Virpi Kristiina Tuunainen Mobile commerce at crossroads . . . . . 41--44 Jun Sun Information requirement elicitation in mobile commerce . . . . . . . . . . . . 45--47 Young Eun Lee and Izak Benbasat Interface design for mobile commerce . . 48--52 Viswanath Venkatesh and V. Ramesh and Anne P. Massey Understanding usability in mobile commerce . . . . . . . . . . . . . . . . 53--56 Peter Tarasewich Designing mobile commerce applications 57--60 Bharat Rao and Louis Minakakis Evolution of mobile location-based services . . . . . . . . . . . . . . . . 61--65 William E. Spangler and Mordechai Gal-Or and Jerrold H. May Using data mining to profile TV viewers 66--72 Jim Q. Chen and Ted E. Lee and Ruidong Zhang and Yue Jeff Zhang Systems requirements for organizational learning . . . . . . . . . . . . . . . . 73--78 Xu Yan Mobile data communications in China . . 80--85 Rajiv Kishore and H. R. Rao and K. Nam and S. Rajagopalan and A. Chaudhury A relationship perspective on IT outsourcing . . . . . . . . . . . . . . 86--92 Tim Chenoweth and David Schuff and Robert St. Louis A method for developing dimensional data marts . . . . . . . . . . . . . . . . . 93--98 Coskun Bayrak and Chad Davis The relationship between distributed systems and open software development 99--102 Lauren Weinstein Inside Risks: The devil you know . . . . 144--144 Manju Ahuja and Babita Gupta and Pushkala Raman An empirical investigation of online consumer purchasing behavior . . . . . . 145--151 Ravi Bapna When snipers become predators: can mechanism design save online auctions? 152--158 Amit Basu and Steve Muylle Authentication in e-commerce . . . . . . 159--166 Sid Davis and Keng Siau and Kumar Dhenuvakonda A fit-gap analysis of e-business curricula vs. industry needs . . . . . . 167--177 Pattarawan Prasarnphanich and Mark L. Gillenson The hybrid clicks and bricks business model . . . . . . . . . . . . . . . . . 178--185 Sanjay Gosain and Arvind Malhotra and Omar A. El Sawy and Fadi Chehade The impact of common e-business interfaces . . . . . . . . . . . . . . . 186--195 Stefano Grazioli and Sirkka L. Jarvenpaa Deceived: under target online . . . . . 196--205 Khawaja A. Saeed and Varun Grover and Yujong Hwang Creating synergy with a clicks and mortar approach . . . . . . . . . . . . 206--212 Andrew Holmes and John Ryan Viewpoint: the end of the long boom . . 213--216 Philip M. Johnson and Mette L. Moffett and Brian T. Pentland Lessons learned from VCommerce . . . . . 217--225 Pairin Katerattanakul and Keng Siau Creating a virtual store image . . . . . 226--232 Mohamed Khalifa and Moez Limayem Drivers of Internet shopping . . . . . . 233--239 Minhee Chae and Jinwoo Kim What's so different about the mobile Internet? . . . . . . . . . . . . . . . 240--247 Ziqi Liao and Michael Tow Cheung Challenges to Internet e-banking . . . . 248--250 Zakaria Maamar Commerce, e-commerce, and m-commerce: what comes next? . . . . . . . . . . . . 251--257 David Martin and Hailin Wu and Adil Alsaid Hidden surveillance by Web sites: Web bugs in contemporary use . . . . . . . . 258--264 Trevor T. Moores and Gurpreet Dhillon Do privacy seals in e-commerce really work? . . . . . . . . . . . . . . . . . 265--271 Kyle B. Murray and Gerald Häubl A human capital perspective of skill acquisition and interface loyalty . . . 272--278 G. Prem Premkumar Perspectives of the e-marketplace by multiple stakeholders . . . . . . . . . 279--288 Robert W. Proctor and Kim-Phuong L. Vu and Lawrence J. Najjar and Misha W. Vaughan and Gavriel Salvendy Content preparation and management for e-commerce Web sites . . . . . . . . . . 289--299 Mani R. Subramani and Balaji Rajagopalan Knowledge-sharing and influence in online social networks via viral marketing . . . . . . . . . . . . . . . 300--307 C. Ranganathan and Vern Goode and Arkalgud Ramaprasad Managing the transition to bricks and clicks . . . . . . . . . . . . . . . . . 308--316 Dan Jong Kim and Manish Agrawal and Bharat Jayaraman and H. Raghav Rao A comparison of B2B e-service solutions 317--324 A. F. Salam and H. R. Rao and C. C. Pegels Consumer-perceived risk in e-commerce transactions . . . . . . . . . . . . . . 325--331 Xiaowen Fang and Gavriel Salvendy Customer-centered rules for design of e-commerce Web sites . . . . . . . . . . 332--336 Fang-Fang Tang and Marcel G. Thom and Liang Toon Wang and Joai Ching Tan and Wai Yee Chow and Xiaoyun Tang Using insurance to create trust on the Internet . . . . . . . . . . . . . . . . 337--344 Amrit Tiwana and Ephraim R. McLean The tightrope to e-business project success . . . . . . . . . . . . . . . . 345--350 Anthony M. Townsend and James T. Bennett Viewpoint: living and bidding in an auction economy . . . . . . . . . . . . 351--353 Ganesh Vaidyanathan and Sarv Devaraj A five-factor framework for analyzing online risks in e-businesses . . . . . . 354--361
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 ACM Staff News track: Sound of Silence; `And For Out Next Nano Number \ldots'; International Enrollment Slows; The Body Electric; Calling All Buoys; Checked Out 9--10 Diane Crawford and H. Joel Jeffrey and Hans Moravec and Joseph Frisina and Douglas Lyon and Jef Raskin and John Craig and Joy Getha and Art Gittleman Forum: More Startling AI Predictions; Mandate Safety-Critical Software; Limited Math Limits the CS Curriculum; Hands-On How We Learn; Not Enough Joy of Computing . . . . . . . . . . . . . . . 11--13 Meg McGinity Staying connected: RFID: is this game of tag fair play? . . . . . . . . . . . . . 15--18 Phillip Armour The Business of Software: When executives code . . . . . . . . . . . . 19--22 CACM Staff ACM annual report for FY03 . . . . . . . 23--29 Sharon Oviatt and Trevor Darrell and Myron Flickner Introduction: Multimodal interfaces that flex, adapt, and persist . . . . . . . . 30--33 Anil K. Jain and Arun Ross Multibiometric systems . . . . . . . . . 34--40 Philip R. Cohen and David R. McGee Tangible multimodal interfaces for safety-critical applications . . . . . . 41--46 Roberto Pieraccini and Krishna Dayanidhi and Jonathan Bloom and Jean-Gui Dahan and Michael Phillips and Bryan R. Goodman and K. Venkatesh Prasad Multimodal conversational systems for automobiles . . . . . . . . . . . . . . 47--49 Harriet J. Nock and Giridharan Iyengar and Chalapathy Neti Multimodal processing by finding common cause . . . . . . . . . . . . . . . . . 51--56 Leah M. Reeves and Jennifer Lai and James A. Larson and Sharon Oviatt and T. S. Balaji and Stéphanie Buisine and Penny Collings and Phil Cohen and Ben Kraal and Jean-Claude Martin and Michael McTear and T. V. Raman and Kay M. Stanney and Hui Su and Qian Ying Wang Guidelines for multimodal user interface design . . . . . . . . . . . . . . . . . 57--59 Matthew Turk Computer vision in the interface . . . . 60--67 Li Deng and Xuedong Huang Challenges in adopting speech recognition . . . . . . . . . . . . . . 69--75 Cynthia F. Cohen and Stanley J. Birkin and Monica J. Garfield and Harold W. Webb Managing conflict in software testing 76--81 Albert B. Schwarzkopf and Roberto J. Mejias and `Jon (Sean) Jasperson and Carol S. Saunders and Hermann Gruenwald Effective practices for IT skills staffing . . . . . . . . . . . . . . . . 83--88 B. Craig Cumberland and Joseph S. Valacich and Leonard M. Jessup Understanding meteor burst communications technologies . . . . . . 89--92 Robert J. Aiken and Javad Boroumand and Stephen Wolff Network and computing research infrastructure: back to the future . . . 93--98 Ronald Dattero and Stuart D. Galup Programming languages and gender . . . . 99--102 Seung Kyoon Shin and Ram D. Gopal and G. Lawrence Sanders and Andrew B. Whinston Global software piracy revisited . . . . 103--107 Wenhong Luo and Mohammad Najdawi Trust-building measures: a review of consumer health portals . . . . . . . . 108--113 Marcus J. Ranum Inside Risks: Believing in myths . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 ACM Staff News track: Resizing America; Little Shop of Software; What Women Want in Wheels; Virtual Autopsies; Coming of Age; Poetic Programming . . . . . . . . 9--10 Diane Crawford and Steve Wildstrom and Hal Berghel and Charles Burnette and Jiming Liu and Peter J. Denning and Carl Binding and Robert Swarr Forum: Defense in Depth Gets the Worm; Put Cognitive Modes in CS and Its Curricula; Don't Blame WAP [Wireless Application Protocol]; Market Share vs. Peer Approval in Open Source . . . . . . 11--13 Pamela Samuelson Legally speaking: What's at stake in \em MGM v. Grokster? . . . . . . . . . . . . 15--20 Gregory J. Pottie Viewpoint: Privacy in the global e-village . . . . . . . . . . . . . . . 21--23 Robert L. Glass Practical programmer: A look at the economics of open source . . . . . . . . 25--27 Jakka Sairamesh and Alison Lee and Loretta Anania Introduction: Information Cities . . . . 28--31 Lee Sproull and John F. Patterson Making information cities livable . . . 33--37 Elizabeth Churchill and Andreas Girgensohn and Les Nelson and Alison Lee Blending digital and physical spaces for ubiquitous community participation . . . 38--44 Donald Ferguson and Jakka Sairamesh and Stuart Feldman Open frameworks for information cities 45--49 Petros Kavassalis and Stelios Lelis and Mahmoud Rafea and Seif Haridi What makes a Web site popular? . . . . . 50--55 Luis von Ahn and Manuel Blum and John Langford Telling humans and computers apart automatically . . . . . . . . . . . . . 56--60 Yossi Lichtenstein Puzzles in software development contracting . . . . . . . . . . . . . . 61--65 Conan C. Albrecht How clean is the future of SOAP? . . . . 66--68 Rajiv Kishore and Hong Zhang and R. Ramesh A Helix-Spindle model for ontological engineering . . . . . . . . . . . . . . 69--75 Pearl Brereton The software customer/supplier relationship . . . . . . . . . . . . . . 77--81 Elizabeth M. Pierce Assessing data quality with control matrices . . . . . . . . . . . . . . . . 82--86 Patrick Y. K. Chau and Paul Jen-Hwa Hu Technology implementation for telemedicine programs . . . . . . . . . 87--92 Csaba Egyhazy and Raj Mukherji Interoperability architecture using RM-ODP . . . . . . . . . . . . . . . . . 93--97 Ruth Bolotin Schwartz and Michele C. Russo Technical opinion: How to quickly find articles in the top IS journals . . . . 98--101 Lauren Weinstein Inside risks: Outsourced and out of control . . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Blurred vision; (Keep) Phone Home; Love/Hate Relationship; Image Makeover; Robot Scientist; Rooms with a View . . . . . . . . . . . . . . . . . . 9--10 Diane Crawford and Peter G. Raeth and Mark Wallace and David Hawley and Donald Anselmo and Henry Ledgard and Dwayne Nelson and Yitzchak Gottlieb and Alex Simonelis and Coskun Bayrak and Chad Davis Forum: Principles of Logical Thought Before Technical Details; Why Reinvent When We Have Open Source?; Still Seeking Software Productivity; Spare Me the Self-Service; Lineage of the Internet's Open Systems Foundation . . . . . . . . 11--13 Rebecca T. Mercuri Security watch: Superscaled security . . 15--18 CACM Staff ACM fellows . . . . . . . . . . . . . . 19--20 Phillip G. Armour The business of software: Beware of counting LOC . . . . . . . . . . . . . . 21--24 Michael A. Cusumano Technology strategy and management: Who is liable for bugs and security flaws in software? . . . . . . . . . . . . . . . 25--27 John G. Messerly Viewpoint: How computer games affect CS (and other) students' school performance 29--31 John Yen Emerging technologies for homeland security: Introduction . . . . . . . . . 32--35 Robert Popp and Thomas Armour and Ted Senator and Kristen Numrych Countering terrorism through information technology . . . . . . . . . . . . . . . 36--43 Thayne Coffman and Seth Greenblatt and Sherry Marcus Graph-based technologies for intelligence analysis . . . . . . . . . 45--47 Paul Kogut and John Yen and Yui Leung and Shuang Sun and Rui Wang and Ted Mielczarek and Ben Hellar Proactive information gathering for homeland security teams . . . . . . . . 48--50 O. Sami Saydjari Cyber defense: art to science . . . . . 52--57 R. Bajcsy and T. Benzel and M. Bishop and B. Braden and C. Brodley and S. Fahmy and S. Floyd and W. Hardaker and A. Joseph and G. Kesidis and K. Levitt and B. Lindell and P. Liu and D. Miller and R. Mundy and C. Neuman and R. Ostrenga and V. Paxson and P. Porras and C. Rosenberg and J. D. Tygar and S. Sastry and D. Sterne and S. F. Wu Cyber defense technology networking and evaluation . . . . . . . . . . . . . . . 58--61 Steve Sawyer and Andrea Tapia and Leonard Pesheck and John Davenport Mobility and the first responder . . . . 62--65 Robin R. Murphy Rescue robotics for homeland security 66--68 Gang Wang and Hsinchun Chen and Homa Atabakhsh Automatically detecting deceptive criminal identities . . . . . . . . . . 70--76 Alberto Escudero-Pascual and Ian Hosein Questioning lawful access to traffic data . . . . . . . . . . . . . . . . . . 77--82 Nikunj P. Dalal and Manjunath Kamath and William J. Kolarik and Eswar Sivaraman Toward an integrated framework for modeling enterprise processes . . . . . 83--87 Luigi Suardi How to manage your software product life cycle with MAUI . . . . . . . . . . . . 89--94 Eyong B. Kim and Marc J. Schniederjans The role of personality in Web-based distance education courses . . . . . . . 95--98 Vikram Sethi and Ruth C. King and James Campbell Quick What causes stress in information system professionals? . . . . . . . . . . . . . 99--102 Mark Stamp Inside risks: Risks of monoculture . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Political Agendas; Spam Rage; Digital Doubts; Women Got Game; Perfict Fit; Awkshun Serchs . . . . . . 9--10 Diane Crawford and David Monniaux and Ralph Johnson and Clark E. Hartsock, III and Ken Nickerson and Robert L. Glass and Marc Bellusci and Alex Simonelis Forum: Open Source vs. Capitalism and Communism; What Worker Shortage?; Design for Pedagogy Not Just for Software . . . 11--13 John White ACM's Professional Development Centre expands learning opportunities . . . . . 14--14 Peter J. Denning The profession of IT: The social life of innovation . . . . . . . . . . . . . . . 15--19 Hal Berghel and Natasa Brajkovska Digital village: Wading into alternate data streams . . . . . . . . . . . . . . 21--27 Eric M. Uslaner Viewpoint: Trust online, trust offline 28--29 Christopher A. Miller Introduction: Human-computer etiquette: managing expectations with intentional agents . . . . . . . . . . . . . . . . . 30--34 Clifford Nass Etiquette equality: exhibitions and expectations of computer politeness . . 35--37 Timothy W. Bickmore Unspoken rules of spoken interaction . . 38--44 Punya Mishra and Kathryn A. Hershey Etiquette and the design of educational technology . . . . . . . . . . . . . . . 45--49 Raja Parasuraman and Christopher A. Miller Trust and etiquette in high-criticality automated systems . . . . . . . . . . . 51--55 Jenny Preece Etiquette online: from nice to necessary 56--61 S. Krishna and Sundeep Sahay and Geoff Walsham Managing cross-cultural issues in global software outsourcing . . . . . . . . . . 62--66 Linda Wallace and Mark Keil Software project risks and their effect on outcomes . . . . . . . . . . . . . . 68--73 Blake Ives and Kenneth R. Walsh and Helmut Schneider The domino effect of password reuse . . 75--78 Anat Hovav and Paul Gray Managing academic e-journals . . . . . . 79--82 Petros Nicopolitidis and Georgios Papadimitriou and Mohammed S. Obaidat and Andreas S. Pomportsis The economics of wireless networks . . . 83--86 Kevin C. Desouza and J. Roberto Evaristo Managing knowledge in distributed projects . . . . . . . . . . . . . . . . 87--91 Xiaotong Li Informational cascades in IT adoption 93--97 John Gerdes, Jr. Technical opinion: The viability of supporting anonymous employees . . . . . 98--100 Jim Horning Inside Risks: Coincidental risks . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Concerts to Go: No Foul; Press This!; Littlest Champ; Truth Be Told . . . . . . . . . . . . . . . . . . 9--10 Diane Crawford and Michael J. Wax and Tom Pittman and Madhu Banavati and Jef Raskin and Rebecca T. Mercuri and Bob Ellis and Paul Nicholson Forum: Why Count Lines of Code?; Computers and Consciousness; Computers, ACM, and Everyday Existence; Don't Dismiss Computers in the Classroom . . . 11--13 Meg McGinity Staying connected: It's alive: Reports of the demise of the telecom industry have been greatly exaggerated . . . . . 15--18 Robert L. Glass Practical programmer: Matching methodology to problem domain . . . . . 19--21 Jeff Grove Viewpoint: Wanted: public policies that foster creation of knowledge . . . . . . 23--25 Kuldeep Kumar and Jos van Hillegersberg Introduction: New architectures for financial services . . . . . . . . . . . 26--30 Krishnan Dandapani Success and failure in Web-based financial services . . . . . . . . . . . 31--33 Ulrich Homann and Michael Rill and Andreas Wimmer Flexible value structures in banking . . 34--36 Alberto Pan and Ángel Viña An alternative architecture for financial data integration . . . . . . . 37--40 Niina Mallat and Matti Rossi and Virpi Kristiina Tuunainen Mobile banking services . . . . . . . . 42--46 N. Chandrasekaran and Geert Ensing ODC: a global IT services delivery model 47--49 Jeroen Tas and Shyam Sunder Financial services business process outsourcing . . . . . . . . . . . . . . 50--52 John S. Zdanowicz Detecting money laundering and terrorist financing via data mining . . . . . . . 53--55 Ton Slewe and Mark Hoogenboom Who will rob you on the digital highway? 56--60 Sarv Devaraj and S. Ramesh Babu How to measure the relationship between training and job performance . . . . . . 62--67 Weidong Xia and Gwanhoo Lee Grasping the complexity of IS development projects . . . . . . . . . . 68--74 Dongsong Zhang and J. Leon Zhao and Lina Zhou and Jay F. Nunamaker, Jr. Can e-learning replace classroom learning? . . . . . . . . . . . . . . . 75--79 Gerald Segal 2004 ACM elections . . . . . . . . . . . 80--89 I. Robert Chiang and Vijay S. Mookerjee Improving software team productivity . . 89--93 Rishi Toshniwal and Dharma P. Agrawal Tracing the roots of markup languages 95--98 Masanori Arita Technical opinion: Comma-free design for DNA words . . . . . . . . . . . . . . . 99--100 Peter J. Denning and Dorothy E. Denning Inside Risks: Artificial stupidity . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Special Skills Draft; MBA Outsourcing Track; Ancient Egypt Online; Rx PlayStation; Camera Ready; Blogging Bahgdad . . . . . . . . . . . . . . . . 9--10 Diane Crawford and Mark Sadler and Anonymous and Michael Cusumano and Alan Karp and Lee A. Hollaar and Chuck Walbourn and Thomas W. Moran and Seung Kyoon Shin and Ram D. Gopal and G. Lawrence Sanders and Andrew B. Whinston Forum: The Threat from Within; No Excuses for Microsoft; How About a Manageable Password?; When is Copyright Infringement Legal? Don't Miss the Lessons in Games; Inconsistent Statistics Unconvincing . . . . . . . . 11--13 Phillip G. Armour The business of software: Real work, necessary friction, optional chaos . . . 15--18 Pamela Samuelson Legally speaking: Why reform the U.S. patent system? . . . . . . . . . . . . . 19--23 Stephen Lau Viewpoint: The Spinning Cube of Potential Doom . . . . . . . . . . . . . 25--26 Allan Glaser and Snow Fu and Mark Tumelty On Site: Growing a participatory programming environment . . . . . . . . 27--29 David E. Culler and Wei Hong Introduction: Wireless sensor networks 30--33 Robert Szewczyk and Eric Osterweil and Joseph Polastre and Michael Hamilton and Alan Mainwaring and Deborah Estrin Habitat monitoring with sensor networks 34--40 Jason Hill and Mike Horton and Ralph Kling and Lakshman Krishnamurthy The platforms enabling wireless sensor networks . . . . . . . . . . . . . . . . 41--46 Alec Woo and Sam Madden and Ramesh Govindan Networking support for query processing in sensor networks . . . . . . . . . . . 47--52 Adrian Perrig and John Stankovic and David Wagner Security in wireless sensor networks . . 53--57 Janice C. Sipior and Burke T. Ward and P. Gregory Bonner Should spam be on the menu? . . . . . . 59--63 Banphot Vatanasombut and Antonis C. Stylianou and Magid Igbaria How to retain online customers . . . . . 64--70 Clayton A. Looney and Leonard M. Jessup and Joseph S. Valacich Emerging business models for mobile brokerage services . . . . . . . . . . . 71--77 Narasimhaiah Gorla and Yan Wah Lam Who should work with whom?: Building effective software project teams . . . . 79--82 Hal Berghel and David L. Sallach A paradigm shift in computing and IT education . . . . . . . . . . . . . . . 83--88 Robert L. Glass and V. Ramesh and Iris Vessey An analysis of research in computing disciplines . . . . . . . . . . . . . . 89--94 Weiling Ke and Kwok Kee Wei Successful e-government in Singapore . . 95--99 Hartmut Wedekind and Erich Ortner Technical opinion: Toward universal literacy: from computer science upward 101--104 Peter G. Neumann Inside risks: Optimistic optimization 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Dominance Lost; Vocal Cards; Flexible Flying; Fantastic Voyage; Uninvited Consequences; Snooze Control 9--10 Diane Crawford and Industry Usability Reporting Project Steering Committee, National Institute of Standards and Technology and Peter J. Denning and Lennart Meier and Jim Farrans and Li Deng and Xuedong Huang and James D. Mooney Forum: Don't Neglect Usability in the Total Cost of Ownership; Where's the Steak?; Discourage the Sale of Credentials in Anonymous Employment; For Voice Interfaces, Hold the SALT; Look Deeper for Markup Roots . . . . . . . . 11--13 Peter J. Denning The profession of IT: The field of programmers myth . . . . . . . . . . . . 15--20 Victor W. A. Mbarika On Site: Is telemedicine the panacea for Sub-Saharan Africa's medical nightmare? 21--24 Rebecca T. Mercuri Security watch: The HIPAA-potamus in health care data security . . . . . . . 25--28 Michael A. Cusumano Technology strategy and management: More lawyers than programmers? Microsoft must alter its strategy to avoid an increasingly litigious future . . . . . 29--31 Catherine L. Mann Viewpoint: What global sourcing means for U.S. IT workers and for the U.S. economy . . . . . . . . . . . . . . . . 33--35 Donna L. Hoffman and Thomas P. Novak and Alladi Venkatesh Has the Internet become indispensable? 37--42 Linda A. Jackson and Alexander von Eye and Gretchen Barbatsis and Frank Biocca and Hiram E. Fitzgerald and Yong Zhao The impact of Internet use on the other side of the digital divide . . . . . . . 43--47 Warren Harrison and George Heuston and Sarah Mocas and Mark Morrissey and John Richardson High-tech forensics: An Oregon police department successfully enlists tech-savvy citizens to serve as police reserve specialists . . . . . . . . . . 48--52 George P. Schell Universities marginalize online courses 53--56 Kaushal Chari and Saravanan Seshadri Demystifying integration . . . . . . . . 58--63 Maris G. Martinsons ERP in China: one package, two profiles 65--68 Huigang Liang and Yajiong Xue and William R. Boulton and Terry Anthony Byrd Why Western vendors don't dominate China's ERP market . . . . . . . . . . . 69--72 Troy J. Strader and Sridhar N. Ramaswami Investor perceptions of traditional and online channels . . . . . . . . . . . . 73--76 Graeme Shanks and Elizabeth Tansley and Ron Weber Representing composites in conceptual modeling . . . . . . . . . . . . . . . . 77--80 Narasimha Bolloju Improving the quality of business object models using collaboration patterns . . 81--86 Huseyin Cavusoglu and Birendra Mishra and Srinivasan Raghunathan A model for evaluating IT security investments . . . . . . . . . . . . . . 87--92 Paul Kocher and Bruce Schneier Inside risks: Insider risks in elections 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Who Gets the Last Word? Pay Up or Scram; Smart Stepping; China Follows Own Drummer; Elusive E-Government; In the Groove . . . . . . 9--10 Diane Crawford and Donn B. Parker and Dani Oderbolz and Kurt Gunteroth and Nicholas Ourosoff and Michael J. Lewchuk and Ian Perry Forum: The Folk Art of Information Security Needs an Upgrade; Don't Let Patents Inhibit Software Innovation; Hold the Methodologies: Give Me Tools; Measuring Project Friction and Chaos; Less is More Code . . . . . . . . . . . 11--13 Robert L. Glass Practical programmer: The mystery of formal methods disuse . . . . . . . . . 15--17 Peter Freeman and David Hart Viewpoint: A science of design for software-intensive systems . . . . . . . 19--21 Martin E. Bush On site: Computer science education in Japan . . . . . . . . . . . . . . . . . 23--26 Andrew Rosenbloom Introduction: Interactive immersion in $3$D graphics . . . . . . . . . . . . . 28--31 Chris Scharver and Ray Evenhouse and Andrew Johnson and Jason Leigh Designing cranial implants in a haptic augmented reality environment . . . . . 32--38 Ming Lin and William Baxter and Vincent Scheib and Jeremy Wendt Physically based virtual painting . . . 40--47 Benjamin C. Lok Toward the merging of real and virtual spaces . . . . . . . . . . . . . . . . . 48--53 Mike Houston and Chris Niederauer and Maneesh Agrawala and Greg Humphreys Visualizing dynamic architectural environments . . . . . . . . . . . . . . 54--59 Charles Jacobs and Wil Li and Evan Schrier and David Bargeron and David Salesin Adaptive document layout . . . . . . . . 60--66 Mike Burmester and Yvo G. Desmedt Is hierarchical public-key certification the next target for hackers? . . . . . . 68--74 Rolf Oppliger Certified mail: the next challenge for secure messaging . . . . . . . . . . . . 75--79 John Gallaugher and Nigel Melville Electronic frontiers in foreign exchange trading . . . . . . . . . . . . . . . . 81--87 CACM Staff 2004 ACM awards banquet: a night to celebrate . . . . . . . . . . . . . . . 89--92 Ralph D. Westfall Does telecommuting really increase productivity? . . . . . . . . . . . . . 93--96 David J. Paper and James A. Rodger and Steven J. Simon Voice says it all in the Navy . . . . . 97--101 Ahmed Elfatatry and Paul Layzell Negotiating in service-oriented environments . . . . . . . . . . . . . . 103--108 Lauren Weinstein Inside risks: Close exposures of the digital kind . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Political Lines; Virtual Visions; E-Earache; Sensors on Ice; Coke Promo Fizzles . . . . . . . . . . . . . 9--10 Diane Crawford and Peter Wegner and Kurt Gunteroth and Joshua Stern and David Marks and Peter J. Denning Forum: No Scientific Discipline Was Ever Built on a Myth . . . . . . . . . . . . 11--13 Meg McGinity Staying connected: Weaving a wireless safety net . . . . . . . . . . . . . . . 15--18 Hal Berghel Digital village: Wireless infidelity I: war driving . . . . . . . . . . . . . . 21--26 James A. Jacobs and Charles Humphrey Viewpoint: Preserving research data . . 27--29 Alistair Sutcliffe and Nikolay Mehandjiev Introduction: End-user development . . . 31--32 G. Fischer and E. Giaccardi and Y. Ye and A. G. Sutcliffe and N. Mehandjiev Meta-design: a manifesto for end-user development . . . . . . . . . . . . . . 33--37 Joerg Beringer Reducing expertise tension . . . . . . . 39--40 Volker Wulf and Matthias Jarke The economics of end-user development 41--42 Alexander Repenning and Andri Ioannidou Agent-based end-user development . . . . 43--46 Brad A. Myers and John F. Pane and Andy Ko Natural programming languages and environments . . . . . . . . . . . . . . 47--52 Margaret Burnett and Curtis Cook and Gregg Rothermel End-user software engineering . . . . . 53--58 Anders I. Mòrch and Gunnar Stevens and Markus Won and Markus Klann and Yvonne Dittrich and Volker Wulf Component-based technologies for end-user development . . . . . . . . . . 59--62 Silvia Berti and Fabio Patern\`o and Carmen Santoro Natural development of ubiquitous interfaces . . . . . . . . . . . . . . . 63--64 Alan F. Blackwell End-user developers at home . . . . . . 65--66 Paul J. Resnick and Derek L. Hansen and Caroline R. Richardson Calculating error rates for filtering software . . . . . . . . . . . . . . . . 67--71 Ozgur Turetken and David Schuff and Ramesh Sharda and Terence T. Ow Supporting systems analysis and design through fisheye views . . . . . . . . . 72--77 Hai Zhuge and Xiaoqing Shi Toward the eco-grid: a harmoniously evolved interconnection environment . . 78--83 Michael J. Hine and Mark Hill and David Ruth and Bob Carlson and Dave Banks and Jim Troxell Empowering persons with disabilities with decision-support technology . . . . 85--89 Susan K. Lippert and Murugan Anandarajan Academic vs. practitioner systems planning and analysis . . . . . . . . . 91--94 Jason E. Bailes and Gary F. Templeton Technical opinion: Managing P2P security 95--98 Peter G. Neumann Inside risks: The big picture . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Experts Dispute Passport Plan; Parliament Endorses Open Access; A Shadow Over the Valley; Paint by Numbers; Talk of the Future; Emotional Ride . . . . . . . . . . . . . . . . . . 9--10 Diane Crawford and Scott Ambler and Peter G. Neumann and Peter Turk and Hartmut Wedekind and John Stanley and Julian V. Noble and Hong-Lok Li and Michael Blaha and Dean Wakerley Forum: Consider Long-Term Implications Now and Forever; The Real Philosophical Roots of Literacy; Give Me Common Carrier Internet Service; For Science and Math, Skip the Online Course; Prepare CS Graduates for Industrial Reality; Elegant Code Produces Maximal Comprehension . . . . . . . . . . . . . 11--13 Phillip G. Armour The business of software: Not-defect: the mature discipline of testing . . . . 15--18 David A. Patterson Hot links: Hot Links . . . . . . . . . . 19--20 Fred von Lohmann Viewpoint: Voluntary collective licensing for music file sharing . . . . 21--24 Michael A. Cusumano Technology strategy and management: Reflections on free and open software 25--27 Peter G. Neumann Introduction: The problems and potentials of voting systems . . . . . . 28--30 Herb Deutsch and Stephen Berger Voting systems standards and certifications . . . . . . . . . . . . . 31--33 Carolyn Coggins Independent testing of voting systems 34--38 Brit J. Williams and Merle S. King Implementing voting systems: the Georgia method . . . . . . . . . . . . . . . . . 39--42 Anthony Di Franco and Andrew Petro and Emmett Shear and Vladimir Vladimirov Small vote manipulations can swing elections . . . . . . . . . . . . . . . 43--45 Douglas W. Jones Auditing elections . . . . . . . . . . . 46--50 Rebecca T. Mercuri and L. Jean Camp The code of elections . . . . . . . . . 52--57 David Jefferson and Aviel D. Rubin and Barbara Simons and David Wagner Analyzing Internet voting security . . . 59--64 Jason Kitcat Source availability and e-voting: an advocate recants . . . . . . . . . . . . 65--67 Jeff Grove ACM statement on voting systems . . . . 69--70 David A. Patterson Latency lags bandwith . . . . . . . . . 71--75 Huaiqing Wang and Shuozhong Wang Cyber warfare: steganography vs. steganalysis . . . . . . . . . . . . . . 76--82 Ioannis Samoladas and Ioannis Stamelos and Lefteris Angelis and Apostolos Oikonomou Open source software development should strive for even greater code maintainability . . . . . . . . . . . . 83--87 Nancy J. Lightner Evaluating e-commerce functionality with a focus on customer service . . . . . . 88--92 Michael Alan Smith Portals: toward an application framework for interoperability . . . . . . . . . . 93--97 Peter B. Southard and Keng Siau A survey of online e-banking retail initiatives . . . . . . . . . . . . . . 99--102 Casey G. Cegielski Technical opinion: Who values technology certification? . . . . . . . . . . . . . 103--105 Bruce Schneier Inside risks: The nonsecurity of secrecy 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6 CACM Staff News track: Spam Spotting the DNA Way; Majoring in Homeland Security; In the Driver's Seat; Campus Security; Bay Area Attractions; Hello, I Must be Going . . 9--10 Diane Crawford and Alex Simonelis and Mike Brenner and Spike McLeary and Jack Nilles and Ralph D. Westfall Forum: Design Principles Are Where You Find Them; The Computer Didn't Make You Do It; Why Doesn't Everyone Telecommute? 11--13 Peter J. Denning The profession of IT: Network laws . . . 15--20 Diane Crawford Hot Links: Top 10 downloads from ACM's Portal . . . . . . . . . . . . . . . . . 21--22 Robert L. Glass Practical programmer: Is this a revolutionary idea, or not? . . . . . . 23--25 Norman Matloff Viewpoint: Globalization and the American IT worker . . . . . . . . . . . 27--29 Craig A. Stewart Introduction: Bioinformatics: transforming biomedical research and medical care . . . . . . . . . . . . . . 30--33 David A. Bader Computational biology and high-performance computing . . . . . . . 34--41 Toshikazu Ebisuzaki and Robert Germain and Makoto Taiji PetaFLOPS computing . . . . . . . . . . 42--45 Ross Overbeek and Terry Disz and Rick Stevens The SEED: a peer-to-peer environment for genome annotation . . . . . . . . . . . 46--51 Mark Ellisman and Michael Brady and David Hart and Fang-Pang Lin and Matthias Müller and Larry Smarr The emerging role of biogrids . . . . . 52--57 Homa Javahery and Ahmed Seffah and Thiruvengadam Radhakrishnan Beyond power: making bioinformatics tools user-centered . . . . . . . . . . 58--63 Chris R. Johnson and Rob MacLeod and Steven G. Parker and David Weinstein Biomedical computing and visualization software environments . . . . . . . . . 64--71 Amrit Tiwana and Mark Keil The one-minute risk assessment tool . . 73--77 James Y. L. Thong and Weiyin Hong and Kar Yan Tam What leads to acceptance of digital libraries? . . . . . . . . . . . . . . . 78--83 Theresa Edgington and Beomjin Choi and Katherine Henson and T. S. Raghu and Ajay Vinze Adopting ontology to facilitate knowledge sharing . . . . . . . . . . . 85--90 Shobha Ganapathy and C. Ranganathan and Balaji Sankaranarayanan Visualization strategies and tools for enhancing customer relationship management . . . . . . . . . . . . . . . 92--99 Markus Biehl and Edmund Prater and John R. McIntyre Remote repair, diagnostics, and maintenance . . . . . . . . . . . . . . 100--106 Thomas F. Stafford and Dennis Gonier What Americans like about being online 107--112 Ken Donaldson and Vicki Stone Technical opinion: Nanoscience fact versus fiction . . . . . . . . . . . . . 113--115 P. L. Vora and B. Adida and R. Bucholz and D. Chaum and D. L. Dill and D. Jefferson and D. W. Jones and W. Lattin and A. D. Rubin and M. I. Shamos and M. Yung Inside risks: Evaluation of voting systems . . . . . . . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: A World Connected; Invisa-Bills; Starting Over; Bots Wild; Creative Measures; By George! . . . . . 9--10 Diane Crawford and Ben Bederson and Harry Hochheiser and Jeff Johnson and Clare-Marie Karat and Jonathan Lazar and John David and Frances C. Bernstein and Andrew D. Wolfe, Jr. and Hong-Lok Li and Mark Burgin and Nicholas Roeder Forum: For a Fair Election, Ensure Usability; Don't Skip Secrecy If Security is the Goal; Let Users Program Their Own Systems; Put More Science in Computer Science; What We Don't Know . . 11--13 Hal Berghel and Jacob Uecker Digital village: Wireless infidelity II: airjacking . . . . . . . . . . . . . . . 15--20 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 21--22 David A. Patterson President's Letter: The health of research conferences and the dearth of big idea papers . . . . . . . . . . . . 23--24 Rebecca T. Mercuri Security watch: The many colors of multimedia security . . . . . . . . . . 25--29 Andrew Rosenbloom Introduction: Special Issue: The blogosphere . . . . . . . . . . . . . . 30--33 Ravi Kumar and Jasmine Novak and Prabhakar Raghavan and Andrew Tomkins Structure and evolution of blogspace . . 35--39 Bonnie A. Nardi and Diane J. Schiano and Michelle Gumbrecht and Luke Swartz Why we blog . . . . . . . . . . . . . . 41--46 Steve Cayzer Semantic blogging and decentralized knowledge management . . . . . . . . . . 47--52 Rebecca Blood How blogging software reshapes the online community . . . . . . . . . . . . 53--55 Cass R. Sunstein Democracy and filtering . . . . . . . . 57--59 Kenneth P. Birman Viewpoint: Like it or not, Web services are distributed objects . . . . . . . . 60--62 CACM Staff ACM annual report for FY04 . . . . . . . 63--69 Ahmed Seffah and Eduard Metzker The obstacles and myths of usability and software engineering . . . . . . . . . . 71--76 Pratyush Bharati and Abhijit Chaudhury Using choiceboards to create business value . . . . . . . . . . . . . . . . . 77--81 Eleanor T. Loiacono Cyberaccess: Web accessibility and corporate America . . . . . . . . . . . 82--87 Yogesh Malhotra and Dennis F. Galletta Building systems that users want to use 88--94 Steve Sawyer Software development teams . . . . . . . 95--99 Hannes Werthner and Francesco Ricci E-commerce and tourism . . . . . . . . . 101--105 Steven M. Bellovin Inside risks: Spamming, phishing, authentication, and privacy . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Sniffing out Trouble; Home Improvements; Patent Number 977; On the Nose; Take a Number; Sick Thoughts . . . 9--10 Diane Crawford and Brad Kidwell and Jeffrey P. Buzen and David A. Patterson and Bradley Dilger and Brit J. Williams and Merle S. King and Chris Morris and David H. Jameson and Ralph Johnson and I. Samoladas and I. Stamelos and L. Angelis Forum: Bandwidth, Latency, and Physical Reality; Share Disturbing Information on e-Voting; Ensure Quality Assurance for Bioinformatics Applications; Follow the Money; Share Open Source Sources . . . . 11--13 Phillip G. Armour The business of software: The unconscious art of software testing . . 15--18 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 19--20 Meg McGinity Staying connected: Let your fingers do the talking . . . . . . . . . . . . . . 21--23 David A. Patterson President's letter: Minority-minority and minority-majority technology transfer . . . . . . . . . . . . . . . . 25--26 Deborah Anderson Viewpoint: Global linguistic diversity for the Internet . . . . . . . . . . . . 27--28 Chris Stephenson Viewpoint: Creating a national K--12 computer science community . . . . . . . 29--31 Allison Druin and Juan Pablo Hourcade Interaction design and children . . . . 32--34 David Kestenbaum The challenges of IDC: what have we learned from our past? . . . . . . . . . 35--38 Mona Leigh Guha and Allison Druin and Gene Chipman and Jerry Alan Fails and Sante Simms and Allison Farber Working with young children as technology design partners . . . . . . . 39--42 Johanna Höysniemi and Perttu Hämäläinen and Laura Turkki and Teppo Rouvi Children's intuitive gestures in vision-based action games . . . . . . . 44--50 Michael Eisenberg The material side of educational technology . . . . . . . . . . . . . . . 51--54 Yvonne Rogers and Sara Price and Cliff Randell and Danae Stanton Fraser and Mark Weal and Geraldine Fitzpatrick Ubi-learning integrates indoor and outdoor experiences . . . . . . . . . . 55--59 Judy Robertson and Judith Good Story creation in virtual game worlds 61--65 RadhaKanta Mahapatra and Vincent S. Lai Evaluating end-user training programs 66--70 Andreas Holzinger Usability engineering methods for software developers . . . . . . . . . . 71--74 John Tillquist and Waymond Rodgers Using asset specificity and asset scope to measure the value of IT . . . . . . . 75--80 Rodrigo Fonseca and Virgílio Almeida and Mark Crovella Locality in a web of streams . . . . . . 82--88 Ganesh Vaidyanathan A framework for evaluating third-party logistics . . . . . . . . . . . . . . . 89--94 Michael Ettredge and John Gerdes Jr. Timeliness of investor relations data at corporate Web sites . . . . . . . . . . 95--100 Ines Herrero and Jose L. Salmeron Using the DEA methodology to rank software technical efficiency . . . . . 101--105 Stuart J. Barnes Technical opinion: Assessing the value of IS journals . . . . . . . . . . . . . 110--112 George Ledin, Jr. Inside risks: Not teaching viruses and worms is harmful . . . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Not All Fun and Games; IT Hiring Up; What Lies A-Head; IT Budget Ups and Downs; Phishing Expeditions; The (Really) Big Picture; Number One ``Blog'' . . . . . . . . . . . . . . . . 9--10 Diane Crawford and Serdar Tasiran and Norman Matloff and Dana Honeycutt and Cass R. Sunstein and Wolter Pieters and Joseph R. Kintry and Tyrone Grandison and Peter G. Neumann Forum: A Global Audience Deserves a Global Perspective; Blogs No Threat to Democracy; Internet Voting Not Impossible; Don't Trade Privacy for Security . . . . . . . . . . . . . . . . 11--13 David A. Patterson President's letter: Why join ACM? . . . 14--14 Michael A. Cusumano Technology strategy and management: Google: what it is and what it is not 15--17 Jon Crowcroft Viewpoint: On the nature of computing 19--20 CACM Staff SIGs announce candidates for election 21--22 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 23--24 Dimitris Metaxas Medical image modeling tools and applications . . . . . . . . . . . . . . 26--29 Herve Delingette and Nicholas Ayache Hepatic surgery simulation . . . . . . . 31--36 Arie E. Kaufman and Sarang Lakare and Kevin Kreeger and Ingmar Bitter Virtual colonoscopy . . . . . . . . . . 37--41 Kyoungju Park and Albert Montillo and Dimitris Metaxas and Leon Axel Volumetric heart modeling and analysis 43--48 Celina Imielinska and Pat Molholt Incorporating $3$D virtual anatomy into the medical curriculum . . . . . . . . . 49--54 Terry S. Yoo and Michael J. Ackerman Open source software for medical image processing and visualization . . . . . . 55--59 CACM Staff Notice of intent to de-charter professional chapters . . . . . . . . . 61--62 CACM Staff Notice of intent to de-charter student chapters . . . . . . . . . . . . . . . . 63--65 J. Roberto Evaristo and Kevin C. Desouza and Kevin Hollister Centralization momentum: the pendulum swings back again . . . . . . . . . . . 66--71 A. F. Salam and Lakshmi Iyer and Prashant Palvia and Rahul Singh Trust in e-commerce . . . . . . . . . . 72--77 Lawrence D. Bodin and Lawrence A. Gordon and Martin P. Loeb Evaluating information security investments using the analytic hierarchy process . . . . . . . . . . . . . . . . 78--83 Fiona Fui-Hoon Nah and Keng Siau and Hong Sheng The value of mobile applications: a utility company study . . . . . . . . . 85--90 R. Kelly Rainer, Jr. and Mark D. Miller Examining differences across journal rankings . . . . . . . . . . . . . . . . 91--94 Yufei Yuan and Brian Detlor Intelligent mobile crisis response systems . . . . . . . . . . . . . . . . 95--98 Chenglie Hu Technical opinion: Dataless objects considered harmful . . . . . . . . . . . 99--101 Shirley Ann Becker Technical opinion: E-government usability for older adults . . . . . . . 102--104 Peter G. Neumann Inside risks: Responsibilities of technologists . . . . . . . . . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Ominous Clouds; In the Wrong Hands; China's Netizens to Soar; Chess Champs in Check; Painful Plateau; War is No Game . . . . . . . . . . . . . . . . 9--10 Diane Crawford and Marius Matioc and Steven M. Bellovin and Richard Hubert and Andrew D. Wolfe, Jr. and David Foulser and Andrew R. Kilner Forum: To Block Spam, Demand Sender Authentication; Not Revolutionary (Thank Goodness); How to Know the Known from the Unknowns; User First in User-Centered Design . . . . . . . . . . 11--13 CACM Staff ACM Fellows . . . . . . . . . . . . . . 14--14 David A. Patterson President's letter: 20$^{th}$ century vs. 21$^{st}$ century C&C: the SPUR manifesto . . . . . . . . . . . . . . . 15--16 Phillip G. Armour The business of software: Project portfolios: organizational management of risk . . . . . . . . . . . . . . . . . . 17--20 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 21--22 Gregory Conti Viewpoint: Why computer scientists should attend hacker conferences . . . . 23--24 Robert L. Glass Practical programmer: The first business application: a significant milestone in software history . . . . . . . . . . . . 25--26 Pamela Samuelson Legally speaking: Legislative challenges to the \em Sony safe harbor rule . . . . 27--31 Norbert Streitz and Paddy Nixon The disappearing computer . . . . . . . 32--35 Gaetano Borriello and Matthew Chalmers and Anthony LaMarca and Paddy Nixon Delivering real-world ubiquitous location systems . . . . . . . . . . . . 36--41 Daniel M. Russell and Norbert A. Streitz and Terry Winograd Building disappearing computers . . . . 42--48 Joëlle Coutaz and James L. Crowley and Simon Dobson and David Garlan Context is key . . . . . . . . . . . . . 49--53 Steve Benford and Carsten Magerkurth and Peter Ljungstrand Bridging the physical and digital in pervasive gaming . . . . . . . . . . . . 54--57 Saadi Lahlou and Marc Langheinrich and Carsten Röcker Privacy and trust issues with invisible computers . . . . . . . . . . . . . . . 59--60 Liam Bannon and Steve Benford and John Bowers and Christian Heath Hybrid design creates innovative museum experiences . . . . . . . . . . . . . . 62--65 Hans Gellersen Smart-Its: computers for artifacts in the physical world . . . . . . . . . . . 66--66 Spyros Lalis and Alexandros Karypidis and Anthony Savidis Ad-hoc composition in wearable and mobile computing . . . . . . . . . . . . 67--68 Achilles Kameas and Irene Mavrommati Extrovert gadgets . . . . . . . . . . . 69--69 Joseph A. Paradiso Sensate media . . . . . . . . . . . . . 70--70 Anatole Gershman and Andrew Fano Examples of commercial applications of ubiquitous computing . . . . . . . . . . 71--71 Jacques Cohen Computer science and bioinformatics . . 72--78 Arun Sen and Atish P. Sinha A comparison of data warehousing methodologies . . . . . . . . . . . . . 79--84 CACM Staff SIGs announce candidates for election 85--85 Trevor Moores Do consumers understand the role of privacy seals in e-commerce? . . . . . . 86--91 Bonnie Rubenstein Montano and Victoria Yoon and Stuart Lowry and Teresa Merlau A multiagent system for U.S. defense research contracting . . . . . . . . . . 93--97 William Hibbard and Curtis Rueden and Steve Emmerson and Tom Rink and David Glowacki and Tom Whittaker and Don Murray and David Fulker and John Anderson Java distributed components for numerical visualization in VisAD . . . . 98--104 Ji-Ye Mao and Karel Vredenburg and Paul W. Smith and Tom Carey The state of user-centered design practice . . . . . . . . . . . . . . . . 105--109 Xiaoni Zhang and Victor R. Prybutok How the mobile communication markets differ in China, the U.S., and Europe 111--114 Marco Gori and Ian Witten Technical opinion: The bubble of Web visibility . . . . . . . . . . . . . . . 115--117 Peter G. Neumann Inside risks: Anticipating disasters . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Setting the Bar; China's Café Count; Portrait of Excess; U.S. Visa Rules Relax; Knock on Wood . . . . . . . 9--10 Diane Crawford and Rodney M. Bates and David Armstrong and Robin Evans and Phillip G. Armour and Scott Duncan and Hong-Lok Li Forum: For Programmers: Objects Are Not the Only Tool; Computing is Mathematical Engineering; Blog on Blog . . . . . . . 11--13 Hal Berghel Digital Village: The two sides of ROI: return on investment vs. risk of incarceration . . . . . . . . . . . . . 15--20 David A. Patterson President's Letter: The state of funding for new initiatives in computer science and engineering . . . . . . . . . . . . 21--25 Peter J. Denning The Profession of IT: Is computer science science? . . . . . . . . . . . . 27--31 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 33--34 Richard P. Suttmeier Viewpoint: A new technonationalism?: China and the development of technical standards . . . . . . . . . . . . . . . 35--37 Vinton G. Cerf Viewpoint: Spam, spim, and spit . . . . 39--43 Maris G. Martinsons Introduction: Transforming China . . . . 44--48 Jonathan J. H. Zhu and Enhai Wang Diffusion, use, and effect of the Internet in China . . . . . . . . . . . 49--53 Xunhua Guo and Guoqing Chen Internet diffusion in Chinese companies 54--58 Maris G. Martinsons The Internet enlightens and empowers Chinese society . . . . . . . . . . . . 59--60 Robert M. Davison and Douglas R. Vogel and Roger W. Harris The e-transformation of western China 62--67 Jing Quan and Qing Hu and Xinan Wang IT is not for everyone in China . . . . 69--72 Glen R. Burrows and Damon L. Drummond and Maris G. Martinsons Knowledge management in China . . . . . 73--76 Qiang Tu and Kanliang Wang and Qin Shu Computer-related technostress in China 77--81 Charalambos L. Iacovou and Albert S. Dexter Surviving IT project cancellations . . . 83--86 Christian Collberg and Stephen Kobourov Self-plagiarism in computer science . . 88--94 Ellen Christiaanse Performance benefits through integration hubs . . . . . . . . . . . . . . . . . . 95--100 Bettina Berendt and Oliver Günther and Sarah Spiekermann Privacy in e-commerce: stated preferences vs. actual behavior . . . . 101--106 Dursun Delen and Nikunj P. Dalal and Perakath C. Benjamin Integrated modeling: the key to holistic understanding of the enterprise . . . . 107--112 K. C. Tan and M. L. Wang and W. Peng A P2P genetic algorithm environment for the Internet . . . . . . . . . . . . . . 113--116 Hai Zhuge Semantic Grid: scientific issues, infrastructure, and methodology . . . . 117--119 Bruce Schneier Two-factor authentication: too little, too late . . . . . . . . . . . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Hackers Sacked; Back to the Future; U.K. Alerts Netizens; Schoolyard E-Bullies; IT and Work, Work, Work; Clocking Family Moves \`a la Potter . . 9--10 Diane Crawford and Richard Stallman and Peter Denning and Jon Crowcroft and Herbert Kanner and Edwin D. Reilly, Jr. and Len Cohen and Larry Brunelle and Philip Burgess and Jonathan Grudin Forum: To Defend Privacy, Don't Collect Personal Data; Look Beyond Abstraction to Define Computing; Voter Anonymity and Vote Security Still Impossible; Hold the LEO and Celebrate Tools; Must Reading for Software Engineers; When Is It OK to Republish? . . . . . . . . . . . . . . . 11--13 Rebecca T. Mercuri Security Watch: Trusting in transparency 15--19 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 21--22 Meg McGinity Shannon Staying Connected: It's the FCC on the line . . . . . . . . . . . . . . . . . . 23--26 David A. Patterson President's Letter: Recognizing individual excellence helps us all . . . 27--28 Satish Nambisan Viewpoint: How to prepare tomorrow's technologists for global networks of innovation . . . . . . . . . . . . . . . 29--31 Anand Desai Introduction: Special Issue: Adaptive complex enterprises . . . . . . . . . . 32--35 Joseph Tan and H. Joseph Wen and Neveen Awad Health care and services delivery systems as complex adaptive systems . . 36--44 Albert Jones and Abhijit Deshmukh Test beds for complex systems . . . . . 45--50 Jay Ramanathan Fractal architecture for the adaptive complex enterprise . . . . . . . . . . . 51--57 Rajiv Ramnath and David Landsbergen IT-enabled sense-and-respond strategies in complex public organizations . . . . 58--64 Ashley A. Bush and Amrit Tiwana Designing sticky knowledge networks . . 66--71 Sridhar Nerur and RadhaKanta Mahapatra and George Mangalaraj Challenges of migrating to agile methodologies . . . . . . . . . . . . . 72--78 Vincent S. Lai and Bo K. Wong Business types, e-strategies, and performance . . . . . . . . . . . . . . 80--85 Suzanne D. Pawlowski and Pratim Datta and Andrea L. Houston The (gradually) changing face of state IT jobs . . . . . . . . . . . . . . . . 87--91 Kenneth R. Fleischmann and William A. Wallace A covenant with transparency: opening the black box of models . . . . . . . . 93--97 Alex Potanin and James Noble and Marcus Frean and Robert Biddle Scale-free geometry in OO programs . . . 99--103 Baihua Zheng and Dik Lun Lee Information dissemination via wireless broadcast . . . . . . . . . . . . . . . 105--110 Serge Abiteboul and Rakesh Agrawal and Phil Bernstein and Mike Carey and Stefano Ceri and Bruce Croft and David DeWitt and Mike Franklin and Hector Garcia Molina and Dieter Gawlick and Jim Gray and Laura Haas and Alon Halevy and Joe Hellerstein and Yannis Ioannidis and Martin Kersten and Michael Pazzani and Mike Lesk and David Maier and Jeff Naughton and Hans Schek and Timos Sellis and Avi Silberschatz and Mike Stonebraker and Rick Snodgrass and Jeff Ullman and Gerhard Weikum and Jennifer Widom and Stan Zdonik The Lowell database research self-assessment . . . . . . . . . . . . 111--118 Ben Light Technical Opinion: Potential pitfalls in packaged software adoption . . . . . . . 119--121 Bruce Schneier Inside Risks: Risks of third-party data 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Betting the Pharm; Mindful of Trust; Asian Jam Session; Schools Unplugged, FCC Undone; Data for a Song; A Fitting Solution . . . . . . . . . . . 9--10 Diane Crawford and David Jameson and Vinton Cerf and Eugen Weinstein and Robert M. Davison and Douglas R. Vogel and Matt Wimble and Michael Cusumano and Charles W. Neville and Philip Wandler Forum: The Imperceptible Cost of Eliminating Spam; Taiwan's place in China; Don't Discount Capital Structure; Beware the Consequences of Citing Self-Plagiarism . . . . . . . . . . . . 11--13 Phillip G. Armour The business of software: Sarbanes--Oxley and software projects 15--17 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 19--20 Pamela Samuelson Legally speaking: The Supreme Court revisits the \em Sony safe harbor . . . 21--25 David A. Patterson President's letter: Do you \em Queue? 27--28 Jacques Cohen Viewpoint: Updating computer science education . . . . . . . . . . . . . . . 29--31 Andrew Rosenbloom Introduction: $3$D hard copy . . . . . . 32--35 Paul K. Wright Rapid prototyping in consumer product design . . . . . . . . . . . . . . . . . 36--41 Mike Bailey Layered manufacturing for scientific visualization . . . . . . . . . . . . . 42--48 Sara McMains Layered manufacturing technologies . . . 50--56 Thomas Funkhouser and Michael Kazhdan and Patrick Min and Philip Shilane Shape-based retrieval and analysis of $3$D models . . . . . . . . . . . . . . 58--64 Carlo H. Séquin Rapid prototyping: a $3$D visualization tool takes on sculpture and mathematical forms . . . . . . . . . . . . . . . . . 66--73 David Koller and Marc Levoy Protecting $3$D graphics content . . . . 74--80 U. N. Umesh and Minh Q. Huynh and Len Jessup Creating successful entrepreneurial ventures in IT . . . . . . . . . . . . . 82--87 Jo Ellen Moore and Mary Sue Love IT professionals as organizational citizens . . . . . . . . . . . . . . . . 88--93 James A. M. McHugh and Fadi P. Deek An incentive system for reducing malware attacks . . . . . . . . . . . . . . . . 94--99 Jennifer Xu and Hsinchun Chen Criminal network analysis and visualization . . . . . . . . . . . . . 100--107 Rahul Singh and A. F. Salam and Lakshmi Iyer Agents in e-supply chains . . . . . . . 108--115 Fiona Fui-Hoon Nah and Keng Siau and Yuhong Tian Knowledge management mechanisms of financial service sites . . . . . . . . 117--123 Tapas Kanungo and Philip Resnik and Song Mao and Doe-Wan Kim and Qigong Zheng The Bible and multilingual optical character recognition . . . . . . . . . 124--130 Younghwa Lee Technical opinion: The CAN-SPAM Act: a silver bullet solution? . . . . . . . . 131--132 Susan Landau Inside risks: What lessons are we teaching? . . . . . . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Hacker Posse; Moore at Home; Sniffing out Cancer; Retiring Old Friends; A Rose By Any Other Name?; Robo-Jockeys . . . . . . . . . . . . . . 9--10 Diane Crawford and Rajesh Gupta and Ashley Braganza and Raymond L. Robert and Hal Berghel and Richard Stallman and Michael Cusumano and Ephraim McLean and Ralph Westfall Forum: DARPA (and U.S.) Opportunities Lost; Don't Ignore the CIO's Legal Burdens; Free is Not Open Software; LEO Lives; Resolving the Dataless Dilemma in OO Programming . . . . . . . . . . . . . 11--13 David A. Patterson President's letter: Reflections on a programming Olympiad . . . . . . . . . . 15--16 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 17--18 Peter J. Denning The Profession of IT: The locality principle . . . . . . . . . . . . . . . 19--24 Michael A. Cusumano Technology Strategy and Management: The puzzle of Japanese software . . . . . . 25--27 Naomi S. Baron Viewpoint: Instant Messaging and the future of language . . . . . . . . . . . 29--31 Karen Holtzblatt Introduction: Designing for the Mobile Device: Experiences, Challenges, and Methods . . . . . . . . . . . . . . . . 32--35 Jan Blom and Jan Chipchase and Jaakko Lehikoinen Contextual and cultural challenges for user mobility research . . . . . . . . . 37--41 Colleen Page Mobile research strategies for a global market . . . . . . . . . . . . . . . . . 42--48 T. S. Balaji and Brian Landers and Jesse Kates and Bob Moritz A carrier's perspective on creating a mobile multimedia service . . . . . . . 49--53 Eeva Kangas and Timo Kinnunen Applying user-centered design to mobile application development . . . . . . . . 55--59 David B. Rondeau For mobile applications, branding is experience . . . . . . . . . . . . . . . 61--66 Barbara P. Heath and David J. McArthur and Marilyn K. McClelland and Ronald J. Vetter Metadata lessons from the iLumina digital library . . . . . . . . . . . . 68--74 Gun A. Lee and Gerard J. Kim and Mark Billinghurst Immersive authoring: What You eXperience Is What You Get (WYXIWYG) . . . . . . . 76--81 Dennis F. Galletta and Alexandra Durcikova and Andrea Everard and Brian M. Jones Does spell-checking software need a warning label? . . . . . . . . . . . . . 82--86 James J. Cappel and Victor R. Prybutok and Benny Varghese A closer look at attention to detail . . 87--92 Mike Thelwall Scientific Web intelligence: finding relationships in university Webs . . . . 93--96 Rudy Hirschheim The Internet-based education bandwagon: look before you leap . . . . . . . . . . 97--101 Robert Davis and David Yung Technical Opinion: Understanding the interactivity between television and mobile commerce . . . . . . . . . . . . 103--105 Edward W. Felten Inside risks: DRM and public policy . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: A Scattering Flock? Transistor Treasure; Unions Lose Legion; Piracy Pays; Pacman Unleashed . . . . . 9--10 Diane Crawford and Amir Ben-Amram and Christian Collbert and Stephen Kobourov and Alex Simonelis and Ashley A. Bush and Amrit Tiwana and Larry Bernstein and Rich Altmaier Forum: Rights and Wrongs in Scientific Publications; Give Users More Than Propaganda; Define Accountability in Software Development; Stick to Public Safety, Not Business Software, in Laws and Regulations . . . . . . . . . . . . 11--13 Robert L. Glass Practical programmer: ``Silver bullet'' milestones in software history . . . . . 15--18 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 19--20 Hal Berghel and Jacob Uecker Digital village: WiFi attack vectors . . 21--28 David A. Patterson President's letter: Does ACM support matter to conferences or journals? . . . 29--30 Sanjeev Arora and Bernard Chazelle Viewpoint: Is the thrill gone? . . . . . 31--33 Thomas F. Stafford Introduction: Spyware . . . . . . . . . 34--36 Steve Gibson Spyware was inevitable . . . . . . . . . 37--39 Roger Thompson Why spyware poses multiple threats to security . . . . . . . . . . . . . . . . 41--43 Xiaoni Zhang What do consumers really know about spyware? . . . . . . . . . . . . . . . . 44--48 Lee A. Freeman and Andrew Urbaczewski Why do people hate spyware? . . . . . . 50--53 Neveen Farag Awad and Kristina Fitzgerald The deceptive behaviors that offend us most about spyware . . . . . . . . . . . 55--60 Qing Hu and Tamara Dinev Is spyware an Internet nuisance or public menace? . . . . . . . . . . . . . 61--66 Mark B. Schmidt and Kirk P. Arnett Spyware: a little knowledge is a wonderful thing . . . . . . . . . . . . 67--70 Younghwa Lee and Kenneth A. Kozar Investigating factors affecting the adoption of anti-spyware systems . . . . 72--77 Merrill Warkentin and Xin Luo and Gary F. Templeton A framework for spyware assessment . . . 79--84 Sudhindra Shukla and Fiona Fui-Hoon Nah Web browsing and spyware intrusion . . . 85--90 Kirk P. Arnett and Mark B. Schmidt Busting the ghost in the machine . . . . 92--95 Robin Poston and Thomas F. Stafford and Amy Hennington Spyware: a view from the (online) street 96--99 Indranil Bose and Raktim Pal Auto-ID: managing anything, anywhere, anytime in the supply chain . . . . . . 100--106 Yihua Philip Sheng and Peter P. Mykytyn, Jr. and Charles R. Litecky Competitor analysis and its defenses in the e-marketplace . . . . . . . . . . . 107--112 Casey G. Cegielski and Brian J. Reithel and Carl M. Rebman Emerging information technologies: developing a timely IT strategy . . . . 113--117 Gregory W. Bond Software as art . . . . . . . . . . . . 118--124 Donald E. Hardaway Sharing research in the 21st Century: borrowing a page from open source software . . . . . . . . . . . . . . . . 125--128 Jeanette Nasem Morgan Why the software industry needs a good ghostbuster . . . . . . . . . . . . . . 129--133 Harry L. Reif and Michel Mitri Technical opinion: How university professors teach project management for information systems . . . . . . . . . . 134--136 Peter G. Neumann and Michael D. Byrne Inside Risks: Disability-related risks 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Low-Tech Security Prevails; Change for the Meter; Quicky Wiki; Kicking and Screaming; Career Swings; A News Item We Couldn't Refuse . . . . . . 9--10 Diane Crawford and Lee Hollaar and Edward W. Felten and Bradley Rhodes and Richard H. Veith and Scott Reynolds Forum: Which Use Is Fair in Digital Rights Management?; We All Own David; Less Than Meets the Eye in Online Coursework; Software Lessons From the Dallas Cowboys . . . . . . . . . . . . . 11--13 Phillip G. Armour The Business of Software: To plan, two plans . . . . . . . . . . . . . . . . . 15--19 Meg McGinity Shannon Staying Connected: Nanotechnology's shadow . . . . . . . . . . . . . . . . . 21--23 David A. Patterson President's letter: Restoring the popularity of computer science . . . . . 25--28 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 29--30 Frank Stajano RFID is x-ray vision . . . . . . . . . . 31--33 Gaetano Borriello Introduction: Special Issue: RFID: Tagging the world . . . . . . . . . . . 34--37 Joshua R. Smith and Kenneth P. Fishkin and Bing Jiang and Alexander Mamishev and Matthai Philipose and Adam D. Rea and Sumit Roy and Kishore Sundara-Rajan RFID-based techniques for human-activity detection . . . . . . . . . . . . . . . 39--44 Ramesh Raskar and Paul Beardsley and Paul Dietz and Jeroen van Baar Photosensing wireless tags for geometric procedures . . . . . . . . . . . . . . . 46--51 Trevor Pering and Rafael Ballagas and Roy Want Spontaneous marriages of mobile devices and interactive spaces . . . . . . . . . 53--59 Sherry Hsi and Holly Fait RFID enhances visitors' museum experience at the Exploratorium . . . . 60--65 Miyako Ohkubo and Koutarou Suzuki and Shingo Kinoshita RFID privacy issues and technical challenges . . . . . . . . . . . . . . . 66--71 Oliver Günther and Sarah Spiekermann RFID and the perception of control: the consumer's view . . . . . . . . . . . . 73--76 Bruce Eckfeldt What does RFID do for the consumer? . . 77--79 Rajiv C. Shah and Jay P. Kesan Nurturing software . . . . . . . . . . . 80--85 James Backhouse and Carol Hsu and Jimmy C. Tseng and John Baptista A question of trust . . . . . . . . . . 87--91 Zhenhui Jiang and Weiquan Wang and Izak Benbasat Multimedia-based interactive advising technology for online consumer decision support . . . . . . . . . . . . . . . . 92--98 Charles A. Wood and Terence T. Ow WEBVIEW: an SQL extension for joining corporate data to data derived from the web . . . . . . . . . . . . . . . . . . 99--104 Ping Zhang and Na Li The importance of affective quality . . 105--108 Hai Zhuge Exploring an epidemic in an e-science environment . . . . . . . . . . . . . . 109--114 Deborah K. Smith and Trevor Moores and Jerry Chang Prepare your mind for learning . . . . . 115--118 G. Anthony Gorry Technical Opinion: As simple as possible, but not simpler . . . . . . . 119--122 Barbara Simons and Jim Horning Inside risks: Risks of technology-oblivious policy . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Medicare to the E-Rescue; Virus Motors Running; Border Security Tags; Japan Sets `Super' Sites; Beautiful Music; Energy-Saving Appliances . . . . . . . . . . . . . . . 9--10 Diane Crawford and Diomidis Spinellis and Peter J. Denning and Henry Baker and Peter J. Denning and Alex Simonelis and David Patterson and Jeff Johnson Forum: Why Computing Parallels Brain Function; The Government's Response to Tech and CS Downturns; Disband the Hacker Posse . . . . . . . . . . . . . . 11--13 David A. Patterson President's letter: The \em new Professional Development Centre boasts 1,000 courses, O'Reilly Books, and CS classics . . . . . . . . . . . . . . . . 15--16 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 17--18 Pamela Samuelson Legally speaking: Did MGM really win the \em Grokster case? . . . . . . . . . . . 19--24 Michael A. Cusumano Technology strategy and management: Software in Ireland: a balance of entrepreneurship and\ldots lifestyle management? . . . . . . . . . . . . . . 25--27 Kenneth A. Ross Viewpoint: Academic dishonesty and the Internet . . . . . . . . . . . . . . . . 29--31 Abbe Mowshowitz and Murray Turoff Introduction: The digital society . . . 32--35 Edward N. Wolff The growth of information workers in the U.S. economy . . . . . . . . . . . . . . 37--42 Sara J. Czaja and Starr Roxanne Hiltz Digital aids for an aging society . . . 43--44 Elia Zureik and Abbe Mowshowitz Consumer power in the digital society 46--51 Barry Wellman Community: from neighborhood to network 53--55 Eli M. Noam Why the Internet is bad for democracy 57--58 Starr Roxanne Hiltz and Murray Turoff Education goes digital: the evolution of online learning and the revolution in higher education . . . . . . . . . . . . 59--64 Hal R. Varian Universal access to information . . . . 65--66 Peter G. Goldschmidt HIT and MIS: implications of health information technology and medical information systems . . . . . . . . . . 68--74 Yong Jin Kim and Rajiv Kishore and G. Lawrence Sanders From DQ to EQ: understanding data quality in the context of e-business systems . . . . . . . . . . . . . . . . 75--81 Gediminas Adomavicius and Alexander Tuzhilin Personalization technologies: a process-oriented perspective . . . . . . 83--90 Bipin Prabhakar and Charles R. Litecky and Kirk Arnett IT skills in a tough job market . . . . 91--94 Dragomir Radev and Jahna Otterbacher and Adam Winkel and Sasha Blair-Goldensohn NewsInEssence: summarizing online news topics . . . . . . . . . . . . . . . . . 95--98 Sang M. Lee and Xin Tan and Silvana Trimi Current practices of leading e-government countries . . . . . . . . . 99--104 Arvind Malhotra and Albert H. Segars Investigating wireless Web adoption patterns in the U.S. . . . . . . . . . . 105--110 Alan R. Peslak Technical opinion: The educational productivity paradox . . . . . . . . . . 111--114 Lauren Weinstein Inside risks: The best-laid plans: a cautionary tale for developers . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Attracting Hackers; Super Competition; Blog Profiles; Improvements in Hand; Tattooed Fruit; Love Lost . . . 9--10 Diane Crawford and Lawrence C. Paulson and Michael A. Cusumano and Stephen Schmid and Fabio A. Schreiber and Hal Lowe and Günter Rote and William Adams and David Anderson and Thomas E. Stafford and Arthur M. Rosenberg Forum: Welcome Defects as a Sign of Innovation?; Homage to the Relational Database; The Cultural Roots of Computer Science; Look to Human Nature for the Roots of Spyware; Wireless at Work . . . 11--13 Peter J. Denning and Andrew McGettrick The profession of IT: Recentering computer science . . . . . . . . . . . . 15--19 Robert L. Glass Practical programmer: The plot to deskill software engineering . . . . . . 21--24 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 25--26 Maria Klawe and Ben Shneiderman Viewpoint: Crisis and opportunity in computer science . . . . . . . . . . . . 27--28 David A. Patterson President's letter: Rescuing our families, our neighbors, and ourselves 29--31 Peter Kugel It's time to think outside the computational box . . . . . . . . . . . 32--37 Alvin T. S. Chan Mobile cookies management on a smart card . . . . . . . . . . . . . . . . . . 38--43 Richard A. Frost Call for a public-domain SpeechWeb . . . 45--49 Benjamin A. Kuperman and Carla E. Brodley and Hilmi Ozdoganoglu and T. N. Vijaykumar and Ankit Jalote Detection and prevention of stack buffer overflow attacks . . . . . . . . . . . . 50--56 Chuan-Fong Shih and Jason Dedrick and Kenneth L. Kraemer Rule of law and the international diffusion of e-commerce . . . . . . . . 57--62 Rana Tassabehji and Maria Vakola Business email: the killer impact . . . 64--70 Sridhar Nerur and Riyaz Sikora and George Mangalaraj and VenuGopal Balijepally Assessing the relative influence of journals in a citation network . . . . . 71--74 Radha Mookerjee Maintaining enterprise software applications . . . . . . . . . . . . . . 75--79 Rosemary H. Wild and Kenneth A. Griggs and Eldon Y. Li An architecture for distributed scenario building and evaluation . . . . . . . . 80--86 Michael Ettredge and John Gerdes and Gilbert Karuga Using Web-based search data to predict macroeconomic statistics . . . . . . . . 87--92 Bill C. Hardgrave and Deborah J. Armstrong Technical opinion: Software process improvement: it's a journey, not a destination . . . . . . . . . . . . . . 93--96 Steven M. Bellovin and Matt Blaze and Susan Landau Inside risks: The real national-security needs for VoIP . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6 CACM Staff News track: Consumers Strike Back; Addictive Hackers; Fish's Tale; A Gamer's Life; Rankings Irk Profs . . . . 9--10 Diane Crawford and Kevin Markey and Scott Peer and Philip Machanick and Jim Chorn and C. J. Fearnley and Melvin Perez and Jeanette Nasem Morgan Forum: No RFID Choice, No Thanks; Booms, Bust, and CS Enrollment; Who Needs a Certificate? . . . . . . . . . . . . . . 11--13 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 15--16 Rebecca Mercuri Security Watch: Challenges in forensic computing . . . . . . . . . . . . . . . 17--21 Hal Berghel and David Hoelzer Digital Village: Pernicious ports . . . 23--30 David A. Patterson Robots in the desert: a research parable for our times . . . . . . . . . . . . . 31--33 Amy S. Bruckman Viewpoint: Student research and the Internet . . . . . . . . . . . . . . . . 35--37 Rahul Singh and Lakshmi S. Iyer and A. F. Salam Introduction: The Semantic E-Business Vision . . . . . . . . . . . . . . . . . 38--41 Jos de Bruijn and Dieter Fensel and Uwe Keller and Rubén Lara Using the Web service modeling ontology to enable semantic e-business . . . . . 43--47 JinKyu Lee and Shambhu J. Upadhyaya and H. Raghav Rao and Raj Sharman Secure knowledge management and the Semantic Web . . . . . . . . . . . . . . 48--54 Manoj Thomas and Richard Redmond and Victoria Yoon and Rahul Singh A semantic approach to monitor business process . . . . . . . . . . . . . . . . 55--59 Ejub Kajan and Leonid Stoimenov Toward an ontology-driven architectural framework for B2B . . . . . . . . . . . 60--66 Thomas P. Moran and Alex Cozzi and Stephen P. Farrell Unified activity management: supporting people in e-business . . . . . . . . . . 67--70 Bhavani Thuraisingham Directions for security and privacy for semantic e-business applications . . . . 71--73 Juhnyoung Lee Model-driven business transformation and the Semantic Web . . . . . . . . . . . . 75--77 Michael J. O'Donnell Separate handles from names on the Internet . . . . . . . . . . . . . . . . 78--83 Sanjiv Augustine and Bob Payne and Fred Sencindiver and Susan Woodcock Agile project management: steering from the edges . . . . . . . . . . . . . . . 85--89 Younghwa Lee and Kenneth A. Kozar and Kai R. Larsen Does avatar email improve communication? 91--95 Torgeir Dingsòyr and Hans Karim Djarraya and Emil Ròyrvik Practical knowledge management tool use in a software consulting company . . . . 96--100 Akhilesh Chandra and Thomas Calderon Challenges and constraints to the diffusion of biometrics in information systems . . . . . . . . . . . . . . . . 101--106 Stephan Kudyba and G. Brent Hamar and William M. Gandy Enhancing efficiency in the health care industry . . . . . . . . . . . . . . . . 107--110 Philip F. Musa and Victor W. Mbarika and Peter Meso Calling for programmed technology transfer and adoption strategies for sustainable LDC growth . . . . . . . . . 111--116 Peter Denning and Jim Horning and David Parnas and Lauren Weinstein Inside risks: Wikipedia risks . . . . . 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--7 CACM Staff News track: Litter Unleashed; China's Net Preferences; Brain Drained; Cell Phones Alter African Life; U.S. IT Salaries to Rise; Runway Techno-Chic . . 9--10 Diane Crawford and George Dodd and Thomas Joos and Anthony Ralston and Peter J. Denning and Andrew McGettrick and Todd Hartle and Robert L. Glass and Ed Callaway and George Hacken and David P. Duggan Forum: Call It Anything But Programming, Even Science; Put Creativity Back in Programming; The Internet's Greatest Contribution to Democracy; Japanese Rigor for Everyone . . . . . . . . . . . 11--13 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 15--16 Phillip G. Armour The business of software: Counting boulders and measuring mountains . . . . 17--20 David A. Patterson and CACM Staff ACM annual report for FY05 . . . . . . . 21--30 Meg McGinity Shannon Staying connected: The network of life 29--32 David A. Patterson President's letter: New Directions for \em CACM? . . . . . . . . . . . . . . . 33--35 Scott Campbell Viewpoint: How to think about security failures . . . . . . . . . . . . . . . . 37--39 Jaime Teevan and William Jones and Benjamin B. Bederson Introduction: Personal information management . . . . . . . . . . . . . . . 40--43 Mary Czerwinski and Douglas W. Gage and Jim Gemmell and Catherine C. Marshall and Manuel A. Pérez-Quiñonesis and Meredith M. Skeels and Tiziana Catarci Digital memories in an era of ubiquitous computing and abundant storage . . . . . 44--50 Wanda Pratt and Kenton Unruh and Andrea Civan and Meredith Skeels Personal health information management 51--55 Clare-Marie Karat and Carolyn Brodie and John Karat Usable privacy and security for personal information management . . . . . . . . . 56--57 Edward Cutrell and Susan T. Dumais and Jaime Teevan Searching to eliminate personal information management . . . . . . . . . 58--64 Catherine C. Marshall and William Jones Keeping encountered information . . . . 66--67 Steve Whittaker and Victoria Bellotti and Jacek Gwizdka Email in personal information management 68--73 Thomas Erickson From PIM to GIM: personal information management in group contexts . . . . . . 74--75 David R. Karger and William Jones Data unification in personal information management . . . . . . . . . . . . . . . 77--82 Diane Kelly Evaluating personal information management behaviors and tools . . . . . 84--86 Jim Gemmell and Gordon Bell and Roger Lueder MyLifeBits: a personal database for everything . . . . . . . . . . . . . . . 88--95 Kevin C. Desouza and Yukika Awazu and Amrit Tiwana Four dynamics for bringing use back into software reuse . . . . . . . . . . . . . 96--100 George Pallis and Athena Vakali Insight and perspectives for content delivery networks . . . . . . . . . . . 101--106 Grace J. Johnson and Paul J. Ambrose Neo-tribes: the power and potential of online communities in health care . . . 107--113 Tim Chenoweth and Karen Corral and Haluk Demirkan Seven key interventions for data warehouse success . . . . . . . . . . . 114--119 Lawrence A. Gordon and Martin P. Loeb Budgeting process for information security expenditures . . . . . . . . . 121--125 Matti Tedre and Erkki Sutinen and Esko Kähkönen and Piet Kommers Ethnocomputing: ICT in cultural and social context . . . . . . . . . . . . . 126--130 Christoph Meinel and Volker Klotz Technical opinion: The first 10 years of the ECCC digital library . . . . . . . . 131--134 John C. Knight and Nancy G. Leveson Inside risks: Software and higher education . . . . . . . . . . . . . . . 160--160
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Moon Match; Billboard Ratings; StAIRway to Heaven; Google Eyes; Owning to Nano Unknowns; What's the Buzz? . . . . . . . . . . . . . . . 9--10 Diane Crawford and Kurt Guntheroth and Andy K. Y. Poon and John Leary and Mike Brenner and Robert J. DuWors and Gediminas Adomavicius and Alexander Tuzhilin and Alex Simonelis Forum: Only More Original Research Can Save Computer Science; Testing Wiki Credibility; No One Programs From Scratch; Emphasize Positive Feedback in Personalization; Why the Internet is Good for Democracy . . . . . . . . . . . 11--13 Gary F. Templeton Technical opinion: Video image stabilization and registration technology . . . . . . . . . . . . . . . 15--18 Siri Birgitte Uldal and Muhammad Aimal Marjan International perspectives: Computing in post-war Afghanistan . . . . . . . . . . 19--24 Pamela Samuelson Legally speaking: Regulating technical design . . . . . . . . . . . . . . . . . 25--30 Michael A. Cusumano Technology strategy and management: Where does Russia fit into the global software industry? . . . . . . . . . . . 31--34 Nanda Kumar and Abbe Mowshowitz Viewpoint: Who should govern the Internet? . . . . . . . . . . . . . . . 35--37 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 39--40 David A. Patterson President's letter: Offshoring: Finally Facts vs. Folklore . . . . . . . . . . . 41--42 Brajendra Panda and Joseph Giordano and Daniel Kalil Introduction: Next-generation cyber forensics . . . . . . . . . . . . . . . 44--47 Eoghan Casey Investigating sophisticated security breaches . . . . . . . . . . . . . . . . 48--55 Brian D. Carrier Risks of live digital forensic analysis 56--61 Frank Adelstein Live forensics: Diagnosing your system without killing it first . . . . . . . . 63--66 The Common Digital Evidence Storage Format Working Group Standardizing digital evidence storage 67--68 Chet Hosmer Digital evidence bag . . . . . . . . . . 69--70 Sheldon Teelink and Robert F. Erbacher Improving the computer forensic analysis process through visualization . . . . . 71--75 Golden G. Richard, III and Vassil Roussev Next-generation digital forensics . . . 76--80 Rahul Bhaskar State and local law enforcement is not ready for a cyber Katrina . . . . . . . 81--83 Simson L. Garfinkel AFF: a new format for storing hard drive images . . . . . . . . . . . . . . . . . 85--87 Ganesan Shankaranarayanan and Adir Even The metadata enigma . . . . . . . . . . 88--94 Pak-Lok Poon and Amy H. L. Lau The present B2C implementation framework 96--103 Jan Damsgaard and Mihir A. Parikh and Bharat Rao Wireless commons perils in the common good . . . . . . . . . . . . . . . . . . 104--109 CACM Staff Student de-charter notice . . . . . . . 110--110 H. M. Gladney Principles for digital preservation . . 111--116 Stephen Owen and Pearl Brereton and David Budgen Protocol analysis: a neglected practice 117--122 Deborah J. Armstrong The quarks of object-oriented development . . . . . . . . . . . . . . 123--128 Roli Varma Making computer science minority-friendly . . . . . . . . . . . 129--134 Peter G. Neumann Inside risks: Trustworthy systems revisited . . . . . . . . . . . . . . . 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Wars Blogged; Snap Judgments; CMU's Robo-Receptionist; Have We Got Mail! . . . . . . . . . . . . . . 9--10 Diane Crawford and Peter Wegner and Dina Goldin and Jean-Pierre Rosen and Curtis Rhodes and C. J. Fearnley and Peter J. Denning and Andrew McGettrick and Mike Segel and Michael J. O'Donnell Forum: Interactive Computing is Already Outside the Box; Lack of Ada Reflects Software Immaturity; Be Skeptical of Rhetorical Slight of Hand; More to Innovation than Innovation Alone; Handles Not a Naming Solution . . . . . 11--13 Phillip G. Armour The Business of Software: The operational executive sponsor . . . . . 15--18 Robert L. Glass Practical programmer: Is the crouching tiger a threat? . . . . . . . . . . . . 19--20 Bertrand Meyer and Willy Zwaenepoel The European report: Europe's computer scientists take fate into their own hands . . . . . . . . . . . . . . . . . 21--24 CACM Staff Call for nominations for advanced member grades in the ACM . . . . . . . . . . . 25--26 David A. Patterson President's letter: Computer science education in the 21$^{st}$ century . . . 27--30 David A. Patterson Reviving your favorite CS books . . . . 31--31 Jeannette M. Wing Viewpoint: Computational thinking . . . 33--35 Jean-Philippe Martin-Flatin and Joe Sventek and Kurt Geihs Introduction: Self-managed systems and services . . . . . . . . . . . . . . . . 36--39 Paul Robertson and Brian Williams Automatic recovery from software failure 41--47 George Porter and Randy H. Katz Effective Web service load balancing through statistical monitoring . . . . . 48--54 Jerry Rolia and Ludmila Cherkasova and Martin Arlitt and Vijay Machiraju Supporting application quality of service in shared resource pools . . . . 55--60 Kenji Leibnitz and Naoki Wakamiya and Masayuki Murata Biologically inspired self-adaptive multi-path routing in overlay networks 62--67 Atul Singh and Mads Haahr Creating an adaptive network of hubs using Schelling's model . . . . . . . . 69--73 CACM Staff ACM fellows . . . . . . . . . . . . . . 74--75 Martin Halvey and Mark T. Keane and Barry Smyth Mobile Web surfing is the same as Web surfing . . . . . . . . . . . . . . . . 76--81 Vicki R. McKinney and Mary M. Whiteside Maintaining distributed relationships 82--86 Zhiping Walter and George Scott Management issues of Internet/Web systems . . . . . . . . . . . . . . . . 87--91 Aldo de Moor and Mark Aakhus Argumentation support: From technologies to tools . . . . . . . . . . . . . . . . 93--98 Juan E. Gilbert Applications quest: Computing diversity 99--104 Robert C. Beatty and Craig D. Williams ERP II: Best practices for successfully implementing an ERP upgrade . . . . . . 105--109 Mazliza Othman and Rodziah Latih Women in computer science: No shortage here! . . . . . . . . . . . . . . . . . 111--114 Brian L. Dos Santos and Andrew L. Wright Technical opinion: Using bulletin boards in an educational setting . . . . . . . 115--118 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 126--127 Marc Rotenberg Inside risks: Real ID, real trouble? . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: The Big Sweep; BMW Blasted; Americans turn to the Net; High-Performance Help; ACM issues offshoring report; The Boss is Watching; Fast(er) Food to Go . . . . . . . . . . 9--10 Diane Crawford and William Adams and Phillip G. Armour and Peter Farrel-Vinay and Sanjiv Augustine and Bob Payne and Susan Woodcock and David Lorge Parnas and Amy S. Bruckman and Adrian Bowyer and Alessandro Berni and Jack Ganssle Forum: To Produce a Good Plan, Start with a Good Process; Who Defined the Requirements?; Proff Depends on Evidence; End the Tragedy of the Wireless Commons; Look Further for Domain Name Persistence; Before Coding, Learn Disciplined Engineering . . . . . 11--13 Peter J. Denning The profession of IT: Hastily formed networks . . . . . . . . . . . . . . . . 15--20 Hal Berghel Digital village: Phishing mongers and posers . . . . . . . . . . . . . . . . . 21--25 CACM Staff Statewide databases of registered voters 26--28 Diane Crawford Hot links: Top 10 Downloads from ACM's Digital Library . . . . . . . . . . . . 29--30 David A. Patterson President's letter: Seven reasons to shave your head and three reasons not to: the bald truth . . . . . . . . . . . 31--32 Shlomo Argamon and Mark Olsen Viewpoint: Toward meaningful computing 33--35 Ryen W. White and Bill Kules and Steven M. Drucker and m. c. schraefel Introduction: Supporting exploratory search . . . . . . . . . . . . . . . . . 36--39 Gary Marchionini Exploratory search: From finding to understanding . . . . . . . . . . . . . 41--46 m. c. schraefel and Max Wilson and Alistair Russell and Daniel A. Smith mSpace: Improving information access to multimedia domains with multimodal exploratory search . . . . . . . . . . . 47--49 Edward Cutrell and Susan T. Dumais Exploring personal information . . . . . 50--51 Edward A. Fox and Fernando Das Neves and Xiaoyan Yu and Rao Shen and Seonho Kim and Weiguo Fan Exploring the computing literature with visualization and stepping stones & pathways . . . . . . . . . . . . . . . . 52--58 Marti A. Hearst Clustering versus faceted categories for information exploration . . . . . . . . 59--61 John Gersh and Bessie Lewis and Jaime Montemayor and Christine Piatko and Russell Turner Supporting insight-based information exploration in intelligence analysis . . 63--68 Ben Shneiderman and Benjamin B. Bederson and Steven M. Drucker Find that photo!: Interface strategies to annotate, browse, and share . . . . . 69--71 Bernard J. Jansen Using temporal patterns of interactions to design effective automated searching assistance . . . . . . . . . . . . . . . 72--74 Jiexun Li and Rong Zheng and Hsinchun Chen From fingerprint to writeprint . . . . . 76--82 Nenad Jukic Modeling strategies and alternatives for data warehousing projects . . . . . . . 83--88 Andrea Ordanini What drives market transactions in B2B exchanges? . . . . . . . . . . . . . . . 89--93 Moshe Zviran and Dov Te'eni and Yuval Gross Does color in email make a difference? 94--99 Rosario Vidal and Elena Mulet Thinking about computer systems to support design synthesis . . . . . . . . 100--104 Harvey G. Enns and Thomas W. Ferratt and Jayesh Prasad Beyond stereotypes of IT professionals: Implications for IT HR practices . . . . 105--109 Sang M. Lee and Choong Kwon Lee Technical opinion: IT managers' requisite skills . . . . . . . . . . . . 111--114 Lauren Weinstein Inside Risks: Fake ID: Batteries not included . . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Embedded Risks; Coat of Silence; Buggy Concept; Net Oversight; Virtual Visitation; Campus Campaigns . . 9--10 Diane Crawford and Bob Elias and Claud D. Price and Bruce Ballengee and Jack Yang and Heman Robinson and Charles Betz and Ganesan Shankaranarayanan and Adrian Bowyer and Peter Denning and James Horning and David Parnas and Lauren Weinstein Forum: Don't Fear the Tiger; Give Metadata its Due; Who Do You Trust? . . 11--13 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 15--16 Rebecca T. Mercuri Security watch: Scoping identity theft 17--21 Meg McGinity Shannon Staying connected: Private lives . . . . 23--26 David A. Patterson President's letter: Revisiting my campaign statement . . . . . . . . . . . 27--30 Thomas A. Easton Viewpoint: Beyond the algorithmization of the sciences . . . . . . . . . . . . 31--33 Hans Weigand Introduction . . . . . . . . . . . . . . 44--46 Peter J. Denning and Robert Dunham Innovation as language action . . . . . 47--52 Göran Goldkuhl Action and media in interorganizational interaction . . . . . . . . . . . . . . 53--57 Jan L. G. Dietz The deep structure of business processes 58--64 Dov Te'eni The language-action perspective as a basis for communication support systems 65--70 Terry Winograd Designing a new foundation for design 71--74 Mareike Schoop and Aldo de Moor and Jan L. G. Dietz The pragmatic Web: a manifesto . . . . . 75--76 Dawn G. Gregg and Steven Walczak Adaptive Web information extraction . . 78--84 Stephen J. Andriole The collaborate/integrate business technology strategy . . . . . . . . . . 85--90 Brian Whitworth and Jerry Fjermestad and Edward Mahinda The web of system performance . . . . . 92--99 Hai Zhuge Discovery of knowledge flow in science 101--107 Brian Dobing and Jeffrey Parsons How UML is used . . . . . . . . . . . . 109--113 Pairin Katerattanakul and Bernard Han and Alan Rea Is information systems a reference discipline? . . . . . . . . . . . . . . 114--118 William E. Spangler and Kathleen S. Hartzel and Mordechai Gal-Or Exploring the privacy implications of addressable advertising and viewer profiling . . . . . . . . . . . . . . . 119--123 Stephen B. Jenkins Technical opinion: Musings of an ``old-school'' programmer . . . . . . . 124--126 Peter G. Neumann and Lauren Weinstein Inside risks: Risks of RFID . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Britannica Bristles; Snooze Headlines; The Geek Factor; Sharper Image; Riding the Brain Train . . . . . 9--10 Diane Crawford and Richard L. Lozes and Andy Belk and Wayne Huang and Umesh Panchaksharaiah and Zu Kim and Collin Park and David Evans and Moshe Zviran and Dov Te'eni and Yuval Gross and David Randolph and Amy S. Bruckman Forum: To Make CS Relevant, Give It an Industrial Focus; The Tiger Means Healthy Competition; Shocked by Email Color; Pursue Reality as a Competitive Advantage . . . . . . . . . . . . . . . 11--13 David A. Patterson President's letter: Farewell address: The growing and graying of ACM . . . . . 15--18 Phillip G. Armour The business of software: The learning edge . . . . . . . . . . . . . . . . . . 19--22 Ronald F. Boisvert and Mary Jane Irwin ACM plagiarism policy: Plagiarism on the rise . . . . . . . . . . . . . . . . . . 23--24 Diane Crawford Hot links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 25--26 Pamela Samuelson Legally speaking: Copyrighting standards 27--31 Gregory Conti Introduction: Hacking and innovation . . 32--36 Tom Cross Academic freedom and the hacker ethic 37--40 Stephen Bono and Aviel Rubin and Adam Stubblefield and Matthew Green Security through legality . . . . . . . 41--43 Joe Grand Research lessons from hardware hacking 44--49 Bruce Potter Wireless hotspots: Petri dish of wireless security . . . . . . . . . . . 50--56 Felix F. X. Lindner Software security is software reliability . . . . . . . . . . . . . . 57--61 Dan Kaminsky Explorations in namespace: White-hat hacking across the domain name system 62--69 Kallol Bagchi and Peeter Kirs and Robert Cerveny Global software piracy: Can economic factors alone explain the trend? . . . . 70--76 Christopher L. Carr Reciprocity: The golden rule of IS-user service relationship quality and cooperation . . . . . . . . . . . . . . 77--83 Timothy Paul Cronan and C. Bryan Foltz and Thomas W. Jones Piracy, computer crime, and IS misuse at the university . . . . . . . . . . . . . 84--90 David Kang and Roger Chiang A systematic approach in managing post-deployment system changes . . . . . 91--96 Bonnie Brinton Anderson and James V. Hansen and Paul Benjamin Lowry and Scott L. Summers The application of model checking for securing e-commerce transactions . . . . 97--101 Barry Shore Enterprise integration across the globally disbursed service organization 102--106 Thomas W. Jackson and Anthony Burgess and Janet Edwards Technical opinion: A simple approach to improving email communication . . . . . 107--109 Robert Charette Inside risks: EHRs: Electronic Health Records or Exceptional Hidden Risks? . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Weather Cells; Urban (Ground) Legends; Coralling Bot Rustlers; Who Do You Trust?; China's ``Pedia'' Product; The Peak of Devotion 9--10 Diane Crawford and Richard Veith and Gregory Aicklen and John Knight and Rebecca Mercuri and D. J. Howorth and Mazliza Othman and Rodziah Latih and Chin-Teng Lin Forum: Think of Programming as an Elegant Essay; Nurture the Joy of Engineering; Don't Equate Bankruptcy and Identity Theft; Author's Response; What Malaysia Looks for When Funding CS Study; Author's Response; We're from Taiwan, Not from China . . . . . . . . . 11--13 Diane Crawford ACM election results: ACM's 2006 general elections . . . . . . . . . . . . . . . 13--13 Peter J. Denning The profession of IT: Infoglut . . . . . 15--19 Michael A. Cusumano Technology strategy and management: What road ahead for Microsoft and Windows? 21--23 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 25--26 Peter Wegner and Dina Goldin Viewpoint: Principles of problem solving 27--29 Jim Spohrer and Doug Riecken Introduction: Special issues on services science . . . . . . . . . . . . . . . . 30--32 Henry Chesbrough and Jim Spohrer A research manifesto for services science . . . . . . . . . . . . . . . . 35--40 Jerry Sheehan Understanding service sector innovation 42--47 John Zysman The algorithmic revolution---the fourth service transformation . . . . . . . . . 48--48 Roland T. Rust and Carol Miu What academic research tells us about service . . . . . . . . . . . . . . . . 49--54 Amit Sheth and Kunal Verma and Karthik Gomadam Semantics to energize the full services spectrum . . . . . . . . . . . . . . . . 55--61 Brenda Dietrich Resource planning for business services 62--64 William B. Rouse and Marietta L. Baba Enterprise transformation . . . . . . . 66--72 Mary Jo Bitner and Stephen W. Brown The evolution and discovery of services science in business schools . . . . . . 73--78 Walter Ganz Germany: service engineering . . . . . . 79--79 Christof Weinhardt and Dirk Neumann and Carsten Holtmann Germany: computer-aided market engineering . . . . . . . . . . . . . . 79--79 Paul P. Maglio and Savitha Srinivasan and Jeffrey T. Kreulen and Jim Spohrer Service systems, service scientists, SSME, and innovation . . . . . . . . . . 81--85 Stuart I. Feldman and Krishna S. Nathan and Thomas Li and Kazuyoshi Hidaka and Corinna Schulze The Clarion Call for modern services: China, Japan, Europe, and the US . . . . 86--87 David Avison and Shirley Gregor and David Wilson Managerial IT unconsciousness . . . . . 88--93 Lance J. Hoffman and Kim Lawson-Jenkins and Jeremy Blum Trust beyond security: an expanded trust model . . . . . . . . . . . . . . . . . 94--101 Ernst Bekkering and J. P. Shim Trust in videoconferencing . . . . . . . 103--107 Narasimha Bolloju and Felix S. K. Leung Assisting novice analysts in developing quality conceptual models with UML . . . 108--112 Fred Martin Technical opinion: Toy projects considered harmful . . . . . . . . . . . 113--116 Peter G. Neumann Inside risks: Risks relating to system compositions . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Airport Security Afoot; Air Fare; The Human Touch; Luddite Politicians Seek Help; Are We There Yet?; Tunes to Go . . . . . . . . . . . 9--10 Diane Crawford and Umesk Panchaksharaiah and L. Peter Deutsch and Kallol Bagchi and Peeter Kirs and Robert Cerveny and Edward J. Ferrara and Frederick G. Volpicelli and Diomidis Spinellis and C. Augusto Casas Forum: Stress Fundamentals in CS Education, Simplicity in Production; No Room For Bias When Covering the Copyright System; Don't Misuse or Misteach UML; Cover to Cover; Future CS Course Already Here; To Attract New Members, Increase ACM Scope and Mandate 11--13 Robert L. Glass Practical programmer: The Standish report: does it really describe a software crisis? . . . . . . . . . . . . 15--16 Hal Berghel and David Hoelzer Digital village: Disk wiping by any other name . . . . . . . . . . . . . . . 17--21 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 23--24 Dan B. Goldman Viewpoint: Blockbusters and blackboards 25--27 Bryan Pardo Introduction: Music Information Retrieval . . . . . . . . . . . . . . . 28--31 Daniel P. W. Ellis Extracting information from music audio 32--37 Roger B. Dannenberg and Christopher Raphael Music score alignment and computer accompaniment . . . . . . . . . . . . . 38--43 Avery Wang The Shazam music recognition service . . 44--48 William Birmingham and Roger Dannenberg and Bryan Pardo Query by humming with the VocalSearch system . . . . . . . . . . . . . . . . . 49--52 Jon W. Dunn and Donald Byrd and Mark Notess and Jenn Riley and Ryan Scherle Variations2: retrieving and using music in an academic setting . . . . . . . . . 53--58 Alexander P. Pons Biometric marketing: targeting the online consumer . . . . . . . . . . . . 60--66 Vaclav Rajlich Changing the paradigm of software engineering . . . . . . . . . . . . . . 67--70 G. Daryl Nord and Tipton F. McCubbins and Jeretta Horn Nord E-monitoring in the workplace: privacy, legislation, and surveillance software 72--77 J. Drew Procaccino and June M. Verner and Steven J. Lorenzet Defining and contributing to software development success . . . . . . . . . . 79--83 Eugenia Y. Huang Tightening access policy: the hidden trade-off . . . . . . . . . . . . . . . 85--89 Charlie McDowell and Linda Werner and Heather E. Bullock and Julian Fernald Pair programming improves student retention, confidence, and program quality . . . . . . . . . . . . . . . . 90--95 Mikko Siponen Technical opinion: Information security standards focus on the existence of process, not its content . . . . . . . . 97--100 Deirdre K. Mulligan and Ari Schwartz and Indrani Mondal Inside risks: Risks of online storage 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: HP's Hot Spot [memory spot]; Spare Cycles Against Malaria; The Caveman's Disconnection [Neanderthal DNA analysis]; Privacy Policy Advice; Take Me Home, Country Roads . . . . . . . . . 9--10 Diane Crawford and William Adams and Peter G. Neumann and John C. Nash and Dru Lavigne and Russell McOrmond and Charles McDonald and Michael Richardson and Raymond Wood and Kallol Bagchi and Peeter Kirs and Robert Cerveny and Berhoooz Parhami and Peter Denning and Rodney M. Bates and Robert L. Glass Forum: When It Comes to Software, Don't Just Do It; Author's Response; A Single Vested Source is Not Data; Author's Response; How to Welcome Uninvited Guests; Author's Response; Skip Toy-Program Thinking in Real-World Projects; Call it Problem Solving, Not Computational Thinking . . . . . . . . . 11--13 Phillip G. Armour The business of software: Software: hard data . . . . . . . . . . . . . . . . . . 15--17 Meg McGinity Shannon Staying connected: Home turf . . . . . . 19--21 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 23--24 Dennis Adams Viewpoint: Wireless laptops in the classroom (and the Sesame Street syndrome) . . . . . . . . . . . . . . . 25--27 Günter Müller Introduction: Privacy and security in highly dynamic systems . . . . . . . . . 28--31 Stefan Sackmann and Jens Strüker and Rafael Accorsi Personalization in privacy-aware highly dynamic systems . . . . . . . . . . . . 32--38 Alexander Pretschner and Manuel Hilty and David Basin Distributed usage control . . . . . . . 39--44 Arvind Seshadri and Mark Luk and Adrian Perrig and Leendert van Doorn and Pradeep Khosla Externally verifiable code execution . . 45--49 Johannes Buchmann and Alexander May and Ulrich Vollmer Perspectives for cryptographic long-term security . . . . . . . . . . . . . . . . 50--55 Brian Subirana and Malcolm Bain Legal programming . . . . . . . . . . . 57--62 Mark D. Hill and Jean-Luc Gaudiot and Mary Hall and Joe Marks and Paolo Prinetto and Donna Baglio A Wiki for discussing and promoting best practices in research . . . . . . . . . 63--64 Gio Wiederhold What is your software worth? . . . . . . 65--75 Weiguo Fan and Linda Wallace and Stephanie Rich and Zhongju Zhang Tapping the power of text mining . . . . 76--82 Marc Stiegler and Alan H. Karp and Ka-Ping Yee and Tyler Close and Mark S. Miller Polaris: virus-safe computing for Windows XP . . . . . . . . . . . . . . . 83--88 Se-Joon Hong and Kar Yan Tam and Jinwoo Kim Mobile data service fuels the desire for uniqueness . . . . . . . . . . . . . . . 89--94 Bongsug (Kevin) Chae and Roger McHaney Asian trio's adoption of Linux-based open source development . . . . . . . . 95--99 Peter G. Neumann Inside risks: The foresight saga . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Outsourcing Twist; Iraq's Cool Factor; Segway's Segue; A Picture Is Worth Even More Spam; Blog-Free CEOs; Sponge Count . . . . . . . . . . . . . . 9--10 Diane Crawford and Donn B. Parker and Phillip Armour and Bhupinder Singh Anand Forum: Why Information Security Is Still a Folk Art;; In Programming, as in Life, Know the Problem Domain; Measure Software Success as Delivered Value to the Customer; How Definitive is the Classical Church--Turing Thesis? . . . . 11--13 Michael A. Cusumano Technology strategy and management: Envisioning the future of India's software services business . . . . . . . 15--17 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 19--20 Pamela Samuelson Legally speaking: IBM's pragmatic embrace of open source . . . . . . . . . 21--25 Pär J. Ågerfalk and Brian Fitzgerald Introduction: Special Issue: Flexible and distributed software processes: old petunias in new bowls? . . . . . . . . . 26--34 Gwanhoo Lee and William DeLone and J. Alberto Espinosa Ambidextrous coping strategies in globally distributed software development projects . . . . . . . . . . 35--40 Balasubramaniam Ramesh and Lan Cao and Kannan Mohan and Peng Xu Can distributed software development be agile? . . . . . . . . . . . . . . . . . 41--46 One-Ki (Daniel) Lee and Probir Banerjee and Kai H. Lim and Kuldeep Kumar and Jos van Hillegersberg and Kwok Kee Wei Aligning IT components to achieve agility in globally distributed system development . . . . . . . . . . . . . . 48--54 Patrick Wagstrom and James Herbsleb Dependency forecasting in the distributed agile organization . . . . . 55--56 Nick V. Flor Globally distributed software development and pair programming . . . . 57--58 Jiming Liu and K. C. Tsui Toward nature-inspired computing . . . . 59--64 Ray Giguette Building objects out of Plato: applying philosophy, symbolism, and analogy to software design . . . . . . . . . . . . 66--71 Casey G. Cegielski and Dianne J. Hall What makes a good programmer? . . . . . 73--75 Tamara Dinev Why spoofing is serious Internet fraud 76--82 Il-Horn Hann and Kai-Lung Hui and Yee-Lin Lai and S. Y. T. Lee and I. P. L. Png Who gets spammed? . . . . . . . . . . . 83--87 Pratyush Bharati and Abhijit Chaudhury Studying the current status of technology adoption . . . . . . . . . . 88--93 Steven M. Bellovin Inside risks: Virtual machines, virtual security? . . . . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Super Game Plan; E-Learning Roots Disputed; Chinese History; U.K. Seeks Popular Science Input; Encryption Commitment; \em Improve-ment News; Vid Kid . . . . . . . . . . . . . . . . . . 9--10 Diane Crawford and Karl Wiegers and Marc Stiegler and Alan H. Karp and Ka-Ping Yee and Tyler Close and Mark S. Miller and Jeffrey A. Rosenwald and Jim Chorn and David Dreyfus Forum: Don't Target Me, Unless I Say You Can; Avoid the Trap of Unrealistic Expectations; Fewer Degrees of Separation Means More Precision in Software Projects . . . . . . . . . . . 11--13 Robert L. Glass Practical programmer: Looking into the challenges of complex IT projects . . . 15--17 Peter J. Denning and Rick Hayes-Roth The profession of IT: Decision making in very large networks . . . . . . . . . . 19--23 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 25--26 Christof Teuscher Viewpoint: Biologically uninspired computer science . . . . . . . . . . . . 27--29 Cormac J. Sreenan and Kobus van der Merwe Introduction to Special Issue on Entertainment Networking . . . . . . . . 30--33 Kuan-Ta Chen and Polly Huang and Chin-Laung Lei How sensitive are online gamers to network quality? . . . . . . . . . . . . 34--38 Mark Claypool and Kajal Claypool Latency and player actions in online games . . . . . . . . . . . . . . . . . 40--45 Jeremy Brun and Farzad Safaei and Paul Boustead Managing latency and fairness in networked games . . . . . . . . . . . . 46--51 Zefir Kurtisi and Xiaoyuan Gu and Lars Wolf Enabling network-centric music performance in wide-area networks . . . 52--54 Reza Rejaie Anyone can broadcast video over the internet . . . . . . . . . . . . . . . . 55--57 Verena Kahmann and Jens Brandt and Lars Wolf Collaborative streaming in heterogeneous and dynamic scenarios . . . . . . . . . 58--63 Dijiang Huang and Qing Cao and Amit Sinha and Marc J. Schniederjans and Cory Beard and Lein Harn and Deep Medhi New architecture for intra-domain network security issues . . . . . . . . 64--72 Hazel Taylor Critical risks in outsourced IT projects: the intractable and the unforeseen . . . . . . . . . . . . . . . 74--79 Dinah Payne and Brett J. L. Landry A uniform code of ethics: business and IT professional ethics . . . . . . . . . 81--84 Arun Sen and Peter A. Dacin and Christos Pattichis Current trends in web data analysis . . 85--91 Rebecca T. Mercuri and Vincent J. Lipsio and Beth Feehan Inside risks: COTS and other electronic voting backdoors . . . . . . . . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track: Tech 20/20 on 2020; Patents Not Pending; A Matter of Style; Nano Products, Giga Concerns; The Tiny Engine that Could; ``Houston, We Have a Problem'' . . . . . . . . . . . . . . . 9--10 Diane Crawford and Girish Seshagiri and Pär Ågerfalk and Brian Fitzgerald and Trevor R. H. Clarke and Niels J. Bjergstrom and Alex Simonelis and Charlie McDowell and Linda Werner and Heather E. Bullock and Julian Fernald and Melvin Fitting and Bhupinder Singh Anand and Thorkil Naur Forum: GSD Benefits Still Not Worth the Trouble; Let Interactive Genetic Algorithms Provide Music Accompaniment; Insist on Risk Management in Software Engineering; Could One Head Be Better Than Two?; Would Church or Turing Make Every Function Computable?; Still No Proof of the Unsolvability of Turing's Halting Problem . . . . . . . . . . . . 11--13 Hal Berghel Digital village: Fungible credentials and next-generation fraud . . . . . . . 15--19 CACM Staff ACM honors distinguished members for contributions to computing . . . . . . . 20--21 Diane Crawford Hot links: Top 10 downloads from ACM's digital library . . . . . . . . . . . . 23--24 Douglas Blank Viewpoint: Robots make computer science personal . . . . . . . . . . . . . . . . 25--27 Vijayan Sugumaran and Sooyong Park and Kyo C. Kang Introduction: Software product line engineering . . . . . . . . . . . . . . 28--32 Paul C. Clements and Lawrence G. Jones and John D. McGregor and Linda M. Northrop Getting there from here: a roadmap for software product line adoption . . . . . 33--36 Charles W. Krueger New methods in software product line practice . . . . . . . . . . . . . . . . 37--40 Jan Bosch The challenges of broadening the scope of software product families . . . . . . 41--44 Don Batory and David Benavides and Antonio Ruiz-Cortes Automated analysis of feature models: challenges ahead . . . . . . . . . . . . 45--47 Magnus Eriksson and Jürgen Börstler and Kjell Borg Software product line modeling made practical . . . . . . . . . . . . . . . 49--54 Jaejoon Lee and Dirk Muthig Feature-oriented variability management in product line engineering . . . . . . 55--59 Krzysztof Czarnecki and Michal Antkiewicz and Chang Hwan Peter Kim Multi-level customization in application engineering . . . . . . . . . . . . . . 60--65 Andreas Helferich and Klaus Schmid and Georg Herzwurm Product management for software product lines: an unsolved problem? . . . . . . 66--67 Kannan Mohan and Balasubramaniam Ramesh Change management patterns in software product lines . . . . . . . . . . . . . 68--72 Tomoji Kishi and Natsuko Noda Formal verification and software product lines . . . . . . . . . . . . . . . . . 73--77 Klaus Pohl and Andreas Metzger Software product line testing . . . . . 78--81 Joaquin Peña and Michael G. Hinchey and Antonio Ruiz-Cortés Multi-agent system product lines: challenges and benefits . . . . . . . . 82--84 Hoh Peter In and Jongmoon Baik and Sangsoo Kim and Ye Yang and Barry Boehm A quality-based cost estimation model for the product line life cycle . . . . 85--88 Ian Angell and Jan Kietzmann RFID and the end of cash? . . . . . . . 90--96 Zakaria Maamar and Djamal Benslimane and Nanjangud C. Narendra What can context do for Web services? 98--103 Martin Bichler and Jayant R. Kalagnanam Software frameworks for advanced procurement auction markets . . . . . . 104--108 Ali Reza Montazemi How they manage IT: SMEs in Canada and the U.S. . . . . . . . . . . . . . . . . 109--112 France Belanger and Weiguo Fan and L. Christian Schaupp and Anjala Krishen and Jeannine Everhart and David Poteet and Kent Nakamoto Technical opinion: Web site success metrics: addressing the duality of goals 114--116 Wilhelm Hasselbring and Matthias Rohr and Jurgen Taeger and Daniel Winteler Inside risks: Liability risks in reusing third-party software . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track . . . . . . . . . . . . . . . 9--10 Diane Crawford Forum . . . . . . . . . . . . . . . . . 11--12 Phillip G. Armour The business of software: Agile \ldots and offshore . . . . . . . . . . . . . . 13--16 Meg McGinity Shannon Staying connected: Shannon's eleven . . 17--20 Russell Beale Viewpoint: Slanty design . . . . . . . . 21--24 CACM Staff ACM Annual Report for FY06 . . . . . . . 25--32 Patricia S. Abril and Robert Plant The patent holder's dilemma: buy, sell, or troll? . . . . . . . . . . . . . . . 36--44 Huimin Zhao Semantic matching across heterogeneous data sources . . . . . . . . . . . . . . 45--50 Markus Biehl Success factors for implementing global information systems . . . . . . . . . . 52--58 Nitin Singh and Kee-hung Lai and T. C. E. Cheng Intra-organizational perspectives on IT-enabled supply chains . . . . . . . . 59--65 Sharon McDonald and Helen M. Edwards Who should test whom? . . . . . . . . . 66--71 Sami Surakka What subjects and skills are important for software developers? . . . . . . . . 73--78 Jaap-Henk Hoepman and Bart Jacobs Increased security through open source 79--83 Peter Naur Computing versus human thinking . . . . 85--94 Diane Crawford Hot links: Top 10 Downloads from ACM's Digital Library . . . . . . . . . . . . 95--96 Lauren Weinstein Inside risks: Ma Bell's revenge: the battle for network neutrality . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track . . . . . . . . . . . . . . . 9--10 Diane Crawford Forum . . . . . . . . . . . . . . . . . 11--13 CACM Staff Student de-charter notice . . . . . . . 14--14 Michael A. Cusumano Technology strategy and management: What road ahead for Microsoft the company? 15--18 Pamela Samuelson Legally speaking: Patent reform through the courts . . . . . . . . . . . . . . . 19--23 Joshua Goodman and Gordon V. Cormack and David Heckerman Spam and the ongoing battle for the inbox . . . . . . . . . . . . . . . . . 24--33 Rakesh Agrawal and Tyrone Grandison and Christopher Johnson and Jerry Kiernan Enabling the 21st century health care information technology revolution . . . 34--42 Grant A. Jacoby and Luqi Intranet model and metrics . . . . . . . 43--50 Bonnie C. Glassberg Electronic markets hypothesis redux: where are we now? . . . . . . . . . . . 51--55 Galen A. Grimes Compliance with the CAN-SPAM Act of 2003 56--62 Ranieri Baraglia and Fabrizio Silvestri Dynamic personalization of web sites without user intervention . . . . . . . 63--67 Joon Koh and Young-Gul Kim and Brian Butler and Gee-Woo Bock Encouraging participation in virtual communities . . . . . . . . . . . . . . 68--73 Dongsong Zhang Web content adaptation for mobile handheld devices . . . . . . . . . . . . 75--79 CACM Staff SIGs Announce Candidates for Election 80--80 Rafae Bhatti and Elisa Bertino and Arif Ghafoor An integrated approach to federated identity and privilege management in open systems . . . . . . . . . . . . . . 81--87 Benjamin B. Shao and Julie Smith David The impact of offshore outsourcing on IT workers in developed countries . . . . . 89--94 Rolf Oppliger Technical opinion: IT security: in search of the Holy Grail . . . . . . . . 96--98 Diane Crawford Hot Links: Top 10 downloads from ACM's digital library . . . . . . . . . . . . 99--100 Peter G. Neumann Inside Risks: Widespread network failures . . . . . . . . . . . . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track . . . . . . . . . . . . . . . 9--10 Diane Crawford Forum . . . . . . . . . . . . . . . . . 11--13 CACM Staff ACM A. M. Turing Award nominations solicited . . . . . . . . . . . . . . . 14--14 Phillip G. Armour The business of software: Mortality play 15--18 Earl Barr and Matt Bishop and Mark Gondree Viewpoint: Fixing federal e-voting standards . . . . . . . . . . . . . . . 19--24 CACM Staff SIGs announce candidates for election 25--25 CACM Staff ACM fellows . . . . . . . . . . . . . . 26--27 Bartel Van de Walle and Murray Turoff Emergency response information systems: Emerging trends and technologies: Introduction . . . . . . . . . . . . . . 29--31 Liz Carver and Murray Turoff Human-computer interaction: the human and computer as a team in emergency management information systems . . . . . 33--38 Simon French and Murray Turoff Decision support systems . . . . . . . . 39--40 Frank Fiedrich and Paul Burghardt Agent-based systems for disaster management . . . . . . . . . . . . . . . 41--42 David Mendonça and Theresa Jefferson and John Harrald Collaborative adhocracies and mix-and-match technologies in emergency management . . . . . . . . . . . . . . . 44--49 B. S. Manoj and Alexandra Hubenko Baker Communication challenges in emergency response . . . . . . . . . . . . . . . . 51--53 Leysia Palen and Starr Roxanne Hiltz and Sophia B. Liu Online forums supporting grassroots participation in emergency preparedness and response . . . . . . . . . . . . . . 54--58 Art Botterell and Ronja Addams-Moring Public warning in the networked age: open standards to the rescue? . . . . . 59--60 Paul Currion and Chamindra de Silva and Bartel Van de Walle Open source software for disaster management . . . . . . . . . . . . . . . 61--65 Stephen J. Andriole The 7 habits of highly effective technology leaders . . . . . . . . . . . 66--72 Thomas A. Horan and Benjamin L. Schooley Time-critical information services . . . 73--78 Sridhar Nerur and VenuGopal Balijepally Theoretical reflections on agile development methodologies . . . . . . . 79--83 Scott McCoy and Andrea Everard and Peter Polak and Dennis F. Galletta The effects of online advertising . . . 84--88 Ning Zhong and Jiming Liu and Yiyu Yao Envisioning intelligent information technologies through the prism of web intelligence . . . . . . . . . . . . . . 89--94 James A. Hall and Stephen L. Liedtka The Sarbanes--Oxley Act: implications for large-scale IT outsourcing . . . . . 95--100 Diane Crawford Hot links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 101--102 Nigel Ward Technical opinion: The (un)predictability of computer science graduate school admissions . . . . . . . 104--106 Donn B. Parker Inside risks: Risks of risk-based security . . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Diane Crawford Forum: Stop chasing the AI illusion . . 7--9 CACM Staff News track . . . . . . . . . . . . . . . 13--14 Hal Berghel Digital Village: Hiding data, forensics, and anti-forensics . . . . . . . . . . . 15--20 Peter J. Denning The profession of IT: Mastering the mess 21--25 CACM Staff ACM honors distinguished members . . . . 26--27 CACM Staff Call for nominations for advanced member grades in ACM . . . . . . . . . . . . . 28--29 CACM Staff Proposal to dissolve SIGAPL . . . . . . 29--29 Jenova Chen Viewpoint: Flow in games (and everything else) . . . . . . . . . . . . . . . . . 31--34 Jeff Kramer Is abstraction the key to computing? . . 36--42 Dorit Nevo and Michael R. Wade How to avoid disappointment by design 43--48 Levent V. Orman Consumer support systems . . . . . . . . 49--54 Stefano Ceri and Maristella Matera and Francesca Rizzo and Vera Demaldé Designing data-intensive web applications for content accessibility using web marts . . . . . . . . . . . . 55--61 Ido Green and Tzvi Raz and Moshe Zviran Analysis of active intrusion prevention data for predicting hostile activity in computer networks . . . . . . . . . . . 63--68 S. Sakthivel Managing risk in offshore systems development . . . . . . . . . . . . . . 69--75 Jeffrey A. Stone and Elinor Madigan Inconsistencies and disconnects . . . . 76--79 Dianne J. Hall and David Paradice Investigating value-based decision bias and mediation: do you do as you think? 81--85 Michael Chau and Xiao Fang and Olivia R. Liu Sheng What are people searching on government web sites? . . . . . . . . . . . . . . . 87--92 Diane Crawford Hot links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 93--94 E. Sonny Butler and Cheryl Aasheim and Susan Williams Technical opinion: Does telecommuting improve productivity? . . . . . . . . . 101--103 Jim Horning Inside Risks: Risks of virtual professionalism . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6 Diane Crawford Forum . . . . . . . . . . . . . . . . . 7--7 Stuart I. Feldman President's letter: ACM's past helps steer its future . . . . . . . . . . . . 10--10 CACM Staff News track . . . . . . . . . . . . . . . 11--12 Meg McGinity Shannon Staying connected: The pearly gates of Internet TV . . . . . . . . . . . . . . 13--15 Stephen B. Jenkins Viewpoint: The rime of the ancyent programmer . . . . . . . . . . . . . . . 17--20 Robert L. Glass Practical programmer: One man's quest for the state of software engineering's practice . . . . . . . . . . . . . . . . 21--23 David S. Wise ACM at 60: a look back in time: Introduction . . . . . . . . . . . . . . 24--26 Bernadette Longo ACM established to develop communication about computing . . . . . . . . . . . . 27--29 Atsushi Akera Edmund Berkeley and the origins of ACM 30--35 Thomas Haigh and Elisabeth Kaplan and Carrie Seib Sources for ACM history: what, where, why . . . . . . . . . . . . . . . . . . 36--41 Charles Care Not only digital: a review of ACM's early involvement with analog computing technology . . . . . . . . . . . . . . . 42--45 David Hemmendinger The ACM and IEEE-CS guidelines for undergraduate CS education . . . . . . . 46--53 Judy Brown and Steve Cunningham A history of ACM SIGGRAPH . . . . . . . 54--61 Chris Edmondson-Yurkanan SIGCOMM's archaeological journey into networking's past . . . . . . . . . . . 63--68 Thomas J. (Tim) Bergin A history of the history of programming languages . . . . . . . . . . . . . . . 69--74 Matthew R. McBride The software architect . . . . . . . . . 75--81 Zeljko Obrenovic and Julio Abascal and Dusan Starcevic Universal accessibility as a multimodal design issue . . . . . . . . . . . . . . 83--88 Michael Harris and Kris Aebischer and Tim Klaus The whitewater process: software product development in small IT businesses . . . 89--93 Bin He and Mitesh Patel and Zhen Zhang and Kevin Chen-Chuan Chang Accessing the deep web . . . . . . . . . 94--101 Viviane Torres da Silva and Carlos J. P. de Lucena Modeling multi-agent systems . . . . . . 103--108 Alessandra Devito Da Cunha and David Greathead Does personality matter?: an analysis of code-review ability . . . . . . . . . . 109--112 Geoffrey Goodell and Paul Syverson Technical opinion: The right place at the right time . . . . . . . . . . . . . 113--117 Diane Crawford Hot Links: Top 10 downloads from ACM's digital library . . . . . . . . . . . . 124--125 Bruce Schneier Inside risks: The psychology of security 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Diane Crawford Forum . . . . . . . . . . . . . . . . . 7--9 CACM Staff News track . . . . . . . . . . . . . . . 13--14 Pamela Samuelson Legally speaking: Software patents and the metaphysics of Section 271(f) . . . 15--19 Phillip G. Armour The business of software: Twenty percent 21--23 Ben Shneiderman Viewpoint: Web science: a provocative invitation to computer science . . . . . 25--27 Eric van Heck and Peter Vervest Smart business networks: how the network wins . . . . . . . . . . . . . . . . . . 28--37 Sasha Dekleva and J. P. Shim and Upkar Varshney and Geoffrey Knoerzer Evolution and emerging issues in mobile wireless networks . . . . . . . . . . . 38--43 Amy Friedlander and Allison Mankin and W. Douglas Maughan and Stephen D. Crocker DNSSEC: a protocol toward securing the Internet infrastructure . . . . . . . . 44--50 Ioanna D. Constantiou and Jan Damsgaard and Lars Knutsen The four incremental steps toward advanced mobile service adoption . . . . 51--55 Mark J. Cotteleer and Christopher A. Cotteleer and Andrew Prochnow Cutting checks: challenges and choices in B2B e-payments . . . . . . . . . . . 56--61 Anand Jeyaraj and Vicki L. Sauter An empirical investigation of the effectiveness of systems modeling and verification tools . . . . . . . . . . . 62--67 David Avison and Terry Young Time to rethink health care and ICT? . . 69--74 Kary Främling and Timo Ala-Risku and Mikko Kärkkäinen and Jan Holmström Design patterns for managing product life cycle information . . . . . . . . . 75--79 Jie Ren and Richard N. Taylor Automatic and versatile publications ranking for research institutions and scholars . . . . . . . . . . . . . . . . 81--85 Diane Crawford Hot Links: Top 10 downloads from ACM's digital library . . . . . . . . . . . . 86--87 Mihail Cocosila and Ofir Turel and Norm Archer and Yufei Yuan Technical opinion: Perceived health risks of 3G cell phones: do users care? 89--92 Peter A. Freeman Inside risks: Risks are your responsibility . . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track . . . . . . . . . . . . . . . 7--8 Peter J. Denning The profession of IT: Computing is a natural science . . . . . . . . . . . . 13--18 Michael A. Cusumano Technology strategy and management: The changing labyrinth of software pricing 19--22 Abbe Mowshowitz and Nanda Kumar Viewpoint: Public vs. private interest on the Internet . . . . . . . . . . . . 23--25 Michael Zyda Creating a science of games: Introduction . . . . . . . . . . . . . . 26--29 Merrilea J. Mayo Games for science and engineering education . . . . . . . . . . . . . . . 30--35 Ralph E. Chatham Games for training . . . . . . . . . . . 36--43 Henry Kelly and Kay Howell and Eitan Glinert and Loring Holding and Chris Swain and Adam Burrowbridge and Michelle Roper How to build serious games . . . . . . . 44--49 Randy Pausch and Don Marinelli Carnegie Mellon's entertainment technology center: combining the left and right brain . . . . . . . . . . . . 50--57 Caitlin Kelleher and Randy Pausch Using storytelling to motivate programming . . . . . . . . . . . . . . 58--64 Nikunj Raghuvanshi and Christian Lauterbach and Anish Chandak and Dinesh Manocha and Ming C. Lin Real-time sound synthesis and propagation for games . . . . . . . . . 66--73 Robert P. Schumaker and Ying Liu and Mark Ginsburg and Hsinchun Chen Evaluating the efficacy of a terrorism question/answer system . . . . . . . . . 74--80 In Lee An architecture for a next-generation holistic e-recruiting system . . . . . . 81--85 Harris Wu and Michael Gordon Collaborative structuring: organizing document repositories effectively and efficiently . . . . . . . . . . . . . . 86--91 Fred Niederman and Richard G. Mathieu and Roger Morley and Ik-Whan Kwon Examining RFID applications in supply chain management . . . . . . . . . . . . 92--101 Someswar Kesh and Pauline Ratnasingam A knowledge architecture for IT security 103--108 Annie I. Antón and Elisa Bertino and Ninghui Li and Ting Yu A roadmap for comprehensive online privacy policy management . . . . . . . 109--116 Waymond Rodgers and Solomon Negash The effects of Web-based technologies on knowledge transfer . . . . . . . . . . . 117--122 Sabah Al-Fedaghi Technical opinion: Conferences under scrutiny . . . . . . . . . . . . . . . . 123--126 Diane Crawford Hot Links: Top 10 downloads from ACM's digital library . . . . . . . . . . . . 135--135 Charles Perrow Inside risks: Disasters evermore? . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track . . . . . . . . . . . . . . . 7--8 Diane Crawford Forum . . . . . . . . . . . . . . . . . 13--14 Diane Crawford Call for nominations for ACM general election . . . . . . . . . . . . . . . . 14--14 Hal Berghel Digital village: Better-than-nothing security practices . . . . . . . . . . . 15--18 Amy S. Bruckman Viewpoint: Software copyright and role models . . . . . . . . . . . . . . . . . 19--20 Robert L. Glass Practical programmer: A deja-vu look at software engineering researchers who care about practice . . . . . . . . . . 21--23 Alfred Kobsa Privacy-enhanced personalization . . . . 24--33 Ahmed Elfatatry Dealing with change: components versus services . . . . . . . . . . . . . . . . 35--39 Matt E. Thatcher and David E. Pingry Modeling the IT value paradox . . . . . 41--45 John Erickson and Keng Siau Theoretical and practical complexity of modeling methods . . . . . . . . . . . . 46--51 Jesper Simonsen Involving top management in IT projects 52--58 Larry J. LeBlanc and Michael R. Galbreth Designing large-scale supply chain linear programs in spreadsheets . . . . 59--64 Yun Wan and Satya Menon and Arkalgud Ramaprasad A classification of product comparison agents . . . . . . . . . . . . . . . . . 65--71 Janice C. Sipior and Burke T. Ward Unintended invitation: organizational wi-fi use by external roaming users . . 72--77 T. H. Tse and Francis C. M. Lau and W. K. Chan and Peter C. K. Liu and Colin K. F. Luk Testing object-oriented industrial software without precise oracles or results . . . . . . . . . . . . . . . . 78--85 Sagnika Sen and Haluk Demirkan and Michael Goul Dynamic decision support through instantiation of UEML representations 87--93 W. ``RP'' Raghupathi Corporate governance of IT: a framework for development . . . . . . . . . . . . 94--99 Diane Crawford Hot Links: Top 10 downloads from ACM's digital library . . . . . . . . . . . . 100--100 Sakgasit Ramingwong and A. S. M. Sajeev Technical opinion: Offshore outsourcing: the risk of keeping mum . . . . . . . . 101--103 David Lorge Parnas Inside risks: Which is riskier: OS diversity or OS monopoly? . . . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track . . . . . . . . . . . . . . . 7--8 Diane Crawford Forum . . . . . . . . . . . . . . . . . 13--14 Neil L. Waters Viewpoint: Why you can't cite Wikipedia in my class . . . . . . . . . . . . . . 15--17 Ronald F. Boisvert and Mary Jane Irwin and Holly Rushmeier Online first: Evolving the ACM journal distribution program . . . . . . . . . . 19--20 Meg McGinity Shannon Staying connected: Shaking hands, kissing babies, and \ldots blogging? . . 21--24 Phillip G. Armour The business of software: The conservation of uncertainty . . . . . . 25--28 Toshinori Munakata Beyond silicon: new computing paradigms: Introduction . . . . . . . . . . . . . . 30--34 Warren Robinett and Gregory S. Snider and Philip J. Kuekes and R. Stanley Williams Computing with a trillion crummy components . . . . . . . . . . . . . . . 35--39 Jing Kong Computation with carbon nanotube devices 40--42 Robert Stadler Molecular, chemical, and organic computing . . . . . . . . . . . . . . . 43--45 John H. Reif and Thomas H. LaBean Autonomous programmable biomolecular devices using self-assembled DNA nanostructures . . . . . . . . . . . . . 46--53 Dave Bacon and Debbie Leung Toward a world with quantum computers 55--59 Hossin Abdeldayem and Donald O. Frazier Optical computing: need and challenge 60--62 David W. M. Marr and Toshinori Munakata Micro/nanofluidic computing . . . . . . 64--68 Masashi Aono and Masahiko Hara and Kazuyuki Aihara Amoeba-based neurocomputing with chaotic dynamics . . . . . . . . . . . . . . . . 69--72 Ami Marowka Parallel computing on any desktop . . . 74--78 George Lepouras and Costas Vassilakis and Constantin Halatsis and Panagiotis Georgiadis Domain expert user development: the SmartGov approach . . . . . . . . . . . 79--83 Joseph S. Valacich and D. Veena Parboteeah and John D. Wells The online consumer's hierarchy of needs 84--90 Susan A. Brown and Norman L. Chervany and Bryan A. Reinicke What matters when introducing new information technology . . . . . . . . . 91--96 Ashley Braganza and Arnoud Franken SOX, compliance, and power relationships 97--102 Irene Pollach What's wrong with online privacy policies? . . . . . . . . . . . . . . . 103--108 Thomas F. Stafford and Dennis Gonier Technical opinion: The online research 'bubble' . . . . . . . . . . . . . . . . 109--112 Diane Crawford Hot Links: Top 10 downloads from ACM's digital library . . . . . . . . . . . . 118--118 Peter G. Neumann Inside risks: E-migrating risks? . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track . . . . . . . . . . . . . . . 7--8 Diane Crawford Forum . . . . . . . . . . . . . . . . . 13--14 Michael A. Cusumano Technology strategy and management: Extreme programming compared with Microsoft-style iterative development 15--18 Pamela Samuelson Legally speaking: Does copyright law need to be reformed? . . . . . . . . . . 19--23 Katia Passerini and Karen Patten and Michael R. Bartolacci and Jerry Fjermestad Technical opinion: Reflections and trends in the expansion of cellular wireless services in the U.S. and China 25--28 Sebastian Thrun Viewpoint: Why we compete in DARPA's Urban Challenge autonomous robot race 29--31 Michael L. Best and Kipp Jones and Illenin Kondo and Dhanaraj Thakur and Edem Wornyo and Calvin Yu International perspectives: Post-conflict communications: the case of Liberia . . . . . . . . . . . . . . . 33--39 Erran Carmel and Pamela Abbott Why 'nearshore' means that distance matters . . . . . . . . . . . . . . . . 40--46 Erran Carmel and Pamela Abbott Nearshore locations in three principal global clusters and their respective attributes . . . . . . . . . . . . . . . 45--45 Matt E. Thatcher and David E. Pingry [Software patents] The good, the bad, and the messy . . . . . . . . . . . . . 47--52 Gregoris Mentzas and Kostas Kafentzis and Panos Georgolios Knowledge services on the semantic web 53--58 U. N. Umesh and Len Jessup and Minh Q. Huynh [Getting ideas to market] Current issues faced by technology entrepreneurs . . . 60--66 Asli Yagmur Akbulut and Clayton Arlen Looney Inspiring students to pursue computing degrees . . . . . . . . . . . . . . . . 67--71 Prabhudev Konana and Gautam Ray Physical product reengineering with embedded information technology . . . . 72--78 Michael P. Papazoglou and Willem-Jan van den Heuvel Business process development life cycle methodology . . . . . . . . . . . . . . 79--85 William L. Kuechler Business applications of unstructured text . . . . . . . . . . . . . . . . . . 86--93 Tom N. Jagatic and Nathaniel A. Johnson and Markus Jakobsson and Filippo Menczer Social phishing . . . . . . . . . . . . 94--100 Wade H. Baker and Loren Paul Rees and Peter S. Tippett Necessary measures: metric-driven information security risk assessment and decision making . . . . . . . . . . . . 101--106 Richard J. Goeke and Robert H. Faley Leveraging the flexibility of your data warehouse . . . . . . . . . . . . . . . 107--111 John D'Arcy and Anat Hovav Deterring internal information systems misuse . . . . . . . . . . . . . . . . . 113--117 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 118--118 Herbert S. Lin and Alfred Z. Spector and Peter G. Neumann and Seymour E. Goodman Inside risks: Toward a safer and more secure cyberspace . . . . . . . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track . . . . . . . . . . . . . . . 7--8 Peter J. Denning The profession of IT: The choice uncertainty principle . . . . . . . . . 9--14 Robert L. Glass Practical programmer: A research project with important practitioner-oriented findings . . . . . . . . . . . . . . . . 15--16 Stuart I. Feldman President's letter: The rewards of ACM's awards . . . . . . . . . . . . . . . . . 17--18 David Lorge Parnas Viewpoint: Stop the numbers game . . . . 19--21 Dror G. Feitelson Experimental computer science: Introduction . . . . . . . . . . . . . . 24--26 Catherine C. McGeoch Experimental algorithmics . . . . . . . 27--31 Victor R. Basili and Marvin V. Zelkowitz Empirical studies to build a science of computer science . . . . . . . . . . . . 33--37 Larry Peterson and Vivek S. Pai Experience-driven experimental systems research . . . . . . . . . . . . . . . . 38--44 Alan Jay Smith Workloads (creation and use) . . . . . . 45--50 Ellen M. Voorhees TREC: Continuing information retrieval's tradition of experimentation . . . . . . 51--54 L. D. Jackel and Douglas Hackett and Eric Krotkov and Michael Perschbacher and James Pippine and Charles Sullivan How DARPA structures its robotics programs to improve locomotion and navigation . . . . . . . . . . . . . . . 55--59 Oded Nov What motivates Wikipedians? . . . . . . 60--64 Paul P. Tallon and Richard Scannell Information life cycle management . . . 65--69 Neil Foshay and Avinandan Mukherjee and Andrew Taylor Does data warehouse end-user metadata add value? . . . . . . . . . . . . . . . 70--77 Chris Sauer and Andrew Gemino and Blaize Horner Reich The impact of size and volatility on IT project performance . . . . . . . . . . 79--84 Dominic M. Thomas and Robert P. Bostrom and Marianne Gouge Making knowledge work in virtual teams 85--90 Hee-Woong Kim and Yunjie Xu Drivers of price Premium in e-markets 91--95 Diane Crawford Hot Links: Top 10 downloads from ACM's Digital Library . . . . . . . . . . . . 97--97 Matt Bishop and David Wagner Inside risks: Risks of e-voting . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 CACM Staff News track . . . . . . . . . . . . . . . 7--8 Diane Crawford Forum . . . . . . . . . . . . . . . . . 9--10 Hal Berghel Digital village: Credit Card Forensics 11--14 Robert Gaskins Viewpoint: PowerPoint at 20: back to basics . . . . . . . . . . . . . . . . . 15--17 Ben Shneiderman Creativity support tools: accelerating discovery and innovation . . . . . . . . 20--32 Dongwon Lee and Jaewoo Kang and Prasenjit Mitra and C. Lee Giles and Byung-Won On Are your citations clean? . . . . . . . 33--38 CACM Staff Nominees for elections and report of the ACM nominating committee . . . . . . . . 39--39 Robert J. Aalberts and Percy Poon and Paul Thistle Trespass, nuisance, and spam: 11th century common law meets the internet 40--45 Antonio M. Lopez, Jr. and Frederick G. Lopez and Robert W. Lent and Madonna G. Constantine Multidisciplinary research on the datapath of the computing disciplines 46--50 Erica L. Wagner and Gabriele Piccoli Moving beyond user participation to achieve successful IS design . . . . . . 51--55 Wai Fong Boh and Christina Soh and Steven Yeo Standards development and diffusion: a case study of RosettaNet . . . . . . . . 57--62 Ilan Oshri and Sue Newell and Shan L. Pan Implementing component reuse strategy in complex products environments . . . . . 63--67 Kannan Mohan and Balasubramaniam Ramesh Tracing variations in software product families . . . . . . . . . . . . . . . . 68--73 Klaus Schild and Stefan Bussmann Self-organization in manufacturing operations . . . . . . . . . . . . . . . 74--79 Varun Grover and Raymond M. Henry and Jason B. Thatcher Fix IT-business relationships through better decision rights . . . . . . . . . 80--86 Gautam Ray and Waleed A. Muhanna and Jay B. Barney Competing with IT: the role of shared IT-business understanding . . . . . . . 87--91 Diane Crawford Hot Links: Top 10 Downloads from ACM's Digital Library . . . . . . . . . . . . 92--92 Emmeline de Pillis and Kimberly Furumo Technical opinion: Counting the cost of virtual teams . . . . . . . . . . . . . 93--95 Chuan-Hoo Tan and Hock-Hai Teo Technical opinion: Training future software developers to acquire agile development skills . . . . . . . . . . . 97--98 Steven M. Bellovin and Matt Blaze and Whitfield Diffie and Susan Landau and Jennifer Rexford and Peter G. Neumann Inside risks: Internal surveillance, external risks . . . . . . . . . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Diane Crawford Forum . . . . . . . . . . . . . . . . . 7--9 Phillip G. Armour The Business of software: Digging CACM 13--15 Meg McGinity Shannon Staying connected: Happy anniversary, CACM . . . . . . . . . . . . . . . . . . 17--19 Peter A. Freeman Viewpoint: Back to experimentation . . . 21--22 Stuart I. Feldman President's letter: Fifty years and still growing . . . . . . . . . . . . . 23--23 Diane Crawford From the editor's desk: Introduction . . 24--26 Calvin C. Gotlieb A time to retrospect and prospect . . . 26--29 M. Stuart Lynn The battle of the covers . . . . . . . . 30--32 Robert L. Ashenhurst The battle behind the scenes . . . . . . 33--34 Peter J. Denning Déj\`a vu all over again . . . . . . . . 35--39 Jacques Cohen From academia to the editorship . . . . 41--43 Moshe Y. Vardi CACM: past, present, and future . . . . 44--48 Andrew Rosenbloom Voices: Introduction . . . . . . . . . . 50--51 Jon Bentley In the realm of insight and creativity 52--54 Whitfield Diffie Information security: 50 years behind, 50 years ahead . . . . . . . . . . . . . 55--57 Jeannette M. Wing Five deep questions in computing . . . . 58--60 Eugene H. Spafford Inspiration and trust . . . . . . . . . 61--62 Rodney Brooks The next 50 years . . . . . . . . . . . 63--64 Pamela Samuelson Hacking intellectual property law . . . 65--67 Stephen B. Jenkins Ode to code . . . . . . . . . . . . . . 67--67 Gul Agha Computing in pervasive cyberspace . . . 68--70 Gregory Conti Could googling take down a president? 71--73 Jon Crowcroft Toward a network architecture that does everything . . . . . . . . . . . . . . . 74--77 Peter G. Neumann Reflections on computer-related risks 78--80 Jason Leigh and Maxine D. Brown Cyber-commons: merging real and virtual worlds . . . . . . . . . . . . . . . . . 82--85 Gordon Bell Bell's law for the birth and death of computer classes . . . . . . . . . . . . 86--94 Greta L. Polites and Richard T. Watson The centrality and prestige of CACM . . 95--100 Diane Crawford Breakthrough research: a preview of things to come: Introduction . . . . . . 104--104 David A. Patterson Technical perspective: the data center is the computer . . . . . . . . . . . . 105--105 Jeffrey Dean and Sanjay Ghemawat MapReduce: simplified data processing on large clusters . . . . . . . . . . . . . 107--113 Bernard Chazelle Technical perspective: finding a good neighbor, near and fast . . . . . . . . 115--115 Alexandr Andoni and Piotr Indyk Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions . . . . . . . . . . . . . . . 117--122 Leonard S. Zegans Inside risks: The psychology of risks 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6 CACM Staff News track . . . . . . . . . . . . . . . 7--8 Diane Crawford Forum . . . . . . . . . . . . . . . . . 9--11 Diane Crawford SIGs announce candidates for election 14--14 Michael A. Cusumano Technology strategy and management: Managing software development in globally distributed teams . . . . . . . 15--17 Andy Oram Viewpoint: Peer to patent needs your expertise . . . . . . . . . . . . . . . 19--20 Pamela Samuelson and Jerome H. Reichman and Graeme Dinwoodie Legally speaking: How to achieve (some) balance in anti-circumvention laws . . . 21--25 Stuart I. Feldman ACM annual report for FY07 . . . . . . . 27--34 Jeffrey Y. Kim and Jonathan P. Allen and Elan Lee Alternate reality gaming . . . . . . . . 36--42 Eric Shih and Kenneth L. Kraemer and Jason Dedrick IT diffusion in developing countries . . 43--48 Mark T. Keane and Maeve O'Brien and Barry Smyth Are people biased in their use of search engines? . . . . . . . . . . . . . . . . 49--52 Nolan J. Taylor and Eleanor T. Loiacono and Richard T. Watson Alternative scenarios to the 'banner' years . . . . . . . . . . . . . . . . . 53--58 Peter Marks and Peter Polak and Scott McCoy and Dennis Galletta Sharing knowledge . . . . . . . . . . . 60--65 Alfred Loo The myths and truths of wireless security . . . . . . . . . . . . . . . . 66--71 Munir Mandviwalla and Abhijit Jain and Julie Fesenmaier and Jeff Smith and Paul Weinberg and Greg Meyers Municipal broadband wireless networks 72--80 Vicki R. McKinney and Darryl D. Wilson and Nita Brooks and Anne O'Leary-Kelly and Bill Hardgrave Women and men in the IT profession . . . 81--84 Bing Liu and Alexander Tuzhilin Managing large collections of data mining models . . . . . . . . . . . . . 85--89 Min-Yen Kan and Yee Fan Tan Technical opinion: Record matching in digital library metadata . . . . . . . . 91--94 Pascal Meunier Inside risks: Software transparency and purity . . . . . . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6 CACM Staff News track . . . . . . . . . . . . . . . 7--8 Phillip G. Armour The business of software: The inaccurate conception . . . . . . . . . . . . . . . 13--16 Robert L. Glass Practical programmer: Managing for innovation . . . . . . . . . . . . . . . 17--18 Chenglie Hu Viewpoint: Just say 'A Class Defines a Data Type' . . . . . . . . . . . . . . . 19--21 CACM Staff ACM fellows . . . . . . . . . . . . . . 22--23 Dana Cuff and Mark Hansen and Jerry Kang Urban sensing: out of the woods . . . . 24--33 Jason O. B. Soh and Bernard C. Y. Tan Mobile gaming . . . . . . . . . . . . . 35--39 Liping Zhao Patterns, symmetry, and symmetry breaking . . . . . . . . . . . . . . . . 40--46 Robert Pinsker and Shaomin Li Costs and benefits of XBRL adoption: early evidence . . . . . . . . . . . . . 47--50 Bernd Carsten Stahl and Carole Brooke The contribution of critical IS research 51--55 David Wright and Michael Friedewald and Wim Schreurs and Michiel Verlinden and Serge Gutwirth and Yves Punie and Ioannis Maghiros and Elena Vildjiounaite and Petteri Alahuhta The illusion of security . . . . . . . . 56--63 Iris A. Junglas and Richard T. Watson Location-based services . . . . . . . . 65--69 Robert LaRose and Nora J. Rifon and Richard Enbody Promoting personal responsibility for internet safety . . . . . . . . . . . . 71--76 Frank Safayeni and P. Robert Duimering and Kimberley Zheng and Natalia Derbentseva and Christopher Poile and Bing Ran Requirements engineering in new product development . . . . . . . . . . . . . . 77--82 Kwangsu Cho and Tingting Rachel Chung and William R. King and Christian Schunn Peer-based computer-supported knowledge refinement: an empirical investigation 83--88 Dinesh K. Gauri and Amit Bhatnagar and Raghav Rao Technical opinion: Role of word of mouth in online store loyalty . . . . . . . . 89--91 Xiaoming Lu and George Ledin, Jr. Inside risks: Wireless sensor networks and the risks of vigilance . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6 Diane Crawford Forum . . . . . . . . . . . . . . . . . 10--10 CACM Staff News track . . . . . . . . . . . . . . . 11--12 Hal Berghel Digital village: Faith-based security 13--17 Peter J. Denning and Peter Yaholkovsky The profession of IT: Getting to 'we' 19--24 CACM Staff Call for nominations for advanced member grades in the ACM . . . . . . . . . . . 25--26 CACM Staff ACM honors distinguished and senior members . . . . . . . . . . . . . . . . 27--30 Daniel Kunkle and Gene Cooperman Viewpoint: Solving Rubik's Cube: disk is the new RAM . . . . . . . . . . . . . . 31--33 Ryan West The psychology of security . . . . . . . 34--40 Richard T. Watson and Marie-Claude Boudreau and Paul T. York and Martina E. Greiner and Donald Wynn, Jr. The business of open source . . . . . . 41--46 Ziqi Liao and Michael Tow Cheung Measuring consumer satisfaction in internet banking: a core framework . . . 47--51 Luc Moreau and Paul Groth and Simon Miles and Javier Vazquez-Salceda and John Ibbotson and Sheng Jiang and Steve Munroe and Omer Rana and Andreas Schreiber and Victor Tan and Laszlo Varga The provenance of electronic data . . . 52--58 Hsiu-Ping Yueh and Shihkuan Hsu Designing a learning management system to support instruction . . . . . . . . . 59--63 Lawrence D. Bodin and Lawrence A. Gordon and Martin P. Loeb Information security and risk management 64--68 Dawn G. Gregg and Judy E. Scott A typology of complaints about eBay sellers . . . . . . . . . . . . . . . . 69--74 Ilan Oshri and Julia Kotlarsky and Leslie Willcocks Missing links: building critical social ties for global collaborative teamwork 76--81 Ivy Chan and Chee-Kwong Chao Knowledge management in small and medium-sized enterprises . . . . . . . . 83--88 Mohamed Khalifa and Kathy Ning Demographic changes in IS research productivity and impact . . . . . . . . 89--94 Pamela Whitten and Deirdre Mylod and Goran Gavran and Howard Sypher 'Most Wired Hospitals' rate patient satisfaction . . . . . . . . . . . . . . 96--102 Chuck Litecky and Bipin Prabhakar and Kirk Arnett Technical opinion: The size of the IT job market . . . . . . . . . . . . . . . 107--109 Lauren Weinstein Inside risks: A current affair . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6 CACM Staff News track . . . . . . . . . . . . . . . 7--8 Diane Crawford Forum . . . . . . . . . . . . . . . . . 9--11 CACM Staff ACM A. M. Turing Award nominations solicited . . . . . . . . . . . . . . . 14--14 Jacques Cohen Viewpoint: The crucial role of CS in systems and synthetic biology . . . . . 15--18 Meg McGinity Shannon Staying connected: This menu has changed 19--21 CACM Staff 2008 ACM Elections . . . . . . . . . . . 22--31 Wingyan Chung Web searching in a multilingual world 32--40 Irit Hadar and Uri Leron How intuitive is object-oriented design? 41--46 Dov Dori Words from pictures for dual-channel processing . . . . . . . . . . . . . . . 47--52 Silvana Trimi and Hong Sheng Emerging trends in M-government . . . . 53--58 Kannan Mohan and Peng Xu and Balasubramaniam Ramesh Improving the change-management process 59--64 Rui Chen and Raj Sharman and H. Raghav Rao and Shambhu J. Upadhyaya Coordination in emergency response management . . . . . . . . . . . . . . . 66--73 Alessandro Garcia and Carlos Lucena Taming heterogeneous agent architectures 75--81 Oded Nov and Bharat Rao Technology-facilitated 'Give According to Your Abilities, Receive According to Your Needs' . . . . . . . . . . . . . . 83--87 Bezalel Gavish and Christopher L. Tucci Reducing Internet auction fraud . . . . 89--97 Edgar A. Whitley and Ian R. Hosein Technical opinion: Departmental influences on policy design . . . . . . 98--100 Steven M. Bellovin Inside risks: The physical world and the real world . . . . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6 CACM Staff News track . . . . . . . . . . . . . . . 7--8 Diane Crawford Forum . . . . . . . . . . . . . . . . . 9--11 Hal Berghel Digital village: BRAP forensics . . . . 15--20 Robert L. Glass Practical programmer: Software design and the monkey's brain . . . . . . . . . 21--22 Arik Ragowsky and Paul S. Licker and David Gefen Viewpoint: Give me information, not technology . . . . . . . . . . . . . . . 23--25 Roel Vertegaal and Ivan Poupyrev Organic user interfaces: Introduction 26--30 Hiroshi Ishii The tangible user interface and its evolution . . . . . . . . . . . . . . . 32--36 Jun Rekimoto Organic interaction technologies: from stone to skin . . . . . . . . . . . . . 38--44 Elise Co and Nikita Pashenkov Emerging display technologies for organic user interfaces . . . . . . . . 45--47 David Holman and Roel Vertegaal Organic user interfaces: designing computers in any way, shape, or form . . 48--55 Eli Blevis Sustainability implications of organic user interface technologies: an inky problem . . . . . . . . . . . . . . . . 56--57 Amanda Parkes and Ivan Poupyrev and Hiroshi Ishii Designing kinetic interactions for organic user interfaces . . . . . . . . 58--65 Carsten Schwesig What makes an interface feel organic? 67--69 Kas Oosterhuis and Nimish Biloria Interactions with proactive architectural spaces: the muscle projects . . . . . . . . . . . . . . . . 70--78 Sachiko Kodama Dynamic ferrofluid sculpture: organic shape-changing art forms . . . . . . . . 79--81 Daniel J. Weitzner and Harold Abelson and Tim Berners-Lee and Joan Feigenbaum and James Hendler and Gerald Jay Sussman Information accountability . . . . . . . 82--87 Charalambos L. Iacovou and Robbie Nakatsu A risk profile of offshore-outsourced development projects . . . . . . . . . . 89--94 Chon Abraham and Richard T. Watson and Marie-Claude Boudreau Ubiquitous access: on the front lines of patient care and safety . . . . . . . . 95--99 Wayne Wei Huang and Jonathon Greene and John Day Outsourcing and the decrease of IS program enrollment . . . . . . . . . . . 101--104 Jim Horning and Peter G. Neumann Inside risks: Risks of neglecting infrastructure . . . . . . . . . . . . . 112--112
Moshe Y. Vardi Editor's letter: 'Where do you come from? and where are you going?' . . . . 5--5 Scott E. Delman Publisher's corner: The art and business of revitalizing a 50-year-old science and technology magazine . . . . . . . . 7--7 David Roman CACM online: Your attention, please . . 8--8 Brian Hayes Cloud computing . . . . . . . . . . . . 9--11 Michael Ross and Mark Oskin Quantum computing . . . . . . . . . . . 12--13 Leah Hoffman In search of dependable design . . . . . 14--16 Alok Aggarwal Emerging Markets: India's role in the globalization of IT . . . . . . . . . . 17--19 Pamela Samuelson Legally Speaking: Revisiting patentable subject matter . . . . . . . . . . . . . 20--22 George V. Neville-Neil Kode Vicious: Beautiful code exists, if you know where to look . . . . . . . . . 23--25 Stephen J. Andriole and Eric Roberts Point/Counterpoint: Technology curriculum for the early 21st Century 27--32 Rick Rashid Image Crisis: Inspiring a new generation of computer scientists . . . . . . . . . 33--34 Len Shustek Interview: The 'art' of being Donald Knuth . . . . . . . . . . . . . . . . . 35--39 Erik Wilde and Robert J. Glushko XML fever . . . . . . . . . . . . . . . 40--46 Adam Leventhal Flash storage memory . . . . . . . . . . 47--51 Margo Seltzer Beyond relational databases . . . . . . 52--58 James Hendler and Nigel Shadbolt and Wendy Hall and Tim Berners-Lee and Daniel Weitzner Web science: an interdisciplinary approach to understanding the Web . . . 60--69 Mark Oskin The revolution inside the box . . . . . 70--78 James Larus and Christos Kozyrakis Transactional memory . . . . . . . . . . 80--88 Bob Colwell Technical Perspective: Computer science takes on molecular dynamics . . . . . . 90--90 David E. Shaw and Martin M. Deneroff and Ron O. Dror and Jeffrey S. Kuskin and Richard H. Larson and John K. Salmon and Cliff Young and Brannon Batson and Kevin J. Bowers and Jack C. Chao and Michael P. Eastwood and Joseph Gagliardo and J. P. Grossman and C. Richard Ho and Douglas J. Lerardi and István Kolossváry and John L. Klepeis and Timothy Layman and Christine McLeavey and Mark A. Moraes and Rolf Mueller and Edward C. Priest and Yibing Shan and Jochen Spengler and Michael Theobald and Brian Towles and Stanley C. Wang Anton, a special-purpose machine for molecular dynamics simulation . . . . . 91--97 Feng Zhao Technical Perspective: The physical side of computing . . . . . . . . . . . . . . 98--98 Philip Levis and Eric Brewer and David Culler and David Gay and Samuel Madden and Neil Patel and Joe Polastre and Scott Shenker and Robert Szewczyk and Alec Woo The emergence of a networking primitive in wireless sensor networks . . . . . . 99--106 Leah Hoffman Last byte: Q&A Talking model-checking technology . . . . . . . . . . . . . . . 112, 1??-1??
Stuart I. Feldman President's letter: A new beginning, a fond farewell . . . . . . . . . . . . . 5--5 CACM Staff Words both kind and contrary . . . . . . 7--7 David Roman Small changes hint at bigger things . . 8--8 Hal R. Varian Designing the perfect auction . . . . . 9--11 Peggy Aycinena Access for all . . . . . . . . . . . . . 12--14 Sarah Underwood Challenging poverty . . . . . . . . . . 15--17 Michael Ross Remembering Jim . . . . . . . . . . . . 18--18 Peter J. Denning The profession of IT: Voices of computing . . . . . . . . . . . . . . . 19--21 Alex E. Bell From the front lines: Software development amidst the whiz of silver bullets . . . . . . . . . . . . . . . . 22--24 Mark Guzdial Education: Paving the way for computational thinking . . . . . . . . . 25--27 Ed Lazowska Viewpoint: Envisioning the future of computing research . . . . . . . . . . . 28--30 Len Shustek Interview: Donald Knuth: A life's work interrupted . . . . . . . . . . . . . . 31--35 Jim Waldo Scaling in games and virtual worlds . . 38--44 Mache Creeger CTO storage roundtable . . . . . . . . . 45--51 Michi Henning The rise and fall of CORBA . . . . . . . 52--57 Luis von Ahn and Laura Dabbish Designing games with a purpose . . . . . 58--67 Diomidis Spinellis and Panagiotis Louridas The collaborative organization of knowledge . . . . . . . . . . . . . . . 68--73 Yoav Shoham Computer science and game theory . . . . 74--79 William Pugh Technical perspective: A methodology for evaluating computer system performance 82--82 Stephen M. Blackburn and Kathryn S. McKinley and Robin Garner and Chris Hoffmann and Asjad M. Khan and Rotem Bentzur and Amer Diwan and Daniel Feinberg and Daniel Frampton and Samuel Z. Guyer and Martin Hirzel and Antony Hosking and Maria Jump and Han Lee and J. Eliot B. Moss and Aashish Phansalkar and Darko Stefanovik and Thomas VanDrunen and Daniel von Dincklage and Ben Wiedermann Wake up and smell the coffee: evaluation methodology for the 21st Century . . . . 83--89 Nir Shavit Technical perspective: Transactions are tomorrow's loads and stores . . . . . . 90--90 Tim Harris and Simon Marlow and Simon Peyton Jones and Maurice Herlihy Composable memory transactions . . . . . 91--100 Peter Winkler Last byte: Puzzled Delightful graph theory . . . . . . . . . . . . . . . . . 104--104
Wendy Hall President's letter: ACM's place in the global picture . . . . . . . . . . . . . 5--5 Scott E. Delman Publisher's corner: 50 Years young . . . 7--7 CACM Staff Letters to the editor: Knuth's art of recovering from errors . . . . . . . . . 9--9 David Roman CACM online: Current features . . . . . 10--10 Kirk L. Kroeker News: Finding diamonds in the rough . . 11--13 Logan Kugler News: Ubiquitous video . . . . . . . . . 14--16 Samuel Greengard News: Privacy matters . . . . . . . . . 17--18 Leah Hoffmann News: Wisdom from Randy Pausch . . . . . 19--19 Michael Cusumano Technology strategy and management: The puzzle of Apple . . . . . . . . . . . . 22--24 George Neville-Neil Kode vicious: Pride and prejudice (the \em Vasa) . . . . . . . . . . . . . . . 25--26 Cameron Wilson and Peter Harsha IT policy: Science policy isn't always about science . . . . . . . . . . . . . 27--29 Richard G. Baraniuk and C. Sidney Burrus Viewpoint: Global warming toward open educational resources . . . . . . . . . 30--32 Ian Foster and Savas Parastatidis and Paul Watson and Mark Mckeown Practice: How do I model state?: Let me count the ways . . . . . . . . . . . . . 34--41 Matthew Garrett Practice: Powering down . . . . . . . . 42--46 Mache Creeger Practice: CTO storage roundtable, part two . . . . . . . . . . . . . . . . . . 47--52 Mike Hinchey and Michael Jackson and Patrick Cousot and Byron Cook and Jonathan P. Bowen and Tiziana Margaria Practice: Software engineering and formal methods . . . . . . . . . . . . . 54--59 Dmitri Roussinov and Weiguo Fan and José Robles-Flores Beyond keywords: Automated question answering on the Web . . . . . . . . . . 60--65 Bertrand Meyer Design and code reviews in the age of the Internet . . . . . . . . . . . . . . 66--71 Philip A. Bernstein and Laura M. Haas Information integration in the enterprise . . . . . . . . . . . . . . . 72--79 Mark Moir Technical perspective: Transactional memory in the operating system . . . . . 82--82 Christopher J. Rossbach and Hany E. Ramadan and Owen S. Hofmann and Donald E. Porter and Aditya Bhandari and Emmett Witchel TxLinux and MetaTM: transactional memory and the operating system . . . . . . . . 83--91 Hagit Attiya Technical perspective: Distributing your data and having it, too . . . . . . . . 92--92 Fabian Kuhn and Thomas Locher and Roger Wattenhofer Distributed selection: a missing piece of data aggregation . . . . . . . . . . 93--99 Peter Winkler Last byte: Puzzled: Solutions and sources . . . . . . . . . . . . . . . . 103--103 William Sims Bainbridge Last byte: Future tense: Will . . . . . 104--104 Robin S. Poston Using and fixing biased rating schemes 105--109 Kannan Mohan and Radhika Jain Using traceability to mitigate cognitive biases in software development . . . . . 110--114 Alexander P. Pons and Peter Polak Understanding user perspectives on biometric technology . . . . . . . . . . 115--118 Lina Zhou and Dongsong Zhang Following linguistic footprints: automatic deception detection in online communication . . . . . . . . . . . . . 119--122 Julia Kotlarsky and Ilan Oshri and Kuldeep Kumar and Jos van Hillegersberg Towards agility in design in global component-based development . . . . . . 123--127 Neset Hikmet and Eileen Z. Taylor and Christopher J. Davis The student productivity paradox: technology mediated learning in schools 128--131 Patrick Y. K. Chau and Fujun Lai and Dahui Li What factors drive the assimilation of Internet technologies in China? . . . . 132--135
Moshe Y. Vardi Editor's letter: Let us---together---make CACM exciting . . . 5--5 Scott E. Delman Publisher's corner: The softer side of \em Communications . . . . . . . . . . . 7--7 CACM Staff Letters to the editor: Prep students for irreversible software trends . . . . . . 8--9 David Roman CACM online: \em Communications site to launch in January . . . . . . . . . . . 10--10 Patrick Kurp News: Green computing . . . . . . . . . 11--13 Alex Wright News: Searching the Deep Web . . . . . . 14--15 Cyrus Farivar News: Clean elections . . . . . . . . . 16--18 Leah Hoffmann News: An inspiring legacy . . . . . . . 19--19 Martin Campbell-Kelly Viewpoints: Historical reflections: Will the future of software be open source? 21--23 Deborah G. Johnson Viewpoints: Computing ethics: Computer experts: guns-for-hire or professionals? 24--26 Alex E. Bell Viewpoints: From the front lines DOA with SOA . . . . . . . . . . . . . . . . 27--28 David L. Dill and Daniel Castro Viewpoints: Point/counterpoint: The U.S. should ban paperless electronic voting machines . . . . . . . . . . . . . . . . 29--33 George V. Neville-Neil Practice: Code spelunking redux . . . . 36--41 Erik Wilde and Robert J. Glushko Practice: Document design matters . . . 43--49 Kayvon Fatahalian and Mike Houston Practice: A closer look at GPUs . . . . 50--57 Jennifer Xu and Hsinchun Chen The topology of dark networks . . . . . 58--65 Jacob Slonim and Sam Scully and Michael McAllister Crossroads for Canadian CS enrollment 66--70 Lila Kari and Grzegorz Rozenberg The many facets of natural computing . . 72--83 Marc Levoy Technical perspective: Computational photography on large collections of images . . . . . . . . . . . . . . . . . 86--86 James Hays and Alexei A. Efros Scene completion using millions of photographs . . . . . . . . . . . . . . 87--94 Éva Tardos Technical perspective: New developments in graph partitioning . . . . . . . . . 95--95 Sanjeev Arora and Satish Rao and Umesh Vazirani Geometry, flows, and graph-partitioning algorithms . . . . . . . . . . . . . . . 96--105 Leah Hoffmann Last byte: Q&A: A complex thinker . . . . 112--ff Mary C. Jones Large scale project team building: beyond the basics . . . . . . . . . . . 113--116 Gediminas Adomavicius and Jesse Bockstedt and Alok Gupta and Robert J. Kauffman Understanding evolution in technology ecosystems . . . . . . . . . . . . . . . 117--122 Seokwoo Song and Sridhar Nerur and James T. C. Teng Understanding the influence of network positions and knowledge processing styles . . . . . . . . . . . . . . . . . 123--126 Brian L. Dos Santos and Lars S. Smith RFID in the supply chain: panacea or Pandora's box? . . . . . . . . . . . . . 127--131 Chen Ye and Kevin C. Desouza and Sridhar R. Papagari Sangareddy and Sanjeev Jha Switching between consumer technologies 132--136 Mary Darking and Edgar A. Whitley and Paolo Dini Governing diversity in the digital ecosystem . . . . . . . . . . . . . . . 137--140 Amrit Tiwana and Ashley A. Bush and Hiroshi Tsuji and Kenichi Yoshida and Akito Sakurai Myths and paradoxes in Japanese IT offshoring . . . . . . . . . . . . . . . 141--145 Thilini Ariyachandra and Hugh J. Watson Technical opinion: Which data warehouse architecture is best? . . . . . . . . . 146--147
John R. White CEO's letter: On the 10th anniversary of ACM's Digital Library . . . . . . . . . 5--5 Diane Crawford Executive editor's corner: Jim Gray: humble visionary . . . . . . . . . . . . 7--7 CACM Staff Letters to the editor: Even science would benefit from auctions . . . . . . 8--9 David Roman CACM online: A first look at the redesigned site . . . . . . . . . . . . 10--10 Leah Hoffmann News: Damage control . . . . . . . . . . 11--13 Bill Howard News: Analyzing online social networks 14--16 David Lindley News: The limits of computability . . . 17--19 Avi Goldfarb and Catherine Tucker Viewpoints: Economic and business dimensions: Search engine advertising 22--24 Susan Landau Viewpoints: Privacy and security: A multidimensional problem . . . . . . . . 25--26 Pamela Samuelson Viewpoints: Legally speaking: \em Quantafying the value of patent exhaustion . . . . . . . . . . . . . . . 27--29 Joanna Goode Viewpoints: Education: Reprogramming: college preparatory computer science . . 31--33 Bryan Cantrill and Jeff Bonwick Practice: Real-world concurrency . . . . 34--39 Calin Cascaval and Colin Blundell and Maged Michael and Harold W. Cain and Peng Wu and Stefanie Chiras and Siddhartha Chatterjee Practice: Software transactional memory: why is it only a research toy? . . . . . 40--46 Mache Creeger Practice: CTO roundtable on virtualization . . . . . . . . . . . . . 47--53 Michael Stonebraker and David J. DeWitt A tribute to Jim Gray . . . . . . . . . 54--57 Alexander S. Szalay Jim Gray, astronomer . . . . . . . . . . 58--65 Jon Kleinberg The convergence of social and technological networks . . . . . . . . . 66--72 Jim Gray Technical perspective: The Polaris Tableau system . . . . . . . . . . . . . 74--74 Chris Stolte and Diane Tang and Pat Hanrahan Polaris: a system for query, analysis, and visualization of multidimensional databases . . . . . . . . . . . . . . . 75--84 Barbara Liskov Technical perspective: Safeguarding online information against failures and attacks . . . . . . . . . . . . . . . . 85--85 Ramakrishna Kotla and Allen Clement and Edmund Wong and Lorenzo Alvisi and Mike Dahlin Zyzzyva: speculative Byzantine fault tolerance . . . . . . . . . . . . . . . 86--95 Peter Winkler Last byte: Puzzled: Circular food . . . 112--112 DaeSoo Kim and Terence T. Ow and Minjoon Junc SME strategies: an assessment of high vs. low performers . . . . . . . . . . . 113--117 Claudio Feijóo and José Luis Gómez-Barroso and David Rojo-Alonso A European perspective of VoIP in market competition . . . . . . . . . . . . . . 118--120 Judy E. Scott Technology acceptance and ERP documentation usability . . . . . . . . 121--124 Faiz Currim and Sudha Ram Conceptually modeling windows and bounds for space and time in database constraints . . . . . . . . . . . . . . 125--129 Quan Z. Sheng and Boualem Benatallah and Zakaria Maamar User-centric services provisioning in wireless environments . . . . . . . . . 130--135 DongBack Seo and Ariel I. La Paz Exploring the dark side of IS in achieving organizational agility . . . . 136--139 Srinivasan Venkatraman and Hillol Bala and Viswanath Venkatesh and Jack Bates Six strategies for electronic medical records systems . . . . . . . . . . . . 140--144 Ping Zhang Technical opinion: Motivational affordances: reasons for ICT design and use . . . . . . . . . . . . . . . . . . 145--147
Ronald F. Boisvert and Holly Rushmeier ACM publications: access and sustainability . . . . . . . . . . . . . 5--5 Scott E. Delman Looking back and forward . . . . . . . . 7--7 CACM Staff Apple builds great platforms, too, not just products . . . . . . . . . . . . . 8--8 David Roman Previewing the new CACM web site . . . . 10--10 Kirk L. Kroeker Living machines . . . . . . . . . . . . 11--13 Ted Selker Touching the future . . . . . . . . . . 14--16 Samuel Greengard Upwardly mobile . . . . . . . . . . . . 17--19 Leah Hoffmann Making a difference . . . . . . . . . . 20--20 Alok Aggarwal Emerging markets: Labor supply in the Indian IT industry . . . . . . . . . . . 21--23 Cameron Wilson and Peter Harsha IT policy: Advising policymakers is more than just providing advice . . . . . . . 24--26 George V. Neville-Neil Kode vicious: Permanence and change . . 27--28 Peter J. Denning and Chris Gunderson and Rick Hayes-Roth The profession of IT: Evolutionary system development . . . . . . . . . . . 29--31 James Hamilton Interview: Database dialogue with Pat Selinger . . . . . . . . . . . . . . . . 32--35 Steve Souders High-performance web sites . . . . . . . 36--41 Mache Creeger CTO virtualization roundtable, part II 43--49 Francine Berman Got data?: a guide to data preservation in the information age . . . . . . . . . 50--56 Ian Horrocks Ontologies and the Semantic Web . . . . 58--67 Oren Etzioni and Michele Banko and Stephen Soderland and Daniel S. Weld Open information extraction from the web 68--74 Michael Stonebraker Technical perspective: One size fits all: an idea whose time has come and gone . . . . . . . . . . . . . . . . . . 76--76 Peter A. Boncz and Martin L. Kersten and Stefan Manegold Breaking the memory wall in MonetDB . . 77--85 Martin C. Rinard Technical perspective: Patching program errors . . . . . . . . . . . . . . . . . 86--86 Gene Novark and Emery D. Berger and Benjamin G. Zorn Exterminator: Automatically correcting memory errors with high probability . . 87--95 Peter Winkler Last Byte: Puzzled: Solutions and sources . . . . . . . . . . . . . . . . 118--118 Cory Doctorow Future tense: Pester power . . . . . . . 120--ff Peter Duchessi and Indushobha Chengalur-Smith Enhancing business performance via vendor managed inventory applications 121--127 Chee Wei Phang and Atreyi Kankanhalli A framework of ICT exploitation for e-participation initiatives . . . . . . 128--132 Michael J. Davern and Carla L. Wilkin Evolving innovations through design and use . . . . . . . . . . . . . . . . . . 133--137 Michael Näf and David Basin Two approaches to an information security laboratory . . . . . . . . . . 138--142 Patrick Stacey and Joe Nandhakumar Opening up to agile games development 143--146 Ross A. Malaga Worst practices in search engine optimization . . . . . . . . . . . . . . 147--150 Pierre Berthon and Leyland F. Pitt and Richard T. Watson From Genesis to Revelations: the technology diaspora . . . . . . . . . . 151--154 Vivien K. G. Lim and Thompson S. H. Teo and Jen Yuin Chin Technical opinion: Bosses and their e-manners . . . . . . . . . . . . . . . 155--157
Moshe Y. Vardi Editor's letter: How are we doing? . . . 5--5 CACM Staff Letters to the editor: True seeds of open source software . . . . . . . . . . 6--6 David Roman CACM online: \em Communications preps Web-enhanced articles . . . . . . . . . 8--8 David Lindley News: Calculating the future . . . . . . 9--11 Jeff Kanipe News: The universe in your computer . . 12--14 Alex Wright News: Get smart . . . . . . . . . . . . 15--16 Michael Ross News: A pioneer woman . . . . . . . . . 17--17 Jonathan Zittrain Viewpoints: Law and technology: The end of the generative Internet . . . . . . . 18--20 Alex E. Bell Viewpoints: From the front lines: Ground control to Architect Tom\ldots . . . . . 21--22 Phillip G. Armour Viewpoints: The business of software: The ontology of paper . . . . . . . . . 23--24 Michael Cusumano Viewpoints: Technology strategy and management: The legacy of Bill Gates . . 25--26 Jon Crowcroft and S. Keshav and Nick McKeown Viewpoint: Scaling the academic publication process to Internet scale 27--30 Stuart I. Feldman ACM's annual report . . . . . . . . . . 33--37 Werner Vogels Eventually consistent . . . . . . . . . 40--44 John Mashey The long road to 64 bits . . . . . . . . 45--53 Tapan S. Parikh Engineering rural development . . . . . 54--63 Dawn N. Jutla and Dimitri Kanevsky wisePad services for vision-, hearing-, and speech-impaired users . . 64--69 Joan Feigenbaum and David C. Parkes and David M. Pennock Computational challenges in e-commerce 70--74 Harry Shum Technical perspective: Customizing media to displays . . . . . . . . . . . . . . 76--76 Ariel Shamir and Shai Avidan Seam carving for media retargeting . . . 77--85 Jock D. Mackinlay Technical perspective: Finding and telling stories with data . . . . . . . 86--86 Jeffrey Heer and Fernanda B. Viégas and Martin Wattenberg Voyagers and voyeurs: Supporting asynchronous collaborative visualization 87--97 Leah Hoffmann Last byte: Q&A: The upper limit . . . . . 112ff Erik T. Mueller Automating commonsense reasoning using the event calculus . . . . . . . . . . . 113--117 Nanda Kumar and Roumen Vragov Active citizen participation using ICT tools . . . . . . . . . . . . . . . . . 118--121 Yogesh Dwivedi and Zahir Irani Understanding the adopters and non-adopters of broadband . . . . . . . 122--125 Allen C. Johnston and Ron Hale Improved security through information security governance . . . . . . . . . . 126--129 Judith Gebauer and Mark Ginsburg Exploring the black box of task-technology fit . . . . . . . . . . 130--135 Hillol Bala and Viswanath Venkatesh and Srinivasan Venkatraman and Jack Bates and Steven H. Brown Disaster response in health care: A design extension for enterprise data warehouse . . . . . . . . . . . . . . . 136--140 Parag C. Pendharkar and James A. Rodger The relationship between software development team size and software development cost . . . . . . . . . . . . 141--144 Carol Xiaojuan Ou and Robert M. Davison Technical opinion: Why eBay lost to TaoBao in China: the global advantage 145--148
Eugene H. Spafford USACM's policy role . . . . . . . . . . 5--5 CACM Staff Seven principles for secure e-voting . . 8--9 David Roman The dot-org difference . . . . . . . . . 10--10 Kirk L. Kroeker Photography's bright future . . . . . . 11--13 Alex Wright Making sense of sensors . . . . . . . . 14--15 Samuel Greengard The first Internet President . . . . . . 16--18 Kirk L. Kroeker SIGGRAPH debuts in Asia . . . . . . . . 19--19 Ashish Arora and Matej Drev and Chris Forman Economic and business dimensions: The extent of globalization of software innovation . . . . . . . . . . . . . . . 20--22 George H. L. Fletcher and James J. Lu Education Human: computing skills: rethinking the K-12 experience . . . . . 23--25 Kristina Irion Privacy and security: International communications surveillance . . . . . . 26--28 Peter G. Neumann Inside risks: U.S. election after-math 29--29 Barbara van Schewick and David Farber Point/Counterpoint: Network neutrality nuances . . . . . . . . . . . . . . . . 31--37 Ulrich Drepper Parallel programming with transactional memory . . . . . . . . . . . . . . . . . 38--43 Tom Leighton Improving performance on the Internet 44--51 T. V. Raman Toward $2^W$, beyond Web 2.0 . . . . . . 52--59 Mary Hall and David Padua and Keshav Pingali Compiler research: the next 50 years . . 60--67 Maria Klawe and Telle Whitney and Caroline Simard Women in computing---take 2 . . . . . . 68--76 Dan Wallach Technical perspective: Tools for information to flow securely and Swift-ly . . . . . . . . . . . . . . . . 78--78 Stephen Chong and Jed Liu and Andrew C. Myers and Xin Qi and K. Vikram and Lantian Zheng and Xin Zheng Building secure Web applications with automatic partitioning . . . . . . . . . 79--87 Ehud Kalai Technical perspective: The complexity of computing Nash equilibrium . . . . . . . 88--88 Constantinos Daskalakis and Paul W. Goldberg and Christos H. Papadimitriou The complexity of computing a Nash equilibrium . . . . . . . . . . . . . . 89--97 Peter Winkler Last Byte: Puzzled: Will my algorithm terminate? . . . . . . . . . . . . . . . 104--104 Pamela E. Carter and Gina Green Networks of contextualized data: a framework for cyberinfrastructure data management . . . . . . . . . . . . . . . 105--109 Xiao-Bai Li and Luvai Motiwalla For sale by owner online: who gets the saved commission? . . . . . . . . . . . 110--114 Ergin Elmacioglu and Dongwon Lee Oracle, where shall I submit my papers? 115--118 Shlomo Argamon and Moshe Koppel and James W. Pennebaker and Jonathan Schler Automatically profiling the author of an anonymous text . . . . . . . . . . . . . 119--123 Sandy Behrens Shadow systems: the good, the bad and the ugly . . . . . . . . . . . . . . . . 124--129 Arik Ragowsky and David Gefen Why IS management is in trouble and how to save it: lessons learned in the automotive industry . . . . . . . . . . 130--133 M. Eric Johnson and Dan McGuire and Nicholas D. Willey Why file sharing networks are dangerous? 134--138 Raquel Benbunan-Fich and Gregory E. Truman Technical opinion: Multitasking with laptops during meetings . . . . . . . . 139--141
Moshe Y. Vardi Editor's letter: 'Yes, it can be done' 5--5 Scott E. Delman Publisher's corner: Communications' Web site to launch in March . . . . . . 7--7 CACM Staff Children's magic won't deliver the Semantic Web . . . . . . . . . . . . . . 8--9 David Roman Prepare for launch . . . . . . . . . . . 12--12 Gregory Goth Betting on ideas . . . . . . . . . . . . 13--15 Leah Hoffmann Crowd control . . . . . . . . . . . . . 16--17 Kirk L. Kroeker The evolution of virtualization . . . . 18--20 Karen A. Frenkel A difficult, unforgettable idea . . . . 21--21 CACM Staff ACM Fellows honored . . . . . . . . . . 22--22 Peter J. Denning and Richard D. Riehle The profession of IT: Is software engineering engineering? . . . . . . . . 24--26 Pamela Samuelson Legally speaking: When is a 'license' really a sale? . . . . . . . . . . . . . 27--29 David A. Patterson Viewpoint: Your students are your legacy 30--33 Jeffrey D. Ullman Viewpoint: Advising students for success 34--37 Len Shustek Interview: An interview with C. A. R. Hoare . . . . . . . . . . . . . . . . . 38--41 Walker White and Christoph Koch and Johannes Gehrke and Alan Demers Better scripts, better games . . . . . . 42--47 Jim Larson Erlang for concurrent programming . . . 48--56 Abigail Sellen and Yvonne Rogers and Richard Harper and Tom Rodden Reflecting human values in the digital age . . . . . . . . . . . . . . . . . . 58--66 David Harel Statecharts in the making: a personal account . . . . . . . . . . . . . . . . 67--75 Madhu Sudan Probabilistically checkable proofs . . . 76--84 Daniel A. Spielman Technical perspective: The beauty of error-correcting codes . . . . . . . . . 86--86 Venkatesan Guruswami and Atri Rudra Error correction up to the information-theoretic limit . . . . . . 87--95 Bud Mishra Technical perspective: Where biology meets computing . . . . . . . . . . . . 96--96 Radu Grosu and Scott A. Smolka and Flavio Corradini and Anita Wasilewska and Emilia Entcheva and Ezio Bartocci Learning and detecting emergent behavior in networks of cardiac myocytes . . . . 97--105 Peter Winkler Last byte: Puzzled: Solutions and sources . . . . . . . . . . . . . . . . 111--111 Joel Garreau Last byte: Future Tense: Radical evolution . . . . . . . . . . . . . . . 112--ff Alexandre Sacchi and Emerson Giannini and Regiane Bochic and Nicolau Reinhard and Alexandre B. Lopes Digital inclusion with the McInternet: would you like fries with that? . . . . 113--116 Clyde W. Holsapple A new map for knowledge dissemination channels . . . . . . . . . . . . . . . . 117--125 Mary J. Culnan and Thomas J. Carlin Online privacy practices in higher education: making the grade? . . . . . . 126--130 Kenneth R. Fleischmann and William A. Wallace Ensuring transparency in computational modeling . . . . . . . . . . . . . . . . 131--134 Florian Mann and Benedikt von Walter and Thomas Hess and Rolf T. Wigand Open access publishing in science . . . 135--139 Greg Linden and Kenneth L. Kraemer and Jason Dedrick Who captures value in a global innovation network?: the case of Apple's iPod . . . . . . . . . . . . . . . . . . 140--144 Anna Formica Concept similarity by evaluating information contents and feature vectors: a combined approach . . . . . . 145--149 Alfred Loo Technical opinion: Security threats of smart phones and Bluetooth . . . . . . . 150--152
Andrew McGettrick Education letter: Computing education matters . . . . . . . . . . . . . . . . 5--5 CACM Staff Letters to the editor: What role for computer science in the war on terror? 9--9 David Roman CACM online: An ongoing study in usability . . . . . . . . . . . . . . . 10--10 Graeme Stemp-Morlock News: Learning more about active learning . . . . . . . . . . . . . . . . 11--13 Alex Wright News: Our sentiments, exactly . . . . . 14--15 David Essex News: Did somebody say virtual colonoscopy? . . . . . . . . . . . . . . 16--18 Bob Violino News: Time to reboot . . . . . . . . . . 19--19 Alan Joch News: IT ecosystem in peril . . . . . . 20--20 Anonymous Emerging markets IT and the world's 'bottom billion' . . . . . . . . . . . . 22--24 System changes and side effects Kode Vicious: System changes and side effects . . . . . . . . . . . . . . . . 25--26 Michael Cusumano Technology strategy and management: Strategies for difficult (and Darwinian) economic times . . . . . . . . . . . . . 27--28 Michael Buckley Viewpoint: Computing as social science 29--30 Bertrand Meyer and Christine Choppy and Jòrgen Staunstrup and Jan van Leeuwen Viewpoint: Research evaluation for computer science . . . . . . . . . . . . 31--34 Mike Shapiro Purpose-built languages . . . . . . . . 36--41 Niels Provos and Moheeb Abu Rajab and Panayiotis Mavrommatis Cybercrime 2.0: when the cloud turns dark . . . . . . . . . . . . . . . . . . 42--47 Chris Richardson ORM in dynamic languages . . . . . . . . 48--55 Gerhard Weikum and Gjergji Kasneci and Maya Ramanath and Fabian Suchanek Database and information-retrieval methods for knowledge discovery . . . . 56--64 Samuel Williams and Andrew Waterman and David Patterson Roofline: an insightful visual performance model for multicore architectures . . . . . . . . . . . . . 65--76 Daniel Jackson A direct path to dependable software . . 78--88 Arif Merchan Technical perspective: Disk array models for automating storage management . . . 90--90 Michael P. Mesnier and Matthew Wachs and Raja R. Sambasivan and Alice X. Zheng and Gregory R. Ganger Relative fitness modeling . . . . . . . 91--96 Goetz Graefe Technical perspective: Integrating flash devices . . . . . . . . . . . . . . . . 97--97 David Roberts and Taeho Kgil and Trevor Mudge Integrating NAND flash devices onto servers . . . . . . . . . . . . . . . . 98--103 Leah Hofmann Last byte: Q&A: Our dame commander . . . 112--ff Jay F. Nunamaker, Jr. and Bruce A. Reinig and Robert O. Briggs Principles for effective virtual teamwork . . . . . . . . . . . . . . . . 113--117 Maris G. Martinsons and Robert M. Davison and Valdis Martinsons How culture influences IT-enabled organizational change and information systems . . . . . . . . . . . . . . . . 118--123 Gee-Woo Bock and Swee Ling Ho Non-work related computing (NWRC) . . . 124--128 Kevin P. Scheibe and James C. McElroy and Paula C. Morrow Object language and impression management . . . . . . . . . . . . . . . 129--131 France Bélanger and Lemuria Carter The impact of the digital divide on e-government use . . . . . . . . . . . . 132--135 Zeinab Karake Shalhoub Analysis of industry-specific concentration of CPOs in Fortune 500 companies . . . . . . . . . . . . . . . 136--141 Eusebio Scornavacca and Sid Huff and Stephen Marshall Mobile phones in the classroom: if you can't beat them, join them . . . . . . . 142--146 Paulo Goes and Yanbin Tu and Y. Alex Tung Technical opinion: Online auctions hidden metrics . . . . . . . . . . . . . 147--149
Moshe Y. Vardi Editor's letter: Conferences vs. journals in computing research . . . . . 5--5 CACM Staff Letters to the Editor: Logic of lemmings in compiler innovation . . . . . . . . . 7--9 CACM Staff blog@CACM: Recommendation algorithms, online privacy, and more . . . . . . . . 10--11 David Roman CACM online: The print-Web partnership turns the page . . . . . . . . . . . . . 12--12 Kirk L. Kroeker News: Rethinking signal processing . . . 13--15 David Essex News: Matchmaker, matchmaker . . . . . . 16--17 Samuel Greengard News: Learning goes global . . . . . . . 18--19 CACM Staff News: Liskov wins Turing Award . . . . . 21--21 Pierre Larouche Law and technology: The network neutrality debate hits Europe . . . . . 22--24 LeAnne Coder and Joshua L. Rosenbloom and Ronald A. Ash and Brandon R. Dupont Economic and business dimensions: Increasing gender diversity in the IT work force . . . . . . . . . . . . . . . 25--27 Martin Campbell-Kelly Historical reflections: The rise, fall, and resurrection of software as a service . . . . . . . . . . . . . . . . 28--30 Mark Guzdial Education: Teaching computing to everyone . . . . . . . . . . . . . . . . 31--33 Ken Birman and Fred B. Schneider Viewpoint: Program committee overload in systems . . . . . . . . . . . . . . . . 34--37 Thomas Wadlow and Vlad Gorelik Security in the browser . . . . . . . . 40--45 Michi Henning API design matters . . . . . . . . . . . 46--56 Eric Schrock Debugging AJAX in production . . . . . . 57--60 James Larus Spending Moore's dividend . . . . . . . 62--69 Edward A. Lee Computing needs time . . . . . . . . . . 70--79 Corrado Priami Algorithmic systems biology . . . . . . 80--88 Ross Anderson Technical perspective: A chilly sense of security . . . . . . . . . . . . . . . . 90--90 J. Alex Halderman and Seth D. Schoen and Nadia Heninger and William Clarkson and William Paul and Joseph A. Calandrino and Ariel J. Feldman and Jacob Appelbaum and Edward W. Felten Lest we remember: cold-boot attacks on encryption keys . . . . . . . . . . . . 91--98 Maurice Herlihy Technical perspective: Highly concurrent data structures . . . . . . . . . . . . 99--99 William N. Scherer, III and Doug Lea and Michael L. Scott Scalable synchronous queues . . . . . . 100--111 Peter Winkler Last byte: Puzzled: Understanding relationships among numbers . . . . . . 112--112 J. Drew Procaccino and June M. Verner Software developers' views of end-users and project success . . . . . . . . . . 113--116 Karlene C. Cousins and Upkar Varshney Designing ubiquitous computing environments to support work life balance . . . . . . . . . . . . . . . . 117--123 Stuart D. Galup and Ronald Dattero and Jim J. Quan and Sue Conger An overview of IT service management . . 124--127 Robert K. Plice and Nigel P. Melville and Oleg V. Pavlov Toward an information-compatible anti-spam strategy . . . . . . . . . . . 128--130 James A. McCart and Varol O. Kayhan and Anol Bhattacherjee Cross-bidding in simultaneous online auctions . . . . . . . . . . . . . . . . 131--134 Carol Xiaojuan Ou and Choon Ling Sia To trust or to distrust, that is the question: investigating the trust-distrust paradox . . . . . . . . . 135--139 Gary W. Brock and Denise J. McManus and Joanne E. Hale Reflections today prevent failures tomorrow . . . . . . . . . . . . . . . . 140--144 Michael Rebstock Technical opinion: Semantic ambiguity: Babylon, Rosetta or beyond? . . . . . . 145--146
Elaine Weyuker ACM-W letter: ACM-W celebrates women in computing . . . . . . . . . . . . . . . 5--5 CACM Staff Letters to the Editor: Share the threats 9--9 Tessa Lau and Daniel Reed blog@CACM: Speech-activated user interfaces and climbing Mt. Exascale . . 10--11 David Roman CACM online: Making that connection . . 12--12 Don Monroe News: Micromedicine to the rescue . . . 13--15 Leah Hoffmann News: Content control . . . . . . . . . 16--17 Gregory Goth News: Autonomous helicopters . . . . . . 18--20 Bob Violino News: Looking backward and forward . . . 21--21 Eugene H. Spafford Privacy and security: Answering the wrong questions is no answer . . . . . . 22--24 Kevin Fu Inside risks: Reducing risks of implantable medical devices . . . . . . 25--27 Peter J. Denning The profession of IT: Beyond computational thinking . . . . . . . . . 28--30 Richard Stallman Viewpoint: Why `open source' misses the point of free software . . . . . . . . . 31--33 George V. Neville-Neil Kode vicious: Obvious truths . . . . . . 34--35 Jon Elerath Hard-disk drives: the good, the bad, and the ugly . . . . . . . . . . . . . . . . 38--45 Mike O'Dell Network front-end processors, yet again 46--50 George V. Neville-Neil Whither sockets? . . . . . . . . . . . . 51--55 Rakesh Agrawal and Anastasia Ailamaki and Philip A. Bernstein and Eric A. Brewer and Michael J. Carey and Surajit Chaudhuri and Anhai Doan and Daniela Florescu and Michael J. Franklin and Hector Garcia-Molina and Johannes Gehrke and Le Gruenwald and Laura M. Haas and Alon Y. Halevy and Joseph M. Hellerstein and Yannis E. Ioannidis and Hank F. Korth and Donald Kossmann and Samuel Madden and Roger Magoulas and Beng Chin Ooi and Tim O'Reilly and Raghu Ramakrishnan and Sunita Sarawagi and Michael Stonebraker and Alexander S. Szalay and Gerhard Weikum The Claremont Report on Database Research . . . . . . . . . . . . . . . . 56--65 Kenneth L. Kraemer and Jason Dedrick and Prakul Sharma One laptop per child: vision vs. reality 66--73 M. Bernardine Dias and Eric Brewer How computer science serves the developing world . . . . . . . . . . . . 74--80 Andrew Myers Technical perspective: Reframing security for the Web . . . . . . . . . . 82--82 Adam Barth and Collin Jackson and John C. Mitchell Securing frame communication in browsers 83--91 Norman P. Jouppi Technical perspective: Software and hardware support for deterministic replay of parallel programs . . . . . . 92--92 Derek R. Hower and Pablo Montesinos and Luis Ceze and Mark D. Hill and Josep Torrellas Two hardware-based approaches for deterministic multiprocessor replay . . 93--100 Peter Winkler Puzzled: Solutions and sources . . . . . 103--103 Robert J. Sawyer Future tense: Webmind says hello . . . . 104--104 Jonghun Park and Kwanho Kim Hyperlinking the work for self-management of flexible workflows 113--117 Steven M. Thompson and Matthew D. Dean Advancing information technology in health care . . . . . . . . . . . . . . 118--121 Amar Gupta Deriving mutual benefits from offshore outsourcing . . . . . . . . . . . . . . 122--126 Mark Lycett and Chris Partridge The challenge of epistemic divergence in IS development . . . . . . . . . . . . . 127--131 Nena Lim and Anne Khoo Forensics of computers and handheld devices: identical or fraternal twins? 132--135 Sudip Bhattacharjee and Ram D. Gopal and James R. Marsden and Ramesh Sankaranarayanan Re-tuning the music industry: can they re-attain business resonance? . . . . . 136--140 Dursun Delen and Suliman Al-Hawamdeh A holistic framework for knowledge discovery and management . . . . . . . . 141--145 T. P. Liang and Andrew J. Czaplewski and Gary Klein and James J. Jiang Technical opinion: Leveraging first-mover advantages in Internet-based consumer services . . . . . . . . . . . 146--148
Moshe Y. Vardi Editor's letter: Open, closed, or clopen access? . . . . . . . . . . . . . . . . 5--5 Scott E. Delman Publisher's corner: \em Communications' annual report card . . . . . . . . . . . 6--7 CACM Staff Letters to the editor: Inspire with introductory computer science . . . . . 8--9 Mark Guzdial and Greg Linden and Tessa Lau blog@CACM: Sharing ideas, writing apps, and creating a professional Web presence 10--11 David Roman CACM online: Moving forward and backward 12--12 Alex Wright News: Contemporary approaches to fault tolerance . . . . . . . . . . . . . . . 13--15 Kirk L. Kroeker News: Toward native Web execution . . . 16--17 Samuel Greengard News: Are we losing our ability to think critically? . . . . . . . . . . . . . . 18--19 Karen A. Frenkel News: Liskov's creative joy . . . . . . 20--22 Alan Joch News: Master of connections . . . . . . 23--23 CACM Staff News: ACM award winners . . . . . . . . 25--25 Pamela Samuelson Legally speaking: The dead souls of the Google book search settlement . . . . . 28--30 Mari Sako Technology strategy and management: Globalization of knowledge-intensive professional services . . . . . . . . . 31--33 Phillip G. Armour The business of software: The cliché defense . . . . . . . . . . . . . . . . 34--36 Matthias Felleisen and Shriram Krishnamurthi Viewpoint: Why computer science doesn't matter . . . . . . . . . . . . . . . . . 37--40 Robert Dewar and Owen Astrachan Point/counterpoint: CS education in the U.S.: heading in the wrong direction? 41--45 Goetz Graefe The five-minute rule 20 years later (and how flash memory changes the rules) . . 48--59 Jonathan M. Smith Fighting physics: a tough battle . . . . 60--65 Erol Gelenbe Steps toward self-aware networks . . . . 66--75 Rick Kazman and Hong-Mei Chen The Metropolis Model: a new logic for development of crowdsourced systems . . 76--84 Nilesh Dalvi and Christopher Ré and Dan Suciu Probabilistic databases: diamonds in the dirt . . . . . . . . . . . . . . . . . . 86--94 Stuart Russell and Lawrence Saul Technical perspective: The ultimate pilot program . . . . . . . . . . . . . 96--96 Adam Coates and Pieter Abbeel and Andrew Y. Ng Apprenticeship learning for helicopter control . . . . . . . . . . . . . . . . 97--105 Greg Morrisett Technical perspective: A compiler's story . . . . . . . . . . . . . . . . . 106--106 Xavier Leroy Formal verification of a realistic compiler . . . . . . . . . . . . . . . . 107--115 Leah Hoffmann Last byte: Q&A: Liskov on Liskov . . . . 120--ff Benjamin Fabian and Oliver Günther Virtual extension: Security challenges of the EPCglobal network . . . . . . . . 121--125 James L. Parrish, Jr. and James F. Courtney, Jr. Virtual extension: Churchman's inquirers as design templates for knowledge management systems . . . . . . . . . . . 126--129 Arvind Malhotra and Claudia Kubowicz Malhotra Virtual extension: A relevancy-based services view for driving adoption of wireless Web services in the U.S. . . . 130--134 Johann Rost and Robert L. Glass Virtual extension: The impact of subversive stakeholders on software projects . . . . . . . . . . . . . . . . 135--138 Sandip C. Patel and Ganesh D. Bhatt and James H. Graham Virtual extension: Improving the cyber security of SCADA communication networks 139--142 Anat Hovav and Ciprian Popoviciu Virtual extension: Adoption leadership and early planners: Comcast's IP upgrade strategy . . . . . . . . . . . . . . . . 143--146 Richard W. Woolridge and David P. Hale and Joanne E. Hale and R. Shane Sharpe Virtual extension: Software project scope alignment: an outcome-based approach . . . . . . . . . . . . . . . . 147--152 Robert M. Davison and Maris G. Martinsons and Henry W. H. Lo and Yuan Li Virtual extension: Technical opinion: The ethics of IT professionals in China 153--155
Steve Bourne and Bryan Cantrill \em Communications and the practitioner 5--5 Scott E. Delman Responding to the blogosphere . . . . . 7--7 CACM Staff Why invention and innovation diverge . . 8--9 CACM Staff In the virtual extension . . . . . . . . 10--10 Jeannette M. Wing and Daniel Reed and Mark Guzdial An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing . . . . . 12--13 David Roman The new searchers . . . . . . . . . . . 14--14 Don Monroe Just for you . . . . . . . . . . . . . . 15--17 Kirk L. Kroeker Face recognition breakthrough . . . . . 18--19 Tom Geller IT drives policy---and vice versa . . . 20--20 Leah Hoffmann Learning through games . . . . . . . . . 21--22 Gregory Goth U.S. unveils cybersecurity plan . . . . 23--23 Tim Draper Economic and business dimensions: Entrepreneurship during a slump . . . . 24--26 Wanda Dann and Stephen Cooper Education Alice 3: concrete to abstract 27--29 Brian Snow and Clinton Brooks Privacy and security: An ethics code for U.S. intelligence officers . . . . . . . 30--32 Lance Fortnow Viewpoint: Time for computer science to grow up . . . . . . . . . . . . . . . . 33--35 Adam Jacobs The pathologies of big data . . . . . . 36--44 Charles Reis and Adam Barth and Carlos Pizano Browser security: lessons from Google Chrome . . . . . . . . . . . . . . . . . 45--49 Mache Creeger CTO roundtable: cloud computing . . . . 50--56 Kristen Shinohara and Josh Tenenberg A blind person's interactions with technology . . . . . . . . . . . . . . . 58--66 Ralph Morelli and Allen Tucker and Norman Danner and Trishan R. De Lanerolle and Heidi J. C. Ellis and Ozgur Izmirli and Danny Krizanc and Gary Parker Revitalizing computing education through free and open source software for humanity . . . . . . . . . . . . . . . . 67--75 Sharad Malik and Lintao Zhang Boolean satisfiability from theoretical hardness to practical success . . . . . 76--82 James Herbsleb Technical perspective: Maintaining quality in the face of distributed development . . . . . . . . . . . . . . 84--84 Christian Bird and Nachiappan Nagappan and Premkumar Devanbu and Harald Gall and Brendan Murphy Does distributed development affect software quality?: an empirical case study of Windows Vista . . . . . . . . . 85--93 Sachin S. Sapatnekar Technical perspective: Where the chips may fall . . . . . . . . . . . . . . . . 94--94 Michael Orshansky and Wei-Shen Wang Statistical analysis of circuit timing using majorization . . . . . . . . . . . 95--100 Peter Winkler Puzzled: Probability and intuition . . . 104--104 Hoon S. Cha and David E. Pingry and Matt E. Thatcher What determines IT spending priorities? 105--110 Andrew Lim and Hong Ma and Qi Wen and Zhou Xu and Brenda Cheang Distinguishing citation quality for journal impact assessment . . . . . . . 111--116 Thomas Gerace and Huseyin Cavusoglu The critical elements of the patch management process . . . . . . . . . . . 117--121 Rajiv Kohli and Nigel P. Melville Learning to build an IT innovation platform . . . . . . . . . . . . . . . . 122--126 Eoin Ó Conchúir and Pär J. Ågerfalk and Helena H. Olsson and Brian Fitzgerald Global software development: where are the benefits? . . . . . . . . . . . . . 127--131 Rohit Kaul and Yeogirl Yun and Seong-Gon Kim Ranking billions of Web pages using diodes . . . . . . . . . . . . . . . . . 132--136 Roli Varma Attracting Native Americans to computing 137--140 Indranil Bose and Alvin Chung Man Leung Technical opinion: What drives the adoption of antiphishing measures by Hong Kong banks? . . . . . . . . . . . . 141--143
Moshe Y. Vardi The financial meltdown and computing . . 5--5 CACM Staff Computer Science does matter . . . . . . 8--9 CACM Staff In the Virtual Extension . . . . . . . . 10--10 Michael Stonebraker and Jason Hong Saying good-bye to DBMSs, designing effective interfaces . . . . . . . . . . 12--13 David Roman What you read on your summer vacation 14--14 Gregory Goth Entering a parallel universe . . . . . . 15--17 Kirk L. Kroeker Medical nanobots . . . . . . . . . . . . 18--19 Samuel Greengard Facing an age-old problem . . . . . . . 20--22 Karen A. Frenkel Computer Science meets environmental science . . . . . . . . . . . . . . . . 23--23 Paul M. Schwartz Law and technology: Keeping track of telecommunications surveillance . . . . 24--26 Peter J. Denning and Paul S. Rosenbloom The profession of IT: Computing: the fourth great domain of science . . . . . 27--29 Mark Cleverley Emerging markets: How ICT advances might help developing nations . . . . . . . . 30--32 Cameron Wilson and Peter Harsha IT policy: The long road to Computer Science education reform . . . . . . . . 33--35 Anwar Ghuloum Viewpoint: Face the inevitable, embrace parallelism . . . . . . . . . . . . . . 36--38 David P. Anderson Interview: An interview with Maurice Wilkes . . . . . . . . . . . . . . . . . 39--42 Bruce Johnson Reveling in constraints . . . . . . . . 44--48 Iosif Legrand and Ramiro Voicu and Catalin Cirstoiu and Costin Grigoras and Latchezar Betev and Alexandru Costan Monitoring and control of large systems with MonALISA . . . . . . . . . . . . . 49--55 Bryan O'Sullivan Making sense of revision-control systems 56--62 Varun Bhagwan and Tyrone Grandison and Daniel Gruhl Sound index: charts for the people, by the people . . . . . . . . . . . . . . . 64--70 James Boyle What intellectual property law should learn from software . . . . . . . . . . 71--76 Lance Fortnow The status of the P versus NP problem 78--86 Katherine Yelick Technical perspective: Abstraction for parallelism . . . . . . . . . . . . . . 88--88 Milind Kulkarni and Keshav Pingali and Bruce Walter and Ganesh Ramanarayanan and Kavita Bala and L. Paul Chew Optimistic parallelism requires abstractions . . . . . . . . . . . . . . 89--97 Marc Dacier Technical perspective: They do click, don't they? . . . . . . . . . . . . . . 98--98 Chris Kanich and Christian Kreibich and Kirill Levchenko and Brandon Enright and Geoffrey M. Voelker and Vern Paxson and Stefan Savage Spamalytics: an empirical analysis of spam marketing conversion . . . . . . . 99--107 Peter Winkler Puzzled: Solutions and sources . . . . . 110--110 Jaron Lanier Future tense: Confusions of the hive mind . . . . . . . . . . . . . . . . . . 112--ff Achita (Mi) Muthitacharoen and Khawaja A. Saeed Examining user involvement in continuous software development: (a case of error reporting system) . . . . . . . . . . . 113--117 Alexander Pasko and Valery Adzhiev Constructive function-based modeling in multilevel education . . . . . . . . . . 118--122 Hongwei Zhu and Stuart E. Madnick One size does not fit all: legal protection for non-copyrightable data 123--128 Eleanor T. Loiacono and Nicholas C. Romano, Jr. and Scott McCoy The state of corporate website accessibility . . . . . . . . . . . . . 128--132 Robert Willison and Mikko Siponen Overcoming the insider: reducing employee computer crime through Situational Crime Prevention . . . . . . 133--137 Mu Xia and Yun Huang and Wenjing Duan and Andrew B. Whinston Ballot box communication in online communities . . . . . . . . . . . . . . 138--142 Dinesh Batra Modified agile practices for outsourced software projects . . . . . . . . . . . 143--148 James Katz and Ronald E. Rice Technical opinion: Falling into the net: Main Street America playing games and making friends online . . . . . . . . . 149--150
Wendy Hall President's letter: ACM Europe . . . . . 5--5 CACM Staff Letters to the editor: Time and computing . . . . . . . . . . . . . . . 6--6 CACM Staff In the Virtual Extension . . . . . . . . 7--7 Greg Linden and Michael Conover and Judy Robertson blog@CACM: The Netflix prize, computer science outreach, and Japanese mobile phones . . . . . . . . . . . . . . . . . 8--9 CACM Staff CACM online: Following the leaders . . . 10--10 David Lindley News: Managing data . . . . . . . . . . 11--13 Alan Joch News: Debating net neutrality . . . . . 14--15 Tom Geller News: Shaping the future . . . . . . . . 16--18 Phillip G. Armour The business of software: Contagious craziness, spreading sanity . . . . . . 19--20 Martin Campbell-Kelly Historical reflections: Computing in the depression era . . . . . . . . . . . . . 21--22 Phillip Porras Inside risks: Reflections on Conficker 23--24 Michael Cusumano Technology strategy and management: Dealing with the venture capital crisis 25--27 George V. Neville-Neil Kode Vicious: Kode reviews 101 . . . . . 28--29 C. A. R. Hoare Viewpoint: Retrospective: an axiomatic basis for computer programming . . . . . 30--32 James C. Phillips and John E. Stone Probing biomolecular machines with graphics processors . . . . . . . . . . 34--41 Matthew T. Dougherty and Michael J. Folk and Erez Zadok and Herbert J. Bernstein and Frances C. Bernstein and Kevin W. Eliceiri and Werner Benger and Christoph Best Unifying biological image formats with HDF5 . . . . . . . . . . . . . . . . . . 42--47 CACM Staff A conversation with David E. Shaw . . . 48--54 Krste Asanovic and Rastislav Bodik and James Demmel and Tony Keaveny and Kurt Keutzer and John Kubiatowicz and Nelson Morgan and David Patterson and Koushik Sen and John Wawrzynek and David Wessel and Katherine Yelick A view of the parallel computing landscape . . . . . . . . . . . . . . . 56--67 Jane Cleland-Huang and Horatiu Dumitru and Chuan Duan and Carlos Castro-Herrera Automated support for managing feature requests in open forums . . . . . . . . 68--74 Daniel A. Spielman and Shang-Hua Teng Smoothed analysis: an attempt to explain the behavior of algorithms in practice 76--84 Surajit Chaudhuri Technical perspective: Relational query optimization: data management meets statistical estimation . . . . . . . . . 86--86 Kevin Beyer and Rainer Gemulla and Peter J. Haas and Berthold Reinwald and Yannis Sismanis Distinct-value synopses for multiset operations . . . . . . . . . . . . . . . 87--95 Johannes Gehrke Technical perspective: Data stream processing: when you only get one look 96--96 Graham Cormode and Marios Hadjieleftheriou Finding the frequent items in streams of data . . . . . . . . . . . . . . . . . . 97--105 Leah Hoffmann Q&A: The networker . . . . . . . . . . . 112--ff Richard J. Goeke and Robert H. Faley Technical opinion: Do SAP successes outperform themselves and their competitors? . . . . . . . . . . . . . . 113--117 Girish H. Subramanian and Gary Klein and James J. Jiang and Chien-Lung Chan Balancing four factors in system development projects . . . . . . . . . . 118--121 Sridhar R. Papagari Sangareddy and Sanjeev Jha and Chen Ye and Kevin C. Desouza Attaining superior complaint resolution 122--126 Vivienne Waller and Robert B. Johnston Making ubiquitous computing available 127--130 Donal Flynn and Gary Pan and Mark Keil and Magnus Mähring De-escalating IT projects: the DMM model 131--134 Francisco Casacuberta and Jorge Civera and Elsa Cubel and Antonio L. Lagarda and Guy Lapalme and Elliott Macklovitch and Enrique Vidal Human interaction for high-quality machine translation . . . . . . . . . . 135--138 Jacques Savoy and Ljiljana Dolamic How effective is Google's translation service in search? . . . . . . . . . . . 139--143 Nan Hu and Jie Zhang and Paul A. Pavlou Overcoming the J-shaped distribution of product reviews . . . . . . . . . . . . 144--147
Moshe Y. Vardi Editor's letter: Is the image crisis over? . . . . . . . . . . . . . . . . . 5--5 CACM Staff Letters to the editor: Pay for editorial independence . . . . . . . . . . . . . . 6--7 CACM Staff In the virtual extension . . . . . . . . 9--9 Ramana Rao and Greg Linden blog@CACM: Computer science curriculum, deceptive advertising . . . . . . . . . 10--11 David Roman CACM online: Internet addiction: it's spreading, but is it real? . . . . . . . 12--12 Gary Anthes News: Deep data dives discover natural laws . . . . . . . . . . . . . . . . . . 13--14 Kirk L. Kroeker News: Electronic paper's next chapter 15--17 Leah Hoffmann News: Implementing electronic medical records . . . . . . . . . . . . . . . . 18--20 Gregory Goth News: Exploring new frontiers . . . . . 21--23 Butler Lampson Privacy and security: Usable security: how to get it . . . . . . . . . . . . . 25--27 Pamela Samuelson Legally speaking: Are business methods patentable? . . . . . . . . . . . . . . 28--30 Shane Greenstein Economic and business dimensions: The broadband price is not right . . . . . . 31--33 Jonathan M. Smith Viewpoint: On public service and computer science . . . . . . . . . . . . 34--35 Bob Cramblitt Interview: An interview with Ping Fu . . 36--39 Whitfield Diffie and Susan Landau Communications surveillance: privacy and security at risk . . . . . . . . . . . . 42--47 Katie Shilton Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection . . . . . . . . . . . . . . . 48--53 Paul Stachour and David Collier-Brown You don't know jack about software maintenance . . . . . . . . . . . . . . 54--58 Mitchel Resnick and John Maloney and Andrés Monroy-Hernández and Natalie Rusk and Evelyn Eastmond and Karen Brennan and Amon Millner and Eric Rosenbaum and Jay Silver and Brian Silverman and Yasmin Kafai Scratch: programming for all . . . . . . 60--67 Tridib Bandyopadhyay and Vijay S. Mookerjee and Ram C. Rao Why IT managers don't go for cyber-insurance products . . . . . . . . 68--73 Edmund M. Clarke and E. Allen Emerson and Joseph Sifakis Model checking: algorithmic verification and debugging . . . . . . . . . . . . . 74--84 Peter Druschel Technical perspective: Narrowing the semantic gap in distributed programming 86--86 Boon Thau Loo and Tyson Condie and Minos Garofalakis and David E. Gay and Joseph M. Hellerstein and Petros Maniatis and Raghu Ramakrishnan and Timothy Roscoe and Ion Stoica Declarative networking . . . . . . . . . 87--95 John Shawe-Taylor Technical perspective: Machine learning for complex predictions . . . . . . . . 96--96 Thorsten Joachims and Thomas Hofmann and Yisong Yue and Chun-Nam Yu Predicting structured objects with support vector machines . . . . . . . . 97--104 Peter Winkler Last byte: Puzzled: Covering the plane 112--112 Lara Khansa and Divakaran Liginlal Quantifying the benefits of investing in information security . . . . . . . . . . 113--117 Wei-Lun Chang and Soe-Tsyr Yuan and Eldon Y. Li iCare home portal: an extended model of quality aging e-services . . . . . . . . 118--124 Aakash Taneja and Anil Singh and M. K. Raja Computing journals and their emerging roles in knowledge exchange . . . . . . 125--131 Rudy Hirschheim Offshoring and the new world order . . . 132--135 C. Bolchini and C. A. Curino and G. Orsi and E. Quintarelli and R. Rossato and F. A. Schreiber and L. Tanca And what can context do for data? . . . 136--140 Frank McCown and Catherine C. Marshall and Michael L. Nelson Why Web sites are lost (and how they're sometimes found) . . . . . . . . . . . . 141--145 Ralph Westfall If your pearls of wisdom fall in a forest\ldots . . . . . . . . . . . . . . 146--149 Frank Nielsen Technical opinion: Steering self-learning distance algorithms . . . 150--152
Chris Stephenson CSTA letter: It is a pivotal time for K--12 computer science . . . . . . . . . 5--5 CACM Staff Letters to the editor: In CS education, educate the educators first . . . . . . 6--7 Jeannette M. Wing and Mark Guzdial blog@CACM: CS woes: deadline-driven research, academic inequality . . . . . 8--9 CACM Staff In the virtual extension . . . . . . . . 11--11 David Roman CACM online: Crowdsourcing and the question of expertise . . . . . . . . . 12--12 Gary Anthes News: Blueprints for self-assembly . . . 13--15 Alex Wright News: Ready for a Web OS? . . . . . . . 16--17 Samuel Greengard News: Making automation work . . . . . . 18--19 Leah Hoffmann News: Problem solvers . . . . . . . . . 20--20 Richard E. Ladner Viewpoints: Broadening participation: Opening remarks . . . . . . . . . . . . 22--24 Orna Berry and Yigal Grayeff Viewpoints: Emerging markets Israel's technology industry as an economic growth engine . . . . . . . . . . . . . 25--27 Peter J. Denning and Peter A. Freeman Viewpoints: The profession of IT: Computing's paradigm . . . . . . . . . . 28--30 George V. Neville-Neil Viewpoints: Kode Vicious: Broken builds 31--32 Savas Parastatidis and Evelyne Viegas and Tony Hey Viewpoint: A 'smart' cyberinfrastructure for research . . . . . . . . . . . . . . 33--37 Alan Ramos and Weina Scott and William Scott and Doug Lloyd and Katherine O'Leary and Jim Waldo Practice: A threat analysis of RFID passports . . . . . . . . . . . . . . . 38--42 Paul Vixie Practice: What DNS is not . . . . . . . 43--47 Alexandra Fedorova and Juan Carlos Saez and Daniel Shelepov and Manuel Prieto Practice: Maximizing power efficiency with asymmetric multicore systems . . . 48--57 Josep Torrellas and Luis Ceze and James Tuck and Calin Cascaval and Pablo Montesinos and Wonsun Ahn and Milos Prvulovic The Bulk Multicore architecture for improved programmability . . . . . . . . 58--65 Michael Zyda Computer science in the conceptual age 66--72 Kelvin Sung Computer games and traditional CS courses . . . . . . . . . . . . . . . . 74--78 James A. Landay Technical perspective: Design tools for the rest of us . . . . . . . . . . . . . 80--80 Yuki Igarashi and Takeo Igarashi Designing plush toys with a computer . . 81--88 Pat Hanrahan Technical perspective: A graphical sense of touch . . . . . . . . . . . . . . . . 89--89 Shahram Izadi and Steve Hodges and Alex Butler and Darren West and Alban Rrustemi and Mike Molloy and William Buxton ThinSight: a thin form-factor interactive surface technology . . . . . 90--98 Peter Winkler Last byte: Puzzled: Solutions and sources . . . . . . . . . . . . . . . . 111--111 Joe Haldeman Last byte: Future tense: Mightier than the pen . . . . . . . . . . . . . . . . 112--112 Niki Panteli and Robert Tucker Power and trust in global virtual teams 113--115 Sun Sun Lim and Hichang Cho and Milagros Rivera Sanchez Online privacy, government surveillance and national ID cards . . . . . . . . . 116--120 Ganesh Vaidyanathan and Steven Mautone Security in dynamic Web Content Management Systems applications . . . . 121--125 Lou Hafer and Arthur E. Kirkpatrick Assessing open source software as a scholarly contribution . . . . . . . . . 126--129 Narciso Cerpa and June M. Verner Why did your project fail? . . . . . . . 130--134 Karen Renaud and Antonella De Angeli Visual passwords: cure-all or snake-oil? 135--140 Nir Kshetri Positive externality, increasing returns, and the rise in cybercrimes . . 141--144 Mikko Siponen and M. Adam Mahmood and Seppo Pahnila Technical opinion: Are employees putting your company at risk by not following information security policies? . . . . . 145--147