Last update:
Thu Apr 24 11:33:05 MDT 2025
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Celestial backbone; Foreign
hands off China's net; Women and the
web; DOE says no nuke access; Worst net
nightmare; Sidebar: Ethics quiz . . . . 9--9
Diane Crawford and
Brian K. E. Balke and
Steve Wilstrom and
Jef Raskin and
Pat McGee Forum: Tackling OO Design Principles;
Educational Concerns; Building LEGO
Robots . . . . . . . . . . . . . . . . . 11--13
Brock N. Meeks Electronic frontier: bugging out: Y2K
fallout or business as usual? . . . . . 15--15
Elliot Soloway and
Cathleen Norris and
Phyllis Blumenfeld and
Barry Fishman and
Joseph Krajcik and
Ronald Marx Log on Education: K--12 and the Internet 19--19
Tom Porter and
Galyn Susman On site: creating lifelike characters in
Pixar movies . . . . . . . . . . . . . . 25--25
Barbara Simons From the President: building Big Brother 31--31
Prabhudev Konana and
Nirup M. Menon and
Sridhar Balasubramanian The implications of online investing . . 34--34
Cecilia M. Gorriz and
Claudia Medina Engaging girls with computers through
software games . . . . . . . . . . . . . 42--42
Eszter Hargittai Radio's lessons for the Internet . . . . 50--50
Mark S. Ackerman and
Christine A. Hadverson Reexamining organizational memory . . . 58--58
Mike Robinson and
Mikko Kovalainen and
Esa Auramäki Diary as dialogue in papermill process
control . . . . . . . . . . . . . . . . 65--65
Jagdish Chandra and
Salvatore T. March and
Satyen Mukherjee and
Will Pape and
R. Ramesh and
H. Raghav Rao and
Ray O. Waddoups Information systems frontiers . . . . . 71--71
Srinarayan Sharma and
Arun Rai CASE deployment in IS organizations . . 80--80
Ruben Gonzalez and
Greg Cranitch and
Jun Jo Academic directions of multimedia
education . . . . . . . . . . . . . . . 89--89
Carl Ellison and
Bruce Schneier Inside risks: risks of PKI: Secure Email 160--160
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: More pay now; Euro net use;
The cursor who spied me; Robot
wheelchair climbs stairs.; The boss
knows; Y2K aftermath; High tech, hold
the computer . . . . . . . . . . . . . . 9--9
Diane Crawford and
Terry D. Decker and
Francisco M. De La Vega and
Jeffrey Shallit and
John A. Wills and
Dennis J. Frailey and
Brad Montgomery and
Carole M. Milazzo and
W. J. Liederbach and
David Mould and
Ewen McNeill Forum: Debating Distance Learning . . . 11--15
Hal Berghel Identity theft, Social Security Numbers,
and the Web . . . . . . . . . . . . . . 17--17
Andrew Grosso Legally speaking: the promise and
problems of the No Electronic Theft Act 23--23
F. Castel Viewpoint: exploring virtuality . . . . 27--27
Fran Allen and
Paula Hawthorn and
Barbara Simons Viewpoint: not now, not like this . . . 29--29
Mark Maybury News on demand: introduction . . . . . . 32--32
Stanley Boykin and
Andrew Merlino Machine learning of event segmentation
for news on demand . . . . . . . . . . . 35--35
Howard D. Wactlar and
Alexander G. Hauptmann and
Michael G. Christel and
Ricky A. Houghton and
Andreas M. Olligschlaeger Complementary video and audio analysis
for broadcast news archives . . . . . . 42--42
Francis Kubala and
Sean Colbath and
Daben Liu and
Amit Srivastava and
John Makhoul Integrated technologies for indexing
spoken language . . . . . . . . . . . . 48--48
The SRI MAESTRO Team MAESTRO: conductor of multimedia
analysis technologies . . . . . . . . . 57--57
Jean-Luc Gauvain and
Lori Lamel and
Gilles Adda Transcribing broadcast news for audio
and video indexing . . . . . . . . . . . 64--64
Sadaoki Furui and
Katsutoshi Ohtsuki and
Zhi-Peng Zhang Japanese broadcast news transcription
and information extraction . . . . . . . 71--71
David S. Pallett and
John S. Garofolo and
Jonathan G. Fiscus Measurements in support of research
accomplishments . . . . . . . . . . . . 75--75
Varun Grover and
Pradeep Vaswani Partnerships in the U.S.
telecommunications industry . . . . . . 80--80
Anil Jain and
Lin Hong and
Sharath Pankanti Biometric identification . . . . . . . . 90--90
Rudy Hirschheim and
Mary Lacity The myths and realities of information
technology insourcing . . . . . . . . . 99--99
Kai R. T. Larsen and
Peter A. Bloniarz A cost and performance model for Web
service investment . . . . . . . . . . . 109--109
David Gillibrand Technical opinion: essential business
object design . . . . . . . . . . . . . 117--117
Carl Ellison and
Bruce Schneier Inside risks: risks of PKI: e-commerce 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: A Future Space Odyssey;
Calculating DNA; Rapid Tracking of
diseases; Hunting Meteorites;
``Millennium'' Banished; English
dominates Web; Top selling software; The
Human Face of E-Commerce . . . . . . . . 9--10
Diane Crawford and
Richard H. Veith and
Lauri Pirttiaho and
Ralph Miller and
Hal Berghel and
Paul E. McKenney and
Tom Moran and
Antanas V. Dundzila and
Frank Cuccias Forum: Planning for Software Project
Success; The Manhattan Project and
Info-czars; Mastering the Basics the
Highest Priority; More Net May Not Yield
More Votes; Are IBM 3083s Vacuum Tube
Systems . . . . . . . . . . . . . . . . 11--15
Robert L. Glass Practical programmer: Y2K and believing
in software practice . . . . . . . . . . 17--18
James A. Rodger and
Parag C. Pendharkar On site: using telemedicine in the
Department of Defense . . . . . . . . . 19--20
Roy Rada and
John Ketchell Sharing standards: standardizing the
European information society . . . . . . 21--25
Barbara Simons From the president: trademarking the Net 27--28
Mohamed Khalifa and
Robert Davison Viewpoint: exploring the telecommuting
paradox . . . . . . . . . . . . . . . . 29--31
Matthew Turk and
George Robertson Perceptual user interfaces
(introduction) . . . . . . . . . . . . . 32--34
Alex Pentland Perceptual user interfaces: perceptual
intelligence . . . . . . . . . . . . . . 35--44
Hong Z. Tan Perceptual user interfaces: haptic
interfaces . . . . . . . . . . . . . . . 40--41
Sharon Oviatt and
Philip Cohen Perceptual user interfaces: multimodal
interfaces that process what comes
naturally . . . . . . . . . . . . . . . 45--53
Rosalind W. Picard Perceptual user interfaces: affective
perception . . . . . . . . . . . . . . . 50--51
James L. Crowley and
Joëlle Coutaz and
François Bérard Perceptual user interfaces: things that
see . . . . . . . . . . . . . . . . . . 54--54
Aaron F. Bobick and
Stephen S. Intille and
James W. Davis and
Freedom Baird and
Claudio S. Pinhanez and
Lee W. Campbell and
Yuri A. Ivanov and
Arjan Schütte and
Andrew Wilson Perceptual user interfaces: the KidsRoom 60--61
Byron Reeves and
Clifford Nass Perceptual user interfaces: perceptual
bandwidth . . . . . . . . . . . . . . . 65--70
Henry Lieberman Programming by example (introduction) 72--74
David Canfield Smith and
Allen Cypher and
Larry Tesler Programming by example: novice
programming comes of age . . . . . . . . 75--81
Brad A. Myers and
Richard McDaniel and
David Wolber Programming by example: intelligence in
demonstrational interfaces . . . . . . . 82--89
Alexander Repenning and
Corrina Perrone Programming by example: programming by
analogous examples . . . . . . . . . . . 90--97
Mathias Bauer and
Dietmar Dengler and
Gabriele Paul and
Markus Meyer Programming by example: programming by
demonstration for information agents . . 98--103
Ken Kahn Programming by example: generalizing by
removing detail . . . . . . . . . . . . 104--106
Robert St. Amant and
Henry Lieberman and
Richard Potter and
Luke Zettlemoyer Programming by example: visual
generalization in programming by example 107--114
Mohamed E. Fayad and
Mauri Laitinen and
Robert P. Ward Thinking objectively: software
engineering in the small . . . . . . . . 115--118
Peter G. Neumann Inside risks: a tale of two thousands 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Merger Marriages; Call for
Security; Gigahertz and beyond; Morphing
Robotoys for X-mas; Plasma Display;
Domain Name Stakes Upped; Olfactory Opt
In; China's Email Shanghaid . . . . . . 9--10
Diane Crawford and
Paul Abrahams and
Bill Patterson and
Anthony Fedzano Forum: Securing User Passwords;
Combining OM and OG . . . . . . . . . . 11--12
Rosemary McGuinness ACM fellows . . . . . . . . . . . . . . 13--14
Neil Munro From Washington: a patchwork of
legislation and regulation . . . . . . . 15--17
Meg McGinity Staying connected: surfing the turf . . 19--21
Kuldeep Kumar and
Jos van Hillegersberg Enterprise resource planning:
introduction . . . . . . . . . . . . . . 22--26
Yvonne van Everdingen and
Jos van Hillegersberg and
Eric Waarts Enterprise resource planning: ERP
adoption by European midsize companies 27--31
Leslie P. Willcocks and
Richard Sykes Enterprise resource planning: the role
of the CIO and IT function in ERP . . . 32--38
Irma Becerra-Fernandez and
Kenneth E. Murphy and
Steven J. Simon Enterprise resource planning:
integrating ERP in the business school
curriculum . . . . . . . . . . . . . . . 39--41
M. Lynne Markus and
Cornelis Tanis and
Paul C. van Fenema Enterprise resource planning: multisite
ERP implementations . . . . . . . . . . 42--46
Christina Soh and
Sia Siew Kien and
Joanne Tay-Yap Enterprise resource planning: cultural
fits and misfits: is ERP a universal
solution? . . . . . . . . . . . . . . . 47--51
Mark Kremers and
Han van Dissel Enterprise resource planning: ERP system
migrations . . . . . . . . . . . . . . . 53--56
August-Wilhelm Scheer and
Frank Habermann Enterprise resource planning: making ERP
a success . . . . . . . . . . . . . . . 57--61
David Sprott Enterprise resource planning:
componentizing the enterprise
application packages . . . . . . . . . . 63--69
Justine Cassell Embodied conversational interface
agents+ . . . . . . . . . . . . . . . . 70--78
Albert Semtner Ocean and climate modeling . . . . . . . 80--89
Jonathan Bowen The ethics of safety-critical systems 91--97
Tim Bass Intrusion detection systems and
multisensor data fusion . . . . . . . . 99--105
Munindar P. Singh and
Mona Singh Technical Opinion: deconstructing the
``any'' key . . . . . . . . . . . . . . 107--108
Jerzy W. Grzymala-Busse and
Wojciech Ziarko Data mining and rough set theory . . . . 108--109
Friedrich Steimann Abstract class hierarchies, factories,
and stable designs . . . . . . . . . . . 109--111
Peter G. Neumann Inside Risks: denial-of-service attacks 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Flying the rails; Logging
online hours at work; Top prize:
embedded encryption; Digital Nose knows;
Walking again via chip implant;
Cell-phone-free class; Another node in
the crowd . . . . . . . . . . . . . . . 9--9
Diane Crawford and
Nancy Mead and
Thomas W. Moran and
Jason Steffler and
Anonymous and
William Dan Terry and
Merrill Warkentin and
John Michael Williams and
Vir V. Phoha and
Vic Basili and
Fred Brooks and
Tom DeMarco and
Ernst Denert and
Koichi Kishida and
Manny Lehman and
Elliot Soloway Forum: Much Ado About Licensing and
Electronic Identity Theft and Email-Only
Classes and Sign-Off on Y2K . . . . . . 11--15
Larry Press Personal computing: from P-books to
E-books . . . . . . . . . . . . . . . . 17--17
Hal Berghel Digital village: predatory
disintermediation . . . . . . . . . . . 23--23
Barbara Simons From the president: to DVD or not to DVD 31--31
Steve Mann Viewpoint: existential education in the
era of personal cybernetics . . . . . . 33--33
Deborah Estrin and
Ramesh Govindan and
John Heidemann Embedding the Internet: introduction . . 38--38
David Tennenhouse Embedding the Internet: proactive
computing . . . . . . . . . . . . . . . 43--43
G. J. Pottie and
W. J. Kaiser Embedding the Internet: wireless
integrated network sensors . . . . . . . 51--51
Gaetano Borriello and
Roy Want Embedding the Internet: embedded
computation meets the World Wide Web . . 59--59
Gaurav S. Sukhatme and
Maja J. Mataric Embedding the Internet: embedding robots
into the Internet . . . . . . . . . . . 67--67
Harold Abelson and
Don Allen and
Daniel Coore and
Chris Hanson and
George Homsy and
Thomas F. Knight and
Radhika Nagpal and
Erik Rauch and
Gerald Jay Sussman and
Ron Weiss Embedding the Internet: amorphous
computing . . . . . . . . . . . . . . . 74--74
Ben Shneiderman Universal usability . . . . . . . . . . 84--84
John P. Baron and
Michael J. Shaw and
Andrew D. Bailey Web-based E-catalog systems in B2B
procurement . . . . . . . . . . . . . . 93--93
Marshall Cline and
Mike Girou Enduring business themes . . . . . . . . 101--101
Laurie A. Williams and
Robert R. Kessler All I really need to know about pair
programming I learned in kindergarten 108--108
Susan Landau Technical opinion: designing
cryptography for the new century . . . . 115--115
Lauren Weinstein and
Peter G. Neumann Inside risks: Internet risks . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: The Supreme Court Goes
Online; Coffee? Tea? Email?; Political
Coffers; Smart Scalpel; Office
Cube-icles; Law Preview; Piracy Rages;
Wireless Rules; The Name Game . . . . . 9--10
Diane Crawford and
Morton Grosser and
Don Walter and
Steve Grief and
Bernard Abramson and
Robert LeMay and
Rob DuWors Forum: A Plea for Dumb Computers;
Gloom-and-Doom Predictions; Expanding
the SE View . . . . . . . . . . . . . . 11--14
Anthony M. Townsend and
Robert J. Aalberts and
Steven A. Gibson Legally speaking: libel and slander on
the Internet . . . . . . . . . . . . . . 15--17
Brock N. Meeks Electronic frontier: Bad moon rising . . 19--21
Elliot Soloway and
Henry J. Becker and
Cathleen Norris and
Neal Topp Log on education: teachers and
technology: easing the way . . . . . . . 23--26
Richard Stallman Viewpoint: Why we must fight UCITA . . . 27--28
Tim O'Reilly Viewpoint: The Internet patent land grab 29--31
Wilhelm Hasselbring Information system integration . . . . . 32--38
Jian Yang and
Mike P. Papazoglou Interoperation support for electronic
business . . . . . . . . . . . . . . . . 39--47
Jane Grimson and
William Grimson and
Wilhelm Hasselbring The SI challenge in health care . . . . 48--55
Elke A. Rundensteiner and
Andreas Koeller and
Xin Zhang Maintaining data warehouses over
changing information sources . . . . . . 57--62
Nabil R. Adam and
Vijayalakshmi Atluri and
Igg Adiwijaya SI in digital libraries . . . . . . . . 64--72
Upkar Varshney and
Ron Vetter Emerging mobile and wireless networks 73--81
Thomas A. Phelps and
Robert Wilensky Multivalent documents . . . . . . . . . 82--90
Terry L. Huston and
Janis L. Huston Is telemedicine a practical reality? . . 91--95
Richard T. Watson and
George M. Zinkhan and
Leyland F. Pitt Integrated Internet marketing . . . . . 97--102
Gerard Parr and
Kevin Curran A paradigm shift in the distribution of
multimedia . . . . . . . . . . . . . . . 103--109
Detlef Schoder and
Torsten Eymann Technical opinion: The real challenges
of mobile agents . . . . . . . . . . . . 111--112
Lauren Weinstein Inside risks: Risks of Internet voting 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: E-Tending the farm; Latest
agricultural stats; Myanmar cuts net;
Video Games, violence linked; Flying the
Web-connected skies; Intricate politics
of weaving; Girls and computers; Wall of
Tetris . . . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Mark Wallace and
Albert Semter and
Alireza Ebrahimi and
Pat McGee and
Rommert J. Casimir and
Frank Land Forum: Global Warning in Ocean and
Climate Modeling; Add PBE to
Conventional Languages; Abbreviation
Hijacking; More to ERP than Org Issues 11--14
Robert L. Glass Practical programmer: On personal
technical obsolescence . . . . . . . . . 15--17
Phillip Ein-Dor and
Seymour E. Goodman and
Peter Wolcott International perspectives: From Via
Maris to electronic highway: the
Internet in Canaan . . . . . . . . . . . 19--23
Dori Kornfeld On site: Deliberating on ICANN . . . . . 25--26
Les Earnest Viewpoint: E2A is worse than Y2K . . . . 27--28
Andrew Rosenbloom Introduction . . . . . . . . . . . . . . 30--32
Chris Hecker Physics in computer games . . . . . . . 34--39
John Funge Cognitive modeling for games and
animation . . . . . . . . . . . . . . . 40--48
Zoran Popovi\'c Controlling physics in realistic
character animation . . . . . . . . . . 50--58
Nick Foster and
Dimitris Metaxas Modeling water for computer animation 60--67
James F. O'Brien and
Jessica K. Hodgins Animating fracture . . . . . . . . . . . 68--75
Jos Stam Interacting with smoke and fire in real
time . . . . . . . . . . . . . . . . . . 76--83
Przemyslaw Prusinkiewicz Simulation modeling of plants and plant
ecosystems . . . . . . . . . . . . . . . 84--93
Torsten Fröhlich The virtual oceanarium . . . . . . . . . 94--101
Jakub Segen and
Senthil Kumar Look ma, no mouse! . . . . . . . . . . . 102--109
Deborah K. Smith and
David B. Paradice and
Steven M. Smith Prepare your mind for creativity . . . . 110--116
Veda C. Storey and
Detmar W. Straub and
Kathy A. Stewart and
Richard J. Welke A conceptual investigation of the
e-commerce industry . . . . . . . . . . 117--123
Gurpreet Dhillon and
James Backhouse Technical opinion: Information system
security management in the new
millennium . . . . . . . . . . . . . . . 125--128
Peter G. Neumann Inside risks: risks in retrospect . . . 144--144
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Everybody Must Get Cloned; A
Step Beyond Cookies; The Chicken and the
Chip; Air Communication Breakdown; No
Sale; Intestinal Pillage; Sidebar: Top
10 Signals You're Tired of the Internet
Business . . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Robert Levine and
John A. Wills and
James L. Rash Forum: The Other Side of Embedding the
Internet; A Cure for Lost Programming
Companionship;l Licensing Software
Developers . . . . . . . . . . . . . . . 11--14
Andrew Grosso Legally Speaking: the economic espionage
act: touring the minefields . . . . . . 15--18
Phillip G. Armour The Business of Software: the case for a
new business model . . . . . . . . . . . 19--22
Daniel Berleant On Site: does typography affect proposal
assessment? . . . . . . . . . . . . . . 24--25
Doug Riecken Introduction: personalized views of
personalization . . . . . . . . . . . . 26--28
Nigel Wells and
Jeff Wolfers The business of personalization: finance
with a personalized touch . . . . . . . 30--34
Udi Manber and
Ash Patel and
John Robison The business of personalization:
experience with personalization of
Yahoo! . . . . . . . . . . . . . . . . . 35--39
Doug Riecken The business of personalization:
personalized communication networks . . 41--42
Joseph Kramer and
Sunil Noronha and
John Vergo The human element: a user-centered
design approach to personalization . . . 44--48
John Karat and
Clare-Marie Karat and
Jacob Ukelson The human element: affordances,
motivation, and the design of user
interfaces . . . . . . . . . . . . . . . 49--51
Edith Schonberg and
Thomas Cofino and
Robert Hoch and
Mark Podlaseck and
Susan L. Spraragen The human element: measuring success . . 53--57
Nicolas J. Belkin The human element: helping people find
what they don't know . . . . . . . . . . 58--61
Linda Candy and
Ernest Edmonds The human element: creativity
enhancement with emerging technologies 62--65
Marvin Minsky Deep issues: commonsense-based
interfaces . . . . . . . . . . . . . . . 66--73
John McCarthy Deep issues: phenomenal data mining . . 75--79
Edwin P. D. Pednault Deep issues: representation is
everything . . . . . . . . . . . . . . . 80--83
Eugene Volokh Deep issues: personalization and privacy 84--88
Doug Riecken Deep issues: personal end-user tools . . 89--91
David Canfield Smith Deep issues: building personal tools by
programming . . . . . . . . . . . . . . 92--95
Paul Maglio and
Rob Barrett Enabling technologies: intermediaries
personalize information streams . . . . 96--101
Haym Hirsh and
Chumki Basu and
Brian D. Davison Enabling technologies: learning to
personalize . . . . . . . . . . . . . . 102--106
Barry Smyth and
Paul Cotter Enabling technologies: a personalized
television listings service . . . . . . 107--111
Paul B. Kantor and
Endre Boros and
Benjamin Melamed and
Vladimir Meñkov and
Bracha Shapira and
David J. Neu Enabling technologies: capturing human
intelligence in the Net . . . . . . . . 112--115
Wlodek Zadrozny and
M. Budzikowska and
J. Chai and
N. Kambhatla and
S. Levesque and
N. Nicolov Enabling technologies: natural language
dialogue for personalized interaction 116--120
Maurice D. Mulvenna and
Sarabjot S. Anand and
Alex G. Büchner Personalization on the Net using Web
mining: introduction . . . . . . . . . . 122--125
Myra Spiliopoulou Web usage mining for Web site evaluation 127--134
Ibrahim Cingil and
Asuman Dogac and
Ayca Azgin A broader approach to personalization 136--141
Bamshad Mobasher and
Robert Cooley and
Jaideep Srivastava Automatic personalization based on Web
usage mining . . . . . . . . . . . . . . 142--151
Mike Perkowitz and
Oren Etzioni Adaptive Web sites . . . . . . . . . . . 152--158
Barbara Simons Inside risks: shrink-wrapping our rights 168--168
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Prioritizing privacy; End of
dot-com days; Online ivory tickling;
Privacy fortress; Asteroids by the
numbers . . . . . . . . . . . . . . . . 9--10
Diane Crawford and
John Letaw and
Mark Wallace and
Les Earnest and
Peter Neely Forum: Is AOL--Time Warner a Closed
System? Repeating SDI Myths; Better Word
Processors for the Vision Impaired . . . 11--12
Neil Munro From Washington: Ethics, schmethics . . 13--15
Meg McGinity Staying Connected: Body of technology 17--19
Andrew W. Appel and
Edward W. Felten Viewpoint: Technological access control
interferes with noninfringing
scholarship . . . . . . . . . . . . . . 21--23
Jennifer Lai Conversational interfaces . . . . . . . 24--27
Susan J. Boyce Natural spoken dialogue systems for
telephony applications . . . . . . . . . 29--34
Clifford Nass and
Li Gong Speech interfaces from an evolutionary
perspective . . . . . . . . . . . . . . 36--43
Sharon Oviatt Taming recognition errors with a
multimodal interface . . . . . . . . . . 45--51
Bruce Lucas VoiceXML for Web-based distributed
conversational applications . . . . . . 53--57
Mark Lucente Conversational interfaces for e-commerce
applications . . . . . . . . . . . . . . 59--61
Ben Shneiderman The limits of speech recognition . . . . 63--65
Judith A. Markowitz Voice biometrics . . . . . . . . . . . . 66--73
Kenneth P. Fishkin and
Anuj Gujar and
Beverly L. Harrison and
Thomas P. Moran and
Roy Want Embodied user interfaces for really
direct manipulation . . . . . . . . . . 74--80
Ram D. Gopal and
G. Lawrence Sanders Global software piracy: you can't get
blood out of a turnip . . . . . . . . . 82--89
David Ferraiolo Integrating RBAC into workflow and
collaborative environments (panel
session) . . . . . . . . . . . . . . . . 89--90
Robert M. Davison and
Robert O. Briggs GSS for presentation support . . . . . . 91--97
Antonis C. Stylianou and
Ram L. Kumar An integrative framework for IS quality
management . . . . . . . . . . . . . . . 99--104
Mauri Laitinen and
Mohamed E. Fayad and
Robert P. Ward Thinking Objectively: The problem with
scalability . . . . . . . . . . . . . . 105--107
Peter G. Neumann Inside Risks: Missile defense . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Tech sector hot for
teachers; Overhaul still lacking; Spy
cooperative; E-casinos hit jackpot;
Driving out counterfeiters; Polly wants
a Web link . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Michael Gardner and
Andrew Bender and
Frank Linton and
Pete Patton and
David Parnas and
Fran Allen and
Paula Hawthorn and
Barbara Simons Forum: what defines a programming relic? 11--12
Brock N. Meeks Being blank in bright waters . . . . . . 13--16
Phillip G. Armour The five orders of ignorance . . . . . . 17--20
Edmund M. A. Ronald and
Moshe Sipper What use is a Turing chatterbox?
Continuing the debate on machine
intelligence . . . . . . . . . . . . . . 21--23
Grant Larsen Component-based enterprise frameworks 24--26
Jon Hopkins Component primer . . . . . . . . . . . . 27--30
Cris Kobryn Modeling components and frameworks with
UML . . . . . . . . . . . . . . . . . . 31--38
Mohamed E. Fayad and
David S. Hamu and
Davide Brugali Enterprise frameworks characteristics,
criteria, and challanges . . . . . . . . 39--46
Michael Sparling Lessons learned: through six years of
component-based development . . . . . . 47--53
Lu Jian and
Li Yingjun and
Ma Xiaoxing and
Cai Min and
Tao Xianping and
Zhang Guanqun and
Liu Jianzhong A hierarchical framework: for parallel
seismic applications . . . . . . . . . . 55--59
Peter Fingar Component-based frameworks for
e-commerce . . . . . . . . . . . . . . . 61--67
Richard A. Johnson The ups and downs of object-oriented
systems development . . . . . . . . . . 68--73
Sudip Bhattacharjee and
R. Ramesh Enterprise computing environments and
cost assessment . . . . . . . . . . . . 74--82
Ritu Agarwal and
Prabuddha De and
Atish P. Sinha and
Mohan Tanniru On the usability of OO representations 83--89
Garland Brown and
Marshall Fisher and
Ned Stoll and
Dave Beeksma and
Mark Black and
Ron Taylor and
Choe Seok Yon and
Aaron J. Williams and
William Bryant and
Bernard J. Jansen Using the lessons of Y2K to improve
information systems architecture . . . . 90--97
Zakaria Maamar and
Jeff Sutherland Toward intelligent business objects . . 99--102
Matt Blaze and
Steven M. Bellovin Inside risks: Tapping on my network door 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Fed Sites Fail on Privacy;
Memory-chip Sandwich; Better X-Ray Tech;
Paper Still King; Tricky Restoration;
Going Coffin Shopping; Sidebar:
Engineering Grads Rankings . . . . . . . 9--10
Diane Crawford and
John Bashinski and
Eugene Volokh and
Brian Balke and
John Michael Williams and
Neville Holmes and
Daniel Berleant and
John J. Bosley and
Jeffrey Rosenwald and
Christopher G. Prince and
Chris Hecker and
Terry Denton Forum: The Ethics of Personalization;
The Economic Espionage Act: A Lawyer's
Perspective; Proposal Typography
Deserves Fuller Treatment; Superficial
Ethical Rant; Who is Worthy; A Point
About Flight Simulators; Predatory
Disintermediation in the Travel Industry 11--15
Hal Berghel Digital village: digital politics 2000 17--22
Seymour Goodman and
Timothy Kelly and
Michael Minges and
Larry Press International perspectives: computing at
the top of the world . . . . . . . . . . 23--27
Jason W. Fouts On site: an ``out-of-box'' experience 28--29
Steven Clift Viewpoint: an Internet of democracy . . 31--32
Lambertus Hesselink Ultra-high-density data storage:
introduction . . . . . . . . . . . . . . 33--34
Garth A. Gibson and
Rodney Van Meter Network attached storage architecture 37--45
Sergei S. Orlov Volume holographic data storage . . . . 46--54
Terry McDaniel Magneto-optical data storage . . . . . . 56--63
Henk van Houten and
Wouter Leibbrandt Phase change recording . . . . . . . . . 64--71
L. Richard Carley and
Gregory R. Ganger and
David F. Nagle MEMS-based integrated-circuit
mass-storage systems . . . . . . . . . . 72--80
Ming Fan and
Jan Stallaert and
Andrew B. Whinston The Internet and the future of financial
markets . . . . . . . . . . . . . . . . 82--88
Philip Ginzboorg Seven comments on charging and billing 89--92
Ziming Liu and
David G. Stork Is paperless really more? . . . . . . . 94--97
Amit Bhatnagar and
Sanjog Misra and
H. Raghav Rao On risk, convenience, and Internet
shopping behavior . . . . . . . . . . . 98--105
Ned Kock Benefits for virtual organizations from
distributed groups . . . . . . . . . . . 107--112
Robert P. Ward and
Mauri Laitinen and
Mohamed E. Fayad Thinking objectively: management in the
small . . . . . . . . . . . . . . . . . 113--116
Anonymous Career opportunities . . . . . . . . . . 117--168
Anonymous Calendar . . . . . . . . . . . . . . . . 169--174
Rebecca Mercuri Inside risks: voting automation (early
and often?) . . . . . . . . . . . . . . 176--176
Diane Crawford Editorial . . . . . . . . . . . . . . .
Ritu Agarwal and
Jayesh Prasad and
Mohan Tanniru and
John Lynch Risks of rapid application development
Zafar Ali and
Arif Ghafoor Synchronized delivery of multimedia
information over ATM networks . . . . .
Elisa Bertino and
Elena Pagani and
Gian Paolo Rossi and
Pierangela Samarati Protecting information on the Web . . .
Joseph Blackburn and
Gary Scudder and
Luk N. Van Wassenhove Concurrent software development . . . .
Susanne Bòdker Coordinating technical support platforms
Manhoi Choy and
Hong Va Leong and
Man Hon Wong Disaster recovery techniques for
database systems . . . . . . . . . . . .
Deborah A. Dahl and
Lewis M. Norton and
K. W. Scholz Commercialization of natural language
processing technology . . . . . . . . .
David E. Douglas and
Bill C. Hardgrave Object-oriented curricula in academic
programs . . . . . . . . . . . . . . . .
Ajit Kambil and
Arnold Kamis and
Marios Koufaris and
Henry C. Lucas Influences on the corporate adoption of
Web technology . . . . . . . . . . . . .
D. W. Loveland Automated deduction: achievements and
future directions . . . . . . . . . . .
Daniel E. O'Leary and
Peter Selfridge Knowledge management for best practices
Derek Partridge Non-programmed computation . . . . . . .
Arik Ragowsky and
Niv Ahituv and
Seev Neumann The benefits of using information
systems . . . . . . . . . . . . . . . .
Louis Scott and
Levente Horvath and
Donald Day Characterizing case constraints . . . .
Vijayan Sugumaran and
Mohan Tanniru and
Veda C. Storey Supporting reuse in systems analysis . .
Diane Crawford Editorial . . . . . . . . . . . . . . . 5--5
Robert Fox News Track: Cut kids computer time;
Computers killed the radio; 3D
Orthodonture; Denial of isolation;
You've got Braille; All's fare; Sidebar:
Connecting the dots . . . . . . . . . . 9--10
Diane Crawford and
David Davenport and
Michael P. Conlon and
Wallace Koehler and
Henry Gladney and
Andrew W. Appel and
Edward W. Felten and
Mark Wallace and
Fred Ballard and
Rich Morin and
Steve Green Forum: Software Piracy Is Not Just
Economics Anymore; Need Stronger
Argument for Access Control; Most
Enlightening Ever . . . . . . . . . . . 11--13
Elliot Soloway and
Cathleen Norris and
Phyllis Blumenfeld and
Ron Marx and
Joe Krajcik and
Barry Fishman Log on education: the three Ts of
elementary education . . . . . . . . . . 15--19
Roy Rada and
John Craparo Sharing standards: standardizing
software projects . . . . . . . . . . . 21--25
Boaz Gelbord Viewpoint: signing your 011001010 . . . 27--28
Andrew Rosenbloom Trusting technology . . . . . . . . . . 31--32
Batya Friedman and
Peter H. Khan and
Daniel C. Howe Trust online . . . . . . . . . . . . . . 34--40
Judith S. Olson and
Gary M. Olson i2i trust in e-commerce . . . . . . . . 41--44
Paul Resnick and
Ko Kuwabara and
Richard Zeckhauser and
Eric Friedman Reputation systems . . . . . . . . . . . 45--48
Justine Cassell and
Timothy Bickmore External manifestations of
trustworthiness in the interface . . . . 50--56
Ben Shneiderman Designing trust into online experiences 57--59
Eric M. Uslaner Social capital and the net . . . . . . . 60--64
Jennifer Kreie and
Timothy Paul Cronan Making ethical decisions . . . . . . . . 66--71
Detlef Schoder and
Pai-Ling Yin Building firm trust online . . . . . . . 73--79
Sara Jones and
Marc Wilikens and
Philip Morris and
Marcelo Masera Trust requirements in e-business . . . . 81--87
Trevor Moores and
Gurpreet Dhillon Software piracy: a view from Hong Kong 88--93
Masud Ahmad Malik Technical opinion: On the perils of
programming . . . . . . . . . . . . . . 95--97
Bruce Schneier Inside risks: semantic network attacks 168--168
Diane Crawford Editorial . . . . . . . . . . . . . . . 5--5
Robert Fox News Track: Code-breaking software
officially illegal; Clogging sky
channels; Info-tech giant Japan; Global
dot-cons; Salmon sensoring; Boots made
for walking; Sidebar: Top 10 Fastest
Growing, High-Tech Metro Areas in the
U.S. . . . . . . . . . . . . . . . . . . 9--10
Robert L. Glass Practical programmer: an embarrassing,
yet rewarding, ending to a previous
column . . . . . . . . . . . . . . . . . 11--11
Phillip G. Armour The business of software: the laws of
software process . . . . . . . . . . . . 15--15
Lenny Foner Viewpoint: fixing a flawed domain name
system . . . . . . . . . . . . . . . . . 19--19
Åke Grönlund Democracy in an IT-framed society:
introduction . . . . . . . . . . . . . . 22--22
Richard T. Watson and
Bryan Mundy A strategic perspective of electronic
democracy . . . . . . . . . . . . . . . 27--27
Ari-Veikko Anttiroiko Toward the European information society 31--31
Per-Olof Ågren Is online democracy in the EU for
professionals only? . . . . . . . . . . 36--36
Ted Becker Rating the impact of new technologies on
democracy . . . . . . . . . . . . . . . 39--39
Ignace Snellen ICTs, bureaucracies, and the future of
democracy . . . . . . . . . . . . . . . 45--45
Joachim Åström Should democracy online be quick,
strong, or thin? . . . . . . . . . . . . 49--49
Doug Schuler Computer professionals and the next
culture of democracy . . . . . . . . . . 52--52
John A. Taylor and
Eleanor Burt Not-for-profits in the democratic polity 58--58
Todd M. La Porte and
Chris C. Demchak and
Christian Friis Webbing governance: global trends across
national-level public agencies . . . . . 63--63
Lance J. Hoffman and
Lorrie Cranor Internet voting for public officials:
introduction . . . . . . . . . . . . . . 69--69
Joe Mohen and
Julia Glidden The case for Internet voting . . . . . . 72--72
Deborah M. Phillips and
Hans A. von Spakovsky Gauging the risks of Internet elections 73--73
Gordon Bell A personal digital store . . . . . . . . 86--86
Thomas M. Chen Increasing the observability of Internet
behavior . . . . . . . . . . . . . . . . 93--93
Abhijit Chaudhury and
Debasish Mallick and
H. Raghav Rao Web channels in e-commerce . . . . . . . 99--99
Simon N. Foley and
Robert Dumigan Are handheld viruses a significant
threat? . . . . . . . . . . . . . . . . 105--105
Rebecca T. Mercuri and
Peter G. Neumann Inside risks: system integrity revisited 160--160
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Crash-free consortium; Pooh
Corner; Bedside matters; Silver lining;
No home work; Ear shot; Quick Picks . . 9--10
Diane Crawford and
Mick Zraly and
Hal Berghel and
Ken Pugh and
Mat H. West and
Conrad Weisert and
Terry Steyaert and
Richard Johnson Forum: How Can the Web Advance Western
Democracies? Who Needs Digital
Signatures; Misinformation and the
Emulex Hoax; OOSCD Not Really So
Unified; Go Back to Non-OOSD . . . . . . 11--13
Peter J. Denning The profession of IT: who are we? . . . 15--19
Meg McGinity Staying connected: name is the game . . 21--23
Steven Bellman and
Eric J. Johnson and
Gerald L. Lohse On site: opt-in or opt-out?: it depends
on the question . . . . . . . . . . . . 25--27
Imran Bashir and
Enrico Serafini and
Kevin Wall Securing network software applications:
introduction . . . . . . . . . . . . . . 28--30
John Viega and
Tadayoshi Kohno and
Bruce Potter Trust (and mistrust) in secure
applications . . . . . . . . . . . . . . 31--36
James B. D. Joshi and
Walid G. Aref and
Arif Ghafoor and
Eugene H. Spafford Security models for Web-based
applications . . . . . . . . . . . . . . 38--44
Richard M. Smith and
Michael Brittain and
Ivan Fetch and
Hailin Wu and
David M. Martin The privacy practices of Web browser
extensions . . . . . . . . . . . . . . . 45--50
Anup K. Ghosh and
Tara M. Swaminatha Software security and privacy risks in
mobile e-commerce . . . . . . . . . . . 51--57
Chris Dalton and
Tse Huong Choo An operating system approach to securing
e-services . . . . . . . . . . . . . . . 58--64
Pamela Samuelson Intellectual property for an information
age: introduction . . . . . . . . . . . 66--68
Dan L. Burk Copyrightable functions and patentable
speech . . . . . . . . . . . . . . . . . 69--75
Randall Davis The digital dilemma . . . . . . . . . . 77--83
Yochai Benkler The battle over the institutional
ecosystem in the digital environment . . 84--90
A. Michael Froomkin The collision of trademarks, domain
names, and due process in cyberspace . . 91--97
Maureen A. O'Rourke Is virtual trespass an apt analogy? . . 98--103
Peter G. Neumann Inside risks: what to know about . . . . 136--136
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5
Robert Fox News Track: The Future of the Tech
Workplace and From the Desk of Rage and
Smarty Pants and Toddlers and Computers
Don't Mix and Dot-Com Graveyard and
Monkeying Around and Mating Call . . . . 9--10
Phillip G. Armour The Business of Software: Software as
Currency . . . . . . . . . . . . . . . . 13--14
Hal Berghel Digital Village: A Cyberpublishing
Manifesto . . . . . . . . . . . . . . . 17--20
Gordon Bell and
Jim Gray Digital immortality . . . . . . . . . . 28--30
Rita R. Colwell Closing the circle of information
technology . . . . . . . . . . . . . . . 31--34
Norman I. Badler Virtual beings . . . . . . . . . . . . . 33--35
Donald A. Norman Cyborgs . . . . . . . . . . . . . . . . 36--37
Ramesh Jain Digital experience . . . . . . . . . . . 38--40
Joseph Jacobson The desktop fab . . . . . . . . . . . . 41--43
Dan Bricklin Look to the past to envision the future 44--44
Ted Selker Affecting humanity . . . . . . . . . . . 45--45
Leon Kappelman The future is ours . . . . . . . . . . . 46--47
V. Michael Bove Astronauts and mosquitoes . . . . . . . 48--49
Andries van Dam User interfaces: disappearing,
dissolving, and evolving . . . . . . . . 50--52
Eric A. Brewer When everything is searchable . . . . . 53--54
Martin Cooper Bandwidth and the creation of awareness 55--57
Thomas A. Horan The paradox of place . . . . . . . . . . 58--59
Ron Vetter The wireless web . . . . . . . . . . . . 60--61
Usama Fayyad The digital physics of data mining . . . 62--65
Jennifer Lai When computers speak, hear, and
understand . . . . . . . . . . . . . . . 66--67
Jim Waldo When the network is everything . . . . . 68--69
Steven J. Schwartz Wearables in 2048 . . . . . . . . . . . 70--71
Cameron Miner Pushing functionality into even smaller
devices . . . . . . . . . . . . . . . . 72--73
Christopher R. Johnson Computational bioimaging for medical
diagnosis and treatment . . . . . . . . 74--75
Jacques Cohen Computers and biology . . . . . . . . . 76--79
Thomas Sterling Continuum computer architecture for
exaflops computation . . . . . . . . . . 78--80
Jon Crowcroft Never lost, never forgotten . . . . . . 81--81
Michael J. Muller and
Ellen Christiansen and
Bonnie Nardi and
Susan Dray Spiritual life and information
technology . . . . . . . . . . . . . . . 82--83
Whitfield Diffie Ultimate cryptography . . . . . . . . . 84--86
Ray Kurzweil Promise and peril-the deeply intertwined
poles of 21st century technology . . . . 88--91
Edsger W. Dijkstra The end of computing science? . . . . . 92--92
Hal R. Varian The computer-mediated economy . . . . . 93--93
Robert X. Cringely Be absolute for death: life after
Moore's law . . . . . . . . . . . . . . 94--94
Brock N. Meeks Accountability through transparency:
life in 2050 . . . . . . . . . . . . . . 96--97
Pamela Samuelson Toward a new politics of intellectual
property . . . . . . . . . . . . . . . . 98--99
Dennis Tsichritzis Forget the past to win the future . . . 100--101
Andrew Grosso The demise of sovereignty . . . . . . . 102--103
Anthony M. Townsend and
James T. Bennett Electronic empire . . . . . . . . . . . 104--105
Ari Schwartz A larger role in the public policy
process for user control . . . . . . . . 106--107
Karen Holtzblatt Inventing the future . . . . . . . . . . 108--110
Richard Stallman Can freedom withstand e-books? . . . . . 111--111
Peter J. Denning Many zeros ahead . . . . . . . . . . . . 112--112
Bruce Schneier Insurance and the computer industry . . 114--115
Kilnam Chon The future of the Internet digital
divide . . . . . . . . . . . . . . . . . 116--117
Grady Booch Developing the future . . . . . . . . . 118--121
Henry Lieberman and
Christopher Fry Will software ever work? . . . . . . . . 122--124
Mark Gorenberg and
Ann Winblad A just-in-time software-based world . . 125--125
Larry L. Constantine Back to the future . . . . . . . . . . . 126--126
Cherri Pancake The ubiquitous beauty of user-aware
software . . . . . . . . . . . . . . . . 130--130
Steven M. Bellovin Computer security --- an end state? . . 131--132
Doug Riecken A commonsense opportunity for computing 133--133
Ravi Ganesan Keep (over) reaching for the stars . . . 134--135
John Glenn Education is the key to future dreams 136--138
Anita Borg Universal literacy --- a challenge for
computing in the 21st Century . . . . . 139--141
Roger C. Schank The computer isn't the medium, it's the
message . . . . . . . . . . . . . . . . 142--143
Mitchel Resnick Closing the fluency gap . . . . . . . . 144--145
Peter G. Neumann and
David L. Parnas Inside risks: Computers: Boon or Bane? 168--168
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5
Robert Fox News Track: ICANN's Domain Name
Experiment; Paper Voting Prevails;
Printed-On Battery Power; Campus Net
Access Rethought; Who Let The Robots
Out?; U.S. Patent Lead; Taste The Web;
Have Virus, Will Work For Mayor . . . . 9--10
Diane Crawford and
Thomas Tiahrt and
Moti Ben-Ari and
Matt West and
Hans A. von Spakovsky and
Deborah Phillips Forum: Participatory Vs. Representative
Democracy; Why Store Everything?; Emulex
Hoax; Correction . . . . . . . . . . . . 13--15
Robert L. Glass Practical programmer: academics, and the
scarlet letter ``A'' . . . . . . . . . . 17--18
Peter J. Denning The profession of IT: crossing the chasm 21--25
David Lanning Viewpoint: on bias, science, equal
protection, and liability . . . . . . . 27--29
Sahin Albayrak Agent-oriented technology for
telecommunications: introduction . . . . 30--33
Nicholas R. Jennings An agent-based approach for building
complex software systems . . . . . . . . 35--41
Stefan Fricke and
Karsten Bsufka and
Jan Keiser and
Torge Schmidt and
Ralf Sesseler and
Sahin Albayrak Agent-based telematic services and
telecom applications . . . . . . . . . . 43--48
Munindar P. Singh and
Bin Yu and
Mahadevan Venkatraman Community-based service location . . . . 49--54
Marcus Brunner and
Bernhard Plattner and
Rolf Stadler Service creation and management in
active telecom networks . . . . . . . . 55--61
Francisco Valera and
Jorge E. López de Vergara and
José I. Moreno and
Víctor A. Villagrá and
Julio Berrocal Communication management experiences in
e-commerce . . . . . . . . . . . . . . . 63--69
Mike P. Papazoglou Agent-oriented technology in support of
e-business . . . . . . . . . . . . . . . 71--77
Varun Grover and
James T. C. Teng E-commerce and the information market 79--86
Mark Keil and
Daniel Robey Blowing the whistle on troubled software
projects . . . . . . . . . . . . . . . . 87--93
Tanya L. Cheyne and
Frank E. Ritter Targeting audiences on the Internet . . 94--98
G. Kappel and
S. Rausch-Schott and
W. Retschitzegger and
M. Sakkinen Bottom-up design of active
object-oriented databases . . . . . . . 99--104
Robert P. Ward and
Mohamed E. Fayad and
Mauri Laitinen Thinking objectively: software process
improvement in the small . . . . . . . . 105--107
Diane Crawford Career opportunities . . . . . . . . . . 109--124
Diane Crowford Calendar of events . . . . . . . . . . . 125--125
Bruce Schneier Inside risks: cyber underwriters lab . . 128--128
Diane Crawford Editorial . . . . . . . . . . . . . . . 5--5
Robert Fox News Track: Euro Net Access Exceeds
U.S.; In-Dash MP3; Poll on the Future;
Beam of Pain; Laundry Made Easier;
Detecting Schizophrenia; Internet
Earthquake Warnings; Patron Net Saint 9--10
Diane Crawford and
John F. Dalphin and
Andy Oram and
Louis A. Russ and
Peter Denning Forum: Evolving commitment to the
profession of computer science . . . . . 11--12
Neil Munro From Washington: The unhappy but
beneficial coexistence of the FBI and
the tech elite . . . . . . . . . . . . . 15--18
Hal Berghel Digital Village: Caustic cookies . . . . 19--22
Alan Howard On site: Software engineering project
management . . . . . . . . . . . . . . . 23--24
Krzysztof R. Apt Viewpoint: One more revolution to make:
free scientific publishing . . . . . . . 25--28
Edward A. Fox and
Gary Marchionini Digital libraries: Introduction . . . . 30--32
Gregory Crane and
Robert F. Chavez and
Anne Mahoney and
Thomas L. Milbank and
Jeffrey A. Rydberg-Cox and
David A. Smith and
Clifford E. Wulfman Drudgery and deep thought . . . . . . . 34--40
Craig Nevill-Manning The biological digital library . . . . . 41--42
Alan S. Inouye A digital strategy for the library of
congress . . . . . . . . . . . . . . . . 43--43
Paul Jones Open (source)ing the doors for
contributor-run digital libraries . . . 45--46
Ian H. Witten and
David Bainbridge and
Stefan Boddie Greenstone: Open-source DL software . . 47--47
Alexa T. McCray and
Marie E. Gallagher Principles for digital library
development . . . . . . . . . . . . . . 48--54
Catherine C. Marshall and
Gene Golovchinsky and
Morgan N. Price Digital libraries and mobility . . . . . 55--56
Michael S. Brown and
W. Brent Seales and
Stephen B. Webb and
Christopher O. Jaynes Building large-format displays for
digital libraries . . . . . . . . . . . 57--59
Michael L. Nelson and
Kurt Maly Buckets: smart objects for digital
libraries . . . . . . . . . . . . . . . 60--62
H. M. Gladney and
Arthur Cantu Authorization management for digital
libraries . . . . . . . . . . . . . . . 63--65
Christine L. Borgman Where is the librarian in the digital
library? . . . . . . . . . . . . . . . . 66--68
William Y. Arms Uniform resource names: handles, PURLs,
and digital object identifiers . . . . . 68--68
Helen R. Tibbo Archival perspectives on the emerging
digital library . . . . . . . . . . . . 69--70
Erik Duval and
Eddy Forte and
Kris Cardinaels and
Bart Verhoeven and
Rafael Van Durm and
Koen Hendrikx and
Maria Wentland Forte and
Norbert Ebel and
Maciej Macowicz and
Ken Warkentyne and
Florence Haenni The Ariadne knowledge pool system . . . 72--78
David McArthur and
Sarah Giersch and
Bill Graves and
Charles R. Ward and
Richard Dillaman and
Russell Herman and
Gabriel Lugo and
James Reeves and
Ron Vetter and
Deborah Knox and
Scott Owen Toward a sharable digital library of
reusable teaching resources . . . . . . 79--79
Mary Marlino and
Tamara Sumner and
David Fulker and
Cathryn Manduca and
David Mogk The digital library for Earth system
education: building community, building
the library . . . . . . . . . . . . . . 80--81
Ian H. Witten and
Michel Loots and
Maria F. Trujillo and
David Bainbridge The promise of digital libraries in
developing countries . . . . . . . . . . 82--85
Lee L. Zia The NSF national science, mathematics,
engineering, and technology education
digital library program . . . . . . . . 83--83
Mark Apperley and
Sally Jo Cunningham and
Te Taka Keegan and
Ian H. Witten NIUPEPA: a historical newspaper
collection . . . . . . . . . . . . . . . 86--87
Shalini R. Urs and
K. S. Raghavan Vidyanidhi: Indian digital library of
electronic theses . . . . . . . . . . . 88--89
Bernard Rous The ACM digital library . . . . . . . . 90--91
Greg Baster and
Prabhudev Konana and
Judy E. Scott Business components: a case study of
Bankers Trust Australia Limited . . . . 92--98
Mark Astley and
Daniel Sturman and
Gul Agha Customizable middleware for modular
distributed software . . . . . . . . . . 99--107
J. McGrath Cohoon Toward improving female retention in the
computer science major . . . . . . . . . 108--114
Lauren Weinstein Inside risks: be seeing you! . . . . . . 128--128
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5
Robert Fox News track: Security Stats; Robotic
Insect; Disposable Phones; Scientific
Oath; Simulating Dripped Drops; An
Aviation First; Coffee-Cam to Go Black 9--10
Diane Crawford and
Ilya Yakovlev and
Yochai Benkler and
Paul McKenney and
Donn B. Parker Forum: More than One Way to Product
Quality Information; Hope for
Educational Sea Change; A Consistent
Definition of Information Security . . . 11--14
Elliot Soloway and
Cathleen Norris and
Phyllis Blumenfeld and
Barry Fishman and
Joseph Krajcik and
Ron Marx Log on education: Handheld devices are
ready-at-hand . . . . . . . . . . . . . 15--20
Seymour E. Goodman and
James B. Gottstein and
Diane S. Goodman International perspectives: Wiring the
wilderness in Alaska and the Yukon . . . 21--26
Paul de Palma Viewpoint: Why women avoid computer
science . . . . . . . . . . . . . . . . 27--30
Rajiv Dewan and
Abraham Seidmann Current issues in e-banking:
introduction . . . . . . . . . . . . . . 31--32
Kemal Saatcioglu and
Jan Stallaert and
Andrew B. Whinston Design of a financial portal . . . . . . 33--38
Yoram (Jerry) Wind The challenge of ``customerization'' in
financial services . . . . . . . . . . . 39--44
Kermal Altinkemer Bundling e-banking services . . . . . . 45--47
Niv Ahituv The open information society . . . . . . 48--52
Christopher P. Holland and
John B. Westwood Product-market and technology strategies
in banking . . . . . . . . . . . . . . . 53--57
Kuldeep Kumar Technology for supporting supply chain
management: introduction . . . . . . . . 58--61
Steve John Simon The art of military logistics . . . . . 62--66
Bill Welty and
Irma Becerra-Fernandez Managing trust and commitment in
collaborative supply chain relationships 67--73
Jos van Hillegersberg and
Rob Zuidwijk and
Jo van Nunen and
Diane van Eijk Supporting return flows in the supply
chain . . . . . . . . . . . . . . . . . 74--79
Girish Ramachandran and
Sanjay Tiwari Challenges in the air cargo supply chain 80--82
R. Krishnan Technology in the Indian retail supply
chain . . . . . . . . . . . . . . . . . 83--87
David Schuff and
Robert St. Louis Centralization vs. decentralization of
application software . . . . . . . . . . 88--94
Gary Klein and
James J. Jiang and
Marion G. Sobol A new view of IS personnel performance
evaluation . . . . . . . . . . . . . . . 95--102
Terry Shepard and
Margaret Lamb and
Diane Kelly More testing should be taught . . . . . 103--108
Michael McCormick Technical opinion: Programming extremism 109--119
Richard Forno and
William Feinbloom Inside risks: PKI: a question of trust
and value . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Net Population's Newest
Numbers; Brush-on Smart Paint; Losses in
the Face of Piracy; Losses in the Name
of Quality; Hear the Earth's Patter;
Radio Frequency Fries Electronics;
Click, Drag, Plagiarize, Gotcha; Web as
Close as Your Wrist . . . . . . . . . . 9--9
Diane Crawford and
Richard G. Canning and
Todd Hodes and
Bill Leal and
George Nagy and
Alan Knight and
G. Kappel and
S. Rausch-Schott and
W. Retschitzegger and
M. Sakkinen and
Luke Hohmann and
Nils Jensen Forum: Reviewer Bias vs. Review
Validity; Millennium Reflections;
Unfashionable Smalltalk; Don't Forget
Existing Customers; The ``Character'' of
Software . . . . . . . . . . . . . . . . 11--13
John White ACM Opens portal . . . . . . . . . . . . 14--16, 28
Andrew Grosso Legally speaking: the individual in the
new age . . . . . . . . . . . . . . . . 17--17
Phillip G. Armour The business of software: Matching
process to types of teams . . . . . . . 21--21
Quentin Stafford-Fraser On site: The life and times of the first
Web Cam . . . . . . . . . . . . . . . . 25--25
Scott Hazelhurst Viewpoint: Developing IT skills
internationally: who's developing whom? 27--27
David Arnold and
Fred Niederman The global IT work force: introduction 30--30
Lawrence A. West and
Walter A. Bogumil Immigration and the global IT work force 34--34
Phalguni Gupta Growth scenario of IT industries in
India . . . . . . . . . . . . . . . . . 40--40
Keith Mander The decline and fall of the American
programmer . . . . . . . . . . . . . . . 43--43
Liisa von Hellens and
Sue Nielsen Australian women in IT . . . . . . . . . 46--46
Philip J. Sallis Some thoughts on IT employment in New
Zealand . . . . . . . . . . . . . . . . 53--53
Diane Crawford ACM general elections . . . . . . . . . 54--54
Linda Marshall A perspective on the IT industry in
South Africa . . . . . . . . . . . . . . 55--55
Ritu Agarwal and
Thomas W. Ferratt Crafting an HR strategy to meet the need
for IT workers . . . . . . . . . . . . . 58--58
Kam-Fai Wong Labor shortfall in Hong Kong's IT
industry . . . . . . . . . . . . . . . . 65--65
Maria Klawe Refreshing the nerds . . . . . . . . . . 67--67
Jo Ellen Moore and
Susan E. Yager and
Mary Sumner and
Galen B. Crow Facilitating career changes into IT . . 70--70
Eileen M. Trauth Mapping information-sector work to the
work force . . . . . . . . . . . . . . . 74--74
Wang Shan The IT work force in China . . . . . . . 76--76
Uladzimir Anishchanko The IT staffing situation in Belarus . . 77--77
Steve Benford and
Chris Greenhalgh and
Tom Rodden and
James Pycock Collaborative virtual environments . . . 79--79
Karim K. Hirji Exploring data mining implementation . . 87--87
Vincent S. Lai Intraorganizational communication with
intranets . . . . . . . . . . . . . . . 95--95
Jim Horning Inside risks: Learning from experience 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Sensing Global Vibrations;
The Big Four Online; Gender Gap
Perceptions; Portion of the World
Offline; Cat \ldots and Mouse; 20
Gigahertz Chip 3 Atoms Thick; Apple
Motto Exorcised . . . . . . . . . . . . 9--10
Diane Crawford and
Richar Hill and
George Ellingham and
Lawrence C. Paulson and
Adriano Comai and
Bill Brykczynski and
Saul I. Gass and
Ferdinand Wagner and
Peter Wolstenholme Forum: The ICANN Framework Better Than
Going to Court; Drop the Adjective
[Digital Library]; Keep E-Journals
Affordable; Needs and Adoption of
Process; Give Security Accreditation a
Chance; Keeping Out Cookies; The Joy of
Coding . . . . . . . . . . . . . . . . . 11--13
Hal Berghel Digital: The Y2K e-commerce tumble . . . 15--15
Peter J. Denning The profession of IT: The IT schools
movement . . . . . . . . . . . . . . . . 19--19
David S. Touretzky Viewpoint: Free speech rights for
programmers . . . . . . . . . . . . . . 23--23
Eric M. Freedman Viewpoint: Pondering pixelized pixies 27--27
Nahum Gershon and
Ward Page What storytelling can do for information
visualization . . . . . . . . . . . . . 31--31
Daniel A. Keim Visual exploration of large data sets 38--38
Stephen G. Eick Visualizing online activity . . . . . . 45--45
Fred Mintzer and
Gordon W. Braudaway and
Francis P. Giordano and
Jack C. Lee and
Karen A. Magerlein and
Silvana D'Auria and
Amnon Ribak and
Gil Shapir and
Fabio Schiattarella and
John Tolva and
Andrey Zelenkov Populating the Hermitage Museum's new
Web site . . . . . . . . . . . . . . . . 52--52
Calvin K. M. Lam and
Bernard C. Y. Tan The Internet is changing the music
industry . . . . . . . . . . . . . . . . 62--62
Henry Lieberman and
Christopher Fry and
Louis Weitzman Exploring the Web with reconnaissance
agents . . . . . . . . . . . . . . . . . 69--69
Nong Ye and
Joseph Giordano and
John Feldman A process control approach to cyber
attack detection . . . . . . . . . . . . 76--76
John Benamati and
Albert L. Lederer Coping with rapid changes in IT . . . . 83--83
Albert Levi and
Çetin Kaya Koç Inside risks: Risks in email security 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Telecommuting Loses Appeal;
Privacy Issue for DNA Database; No
Copying, No Warning; Big `Boss' Is
Watching; Men Outperform Women in
Virtual World; Cell Phone Radio Waves
Made Public; The Mystery of the Sucking
Shower Curtain . . . . . . . . . . . . . 9--10
Diane Crawford and
Oleg Dulin and
David Arnold and
Fred Niederman and
Ralpha Castain and
Bill Rivera Forum: How to Address the Global IT
Worker Shortage; Proposals for
Attracting Women Back into IT . . . . . 11--11
Robert L. Glass Practical programmer: of model
changeovers, style, and fatware . . . . 17--20
Meg McGinity Staying connected: suit yourself . . . . 21--24
Jane C. Ginsberg Viewpoint: what to know before reissuing
old titles as e-books . . . . . . . . . 25--25
Nikolaos A. Mylonopoulos and
Vasilis Theoharakis On site: global perceptions of IS
journals . . . . . . . . . . . . . . . . 29--33
Vinton Cerf Beyond the post-PC Internet . . . . . . 34--37
Adrian Hooke The interplanetary Internet . . . . . . 38--40
Leonard Kleinrock Breaking loose . . . . . . . . . . . . . 41--46
José A. Corrales An Asturian view of networking 2015 . . 47--54
Lada A. Adamic and
Bernardo A. Huberman The Web's hidden order . . . . . . . . . 55--60
Mark Weiser Whatever happened to the next-generation
Internet? . . . . . . . . . . . . . . . 61--69
Lawrence A. Gordon and
Martin P. Loeb Using information security as a response
to competitor analysis systems . . . . . 70--75
Alvin T. S. Chan and
Jiannong Cao and
Henry Chan and
Gilbert Young A Web-enabled framework for smart card
applications in health services . . . . 76--82
Glenn B. Bell and
Anil Sethi Matching records in a national medical
patient index . . . . . . . . . . . . . 83--88
Terry Huston Security issues for implementation of
e-medical records . . . . . . . . . . . 89--94
Mohammed E. Fayad and
Adam Altman Thinking objectively: an introduction to
software stability . . . . . . . . . . . 95--95
Emil Sit and
Kevin Fu Inside Risks: Web cookies: not just a
privacy risk . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: ACM Files Declaration;
Taking a Bite Out of Shark Attacks;
China Web Growth; Photomapping
Technology; Simulating Mercury's Wobble;
Cell Phone Impact on Wildlife; Wile E.
Coyote Doesn't Stand a Chance . . . . . 9--10
Diane Crawford and
Ted Mihalsin and
William Bogstad and
Daniel Kiem and
J. William Cupp and
Sandy Ressler Forum: How Big is ``Big'' When it Comes
to Data Sets? Similar Figures for Women
Math Majors; Commendation . . . . . . . 11--12
Phillip Armour The business of software: Zeppelins and
jet planes: a metaphor for modern
software projects . . . . . . . . . . . 13--15
Neil Munro From Washington: considering the
broadband debate . . . . . . . . . . . . 17--19
Keith Devlin Viewpoint: the real reason why software
engineers need math . . . . . . . . . . 21--22
Barbara Simons Viewpoint: the ACM declaration in Felten
v. RIAA . . . . . . . . . . . . . . . . 23--26
Tzilla Elrad and
Robert E. Filman and
Atef Bader Aspect-oriented programming:
Introduction . . . . . . . . . . . . . . 29--32
Tzilla Elrad and
Mehmet Aksits and
Gregor Kiczales and
Karl Lieberherr and
Harold Ossher Discussing aspects of AOP . . . . . . . 33--38
Karl Lieberherr and
Doug Orleans and
Johan Ovlinger Aspect-oriented programming with
adaptive methods . . . . . . . . . . . . 39--41
Harold Ossher and
Peri Tarr Using multidimensional separation of
concerns to (re)shape evolving software 43--50
Lodewijk Bergmans and
Mehmet Aksits Composing crosscutting concerns using
composition filters . . . . . . . . . . 51--57
Gregor Kiczales and
Erik Hilsdale and
Jim Hugunin and
Mik Kersten and
Jeffrey Palm and
William Griswold Getting started with ASPECTJ . . . . . . 59--65
J. Andrés Díaz Pace and
Marcelo R. Campo Analyzing the role of aspects in
software design . . . . . . . . . . . . 66--73
Gail C. Murphy and
Robert J. Walker and
Elisa L. A. Baniassad and
Martin P. Robillard and
Albert Lai and
Mik A. Kersten Does aspect-oriented programming work? 75--77
Yvonne Coady and
Gregor Kiczales and
Mike Feeley and
Norm Hutchinson and
Joon Suan Ong Structuring operating system aspects:
using AOP to improve OS structure
modularity . . . . . . . . . . . . . . . 79--82
Paniti Netinant and
Tzilla Elrad and
Mohamed E. Fayad A layered approach to building open
aspect-oriented systems: a framework for
the design of on-demand system
demodularization . . . . . . . . . . . . 83--85
Jeff Gray and
Ted Bapty and
Sandeep Neema and
James Tuck Handling crosscutting constraints in
domain-specific modeling . . . . . . . . 87--93
Gregory T. Sullivan Aspect-oriented programming using
reflection and metaobject protocols . . 95--97
Cherri Pancake and
Christian Lengauer High-performance Java . . . . . . . . . 98--101
José E. Moreira and
Samuel P. Midkiff and
Manish Gupta and
Pedro V. Artigas and
Peng Wu and
George Almasi The NINJA project . . . . . . . . . . . 102--109
Thilo Kielmann and
Philip Hatcher and
Luc Bougé and
Henri E. Bal Enabling Java for high-performance
computing . . . . . . . . . . . . . . . 110--117
Vladimir Getov and
Gregor von Laszewski and
Michael Philippsen and
Ian Foster Multiparadigm communications in Java for
grid computing . . . . . . . . . . . . . 118--125
Henry F. Ledgard Technical opinion: The emperor with no
clothes . . . . . . . . . . . . . . . . 126--128
Ralph Westfall Technical opinion: Hello, world
considered harmful . . . . . . . . . . . 129--130
Stephan Somogyi and
Bruce Schneier Inside Risks: The perils of port 80 . . 168--168
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: NSA's Data Overload Slows
Intelligence; Disaster Plans, Thanks to
Y2K; Simulating the Birth of the Moon;
Looking for a Few Good Hackers; GPS for
Plane Navigation; Free Medical Journal
Access; Music to Live By; Tracking
Employee Trust . . . . . . . . . . . . . 9--10
Diane Crawford and
Scott E. Hamilton and
David Touretzky and
Raymond Michiels and
David Parnas and
Peter Denning and
Alan Creak Forum: Simple Copyright Violation or
Unlawful Circumvention? Outlawing
Numbers Impractical; Defining
Information; Special Needs and Sound
Scholarship . . . . . . . . . . . . . . 11--15
Brock N. Meeks Electronic Frontier: Blanking on
rebellion: where the future is
``Nabster'' . . . . . . . . . . . . . . 17--20
Peter J. Denning and
Robert Dunham The Profession of IT: The core of the
third-wave professional . . . . . . . . 21--25
Fran Berman Viewpoint: From TeraGrid to knowledge
grid . . . . . . . . . . . . . . . . . . 27--28
Albert Huang On Site: Innovative use of email for
teaching . . . . . . . . . . . . . . . . 29--32
Brad A. Myers Using handhelds and PCs together . . . . 34--41
Ravi Bapna and
Paulo Goes and
Alok Gupta Insights and analyses of online auctions 42--50
Michael Ettredge and
Vernon J. Richardson and
Susan Scholz A Web site design model for financial
information . . . . . . . . . . . . . . 51--56
Alina M. Chircu and
Robert J. Kauffman and
Doug Keskey Maximizing the value of Internet-based
corporate travel reservation systems . . 57--63
John Gray The end of career . . . . . . . . . . . 65--69
John Backus Funding the computing revolution's third
wave . . . . . . . . . . . . . . . . . . 70--76
Nicholas Carriero and
David Gelernter A computational model of everything . . 77--81
Mark Burgin How we know what technology can do . . . 82--88
Henry C. Lucas Information technology and physical
space . . . . . . . . . . . . . . . . . 89--96
Steve Sawyer A market-based perspective on
information systems development . . . . 97--102
Lauren Weinstein and
Peter G. Neumann Inside Risks: Risks of panic . . . . . . 152--152
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Privacy Tradeoff Fighting
Terrorism; Information Removal;
Military-Issue Handhelds; Haptic
Tug-of-War; Turning Back 10 Billion
(Web) Pages of Time; Brainy Baboons;
Grunt Work . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Scott W. Ambler and
John Jaros and
Jim Highsmith and
Kurt Guntheroth and
Eric A. Weiss and
Steven Pothier Forum: One Sure Thing if Good Clean
Code; Exposing Agency Injustices;
Targeting Software Project Goals; Taking
a Stand on Copyright . . . . . . . . . . 11--13
Hal Berghel Digital Village: The Code Red Worm . . . 15--19
Roger C. Schank Log on Education: Revolutionizing the
Traditional Classroom Course . . . . . . 21--24
Ka-Ping Yee On Site: Operating an Emergency
Information Service . . . . . . . . . . 25--28
Jon M. Peha On Site: The Growing Debate Over Science
and Technology Advice for Congress . . . 29--31
Vir V. Phoha Viewpoint: The DMCA Needs Fixing . . . . 33--34
Zakaria Maamar and
Eric Dorion and
Catherine Daigle Technical Opinion: Toward Virtual
Marketplaces for E-Commerce Support . . 35--38
James M. Ragusa and
Grace M. Bochenek Collaborative Virtual Design
Environments: Introduction . . . . . . . 40--43
Randall C. Smith Shared Vision . . . . . . . . . . . . . 45--48
R. Bowen Loftin Design Engineering in Virtual
Environments . . . . . . . . . . . . . . 49--50
Mark Maybury Collaborative Virtual Environments for
Analysis and Decision Support . . . . . 51--54
Mark Maybury and
Ray D'Amore and
David House Expert Finding for Collaborative Virtual
Environments . . . . . . . . . . . . . . 55--56
Simon Su and
R. Bowen Loftin A Shared Virtual Environment for
Exploring and Designing Molecules . . . 57--58
Imre Horváth and
Zoltán Rusák Collaborative Shape Conceptualization in
Virtual Design Environments . . . . . . 59--63
Cristian Luciano and
Pat Banerjee and
Sanjay Mehrotra 3$D$ Animation of Telecollaborative
Anthropomorphic Avatars . . . . . . . . 64--67
Robert Davison and
Gert-Jan De Vreede Global Applications of Collaborative
Technology: Introduction . . . . . . . . 68--70
Line Dubé and
Guy Paré Global Virtual Teams . . . . . . . . . . 71--73
Sue Newell and
Shan L. Pan and
Robert D. Galliers and
Jimmy C. Huang The Myth of the Boundaryless
Organization . . . . . . . . . . . . . . 74--76
Séamas Kelly and
Matthew Jones Groupware and the Social Infrastructure
of Communication . . . . . . . . . . . . 77--79
Gerardine DeSanctis and
Matthew Wright and
Lu Jiang Building a Global Learning Community . . 80--82
Anne P. Massey and
Mitzi Montoya-Weiss and
Caisy Hung and
V. Ramesh Cultural Perceptions of Task-Technology
Fit . . . . . . . . . . . . . . . . . . 83--84
Sajda Qureshi and
Ilze Zigurs Paradoxes and Prerogatives in Global
Virtual Collaboration . . . . . . . . . 85--88
Roberto Evaristo Nonconsensual Negotiation in Distributed
Collaboration . . . . . . . . . . . . . 89--89
Ram D. Gopal and
Zhiping Walter and
Arvind K. Tripathi Admediation: New Horizons in Effective
Email Advertising . . . . . . . . . . . 91--96
Eric J. Glover and
Steve Lawrence and
Michael D. Gordon and
William P. Birmingham and
C. Lee Giles Web Search---Your Way . . . . . . . . . 97--102
J. Leon Zhao and
Vincent H. Resh Internet Publishing and Transformation
of Knowledge Processes . . . . . . . . . 103--109
Peter G. Neumann and
Lauren Weinstein Inside Risks: Risks of National Identity
Cards . . . . . . . . . . . . . . . . . 176--176
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Working Shadow; Hold That
Thought; Access Advantage; Tuned Out or
In?; Strength in Numbers; Research
Salaries; Bye Big Blues; Sidebar: Hooked
U. . . . . . . . . . . . . . . . . . . . 9--10
Phillip G. Armour The business of software: The spiritual
life of projects . . . . . . . . . . . . 11--14
Neil Munro From Washington: Too much of a good
thing . . . . . . . . . . . . . . . . . 15--17
Lloyd W. Bartholome and
David H. Olsen On site: A practical approach for
implementing e-commerce programs in
business schools . . . . . . . . . . . . 19--21
Anthony M. Townsend and
Anthony R. Hendrickson and
Samuel M. DeMarie Viewpoint: Meeting the virtual work
imperative . . . . . . . . . . . . . . . 23--26
Michael Lewis and
Jeffrey Jacobson Game engines in scientific research:
Introduction . . . . . . . . . . . . . . 27--31
Michael Lewis The new cards . . . . . . . . . . . . . 30--31
John E. Laird Research in human-level AI using
computer games . . . . . . . . . . . . . 32--35
Wayne Piekarski and
Bruce Thomas ARQuake: the outdoor augmented reality
gaming system . . . . . . . . . . . . . 36--38
Jeffrey Jacobson and
Zimmy Hwang Unreal tournament for immersive
interactive theater . . . . . . . . . . 39--42
Gal A. Kaminka and
Manuela M. Veloso and
Steve Schaffer and
Chris Sollitto and
Rogelio Adobbati and
Andrew N. Marshall and
Andrew Scholer and
Sheila Tejada GameBots: a flexible test bed for
multiagent team research . . . . . . . . 43--45
Markus Bylund and
Fredrik Espinoza Testing and demonstrating context-aware
services with Quake III Arena . . . . . 46--48
CACM Staff The ACM annual report FY01 . . . . . . . 49--52
Murugan Anandarajan Internet abuse in the workplace:
Introduction . . . . . . . . . . . . . . 53--54
Jeffrey M. Stanton Company profile of the frequent Internet
user . . . . . . . . . . . . . . . . . . 55--59
Jo Ann Oravec Constructive approaches to Internet
recreation in the workplace . . . . . . 60--63
France Belanger and
Craig Van Slyke Abuse or learning? . . . . . . . . . . . 64--65
Vivien K. G. Lim and
Thompson S. H. Teo and
Geok Leng Loo How do I loaf here? Let me count the
ways . . . . . . . . . . . . . . . . . . 66--70
Claire A. Simmers Aligning Internet usage with business
priorities . . . . . . . . . . . . . . . 71--74
Keng Siau and
Fiona Fui-Hoon Nah and
Limei Teng Acceptable Internet use policy . . . . . 75--79
Andrew Urbaczewski and
Leonard M. Jessup Does electronic monitoring of employee
Internet usage work? . . . . . . . . . . 80--83
Raymond R. Panko and
Hazel Glenn Beh Monitoring for pornography and sexual
harassment . . . . . . . . . . . . . . . 84--87
Upkar Varshney and
Andy Snow and
Matt McGivern and
Christi Howard Voice over IP . . . . . . . . . . . . . 89--96
Chittibabu Govindarajulu The status of helpdesk support . . . . . 97--100
Julie Smith David and
David Schuff and
Robert St. Louis Managing your total IT cost of ownership 101--106
Cris Kobryn Technical opinion: Will UML 2.0 be agile
or awkward? . . . . . . . . . . . . . . 107--110
Mohamed Fayad Thinking objectively: Accomplishing
software stability . . . . . . . . . . . 111--115
Robert E. Filman and
Stuart Barrett and
Diana D. Lee and
Ted Linden Inserting ilities by controlling
communications . . . . . . . . . . . . . 116--122
Rebecca Mercuri Inside risks: Uncommon criteria . . . . 172--172
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6
Robert Fox News Track: A Blessing and a Curse;
Jacked-In Jersey; Not Just Music;
Infectious Glow; All-Seeing; On Your
Mark; Brain Waves; Diabolical Degree . . 9--10
Diane Crawford and
Byron Weber Becker and
Jaime Nino and
Hugh McGuire and
Gil Colgate and
Mark Lutton and
Vladimir Safonov and
Ralph Westfall and
Bradley K. Sherman and
Ed Lowry and
Kurt Guntheroth Forum: `Hello, World' Gets Mixed
Greetings; Westfall Responds; The
Emperor's Wardrobe; Targeting Zeppelins 11--17
Andrew Grosso Legally speaking: Why the Digital
Millennium Copyright Act is a failure of
reason . . . . . . . . . . . . . . . . . 19--23
Robert L. Glass Practical programmer: Stodgy by design,
and the notion of `dumbing up' . . . . . 25--27
Felipe Castel Ontological computing . . . . . . . . . 29--30
Ben Shneiderman Viewpoint: ACM's computing professionals
face new challenges . . . . . . . . . . 31--34
Qing Bian Zhang and
Patrick Y. K. Chau On site: Creating e-commerce courses
with regional intent . . . . . . . . . . 35--37
Michael Gruninger and
Jintae Lee Ontology applications and design:
Introduction . . . . . . . . . . . . . . 39--41
Clyde W. Holsapple and
K. D. Joshi A collaborative approach to ontology
design . . . . . . . . . . . . . . . . . 42--47
Henry Kim Predicting how ontologies for the
semantic Web will evolve . . . . . . . . 48--54
John O. Everett and
Daniel G. Bobrow and
Reinhard Stolle and
Richard Crouch and
Valeria de Paiva and
Cleo Condoravdi and
Martin van den Berg and
Livia Polanyi Making ontologies work for resolving
redundancies across documents . . . . . 55--60
Nicola Guarino and
Christopher Welty Evaluating ontological decisions with
OntoClean . . . . . . . . . . . . . . . 61--65
Bert J. Dempsey and
Debra Weiss and
Paul Jones and
Jane Greenberg Who is an open source software
developer? . . . . . . . . . . . . . . . 67--72
Jo Ellen Moore and
Lisa A. Burke How to turn around `turnover culture' in
IT . . . . . . . . . . . . . . . . . . . 73--78
William J. Kettinger and
Choong C. Lee Understanding the IS-user divide in IT
innovation . . . . . . . . . . . . . . . 79--84
Delvin Grant A wider view of business process
reengineering . . . . . . . . . . . . . 85--90
Gordon Bell and
Jim Gray What's next in high-performance
computing? . . . . . . . . . . . . . . . 91--95
Richard T. Snodgrass Rights and responsibilities in ACM
publishing: Progress on ACM's becoming
the Preferred Publisher . . . . . . . . 97--101
Thomas Erickson Technical opinion: Some problems with
the notion of context-aware computing 102--104
Evgeniy Gabrilovich and
Alex Gontmakher Inside risks: The homograph attack . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Boosting Military Tech
Spending; Press `Eject' Button and Call
Security; Identity Tops Theft List;
Pashto-Phonics; Talk to the (Gloved)
Hand; Winning Over Girls on the Gadget
Front; A Robot to Do a Nano-Crab's Work;
When Web Surfing Turns to Googlewhacking 9--10
Diane Crawford and
Richard Staehli and
Donald J. Reifer and
Anonymous and
William L. Anderson and
Atanas Radenski and
Rick Simkin and
Ram D. Gopal and
Zhiping Walter and
Arvind K. Tripathi and
Phil Armour Forum: Doubts and Hopes for AOP; Social
and Technical Aspects of Information
Systems Design and Deployment; Classroom
Teaching vs. Online Courses; No
Unsolicited Email Ads for Me, Please; A
Chilling Virus . . . . . . . . . . . . . 11--14
Peter Denning Internet time out . . . . . . . . . . . 15--18
Meg McGinity Call it techonomics . . . . . . . . . . 19--21
The Stanford Student Computer and
Network Privacy Project A study of student privacy issues at
Stanford University . . . . . . . . . . 23--25
Ananda Mitra Trust, authenticity, and discursive
power in cyberspace . . . . . . . . . . 27--29
Gaurav S. Sukhatme and
Maja J. Matari\'c Robots: Intelligence, Versatility,
Adaptivity . . . . . . . . . . . . . . . 30--32
Rodney Brooks Humanoid robots . . . . . . . . . . . . 33--38
Daniela Rus and
Zack Butler and
Keith Kotay and
Marsette Vona Self-reconfiguring robots . . . . . . . 39--45
Oussama Khatib and
Oliver Brock and
Kyong-Sok Chang and
François Conti and
Diego Ruspini and
Luis Sentis Robotics and interactive simulation . . 46--51
Sebastian Thrun Probabilistic robotics . . . . . . . . . 52--57
Manuela M. Veloso Entertainment robotics . . . . . . . . . 59--63
Richard T. Grenci and
Peter A. Todd Solutions-driven marketing . . . . . . . 64--71
John Cameron Configurable development processes . . . 72--77
Leysia Palen Mobile telephony in a connected life . . 78--82
Huaiqing Wang and
John Mylopoulos and
Stephen Liao Intelligent agents and financial risk
monitoring systems . . . . . . . . . . . 83--88
Vincent S. Lai and
Wingyan Chung Managing international data
communications . . . . . . . . . . . . . 89--93
Ruzena Bajcsy and
Craig Reynolds Computer science: the science of and
about information and computation . . . 94--98
Peter J. Denning and
James J. Horning Inside Risks: Risks of linear thinking 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Security Boom; Line-of-Sight
Laser Communication; Toxic Tech Exports;
Internet Not Ready for Public Elections;
Chip Implant for Positive ID; Clicking
Overseas to the Movies; Finland? How
About Nokialand? . . . . . . . . . . . . 9--10
Diane Crawford and
Edward J. Beroset and
John Jaros and
C. J. Date and
Robert Plotkin and
Rick Simkin and
Thomas W. Moran and
Hugh Kawabata and
Neil Munro and
Jason Funk and
Pal Valckenaers and
Bob Rinker and
Brock Meeks and
Dennis de Champeaux and
John A. Wills and
Gabriel Mateescu Forum: Don't Take Civil Liberties in the
Name of National Security; Spare Me the
Paranoia; Taking Responsibility for
Worms and Viruses; Who's Research is
Unethical?; Dual Parallelism in the Grid 11--16
Mark Guzdial and
Elliot Soloway Log on education: Teaching the Nintendo
generation to program . . . . . . . . . 17--21
Hal Berghel Digital village: Hijacking the Web:
Cookies revisited: Continuing the
dialogue on personal security and
underlying privacy issues . . . . . . . 23--27
Murray Turoff On site: Past and future emergency
response information systems . . . . . . 29--32
David Davenport Viewpoint: Anonymity on the Internet:
why the price may be too high . . . . . 33--35
Jenny Preece Introduction: Supporting community and
building social capital . . . . . . . . 37--39
Thomas Erickson and
Christine Halverson and
Wendy A. Kellogg and
Mark Laff and
Tracee Wolf Social translucence: designing social
infrastructures that make collective
activity visible . . . . . . . . . . . . 40--44
Judith Donath A semantic approach to visualizing
online conversations . . . . . . . . . . 45--49
Marc Smith Tools for navigating large social
cyberspaces . . . . . . . . . . . . . . 51--55
Starr Roxanne Hiltz and
Murray Turoff What makes learning networks effective? 56--59
Amy Bruckman The future of e-learning communities . . 60--63
Dorine C. Andrews Audience-specific online community
design . . . . . . . . . . . . . . . . . 64--68
David R. Millen and
Michael A. Fontaine and
Michael J. Muller Understanding the benefit and costs of
communities of practice . . . . . . . . 69--73
Judy E. Scott and
Iris Vessey Managing risks in enterprise systems
implementations . . . . . . . . . . . . 74--81
Thomas Schambach and
J. Ellis Blanton The professional development challenge
for IT professionals . . . . . . . . . . 83--87
Bonnie A. Nardi and
Steve Whittaker and
Ellen Isaacs and
Mike Creech and
Jeff Johnson and
John Hainsworth Integrating communication and
information through ContactMap . . . . . 89--95
Mordechai Ben-Menachem and
Roy Gelbard Integrated IT management tool kit . . . 96--102
Arnd Weber Enabling crypto: how radical innovations
occur . . . . . . . . . . . . . . . . . 103--107
Mohamed E. Fayad Thinking objectively: How to deal with
software stability . . . . . . . . . . . 109--112
David W. J. Stringer-Calvert Inside Risks: Digital evidence . . . . . 128--128
Marie-Mich\`ele Boulet and
Faouzi Ben Jebara and
Fathi Bemmira and
Serge Boudreault A Comparison of Three Delivery Systems
for Teaching an Information Technology
Course . . . . . . . . . . . . . . . . . 129--135
Vladan Deved\vzi\'c Understanding Ontological Engineering 136--144
Christos J. Georgiou and
Petros S. Stefaneas Strategies for Accelerating the
Worldwide Adoption of E-Commerce . . . . 145--151
T. Dean Hendrix and
Michelle P. Schneider NASA's TReK Project: A Case Study in
Using the Spiral Model of Software
Development . . . . . . . . . . . . . . 152--159
William Hibbard and
Curtis Rueden and
Steve Emmerson and
Tom Rink and
David Glowacki and
Tom Whittaker and
Don Murray and
David Fulker and
John Anderson Java Distributed Objects for Numerical
Visualization in VisAD . . . . . . . . . 160--170
Gretchen L. Robertson and
Deborah Hix Making the Computer Accessible to
Mentally Retarded Adults . . . . . . . . 171--183
Beverly K. Kahn and
Diane M. Strong and
Richard Y. Wang Information Quality Benchmarks: Product
and Service Performance . . . . . . . . 184--192
Anandasivam Gopal and
Tridas Mukhopadhyay and
Mayuram S. Krishnan The Role of Software Processes and
Communication in Offshore Software
Development . . . . . . . . . . . . . . 193--200
Ravi Patnayakuni and
Arun Rai Development Infrastructure
Characteristics and Process Capability 201--210
Leo L. Pipino and
Yang W. Lee and
Richard Y. Wang Data Quality Assessment . . . . . . . . 211--218
Moshe Zviran Securing PC Applications: The Relay Race
Approach . . . . . . . . . . . . . . . . 219--227
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Part Cyborg, Part Human;
Airline (Web) Revenue Soars; Cutting
Work Privileges; Slight Change in
High-Tech Hirings; Monkey Think, Monkey
Do; Campus File-Swapping Truce; Love
Found, Love Lost . . . . . . . . . . . . 9--10
Diane Crawford and
Steven Warshawsky and
Kamesh Balasubramanian and
H. Paul Zeiger and
Richard Ho and
David Cymbala and
John C. Nash and
Bertrand Meyer and
Mordechai Ben-Menachem Forum: The Spirited Sides of a Story;
Strength in Stability; Total Picture; A
Readable Plea; The More Things
Change\ldots . . . . . . . . . . . . . . 11--13
Robert L. Glass Searching for the holy grail of software
engineering . . . . . . . . . . . . . . 15--16
Phillip G. Armour The organism and the mechanism of
projects . . . . . . . . . . . . . . . . 17--20
Pratyush Bharati and
Peter Tarasewich Global perceptions of journals
publishing e-commerce research . . . . . 21--26
Wei-Lung Wang Beware the engineering metaphor . . . . 27--29
Peter Brusilovsky and
Mark T. Maybury From adaptive hypermedia to the adaptive
Web . . . . . . . . . . . . . . . . . . 30--33
Daniel Billsus and
Clifford A. Brunk and
Craig Evans and
Brian Gladish and
Michael Pazzani Adaptive interfaces for ubiquitous Web
access . . . . . . . . . . . . . . . . . 34--38
Barry Smyth and
Keith Bradley and
Rachael Rafter Personalization techniques for online
recruitment services . . . . . . . . . . 39--40
Josef Fink and
Jürgen Koenemann and
Stephan Noller and
Ingo Schwab Putting personalization into practice 41--42
Elisabeth André and
Thomas Rist From adaptive hypertext to personalized
Web companions . . . . . . . . . . . . . 43--46
Keith Cheverst and
Keith Mitchell and
Nigel Davies The role of adaptive hypermedia in a
context-aware tourist GUIDE . . . . . . 47--51
Liliana Ardissono and
Anna Goy and
Giovanna Petrone and
Marino Segnan Personalization in business-to-customer
interaction . . . . . . . . . . . . . . 52--53
Marc Light and
Mark T. Maybury Personalized multimedia information
access . . . . . . . . . . . . . . . . . 54--59
Paul De Bra Adaptive educational hypermedia on the
Web . . . . . . . . . . . . . . . . . . 60--61
Diana Bental and
Alison Cawsey Personalized and adaptive systems for
medical consumer applications . . . . . 62--63
Alfred Kobsa Personalized hypermedia and
international privacy . . . . . . . . . 64--67
Edieal J. Pinker and
Abraham Seidmann and
Reginald C. Foster Strategies for transitioning `old
economy' firms to e-business . . . . . . 76--83
Christian Wagner and
Efraim Turban Are intelligent e-commerce agents
partners or predators? . . . . . . . . . 84--90
Barry Wellman Designing the Internet for a networked
society . . . . . . . . . . . . . . . . 91--96
John J. Helly and
T. Todd Elvins and
Don Sutton and
David Martinez and
Scott E. Miller and
Steward Pickett and
Aaron M. Ellison Controlled publication of digital
scientific data . . . . . . . . . . . . 97--101
Ned Kock Managing with Web-based IT in mind . . . 102--106
Michael Tow Cheung and
Ziqi Liao Time-asymmetry in business processes . . 107--108
Lauren Weinstein Inside Risks: Risks of inaction . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Floating Transponders; Gonzo
Journalism Redefined; China Second in
Web Use; Household Appliances, Lend Me
Your Ears; GPS as Prison Guard; Newest
Hack: Blinking Lights; Its Name Is
ASIMO; Beware Net Spirituality . . . . . 9--10
Diane Crawford and
Peter Magsig and
Marc Shapiro and
Paul Zeiger and
Pete McDougall and
Earl Furman and
James Bach and
Sandy Ressler and
Daniel Savarese Forum: Weighing in on the notion of
`dumbing up' . . . . . . . . . . . . . . 11--13
Peter J. Denning The profession of IT: Flatlined . . . . 15--19
Meg McGinity Staying connected: Broadband to go . . . 21--24
Harold W. Lawson Viewpoint: Rebirth of the computer
industry . . . . . . . . . . . . . . . . 25--29
Gul A. Agha Introduction: Adaptive Middleware . . . 30--32
Fabio Kon and
Fabio Costa and
Gordon Blair and
Roy H. Campbell The case for reflective middleware . . . 33--38
Anand Tripathi Challenges designing next-generation
middleware systems . . . . . . . . . . . 39--42
Douglas C. Schmidt Middleware for real-time and embedded
systems . . . . . . . . . . . . . . . . 43--48
Nalini Venkatasubramanian Safe `composability' of middleware
services . . . . . . . . . . . . . . . . 49--52
Valérie Issarny and
Christos Kloukinas and
Apostolos Zarras Systematic aid for developing middleware
architectures . . . . . . . . . . . . . 53--58
Jean Bacon and
Ken Moody Toward open, secure, widely distributed
services . . . . . . . . . . . . . . . . 59--64
Diane Crawford ACM fellows . . . . . . . . . . . . . . 65--65
Michael Ettredge and
Vernon J. Richardson and
Susan Scholz \em Timely financial reporting at
corporate Web sites? . . . . . . . . . . 67--71
Kai Lung Hui and
Patrick Y. K. Chau Classifying digital products . . . . . . 73--79
Gary Klein and
James J. Jiang and
Debbie B. Tesch Wanted: project teams with a blend of is
professional orientations . . . . . . . 81--87
Gloria Mark Extreme collaboration . . . . . . . . . 89--93
Raquel Benbunan-Fich Improving education and training with IT 94--99
James A. Aries and
Subhankar Banerjee and
Marc S. Brittan and
Eric Dillon and
Janusz S. Kowalik and
John P. Lixvar Capacity and performance analysis of
distributed enterprise systems . . . . . 100--105
Patrick P. Gelsinger Technical opinion: Power play . . . . . 106--106
Ross Anderson Inside Risks: Free speech online and
offline . . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News Track: Eye on Sensitive Student
Visas; E-Tooling Government IT
Recruiting; Remote Control Ratbots; More
Hack Attacks in Israel; Felt-Tipped Pen
Mightier Than CD Copy Protection; Need a
Screen? Paint One; Where High-Tech CEOs
See Growth; All Thumbs in Japan . . . . 9--10
Diane Crawford and
Aram Gharib and
Ken Kahn and
B. Jagannathan and
Richard Stallman and
Jim Densmore Forum: In Praise of Work's Human
Dimension; Make it Visible, Tangible,
Graphical; Justifying Anonymity; Free
Software Reality v. Deception; Already
Maxed Out . . . . . . . . . . . . . . . 11--12
Brock N. Meeks Electronic frontier: True blue and
vigilante, too . . . . . . . . . . . . . 13--15
Neil Munro From Washington: The ever-expanding
network of local and federal databases 17--19
Shai Simonson On site: A post-baccalaureate
undergraduate-level program in computer
science . . . . . . . . . . . . . . . . 21--24
Maris G. Martinsons and
Valdis Martinsons Viewpoint: Rethinking the value of IT,
again . . . . . . . . . . . . . . . . . 25--26
Andrew Rosenbloom How the virtual inspires the real . . . 28--31
W. Daniel Hillis The power to shape the world . . . . . . 32--35
Alvy Ray Smith The reality of simulated actors . . . . 36--39
Theresa-Marie Rhyne Computer games and scientific
visualization . . . . . . . . . . . . . 40--44
Clemens Wagner and
Markus Schill and
Reinhard Männer Intraocular surgery on a virtual eye . . 45--49
Marc Pollefeys and
Luc Van Gool From images to $3$D models . . . . . . . 50--55
Norman I. Badler and
Charles A. Erignac and
Ying Liu Virtual humans for validating
maintenance procedures . . . . . . . . . 56--63
Mark Billinghurst and
Hirokazu Kato Collaborative augmented reality . . . . 64--70
Gordon Bell and
Jim Gemmell A call for the home media network . . . 71--75
Toru Ishida Digital city Kyoto . . . . . . . . . . . 76--81
Katherine M. Shelfer and
J. Drew Procaccino Smart card evolution . . . . . . . . . . 83--88
John M. Gallaugher E-commerce and the undulating
distribution channel . . . . . . . . . . 89--95
Snehamay Banerjee and
Ram L. Kumar Managing electronic interchange of
business documents . . . . . . . . . . . 96--102
Jonathon N. Cummings and
Brian Butler and
Robert Kraut The quality of online social
relationships . . . . . . . . . . . . . 103--108
Robert Davison Technical opinion: Cultural
complications of ERP . . . . . . . . . . 109--111
Donald A. Norman Inside risks: Beyond the computer
industry . . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News tracks . . . . . . . . . . . . . . 9--10
Diane Crawford and
Srinivas Nedunuri and
Adrian Bowyer and
Arnd Weber and
Greg A. Woods and
Mark Adler Forum: Embrace the Engineering Metaphor;
Credit for Crypto's Parallel
Development; Enough PDF: Give me HTML 11--14
Cathleen Norrisand and
Elliot Soloway and
Terry Sullivan Log on education: Examining 25 years of
technology in U.S. education . . . . . . 15--18
Robert L. Glass Practical programmer: The proof of
correctness wars . . . . . . . . . . . . 19--21
Christof Teuscher and
Moshe Sipper Viewpoint: Hypercomputation: hype or
computation? . . . . . . . . . . . . . . 23--24
Ross A. Malaga On site: Additional methods when using
email for teaching . . . . . . . . . . . 25--27
Usama Fayyad and
Ramasamy Uthurusamy Evolving data into mining solutions for
insights . . . . . . . . . . . . . . . . 28--31
Padhraic Smyth and
Daryl Pregibon and
Christos Faloutsos Data-driven evolution of data mining
algorithms . . . . . . . . . . . . . . . 33--37
Paul Bradley and
Johannes Gehrke and
Raghu Ramakrishnan and
Ramakrishnan Srikant Scaling mining algorithms to large
databases . . . . . . . . . . . . . . . 38--43
Ron Kohavi and
Neal J. Rothleder and
Evangelos Simoudis Emerging trends in business analytics 45--48
Chidanand Apte and
Bing Liu and
Edwin P. D. Pednault and
Padhraic Smyth Business applications of data mining . . 49--53
Jiawei Han and
Russ B. Altman and
Vipin Kumar and
Heikki Mannila and
Daryl Pregibon Emerging scientific applications in data
mining . . . . . . . . . . . . . . . . . 54--58
Robert L. Grossman and
Mark F. Hornick and
Gregor Meyer Data mining standards initiatives . . . 59--61
Peter Tarasewich and
Patrick R. McMullen Swarm intelligence: power in numbers . . 62--67
Tim Coltman and
Timothy M. Devinney and
Alopi S. Latukefu and
David F. Midgley Keeping e-business in perspective . . . 69--73
Clayton A. Looney and
Debabroto Chatterjee Web-enabled transformation of the
brokerage industry . . . . . . . . . . . 75--81
Craig Van Slyke and
Christie L. Comunale and
France Belanger Gender differences in perceptions of
Web-based shopping . . . . . . . . . . . 82--86
George Chin and
James Myers and
David Hoyt Social networks in the virtual science
laboratory . . . . . . . . . . . . . . . 87--92
M. A. Quaddus and
Lai Lai Tung Explaining cultural differences in
decision conferencing . . . . . . . . . 93--98
Lawrence G. Jones and
Arthur L. Price Changes in computer science
accreditation . . . . . . . . . . . . . 99--103
Nick Ourosoff Technical opinion: Primitive types in
Java considered harmful . . . . . . . . 105--106
Tolga Acar and
John R. Michener Inside risks: Risks in features vs.
assurance . . . . . . . . . . . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track: Symbols for Vagabond Users;
Chipped Tooth; Pixel Fix on Visual
Intelligence; Blinking Bumper; Virtual
House Calls; More Than One Billion
Served; Math and Science Teachers
Wanted; Crash Test Dummy . . . . . . . . 9--10
Diane Crawford and
Al Endres and
Jason Funk and
John Florentin and
Gregg Irwin and
Bud Lawson and
Alvin P. Mullery and
Christian Wagner and
Efraim Turban Forum: Influencing Factors in the
Computer Industry; The Difference
Between Intelligent Agents and Mobile
Agents . . . . . . . . . . . . . . . . . 11--14
Hal Berghel Digital Village: Responsible Web caching 15--20
Peter J. Denning The Profession of IT: Career redux . . . 21--26
Paul F. Ross On Site: Whatever became of integrity? 27--28
Maria M. Klawe Letter from the President: Making a
difference through computing communities 29--30
Ralph R. Miller Viewpoint: Information management in the
aftermath of 9/11 . . . . . . . . . . . 31--33
Simon Davies A year after 9/11: where are we now? . . 35--39
Eric A. Brewer Introduction: The Consumer Side of
Search . . . . . . . . . . . . . . . . . 40--41
Marti Hearst and
Ame Elliott and
Jennifer English and
Rashmi Sinha and
Kirsten Swearingen and
Ka-Ping Yee Finding the flow in Web site search . . 42--49
James Pitkow and
Hinrich Schütze and
Todd Cass and
Rob Cooley and
Don Turnbull and
Andy Edmonds and
Eytan Adar and
Thomas Breuel Personalized search . . . . . . . . . . 50--55
Abbe Mowshowitz and
Akira Kawaguchi Bias on the Web . . . . . . . . . . . . 56--60
James Gerlach and
Bruce Neumann and
Edwin Moldauer and
Martha Argo and
Daniel Frisby Determining the cost of IT services . . 61--67
Ellen Isaacs and
Alan Walendowski and
Dipti Ranganathan Mobile instant messaging through Hubbub 68--72
Ritu Agarwal and
Thomas W. Ferratt Enduring practices for managing IT
professionals . . . . . . . . . . . . . 73--79
Mike Morrison and
Joline Morrison and
Anthony Keys Integrating Web sites and databases . . 81--86
Craig K. Tyran and
Joey F. George Improving software inspections with
group process support . . . . . . . . . 87--92
William R. King and
Peter V. Marks, Jr. and
Scott McCoy The most important issues in knowledge
management . . . . . . . . . . . . . . . 93--97
Nikolay V. Shilov and
Kwangkeun Yi Engaging students with theory through
ACM Collegiate Programming Contests . . 98--101
Mohamed Fayad and
Shasha Wu Thinking Objectively: Merging multiple
conventional models in one stable model 102--106
Mark Stamp Inside Risks: Risks of digital rights
management . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track: Liquid Light; Let Your
Finging Do the Paying; IT Professional
Pressure Cooker; A Spot in the Clouds;
Must See Floppy TV; Mainframe Skill
Shortage; Moore's Law and Cyronic
Suspension . . . . . . . . . . . . . . . 9--10
Rebecca T. Mercuri Security Watch: Computer security:
quality rather than quantity . . . . . . 11--14
Pamela Samuelson Legally Speaking: Reverse engineering
under siege . . . . . . . . . . . . . . 15--20
R. S. Boyer and
W. Feijen and
D. Gries and
C. A. R. Hoare and
J. Misra and
J. Moore and
H. Richards In memoriam: Edsger W. Dijkstra
1930--2002 . . . . . . . . . . . . . . . 21--22
Rafael Palacios On Site: Remote automatic doorman via
the Internet . . . . . . . . . . . . . . 23--25
Alan Howard Viewpoint: Rapid Application
Development: rough and dirty or
value-for-money engineering? . . . . . . 27--29
Ali Arsanjani Introduction: Developing and Integrating
Enterprise Components and Services . . . 30--34
Ivica Crnkovic and
Brahim Hnich and
Torsten Jonsson and
Zeynep Kiziltan Specification, implementation, and
deployment of components . . . . . . . . 35--40
Erik Meijer and
Clemens Szyperski Overcoming independent extensibility
challenges . . . . . . . . . . . . . . . 41--44
Keith Levi and
Ali Arsanjani A goal-driven approach to enterprise
component identification and
specification . . . . . . . . . . . . . 45--52
Ricardo Jardim-Gonçalves and
Adolfo Steiger-Garção Implicit multilevel modeling in flexible
business environments . . . . . . . . . 53--57
Jeff Sutherland and
Willem-Jan van den Heuvel Enterprise application integration and
complex adaptive systems . . . . . . . . 59--64
Aniruddha Gokhale and
Douglas C. Schmidt and
Balachandran Natarajan and
Nanbor Wang Applying model-integrated computing to
component middleware and enterprise
applications . . . . . . . . . . . . . . 65--70
Michael Stal Web services: beyond component-based
computing . . . . . . . . . . . . . . . 71--76
Paul Fremantle and
Sanjiva Weerawarana and
Rania Khalaf Enterprise services . . . . . . . . . . 77--82
Soo Dong Kim Lessons learned from a nationwide CBD
promotion project . . . . . . . . . . . 83--87
Winslow Burleson and
Ted Selker Introduction: Creativity and Interface 88--90
Ernest Edmonds and
Linda Candy Creativity, art practice, and knowledge 91--95
Lena Mamykina and
Linda Candy and
Ernest Edmonds Collaborative creativity . . . . . . . . 96--99
Sharon L. Greene Characteristics of applications that
support creativity . . . . . . . . . . . 100--104
Michael Terry and
Elizabeth D. Mynatt Supporting experimentation with
Side-Views . . . . . . . . . . . . . . . 106--108
Chris Roast and
Innes Ritchie and
Stephanie Thomas Re-creating the reader: supporting
active reading in literary research . . 109--111
John C. Thomas and
Alison Lee and
Catalina Danis Enhancing creative design via software
tools . . . . . . . . . . . . . . . . . 112--115
Ben Shneiderman Creativity support tools . . . . . . . . 116--120
E. Vance Wilson Email winners and losers . . . . . . . . 121--126
Ali F. Farhoomand and
Don H. Drury Managerial information overload . . . . 127--131
H. James Nelson and
Deborah J. Armstrong and
Mehdi Ghods Old dogs and new tricks . . . . . . . . 132--137
Patrick Y. K. Chau and
Melissa Cole and
Anne P. Massey and
Mitzi Montoya-Weiss and
Robert M. O'Keefe Cultural differences in the online
behavior of consumers . . . . . . . . . 138--143
Rajeswari Malladi and
Dharma P. Agrawal Technical Opinion: Current and future
applications of mobile and wireless
networks . . . . . . . . . . . . . . . . 144--146
Fred B. Schneider Inside Risks: Secure systems conundrum 160--160
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track: A Thousand Points of Light;
Typing with Your Eyes; Cleaning
Crustacean; The E-Bay of Argentina;
Online Abduction Alerts; Fighting
Airport Noise; Happy Birthday :-) . . . 9--10
Diane Crawford and
Sherif Yacoub and
John Stracke and
Gordon Bell and
Jim Gemmell and
Bob Ellis and
Myles Losch and
Ronnie Ward and
Anthony Ralston and
Rich Henders and
Steve Arnold and
Mark Lutton Forum: I Want My Home Network;
Consumer-Created Content Key to
Broadband; Still Living Off Y2K
Spending; Grading Education; Objective
Opinion; PDF Peeves; Homemade
Hypercomputation . . . . . . . . . . . . 11--14
Phillip Armour Business of Software: Ten unmyths of
project estimation . . . . . . . . . . . 15--18
Robert L. Glass Practical Programmer: Sorting out
software complexity . . . . . . . . . . 19--21
Boaz Gelbord and
Gert Roelofsen Viewpoint: New surveillance techniques
raise privacy concerns . . . . . . . . . 23--24
Zakaria Maamar and
Weiming Shen Introduction: Computer-Supported
Cooperative Work in Design . . . . . . . 25--26
Mark Klein and
Hiroki Sayama and
Peyman Faratin and
Yaneer Bar-Yam A complex systems perspective on
computer-supported collaborative design
technology . . . . . . . . . . . . . . . 27--31
Soroush Sedaghat and
Josef Pieprzyk and
Ehsan Vossough On-the-fly Web content integrity check
boosts users' confidence . . . . . . . . 33--37
Federico Bergenti and
Agostino Poggi and
Matteo Somacher A collaborative platform for fixed and
mobile networks . . . . . . . . . . . . 39--44
Lihui Wang and
Brian Wong and
Weiming Shen and
Sherman Lang A Java 3D-enabled cyber workspace . . . 45--49
Jim Gray and
Alex Szalay The World-Wide Telescope . . . . . . . . 50--55
David P. Anderson and
Jeff Cobb and
Eric Korpela and
Matt Lebofsky and
Dan Werthimer SETI@home: an experiment in
public-resource computing . . . . . . . 56--61
Jon Genetti Volume-rendered galactic animations . . 62--66
Joaquin Miller Introduction: What UML Should Be . . . . 67--69
Bran Selic and
Guus Ramackers and
Cris Kobryn Evolution, not revolution . . . . . . . 70--72
Keith Duddy UML2 must enable a family of languages 73--75
Stephen J. Mellor Make models be assets . . . . . . . . . 76--78
William Frank and
Kevin P. Tyson Be clear, clean, concise . . . . . . . . 79--81
Dov Dori Why significant UML change is unlikely 82--85
John C. Knight and
Nancy G. Leveson Should software engineers be licensed? 87--90
John White and
Barbara Simons ACM's position on the licensing of
software engineers . . . . . . . . . . . 91--91
Donald J. Bagert Texas licensing of software engineers:
all's quiet, for now . . . . . . . . . . 92--94
Ken Kennedy and
Moshe Y. Vardi A Rice University perspective on
software engineering licensing . . . . . 94--95
David Lorge Parnas Licensing software engineers in Canada 96--98
Gord McCalla Software engineering requires individual
professionalism . . . . . . . . . . . . 98--101
Dennis de Champeaux Technical opinion: Software engineering
considered harmful . . . . . . . . . . . 102--104
Rebecca Mercuri Inside Risks: Florida 2002: sluggish
systems, vanishing votes . . . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track: Software to Combat Terror;
Translating the Art of War; Pressing
Flesh for Transmission; Ripping and
Burning DNA; New Meaning of ``PDA'';
Advanced Electronics Second Guesses
Umps; Sports in the Dark Possible . . . 9--10
Diane Crawford and
C. W. Neville and
James H. Fetzer and
Rodney M. Bates and
Paul E. McKenney and
Ann Sobel and
Michael Clarkson and
Todd Palino and
Hal Berghel Forum: Resolving the
Program-Verification Debate; Handling
Web Content . . . . . . . . . . . . . . 11--15
Victor Mbarika and
Mike Jensen and
Peter Meso International Perspectives: Cyberspace
across sub-Saharan Africa . . . . . . . 17--21
Jens Palsberg and
Scott J. Baxter On Site: Teaching reviewing to graduate
students . . . . . . . . . . . . . . . . 22--24
Felipe Castel Viewpoint: Theory, theory on the wall 25--26
Upkar Varshney Multicast over wireless networks . . . . 31--37
Aviel D. Rubin Security considerations for remote
electronic voting . . . . . . . . . . . 39--44
Troy J. Strader and
Sridhar N. Ramaswami The value of seller trustworthiness in
C2C online markets . . . . . . . . . . . 45--49
Christoph Schlueter-Langdon and
Michael J. Shaw Emergent patterns of integration in
electronic channel systems . . . . . . . 50--55
Wullianallur Raghupathi and
Joseph Tan Strategic IT applications in health care 56--61
Kalle Lyytinen and
Youngjin Yoo Introduction: Issues and challenges in
ubiquitous computing . . . . . . . . . . 62--65
Gordon B. Davis Anytime/anyplace computing and the
future of knowledge work . . . . . . . . 67--73
Jonathan Grudin Group dynamics and ubiquitous computing 74--78
Daniel P. Siewiorek New frontiers of application design . . 79--82
Andrew Fano and
Anatole Gershman The future of business services in the
age of ubiquitous computing . . . . . . 83--87
Leonard M. Jessup and
Daniel Robey The relevance of social issues in
ubiquitous computing environments . . . 88--91
Guruduth Banavar and
Abraham Bernstein Software infrastructure and design
challenges for ubiquitous computing
applications . . . . . . . . . . . . . . 92--96
Fernando Berzal and
Ignacio Blanco and
Juan-Carlos Cubero and
Nicolas Marin Technical opinion: Component-based data
mining frameworks . . . . . . . . . . . 97--100
Avishai Wool Inside risks: Why security standards
sometimes fail . . . . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News tracks: Incredible Shrinking
Computing; Super-size Telescope; Global
Reach Around; Gastric Simulation;
Filipino Text-Message TV; Caging
Hackers; Japan's Singing, Dancing Robot 9--10
Diane Crawford and
Barbara Simons and
Eugene H. Spafford and
Christof Schmalenbach and
László Karafiát and
Dave Isaacs and
Ken Kennedy and
Moshe Vardi Forum: A Lawful Way to Acquire a Trade
Secret; Criteria for Integration
Technology; The Current State of
Hypercomputation; Still No Licensing in
Texas . . . . . . . . . . . . . . . . . 11--12
Meg McGinity Staying connected: Hibernating during
telecom winter . . . . . . . . . . . . . 13--15
Rebecca T. Mercuri Security watch: On auditing audit trails 17--20
Alan H. Karp Viewpoint: Making money selling content
that others are giving away . . . . . . 21--22
Gary Marchionini and
Hanan Samet and
Larry Brandt Introduction: Digital government . . . . 24--27
Hsinchun Chen and
Daniel Zeng and
Homa Atabakhsh and
Wojciech Wyzga and
Jenny Schroeder COPLINK: managing law enforcement data
and knowledge . . . . . . . . . . . . . 28--34
Steve Goddard and
Sherri K. Harms and
Stephen E. Reichenbach and
Tsegaye Tadesse and
William J. Waltman Geospatial decision support for drought
risk management . . . . . . . . . . . . 35--37
Lois Delcambre and
Timothy Tolle and
The Forest Project Team Harvesting information to sustain
forests . . . . . . . . . . . . . . . . 38--39
Sharon S. Dawes and
Lise Préfontaine Understanding new models of
collaboration for delivering government
services . . . . . . . . . . . . . . . . 40--42
Jane E. Fountain Prospects for improving the regulatory
process using e-rulemaking . . . . . . . 43--44
Sarah Nusser and
Leslie Miller and
Keith Clarke and
Michael Goodchild Geospatial IT for mobile field data
collection . . . . . . . . . . . . . . . 45--46
Eduard Hovy Using an ontology to simplify data
access . . . . . . . . . . . . . . . . . 47--49
Leana Golubchik and
William C. Cheng and
Cheng-Fu Chou and
Samir Khuller and
Hanan Samet and
C. Justin Wan Bistro: a scalable and secure data
transfer service for digital government
applications . . . . . . . . . . . . . . 50--51
Carol A. Hert and
Elizabeth D. Liddy and
Ben Shneiderman and
Gary Marchionini Supporting statistical electronic table
usage by citizens . . . . . . . . . . . 52--54
Cathryn Dippo FedStats: the gateway to federal
statistics . . . . . . . . . . . . . . . 55--55
Alan F. Karr and
Adrian Dobra and
Ashish P. Sanil Table servers protect confidentiality in
tabular data releases . . . . . . . . . 57--58
Alan M. MacEachren and
Frank Hardisty and
Xiping Dai and
Linda Pickle Supporting visual analysis of federal
geospatial statistics . . . . . . . . . 59--60
Hanan Samet and
Houman Alborzi and
Franti\vsek Brabec and
Claudio Esperança and
Gísli R. Hjaltason and
Frank Morgan and
Egemen Tanin Use of the SAND spatial browser for
digital government applications . . . . 61--64
Peggy Agouris and
Anthony Stefanidis Efficient summarization of
spatiotemporal events . . . . . . . . . 65--66
William L. Scherlis and
Jon Eisenberg IT research, innovation, and
e-government . . . . . . . . . . . . . . 67--68
Melvyn Ciment A personal history of the NSF digital
government program . . . . . . . . . . . 69--70
Diomidis Spinellis The decay and failures of Web references 71--77
David E. Avison and
Guy Fitzgerald Where now for development methodologies? 78--82
Ken Peffers and
Charles E. Gengler How to identify new high-payoff
information systems for the organization 83--88
Mario Cannataro and
Domenico Talia The knowledge grid . . . . . . . . . . . 89--93
Pak Chung Wong and
Kwong-kwok Wong and
Harlan Foote Organic data memory using the DNA
approach . . . . . . . . . . . . . . . . 95--98
Kevin C. Desouza Technical opinion: Barriers to effective
use of knowledge management systems in
software engineering . . . . . . . . . . 99--101
Michael Lesk Inside risks: The mindset of
dependability . . . . . . . . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track: NET Works for Volunteers;
Lights Out Back In; China Holds Tightest
Net Reins; Hints of Recovery; Talk is
Hardly Cheap; '02 Views . . . . . . . . 9--10
Diane Crawford and
Simon Bennett and
Lesley Clark and
Dan Klarmann and
Gernot Salzer and
Dan Hestand and
Richard Molpus and
Rebecca Mercuri Forum: Why Projects As Knowledge
Acquisition Work; Complex, But Not That
Complex; Blame the Process, Not the
Parties . . . . . . . . . . . . . . . . 11--13
Brock N. Meeks Electronic frontier: Conspicuous in
their silence . . . . . . . . . . . . . 15--16
Phillip Armour The business of software: The reorg
cycle . . . . . . . . . . . . . . . . . 19--22
Jessica Brazelton and
G. Anthony Gorry On site: Creating a knowledge-sharing
community: if you build it, will they
come? . . . . . . . . . . . . . . . . . 23--25
Diane Crawford ACM Fellows . . . . . . . . . . . . . . 26--26
Detlef Schoder and
Kai Fischbach Viewpoint: Peer-to-peer prospects . . . 27--29
Richard Lethin Introduction: Technical and social
components of peer-to-peer computing . . 30--32
John Kubiatowicz Extracting guarantees from chaos . . . . 33--38
Philip E. Agre P2P and the promise of Internet equality 39--42
Hari Balakrishnan and
M. Frans Kaashoek and
David Karger and
Robert Morris and
Ion Stoica Looking up data in P2P systems . . . . . 43--48
Jintae Lee An end-user perspective on file-sharing
systems . . . . . . . . . . . . . . . . 49--53
Jinyoul Lee and
Keng Siau and
Soongoo Hong Enterprise integration with ERP and EAI 54--60
Bay Arinze and
Murugan Anandarajan A framework for using OO mapping methods
to rapidly configure ERP systems . . . . 61--65
Amitava Dutta and
Rahul Roy Anticipating Internet diffusion . . . . 66--71
James J. Jiang and
Gary Klein and
Debbie Tesch and
Hong-Gee Chen Closing the user and provider service
quality gap . . . . . . . . . . . . . . 72--76
Ravindra Krovi and
Akhilesh Chandra and
Balaji Rajagopalan Information flow parameters for managing
organizational processes . . . . . . . . 77--82
Xinping Shi and
Philip C. Wright E-commercializing business operations 83--87
Nayeem Islam and
Mohamed Fayad Thinking objectively: Toward ubiquitous
acceptance of ubiquitous computing . . . 89--92
Peter G. Neumann Inside risks: Gambling on system
accountability . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track: Thanks, But No Thanks; Still
Choking on Spam; Cameras, Cameras,
Everywhere; Rat's Sense; One Person's
Garbage; Easy Dot-Com and Go . . . . . . 9--10
Diane Crawford and
Dennis de Champeaux and
David Lorge Parnas and
Craig Partridge and
Julio Lerm and
Oladokun Olajoyegbe Forum: Extending and Shrinking UML; Give
Meaning to the Status of Software
Engineer; The Art of the Paper Review;
No Waiting for Enterprise-Integration
Products; Mathematical Rigor for the
Social Sciences . . . . . . . . . . . . 11--13
Michael Cusumano Technology strategy and management:
Finding your balance in the products and
services debate . . . . . . . . . . . . 15--17
Peter J. Denning and
Robert Dunham The profession of IT: The missing
customer . . . . . . . . . . . . . . . . 19--23
Mohammad Rob On site: The rise and fall of an
e-commerce program . . . . . . . . . . . 25--26
Bob Besaha Viewpoint: Bounty hunting in the patent
base . . . . . . . . . . . . . . . . . . 27--29
Roel Vertegaal Introduction: Attentive User Interfaces 30--33
Shumin Zhai What's in the eyes for attentive input 34--39
Jeffrey S. Shell and
Ted Selker and
Roel Vertegaal Interacting with groups of computers . . 40--46
Paul P. Maglio and
Christopher S. Campbell Attentive agents . . . . . . . . . . . . 47--51
Eric Horvitz and
Carl Kadie and
Tim Paek and
David Hovel Models of attention in computing and
communication: from principles to
applications . . . . . . . . . . . . . . 52--59
Patrick Baudisch and
Doug DeCarlo and
Andrew T. Duchowski and
Wilson S. Geisler Focusing on the essential: considering
attention in display design . . . . . . 60--66
D. Scott McCrickard and
C. M. Chewar Attuning notification design to user
goals and attention costs . . . . . . . 67--72
José del R. Millán Adaptive brain interfaces . . . . . . . 74--80
Lawrence A. Gordon and
Martin P. Loeb and
Tashfeen Sohail A framework for using insurance for
cyber-risk management . . . . . . . . . 81--85
Gustavo da Rocha Barreto Pinto and
Sergio Palma J. Medeiros and
Jano Moreira de Souza and
Julia Celia Mercedes Strauch and
Carlete Rosana Ferreira Marques Spatial data integration in a
collaborative design framework . . . . . 86--90
Mark C. Anderson and
Rajiv D. Banker and
Sury Ravindran The new productivity paradox . . . . . . 91--94
Roger Evernden and
Elaine Evernden Third-generation information
architecture . . . . . . . . . . . . . . 95--98
David Chadwick Deficiencies in LDAP when used to
support PKI . . . . . . . . . . . . . . 99--104
Gary F. Templeton Technical opinion: Object-oriented
programming of integrated circuits . . . 105--108
Barbara Simons and
Eugene H. Spafford Inside risks: Risks of total
surveillance . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track: More Tech Dollars for
Defense; No Hands, No Break; More Net
$=$ Less TV; Brain Scan; A Word to the
Hip; Smart Dresser . . . . . . . . . . . 9--10
Diane Crawford and
Sandy Ressler and
Michael DeBellis and
Mark Wallace and
Arthur M. Rosenberg and
Robert Levine and
Barry I. Soroka Forum: The `Terrible Price' of the DMCA;
The Patriot Act Is Only the Beginning;
Communicating vs. Computing; Don't Tag
Living Organisms . . . . . . . . . . . . 11--14
Hal Berghel and
Kim Womack Digital village: Anonymizing the net . . 15--20
Jeff Grove Viewpoint: Legal and technological
efforts to lock up content threaten
innovation . . . . . . . . . . . . . . . 21--22
Meg McGinity Staying connected: Getting real . . . . 23--26
Ramesh Jain Viewpoint: Folk computing . . . . . . . 27--29
Deirdre K. Mulligan Introduction: Digital Rights Management
and Fair Use by Design . . . . . . . . . 30--33
John S. Erickson Fair use, DRM, and trusted computing . . 34--39
Pamela Samuelson DRM and, or, vs. the law . . . . . . . . 41--45
Julie E. Cohen DRM and privacy . . . . . . . . . . . . 46--49
Séverine Dusollier Fair use by design in the European
Copyright Directive of 2001 . . . . . . 51--55
Edward W. Felten A skeptical view of DRM and fair use . . 56--59
Barbara L. Fox and
Brian A. LaMacchia Encouraging recognition of fair uses in
DRM systems . . . . . . . . . . . . . . 61--63
Brian Fitzgerald and
Nancy L. Russo and
Tom O'Kane Software development method tailoring at
Motorola . . . . . . . . . . . . . . . . 64--70
François Pachet Content management for electronic music
distribution . . . . . . . . . . . . . . 71--75
Susan A. Brown and
Viswanath Venkatesh Bringing non-adopters along: the
challenge facing the PC industry . . . . 76--80
Julia B. Earp and
David Baumer Innovative Web use to learn about
consumer behavior and online privacy . . 81--83
Ali F. Farhoomand and
Pauline S. P. Ng and
William L. Conley Building a successful e-business: the
FedEx story . . . . . . . . . . . . . . 84--89
Keng Siau and
Zixing Shen Building customer trust in mobile
commerce . . . . . . . . . . . . . . . . 91--94
Shan L. Pan and
Jae-Nam Lee Using e-CRM for a unified view of the
customer . . . . . . . . . . . . . . . . 95--99
Peter Wegner and
Dina Goldin Technical opinion: Computation beyond
Turing machines . . . . . . . . . . . . 100--102
Andrew Wright Inside risks: On Sapphire and type-safe
languages . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Robert Fox News track: Antiterror Gizmos; Grayer
Days Ahead; Take Your Receipt; Gramr
CWOT; Dot.con; Work Free on Free Time;
Cyber Arches . . . . . . . . . . . . . . 9--10
Diane Crawford and
Urs Hoelzle and
Michael Lewchuk and
Lawrence A. Stabile and
Donn B. Parker and
Lawrence A. Gordon and
Martin P. Loeb and
Tashfeen Sohail and
Harry Rudin Forum: Archiving the Web is Feasible
Today; Stop the Reorg Cycle; Customer
Found; Cyber-Risk Management Not
Feasible; Dear Life . . . . . . . . . . 11--13
Phillip Armour The business of software: In the zone:
the need for flexible roles . . . . . . 15--19
Robert L. Glass Practical programmer: One giant step
backward . . . . . . . . . . . . . . . . 21--23
Dennis Tsichritzis Viewpoint: Life beyond the bubbles . . . 25--27
Aviel D. Rubin Introduction: Wireless Networking
Security . . . . . . . . . . . . . . . . 28--30
Russ Housley and
William Arbaugh Security problems in 802.11-based
networks . . . . . . . . . . . . . . . . 31--34
Nancy Cam-Winget and
Russ Housley and
David Wagner and
Jesse Walker Security flaws in 802.11 data link
protocols . . . . . . . . . . . . . . . 35--39
Simon Byers and
Dave Kormann 802.11b access point mapping . . . . . . 41--46
Terry Schmidt and
Anthony Townsend Why Wi-Fi wants to be free . . . . . . . 47--52
Amir Herzberg Payments and banking with mobile
personal devices . . . . . . . . . . . . 53--58
Jae Kyu Lee and
Mye M. Sohn The eXtensible Rule Markup Language . . 59--64
Julie Smith David and
William E. McCarthy and
Brian S. Sommer Agility: the key to survival of the
fittest in the software market . . . . . 65--69
Leah Graham and
Panagiotis Takis Metaxas ``Of course it's true; I saw it on the
Internet!'': critical thinking in the
Internet era . . . . . . . . . . . . . . 70--75
Amrit Tiwana Affinity to infinity in peer-to-peer
knowledge platforms . . . . . . . . . . 76--80
Ziqi Liao Real-time taxi dispatching using Global
Positioning Systems . . . . . . . . . . 81--83
Jae-Nam Lee and
Minh Q. Huynh and
Ron Chi-Wai Kwok and
Shih-Ming Pi IT outsourcing evolution: past, present,
and future . . . . . . . . . . . . . . . 84--89
George Marsaglia Technical opinion: Seeds for random
number generators: Techniques for
choosing seeds for social and scientific
applications of random number generators 90--93
Peter G. Neumann Inside risks: E-epistemology and
misinformation . . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM staff News track: Federal Red Flag; Proof in
Numbers; Bots for What?; Spell Checked;
Now You See It; Profiles in Trouble . . 9--10
Diane Crawford and
Mark Strefik and
Rory Short and
Simone Santinie and
Peter Wegner and
Dina Goldin Forum: In DRM, Rethink Business
Practices, Not Just Technology and the
Law; Don't Forget Mental Models in
Systems Development; What the Turing
Machine Doesn't Model . . . . . . . . . 11--13
Rebecca T. Mercuri Security watch: Analyzing security costs 15--18
Pamela Samuelson Legally speaking: Trade secrets vs. free
speech . . . . . . . . . . . . . . . . . 19--23
Tom DeMarco Viewpoint: The McCarthy protocols . . . 24--25
Thomas F. Stafford Introduction: E-Services . . . . . . . . 26--28
Heather Kreger Fulfilling the Web services promise . . 29--30
Christopher Ferris and
Joel Farrell What are Web services? . . . . . . . . . 31--31
Roland T. Rust and
P. K. Kannan E-service: a new paradigm for business
in the electronic environment . . . . . 36--42
Ruth N. Bolton Marketing challenges of e-services . . . 43--44
Hongjun Song E-services at FedEx . . . . . . . . . . 45--46
M. Kathryn Brohman and
Richard T. Watson and
Gabriele Piccoli and
A. Parasurama Data completeness: a key to effective
net-based customer service systems . . . 47--51
K. Douglas Hoffman Marketing + MIS $=$ e-service . . . . . 53--55
Neal G. Shaw and
Christopher W. Craighead Technology enablers to recover from
failures in e-services . . . . . . . . . 56--57
Joseph Williams The Web services debate: J2EE vs. .NET 58--63
Gerry Miller The Web services debate: .NET vs. J2EE 64--67
Walid Ben-Ameur and
Hervé Kerivin New Economical Virtual Private Networks 69--73
Huaiqing Wang and
Chen Wang Taxonomy of security considerations and
software quality . . . . . . . . . . . . 75--78
E. Vance Wilson Asynchronous health care communication 79--84
Kevin C. Desouza Facilitating tacit knowledge exchange 85--88
Fay Cobb Payton Rethinking the digital divide . . . . . 89--91
Peter E. Hart and
Ziming Liu Trust in the preservation of digital
information . . . . . . . . . . . . . . 93--97
James Backhouse and
Carol Hsu and
Aidan McDonnell Technical opinion: Toward public-key
infrastructure interoperability . . . . 98--100
Diomidis Spinellis Inside risks: Reflections on trusting
trust revisited . . . . . . . . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Cinematic Watermark;
Eye-Opening Education; Roaming Time;
Stand By Me; Savings Bonds Fade to Net;
Phone Home . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Simone Santini and
Ralph Castain and
William F. Dowling and
John Cook and
Simon Dobson and
Peter J. Denning and
Robert Dunham and
Jef Raskin and
Dennis Tsichritzis Forum: When Is a Computer More Like a
Guitar than a Washing Machine?;
Corroboration the Only Way to Determine
Web Accuracy; How to Teach Critical
Thinking about Web Content; Create a
Random Number Service Based on the
Mersenne Twister; Make Fair Uses a Legal
Requirement in DRM Systems; ``The
Missing Customer'' Redux; Enthusiasm,
Drive, Wisdom, Patience Not Tied to Age 11--13
Michael Cusumano Technology strategy and management:
Beware the lure of the horizontal . . . 15--17
Peter J. Denning The profession of IT: Accomplishment . . 19--23
Rita R. Colwell Viewpoint: From terabytes to insights 25--27
Andrew Rosenbloom Introduction: A Game Experience in Every
Application . . . . . . . . . . . . . . 28--31
William Swartout and
Michael van Lent Making a game of system design . . . . . 32--39
Mary C. Whitton Making virtual environments compelling 40--47
Ramesh Jain Experiential computing . . . . . . . . . 48--55
Michael Tsang and
George Fitzmaurice and
Gord Kurtenbach and
Azam Khan Game-like navigation and responsiveness
in non-game applications . . . . . . . . 56--61
Joseph A. Paradiso Tracking contact and free gesture across
large interactive surfaces . . . . . . . 62--69
Carlo Tomasi and
Abbas Rafii and
Ilhami Torunoglu Full-size projection keyboard for
handheld devices . . . . . . . . . . . . 70--75
Cynthia Breazeal and
Andrew Brooks and
Jesse Gray and
Matt Hancher and
John McBean and
Dan Stiehl and
Joshua Strickon Interactive robot theatre . . . . . . . 76--85
Paul Vickers and
James L. Alty Siren songs and swan songs debugging
with music . . . . . . . . . . . . . . . 86--93
Daniel May and
Paul Taylor Knowledge management with patterns . . . 94--99
Jackie Rees and
Subhajyoti Bandyopadhyay and
Eugene H. Spafford PFIRES: a policy framework for
information security . . . . . . . . . . 101--106
Sudip Bhattacharjee and
Ram D. Gopal and
G. Lawrence Sanders Digital music and online sharing:
software piracy 2.0? . . . . . . . . . . 107--111
Alan H. Karp E-speak e-xplained . . . . . . . . . . . 112--118
Varun Grover and
Khawaja Saeed The telecommunication industry
revisited: the changing pattern of
partnerships . . . . . . . . . . . . . . 119--125
Timon C. Du and
Eldon Y. Li and
An-Pin Chang Mobile agents in distributed network
management . . . . . . . . . . . . . . . 127--132
D. Scott Brandt and
Lorna Uden Insight into mental models of novice
Internet searchers . . . . . . . . . . . 133--136
Younghwa Lee and
Zoonky Lee and
Kai R. T. Larsen Coping with Internet channel conflict 137--142
Zakaria Maamar and
Paul Labbé Technical opinion: Moving vs. inviting
software agents . . . . . . . . . . . . 143--144
Albert Levi Inside risks: How secure is secure Web
browsing? . . . . . . . . . . . . . . . 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
ACM Staff News track; Blood Spills Builds Skills;
Canary in a Chip; PlayStation
Superpower; Personal Shopper; Learner
and Meaner; Get Me Rewrite! . . . . . . 9--10
Diane Crawford and
Ralph Castain and
Viktor Decyk and
Ben Schwarz and
Michael Metcalf and
Rob Dublin and
Robert L. Glass and
Bob Morrison and
Frans Swaalf and
Martin Henz Forum: Backward and Forward with the
Practical Programmer; Don't Forget
Experience in Role Definition; Correct
Me If I'm Wrong; Article or Ad? . . . . 11--13
Hal Berghel Digital village: The discipline of
Internet forensics . . . . . . . . . . . 15--20
Robert L. Glass Practical programmer: A mugwump's-eye
view of Web work . . . . . . . . . . . . 21--23
William W. Agresti Viewpoint: Discovery informatics . . . . 25--28
David L. Dill and
Bruce Schneier and
Barbara Simons Viewpoint: Voting and technology: who
gets to count your vote? Paperless
voting machines threaten the integrity
of democratic process by what they \em
don't do . . . . . . . . . . . . . . . . 29--31
Bjorn De Sutter and
Koen De Bosschere Introduction: Software techniques for
program compaction . . . . . . . . . . . 32--34
Frank Tip and
Peter F. Sweeney and
Chris Laffra Extracting library-based Java
applications . . . . . . . . . . . . . . 35--40
Bruno De Bus and
Daniel Kästner and
Dominique Chanet and
Ludo Van Put and
Bjorn De Sutter Post-pass compaction techniques . . . . 41--46
Arvind Krishnaswamy and
Rajiv Gupta Mixed-width instruction sets . . . . . . 47--52
Saumya Debray and
William S. Evans Cold code decompression at runtime . . . 54--60
William S. Evans and
Christopher W. Fraser Grammar-based compression of interpreted
code . . . . . . . . . . . . . . . . . . 61--66
Padmal Vitharana Risks and challenges of component-based
software development . . . . . . . . . . 67--72
Richard E. Potter How CIOs manage their superiors'
expectations . . . . . . . . . . . . . . 74--79
Thomas W. Jackson and
Ray Dawson and
Darren Wilson Understanding email interaction
increases organizational productivity 80--84
Bruce Russell and
Sangit Chatterjee Relationship quality: the undervalued
dimension of software quality . . . . . 85--89
Michael E. Whitman Enemy at the gate: threats to
information security . . . . . . . . . . 91--95
Gert-Jan de Vreede and
Robert M. Davison and
Robert O. Briggs How a silver bullet may lose its shine 96--101
Kenneth R. Walsh Analyzing the application ASP concept:
technologies, economies, and strategies 103--107
T. Ravichandran and
Marcus A. Rothenberger Software reuse strategies and component
markets . . . . . . . . . . . . . . . . 109--114
Zhou Zhiying CMM in uncertain environments . . . . . 115--119
P. Nicopolitidis and
G. I. Papadimitriou and
M. S. Obaidat and
A. S. Pomportsis Technical opinion: Third generation and
beyond wireless systems . . . . . . . . 120--124
Lauren Weinstein Inside risks: Spam wars . . . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 7--7
CACM staff News track: Juggling Outsourcing Stats;
He Said, She Said; Royal E-Flush; Plane
Precision; Email Evidence; VCR RIP?
Driver to Distraction . . . . . . . . . 11--12
Diane Crawford and
Richard M. Stallman and
Richard Proudfoot and
Sudip Bhattacharjee and
Ram D. Gopal and
G. Lawrence Sanders and
Tom Pittman and
Richard R. Brooks and
Dennis E. Hamilton Forum: Legalize Music Sharing Now; Hold
the Games; Give Up Trying to Halt the
Flow of Information; Praise for
Denning's Powerful Chord of
Professionalism . . . . . . . . . . . . 13--15
Meg McGinity Staying connected: Power to the people 17--20
Seymour Goodman International perspectives: The origins
of digital computing in Europe . . . . . 21--25
Phillip Armour The business of software: Closing the
learning application gap . . . . . . . . 27--31
Yigal Arens and
Paul S. Rosenbloom Viewpoint: Responding to the unexpected 33--35
Keith Devlin Introduction: Why universities require
computer science students to take math 36--39
Kim B. Bruce and
Robert L. Scot Drysdale and
Charles Kelemen and
Allen Tucker Why math? . . . . . . . . . . . . . . . 40--44
Peter B. Henderson Mathematical reasoning in software
engineering education . . . . . . . . . 45--50
Vicki L. Almstrum What is the attraction to computing? . . 51--55
Alfred W. Loo The future of peer-to-peer computing . . 56--61
Michiel Ronsse and
Koen De Bosschere and
Mark Christiaens and
Jacques Chassin de Kergommeaux and
Dieter Kranzlmüller Record/replay for nondeterministic
program executions . . . . . . . . . . . 62--67
Atreyi Kankanhalli and
Fransiska Tanudidjaja and
Juliana Sutanto and
Bernard C. Y. Tan The role of IT in successful knowledge
management initiatives . . . . . . . . . 69--73
Roberto Di Pietro and
Luigi V. Mancini Security and privacy issues of handheld
and wearable wireless devices . . . . . 74--79
Ali F. Farhoomand and
Pauline S. P. Ng Creating sustainable competitive
advantage through internetworked
communities . . . . . . . . . . . . . . 83--88
G. Prem Premkumar Alternate distribution strategies for
digital music . . . . . . . . . . . . . 89--95
Robert G. Fichman and
Mary J. Cronin Information-rich commerce at a
crossroads: business and technology
adoption requirements . . . . . . . . . 96--102
Ziqi Liao and
Michael Tow Cheung Concurrent-convergent strategy in IT
consulting . . . . . . . . . . . . . . . 103--104
Stefan Baldi and
Hauke Heier and
Anett Mehler-Bicher Technical opinion: Open courseware and
open source software . . . . . . . . . . 105--107
Peter G. Neumann Inside risks: Risks in trusting
untrustworthiness . . . . . . . . . . . 120--120
Ari-Veikko Anttiroiko Building strong e-democracy: the role of
technology in developing democracy for
the information age . . . . . . . . . . 121--128
Patrick Y. K. Chau and
Simpson Poon Octopus: an e-cash payment system
success story . . . . . . . . . . . . . 129--133
John Erickson and
Keng Siau E-ducation . . . . . . . . . . . . . . . 134--140
Kiran J. Fernandes and
Vinesh Raja and
Julian Eyre Cybersphere: the fully immersive
spherical projection system . . . . . . 141--146
Lee A. Freeman A refresher in data flow diagramming: an
effective aid for analysts . . . . . . . 147--151
Chittibabu Govindarajulu End users: who are they? . . . . . . . . 152--159
Ernest Goss and
Uma Gupta Women and the Internet: is there an
economic payoff? . . . . . . . . . . . . 160--166
Kathleen Hartzel How self-efficacy and gender issues
affect software adoption and use . . . . 167--171
Richard D. Holowczak and
Nabil R. Adam and
Francisco J. Artigas and
Irfan Bora Data warehousing in environmental
digital libraries . . . . . . . . . . . 172--178
Ned Kock and
Camille Auspitz and
Brad King Web-supported course partnerships:
bringing industry and academia together 179--183
Sarv Devaraj and
Ming Fan and
Rajiv Kohli E-loyalty: elusive ideal or competitive
edge? . . . . . . . . . . . . . . . . . 184--191
James M. Laffey and
Dale Musser and
Herbert Remidez and
Josh Gottdenker Networked systems for schools that learn 192--200
William Lewis, Jr. and
Richard T. Watson and
Ann Pickren An empirical assessment of IT disaster
risk . . . . . . . . . . . . . . . . . . 201--206
Trevor T. Moores The effect of national culture and
economic wealth on global software
piracy rates . . . . . . . . . . . . . . 207--215
Scott L. Schneberger and
Ephraim R. McLean The complexity cross: implications for
practice . . . . . . . . . . . . . . . . 216--225
Jeff Hoi Yan Yeung and
J. P. Shim and
Andy Yin Kit Lai Current progress of e-commerce adoption:
small and medium enterprises in Hong
Kong . . . . . . . . . . . . . . . . . . 226--232
Kunihiko Higa and
Bongsik Shin The telework experience in Japan . . . . 233--242
Nitin Singh Emerging technologies to support supply
chain management . . . . . . . . . . . . 243--247
Ritu Agarwal and
Atish P. Sinha Object-oriented modeling with UML: a
study of developers' perceptions . . . . 248--256
Jarke J. van Wijk and
Frank van Ham and
Huub van de Wetering Rendering hierarchical data . . . . . . 257--263
Kevin Zhu and
Bryan MacQuarrie The economics of digital bundling: the
impact of digitization and bundling on
the music industry . . . . . . . . . . . 264--270
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
ACM Staff News track: Salt in the Wound; Coming
into Focus; Study in Slime; That's
Courriel, S'il Vous Pla\^\it; A Healthy
Spritz; How Does That Make You Feel?;
Dial-A-Dolphin . . . . . . . . . . . . . 9--10
Diane Crawford and
Peter Sommers and
Hal Berghel and
W. Terry Hardgrave and
Chris Morris and
Jim Haynes Forum: Tell It to the Judge; What
Software Engineering Can Do for Web
Development . . . . . . . . . . . . . . 11--13
Pamela Samuelson Legally speaking: Unsolicited
communications as trespass? . . . . . . 15--20
Michael Cusumano Technology strategy and management:
Company character and the software
business . . . . . . . . . . . . . . . . 21--23
M. P. Papazoglou and
D. Georgakopoulos Introduction: Service-Oriented Computing 24--28
Francisco Curbera and
Rania Khalaf and
Nirmal Mukhi and
Stefan Tai and
Sanjiva Weerawarana The next step in Web services . . . . . 29--34
Jian Yang Web service componentization . . . . . . 35--40
L. G. Meredith and
Steve Bjorg Contracts and types . . . . . . . . . . 41--47
Mark Little Transactions and Web services . . . . . 49--54
Fabio Casati and
Eric Shan and
Umeshwar Dayal and
Ming-Chien Shan Business-oriented management of Web
services . . . . . . . . . . . . . . . . 55--60
Dov Dori Introduction: Conceptual Modeling and
System Architecting . . . . . . . . . . 62--65
Nathan R. Soderborg and
Edward F. Crawley and
Dov Dori System function and architecture:
OPM-based definitions and operational
templates . . . . . . . . . . . . . . . 67--72
Brian Henderson-Sellers Method engineering for OO systems
development . . . . . . . . . . . . . . 73--78
Andrew Gemino and
Yair Wand Evaluating modeling techniques based on
models of learning . . . . . . . . . . . 79--84
Graeme Shanks and
Elizabeth Tansley and
Ron Weber Using ontology to validate conceptual
models . . . . . . . . . . . . . . . . . 85--89
Hans Moravec Robots, after all . . . . . . . . . . . 90--97
Sai Ho Kwok Watermark-based copyright protection
system security . . . . . . . . . . . . 98--101
Willem-Jan Van Den Heuvel and
Zakaria Maamar Intelligent Web services moving toward a
framework to compose . . . . . . . . . . 103--109
Pairin Katerattanakul and
Bernard Han and
Soongoo Hong Objective quality ranking of computing
journals . . . . . . . . . . . . . . . . 111--114
Cong-cong Xing and
Boumediene Belkhouche Technical opinion: On pseudo
object-oriented programming considered
harmful . . . . . . . . . . . . . . . . 115--117
Peter G. Neumann Inside risks: Information system
security redux . . . . . . . . . . . . . 136--136
Diane Crawford Editoral pointers . . . . . . . . . . . 5--5
ACM Staff News track: Security holes; Don't Look
Back; Developing PC Nations; Hari Today,
Brain Surgery Tomorrow?; IMing at Work;
Now Speak . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Joseph F. Traub and
Reidar Conradi and
Steve Johnson and
Clinton Mah and
Frédéric Guéron and
David lowe and
Bill Willcox and
Rommert J. Casimir and
Kevin Mackie and
Mark Wallace and
Andries van Dam Forum: CS Student's Need Other Kinds of
Math, Too; Web Development Not So
Different After All; For Responsible
Spam, Pay As You Go; No Innovation Means
No Customers; Computer Allure Moves East 11--13
Peter J. Denning The profession of IT: Great principles
of computing . . . . . . . . . . . . . . 15--20
Robert L. Glass Practical programmer: A sociopolitical
look at open source . . . . . . . . . . 21--23
Geoffrey Sampson Viewpoint: The myth of diminishing firms 25--28
Maxine D. Brown Introduction: Blueprint for the future
of high-performance networking . . . . . 30--33
Tom DeFanti and
Cees de Laat and
Joe Mambretti and
Kees Neggers and
Bill St. Arnaud TransLight: a global-scale LambdaGrid
for e-science . . . . . . . . . . . . . 34--41
Aaron Falk and
Ted Faber and
Joseph Bannister and
Andrew Chien and
Robert Grossman and
Jason Leigh Transport protocols for high performance 42--49
Ian Foster and
Robert L. Grossman Data integration in a bandwidth-rich
world . . . . . . . . . . . . . . . . . 50--57
Larry L. Smarr and
Andrew A. Chien and
Tom DeFanti and
Jason Leigh and
Philip M. Papadopoulos The OptIPuter . . . . . . . . . . . . . 58--67
Harvey B. Newman and
Mark H. Ellisman and
John A. Orcutt Data-intensive e-science frontier
research . . . . . . . . . . . . . . . . 68--77
Stuart J. Barnes and
Sid L. Huff Rising sun: iMode and the wireless
Internet . . . . . . . . . . . . . . . . 78--84
Daniel P. Lorence The perils of data misreporting . . . . 85--88
Robert F. Easley and
John G. Michel and
Sarv Devaraj The MP3 open standard and the music
industry's response to Internet piracy 90--96
Padmal Vitharana and
Fatemah Mariam Zahedi and
Hemant Jain Design, retrieval, and assembly in
component-based software development . . 97--102
A. Graham Peace Balancing free speech and censorship:
academia's response to the Internet . . 104--109
Narasimhaiah Gorla Features to consider in a data
warehousing system . . . . . . . . . . . 111--115
Jeffrey P. Landry and
J. Harold Pardue and
Herbert E. Longenecker, Jr. and
David F. Feinstein A common theme for IT degree programs 117--120
Donald Anselmo and
Henry Ledgard Measuring productivity in the software
industry . . . . . . . . . . . . . . . . 121--125
David Nordfors and
Michel Bajuk and
Lena Norberg and
Jochen Brinkmann and
Dan Forbush Introducing a country to
Internet-enabled expert networks . . . . 127--132
Rebecca T. Mercuri and
Peter G. Neumann Inside risks: Security by obscurity . . 160--160
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
ACM Staff News track: Pay as You Go Plan; You Say
``Potato''; Who Types There?; Homework
and the Web; \`A la Cart; Shattering Net
Speeds; Gift Bots . . . . . . . . . . . 9--10
Diane Crawford and
Simone Santini and
Bill Buxton and
Joanna Wolfe and
Carl J. Mueller and
Halina Kaminski Forum: Keep the Pedagogical Ahead of the
Technological; Minds Over Math;
Requirements vs. Components; Mark Every
Vote Count . . . . . . . . . . . . . . . 11--13
ACM Nominating Committee Nominees for elections and report of the
ACM Nominating Committee . . . . . . . . 14--14
Hal Berghel Digital Village: Malware month . . . . . 15--19
Rebecca T. Mercuri Security Watch: Standards insecurity . . 21--25
Alan H. Karp Viewpoint: Enforce POLA on processes to
control viruses . . . . . . . . . . . . 27--29
Andrew Urbaczewski and
Joseph S. Valacich and
Leonard M. Jessup Introduction: Mobile Commerce:
Opportunities and Challenges . . . . . . 30--32
Thomas F. Stafford and
Mark L. Gillenson Mobile commerce: what it is and what it
could be . . . . . . . . . . . . . . . . 33--34
Suprateek Sarker and
John D. Wells Understanding mobile handheld device use
and adoption . . . . . . . . . . . . . . 35--40
Sirkka L. Jarvenpaa and
Karl Reiner Lang and
Yoko Takeda and
Virpi Kristiina Tuunainen Mobile commerce at crossroads . . . . . 41--44
Jun Sun Information requirement elicitation in
mobile commerce . . . . . . . . . . . . 45--47
Young Eun Lee and
Izak Benbasat Interface design for mobile commerce . . 48--52
Viswanath Venkatesh and
V. Ramesh and
Anne P. Massey Understanding usability in mobile
commerce . . . . . . . . . . . . . . . . 53--56
Peter Tarasewich Designing mobile commerce applications 57--60
Bharat Rao and
Louis Minakakis Evolution of mobile location-based
services . . . . . . . . . . . . . . . . 61--65
William E. Spangler and
Mordechai Gal-Or and
Jerrold H. May Using data mining to profile TV viewers 66--72
Jim Q. Chen and
Ted E. Lee and
Ruidong Zhang and
Yue Jeff Zhang Systems requirements for organizational
learning . . . . . . . . . . . . . . . . 73--78
Xu Yan Mobile data communications in China . . 80--85
Rajiv Kishore and
H. R. Rao and
K. Nam and
S. Rajagopalan and
A. Chaudhury A relationship perspective on IT
outsourcing . . . . . . . . . . . . . . 86--92
Tim Chenoweth and
David Schuff and
Robert St. Louis A method for developing dimensional data
marts . . . . . . . . . . . . . . . . . 93--98
Coskun Bayrak and
Chad Davis The relationship between distributed
systems and open software development 99--102
Lauren Weinstein Inside Risks: The devil you know . . . . 144--144
Manju Ahuja and
Babita Gupta and
Pushkala Raman An empirical investigation of online
consumer purchasing behavior . . . . . . 145--151
Ravi Bapna When snipers become predators: can
mechanism design save online auctions? 152--158
Amit Basu and
Steve Muylle Authentication in e-commerce . . . . . . 159--166
Sid Davis and
Keng Siau and
Kumar Dhenuvakonda A fit-gap analysis of e-business
curricula vs. industry needs . . . . . . 167--177
Pattarawan Prasarnphanich and
Mark L. Gillenson The hybrid clicks and bricks business
model . . . . . . . . . . . . . . . . . 178--185
Sanjay Gosain and
Arvind Malhotra and
Omar A. El Sawy and
Fadi Chehade The impact of common e-business
interfaces . . . . . . . . . . . . . . . 186--195
Stefano Grazioli and
Sirkka L. Jarvenpaa Deceived: under target online . . . . . 196--205
Khawaja A. Saeed and
Varun Grover and
Yujong Hwang Creating synergy with a clicks and
mortar approach . . . . . . . . . . . . 206--212
Andrew Holmes and
John Ryan Viewpoint: the end of the long boom . . 213--216
Philip M. Johnson and
Mette L. Moffett and
Brian T. Pentland Lessons learned from VCommerce . . . . . 217--225
Pairin Katerattanakul and
Keng Siau Creating a virtual store image . . . . . 226--232
Mohamed Khalifa and
Moez Limayem Drivers of Internet shopping . . . . . . 233--239
Minhee Chae and
Jinwoo Kim What's so different about the mobile
Internet? . . . . . . . . . . . . . . . 240--247
Ziqi Liao and
Michael Tow Cheung Challenges to Internet e-banking . . . . 248--250
Zakaria Maamar Commerce, e-commerce, and m-commerce:
what comes next? . . . . . . . . . . . . 251--257
David Martin and
Hailin Wu and
Adil Alsaid Hidden surveillance by Web sites: Web
bugs in contemporary use . . . . . . . . 258--264
Trevor T. Moores and
Gurpreet Dhillon Do privacy seals in e-commerce really
work? . . . . . . . . . . . . . . . . . 265--271
Kyle B. Murray and
Gerald Häubl A human capital perspective of skill
acquisition and interface loyalty . . . 272--278
G. Prem Premkumar Perspectives of the e-marketplace by
multiple stakeholders . . . . . . . . . 279--288
Robert W. Proctor and
Kim-Phuong L. Vu and
Lawrence J. Najjar and
Misha W. Vaughan and
Gavriel Salvendy Content preparation and management for
e-commerce Web sites . . . . . . . . . . 289--299
Mani R. Subramani and
Balaji Rajagopalan Knowledge-sharing and influence in
online social networks via viral
marketing . . . . . . . . . . . . . . . 300--307
C. Ranganathan and
Vern Goode and
Arkalgud Ramaprasad Managing the transition to bricks and
clicks . . . . . . . . . . . . . . . . . 308--316
Dan Jong Kim and
Manish Agrawal and
Bharat Jayaraman and
H. Raghav Rao A comparison of B2B e-service solutions 317--324
A. F. Salam and
H. R. Rao and
C. C. Pegels Consumer-perceived risk in e-commerce
transactions . . . . . . . . . . . . . . 325--331
Xiaowen Fang and
Gavriel Salvendy Customer-centered rules for design of
e-commerce Web sites . . . . . . . . . . 332--336
Fang-Fang Tang and
Marcel G. Thom and
Liang Toon Wang and
Joai Ching Tan and
Wai Yee Chow and
Xiaoyun Tang Using insurance to create trust on the
Internet . . . . . . . . . . . . . . . . 337--344
Amrit Tiwana and
Ephraim R. McLean The tightrope to e-business project
success . . . . . . . . . . . . . . . . 345--350
Anthony M. Townsend and
James T. Bennett Viewpoint: living and bidding in an
auction economy . . . . . . . . . . . . 351--353
Ganesh Vaidyanathan and
Sarv Devaraj A five-factor framework for analyzing
online risks in e-businesses . . . . . . 354--361
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
ACM Staff News track: Sound of Silence; `And For
Out Next Nano Number \ldots';
International Enrollment Slows; The Body
Electric; Calling All Buoys; Checked Out 9--10
Diane Crawford and
H. Joel Jeffrey and
Hans Moravec and
Joseph Frisina and
Douglas Lyon and
Jef Raskin and
John Craig and
Joy Getha and
Art Gittleman Forum: More Startling AI Predictions;
Mandate Safety-Critical Software;
Limited Math Limits the CS Curriculum;
Hands-On How We Learn; Not Enough Joy of
Computing . . . . . . . . . . . . . . . 11--13
Meg McGinity Staying connected: RFID: is this game of
tag fair play? . . . . . . . . . . . . . 15--18
Phillip Armour The Business of Software: When
executives code . . . . . . . . . . . . 19--22
CACM Staff ACM annual report for FY03 . . . . . . . 23--29
Sharon Oviatt and
Trevor Darrell and
Myron Flickner Introduction: Multimodal interfaces that
flex, adapt, and persist . . . . . . . . 30--33
Anil K. Jain and
Arun Ross Multibiometric systems . . . . . . . . . 34--40
Philip R. Cohen and
David R. McGee Tangible multimodal interfaces for
safety-critical applications . . . . . . 41--46
Roberto Pieraccini and
Krishna Dayanidhi and
Jonathan Bloom and
Jean-Gui Dahan and
Michael Phillips and
Bryan R. Goodman and
K. Venkatesh Prasad Multimodal conversational systems for
automobiles . . . . . . . . . . . . . . 47--49
Harriet J. Nock and
Giridharan Iyengar and
Chalapathy Neti Multimodal processing by finding common
cause . . . . . . . . . . . . . . . . . 51--56
Leah M. Reeves and
Jennifer Lai and
James A. Larson and
Sharon Oviatt and
T. S. Balaji and
Stéphanie Buisine and
Penny Collings and
Phil Cohen and
Ben Kraal and
Jean-Claude Martin and
Michael McTear and
T. V. Raman and
Kay M. Stanney and
Hui Su and
Qian Ying Wang Guidelines for multimodal user interface
design . . . . . . . . . . . . . . . . . 57--59
Matthew Turk Computer vision in the interface . . . . 60--67
Li Deng and
Xuedong Huang Challenges in adopting speech
recognition . . . . . . . . . . . . . . 69--75
Cynthia F. Cohen and
Stanley J. Birkin and
Monica J. Garfield and
Harold W. Webb Managing conflict in software testing 76--81
Albert B. Schwarzkopf and
Roberto J. Mejias and
`Jon (Sean) Jasperson and
Carol S. Saunders and
Hermann Gruenwald Effective practices for IT skills
staffing . . . . . . . . . . . . . . . . 83--88
B. Craig Cumberland and
Joseph S. Valacich and
Leonard M. Jessup Understanding meteor burst
communications technologies . . . . . . 89--92
Robert J. Aiken and
Javad Boroumand and
Stephen Wolff Network and computing research
infrastructure: back to the future . . . 93--98
Ronald Dattero and
Stuart D. Galup Programming languages and gender . . . . 99--102
Seung Kyoon Shin and
Ram D. Gopal and
G. Lawrence Sanders and
Andrew B. Whinston Global software piracy revisited . . . . 103--107
Wenhong Luo and
Mohammad Najdawi Trust-building measures: a review of
consumer health portals . . . . . . . . 108--113
Marcus J. Ranum Inside Risks: Believing in myths . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
ACM Staff News track: Resizing America; Little
Shop of Software; What Women Want in
Wheels; Virtual Autopsies; Coming of
Age; Poetic Programming . . . . . . . . 9--10
Diane Crawford and
Steve Wildstrom and
Hal Berghel and
Charles Burnette and
Jiming Liu and
Peter J. Denning and
Carl Binding and
Robert Swarr Forum: Defense in Depth Gets the Worm;
Put Cognitive Modes in CS and Its
Curricula; Don't Blame WAP [Wireless
Application Protocol]; Market Share vs.
Peer Approval in Open Source . . . . . . 11--13
Pamela Samuelson Legally speaking: What's at stake in \em
MGM v. Grokster? . . . . . . . . . . . . 15--20
Gregory J. Pottie Viewpoint: Privacy in the global
e-village . . . . . . . . . . . . . . . 21--23
Robert L. Glass Practical programmer: A look at the
economics of open source . . . . . . . . 25--27
Jakka Sairamesh and
Alison Lee and
Loretta Anania Introduction: Information Cities . . . . 28--31
Lee Sproull and
John F. Patterson Making information cities livable . . . 33--37
Elizabeth Churchill and
Andreas Girgensohn and
Les Nelson and
Alison Lee Blending digital and physical spaces for
ubiquitous community participation . . . 38--44
Donald Ferguson and
Jakka Sairamesh and
Stuart Feldman Open frameworks for information cities 45--49
Petros Kavassalis and
Stelios Lelis and
Mahmoud Rafea and
Seif Haridi What makes a Web site popular? . . . . . 50--55
Luis von Ahn and
Manuel Blum and
John Langford Telling humans and computers apart
automatically . . . . . . . . . . . . . 56--60
Yossi Lichtenstein Puzzles in software development
contracting . . . . . . . . . . . . . . 61--65
Conan C. Albrecht How clean is the future of SOAP? . . . . 66--68
Rajiv Kishore and
Hong Zhang and
R. Ramesh A Helix-Spindle model for ontological
engineering . . . . . . . . . . . . . . 69--75
Pearl Brereton The software customer/supplier
relationship . . . . . . . . . . . . . . 77--81
Elizabeth M. Pierce Assessing data quality with control
matrices . . . . . . . . . . . . . . . . 82--86
Patrick Y. K. Chau and
Paul Jen-Hwa Hu Technology implementation for
telemedicine programs . . . . . . . . . 87--92
Csaba Egyhazy and
Raj Mukherji Interoperability architecture using
RM-ODP . . . . . . . . . . . . . . . . . 93--97
Ruth Bolotin Schwartz and
Michele C. Russo Technical opinion: How to quickly find
articles in the top IS journals . . . . 98--101
Lauren Weinstein Inside risks: Outsourced and out of
control . . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Blurred vision; (Keep) Phone
Home; Love/Hate Relationship; Image
Makeover; Robot Scientist; Rooms with a
View . . . . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Peter G. Raeth and
Mark Wallace and
David Hawley and
Donald Anselmo and
Henry Ledgard and
Dwayne Nelson and
Yitzchak Gottlieb and
Alex Simonelis and
Coskun Bayrak and
Chad Davis Forum: Principles of Logical Thought
Before Technical Details; Why Reinvent
When We Have Open Source?; Still Seeking
Software Productivity; Spare Me the
Self-Service; Lineage of the Internet's
Open Systems Foundation . . . . . . . . 11--13
Rebecca T. Mercuri Security watch: Superscaled security . . 15--18
CACM Staff ACM fellows . . . . . . . . . . . . . . 19--20
Phillip G. Armour The business of software: Beware of
counting LOC . . . . . . . . . . . . . . 21--24
Michael A. Cusumano Technology strategy and management: Who
is liable for bugs and security flaws in
software? . . . . . . . . . . . . . . . 25--27
John G. Messerly Viewpoint: How computer games affect CS
(and other) students' school performance 29--31
John Yen Emerging technologies for homeland
security: Introduction . . . . . . . . . 32--35
Robert Popp and
Thomas Armour and
Ted Senator and
Kristen Numrych Countering terrorism through information
technology . . . . . . . . . . . . . . . 36--43
Thayne Coffman and
Seth Greenblatt and
Sherry Marcus Graph-based technologies for
intelligence analysis . . . . . . . . . 45--47
Paul Kogut and
John Yen and
Yui Leung and
Shuang Sun and
Rui Wang and
Ted Mielczarek and
Ben Hellar Proactive information gathering for
homeland security teams . . . . . . . . 48--50
O. Sami Saydjari Cyber defense: art to science . . . . . 52--57
R. Bajcsy and
T. Benzel and
M. Bishop and
B. Braden and
C. Brodley and
S. Fahmy and
S. Floyd and
W. Hardaker and
A. Joseph and
G. Kesidis and
K. Levitt and
B. Lindell and
P. Liu and
D. Miller and
R. Mundy and
C. Neuman and
R. Ostrenga and
V. Paxson and
P. Porras and
C. Rosenberg and
J. D. Tygar and
S. Sastry and
D. Sterne and
S. F. Wu Cyber defense technology networking and
evaluation . . . . . . . . . . . . . . . 58--61
Steve Sawyer and
Andrea Tapia and
Leonard Pesheck and
John Davenport Mobility and the first responder . . . . 62--65
Robin R. Murphy Rescue robotics for homeland security 66--68
Gang Wang and
Hsinchun Chen and
Homa Atabakhsh Automatically detecting deceptive
criminal identities . . . . . . . . . . 70--76
Alberto Escudero-Pascual and
Ian Hosein Questioning lawful access to traffic
data . . . . . . . . . . . . . . . . . . 77--82
Nikunj P. Dalal and
Manjunath Kamath and
William J. Kolarik and
Eswar Sivaraman Toward an integrated framework for
modeling enterprise processes . . . . . 83--87
Luigi Suardi How to manage your software product life
cycle with MAUI . . . . . . . . . . . . 89--94
Eyong B. Kim and
Marc J. Schniederjans The role of personality in Web-based
distance education courses . . . . . . . 95--98
Vikram Sethi and
Ruth C. King and
James Campbell Quick What causes stress in information system
professionals? . . . . . . . . . . . . . 99--102
Mark Stamp Inside risks: Risks of monoculture . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Political Agendas; Spam
Rage; Digital Doubts; Women Got Game;
Perfict Fit; Awkshun Serchs . . . . . . 9--10
Diane Crawford and
David Monniaux and
Ralph Johnson and
Clark E. Hartsock, III and
Ken Nickerson and
Robert L. Glass and
Marc Bellusci and
Alex Simonelis Forum: Open Source vs. Capitalism and
Communism; What Worker Shortage?; Design
for Pedagogy Not Just for Software . . . 11--13
John White ACM's Professional Development Centre
expands learning opportunities . . . . . 14--14
Peter J. Denning The profession of IT: The social life of
innovation . . . . . . . . . . . . . . . 15--19
Hal Berghel and
Natasa Brajkovska Digital village: Wading into alternate
data streams . . . . . . . . . . . . . . 21--27
Eric M. Uslaner Viewpoint: Trust online, trust offline 28--29
Christopher A. Miller Introduction: Human-computer etiquette:
managing expectations with intentional
agents . . . . . . . . . . . . . . . . . 30--34
Clifford Nass Etiquette equality: exhibitions and
expectations of computer politeness . . 35--37
Timothy W. Bickmore Unspoken rules of spoken interaction . . 38--44
Punya Mishra and
Kathryn A. Hershey Etiquette and the design of educational
technology . . . . . . . . . . . . . . . 45--49
Raja Parasuraman and
Christopher A. Miller Trust and etiquette in high-criticality
automated systems . . . . . . . . . . . 51--55
Jenny Preece Etiquette online: from nice to necessary 56--61
S. Krishna and
Sundeep Sahay and
Geoff Walsham Managing cross-cultural issues in global
software outsourcing . . . . . . . . . . 62--66
Linda Wallace and
Mark Keil Software project risks and their effect
on outcomes . . . . . . . . . . . . . . 68--73
Blake Ives and
Kenneth R. Walsh and
Helmut Schneider The domino effect of password reuse . . 75--78
Anat Hovav and
Paul Gray Managing academic e-journals . . . . . . 79--82
Petros Nicopolitidis and
Georgios Papadimitriou and
Mohammed S. Obaidat and
Andreas S. Pomportsis The economics of wireless networks . . . 83--86
Kevin C. Desouza and
J. Roberto Evaristo Managing knowledge in distributed
projects . . . . . . . . . . . . . . . . 87--91
Xiaotong Li Informational cascades in IT adoption 93--97
John Gerdes, Jr. Technical opinion: The viability of
supporting anonymous employees . . . . . 98--100
Jim Horning Inside Risks: Coincidental risks . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Concerts to Go: No Foul;
Press This!; Littlest Champ; Truth Be
Told . . . . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Michael J. Wax and
Tom Pittman and
Madhu Banavati and
Jef Raskin and
Rebecca T. Mercuri and
Bob Ellis and
Paul Nicholson Forum: Why Count Lines of Code?;
Computers and Consciousness; Computers,
ACM, and Everyday Existence; Don't
Dismiss Computers in the Classroom . . . 11--13
Meg McGinity Staying connected: It's alive: Reports
of the demise of the telecom industry
have been greatly exaggerated . . . . . 15--18
Robert L. Glass Practical programmer: Matching
methodology to problem domain . . . . . 19--21
Jeff Grove Viewpoint: Wanted: public policies that
foster creation of knowledge . . . . . . 23--25
Kuldeep Kumar and
Jos van Hillegersberg Introduction: New architectures for
financial services . . . . . . . . . . . 26--30
Krishnan Dandapani Success and failure in Web-based
financial services . . . . . . . . . . . 31--33
Ulrich Homann and
Michael Rill and
Andreas Wimmer Flexible value structures in banking . . 34--36
Alberto Pan and
Ángel Viña An alternative architecture for
financial data integration . . . . . . . 37--40
Niina Mallat and
Matti Rossi and
Virpi Kristiina Tuunainen Mobile banking services . . . . . . . . 42--46
N. Chandrasekaran and
Geert Ensing ODC: a global IT services delivery model 47--49
Jeroen Tas and
Shyam Sunder Financial services business process
outsourcing . . . . . . . . . . . . . . 50--52
John S. Zdanowicz Detecting money laundering and terrorist
financing via data mining . . . . . . . 53--55
Ton Slewe and
Mark Hoogenboom Who will rob you on the digital highway? 56--60
Sarv Devaraj and
S. Ramesh Babu How to measure the relationship between
training and job performance . . . . . . 62--67
Weidong Xia and
Gwanhoo Lee Grasping the complexity of IS
development projects . . . . . . . . . . 68--74
Dongsong Zhang and
J. Leon Zhao and
Lina Zhou and
Jay F. Nunamaker, Jr. Can e-learning replace classroom
learning? . . . . . . . . . . . . . . . 75--79
Gerald Segal 2004 ACM elections . . . . . . . . . . . 80--89
I. Robert Chiang and
Vijay S. Mookerjee Improving software team productivity . . 89--93
Rishi Toshniwal and
Dharma P. Agrawal Tracing the roots of markup languages 95--98
Masanori Arita Technical opinion: Comma-free design for
DNA words . . . . . . . . . . . . . . . 99--100
Peter J. Denning and
Dorothy E. Denning Inside Risks: Artificial stupidity . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Special Skills Draft; MBA
Outsourcing Track; Ancient Egypt Online;
Rx PlayStation; Camera Ready; Blogging
Bahgdad . . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Mark Sadler and
Anonymous and
Michael Cusumano and
Alan Karp and
Lee A. Hollaar and
Chuck Walbourn and
Thomas W. Moran and
Seung Kyoon Shin and
Ram D. Gopal and
G. Lawrence Sanders and
Andrew B. Whinston Forum: The Threat from Within; No
Excuses for Microsoft; How About a
Manageable Password?; When is Copyright
Infringement Legal? Don't Miss the
Lessons in Games; Inconsistent
Statistics Unconvincing . . . . . . . . 11--13
Phillip G. Armour The business of software: Real work,
necessary friction, optional chaos . . . 15--18
Pamela Samuelson Legally speaking: Why reform the U.S.
patent system? . . . . . . . . . . . . . 19--23
Stephen Lau Viewpoint: The Spinning Cube of
Potential Doom . . . . . . . . . . . . . 25--26
Allan Glaser and
Snow Fu and
Mark Tumelty On Site: Growing a participatory
programming environment . . . . . . . . 27--29
David E. Culler and
Wei Hong Introduction: Wireless sensor networks 30--33
Robert Szewczyk and
Eric Osterweil and
Joseph Polastre and
Michael Hamilton and
Alan Mainwaring and
Deborah Estrin Habitat monitoring with sensor networks 34--40
Jason Hill and
Mike Horton and
Ralph Kling and
Lakshman Krishnamurthy The platforms enabling wireless sensor
networks . . . . . . . . . . . . . . . . 41--46
Alec Woo and
Sam Madden and
Ramesh Govindan Networking support for query processing
in sensor networks . . . . . . . . . . . 47--52
Adrian Perrig and
John Stankovic and
David Wagner Security in wireless sensor networks . . 53--57
Janice C. Sipior and
Burke T. Ward and
P. Gregory Bonner Should spam be on the menu? . . . . . . 59--63
Banphot Vatanasombut and
Antonis C. Stylianou and
Magid Igbaria How to retain online customers . . . . . 64--70
Clayton A. Looney and
Leonard M. Jessup and
Joseph S. Valacich Emerging business models for mobile
brokerage services . . . . . . . . . . . 71--77
Narasimhaiah Gorla and
Yan Wah Lam Who should work with whom?: Building
effective software project teams . . . . 79--82
Hal Berghel and
David L. Sallach A paradigm shift in computing and IT
education . . . . . . . . . . . . . . . 83--88
Robert L. Glass and
V. Ramesh and
Iris Vessey An analysis of research in computing
disciplines . . . . . . . . . . . . . . 89--94
Weiling Ke and
Kwok Kee Wei Successful e-government in Singapore . . 95--99
Hartmut Wedekind and
Erich Ortner Technical opinion: Toward universal
literacy: from computer science upward 101--104
Peter G. Neumann Inside risks: Optimistic optimization 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Dominance Lost; Vocal Cards;
Flexible Flying; Fantastic Voyage;
Uninvited Consequences; Snooze Control 9--10
Diane Crawford and
Industry Usability Reporting Project Steering Committee, National Institute of Standards and
Technology and
Peter J. Denning and
Lennart Meier and
Jim Farrans and
Li Deng and
Xuedong Huang and
James D. Mooney Forum: Don't Neglect Usability in the
Total Cost of Ownership; Where's the
Steak?; Discourage the Sale of
Credentials in Anonymous Employment; For
Voice Interfaces, Hold the SALT; Look
Deeper for Markup Roots . . . . . . . . 11--13
Peter J. Denning The profession of IT: The field of
programmers myth . . . . . . . . . . . . 15--20
Victor W. A. Mbarika On Site: Is telemedicine the panacea for
Sub-Saharan Africa's medical nightmare? 21--24
Rebecca T. Mercuri Security watch: The HIPAA-potamus in
health care data security . . . . . . . 25--28
Michael A. Cusumano Technology strategy and management: More
lawyers than programmers? Microsoft must
alter its strategy to avoid an
increasingly litigious future . . . . . 29--31
Catherine L. Mann Viewpoint: What global sourcing means
for U.S. IT workers and for the U.S.
economy . . . . . . . . . . . . . . . . 33--35
Donna L. Hoffman and
Thomas P. Novak and
Alladi Venkatesh Has the Internet become indispensable? 37--42
Linda A. Jackson and
Alexander von Eye and
Gretchen Barbatsis and
Frank Biocca and
Hiram E. Fitzgerald and
Yong Zhao The impact of Internet use on the other
side of the digital divide . . . . . . . 43--47
Warren Harrison and
George Heuston and
Sarah Mocas and
Mark Morrissey and
John Richardson High-tech forensics: An Oregon police
department successfully enlists
tech-savvy citizens to serve as police
reserve specialists . . . . . . . . . . 48--52
George P. Schell Universities marginalize online courses 53--56
Kaushal Chari and
Saravanan Seshadri Demystifying integration . . . . . . . . 58--63
Maris G. Martinsons ERP in China: one package, two profiles 65--68
Huigang Liang and
Yajiong Xue and
William R. Boulton and
Terry Anthony Byrd Why Western vendors don't dominate
China's ERP market . . . . . . . . . . . 69--72
Troy J. Strader and
Sridhar N. Ramaswami Investor perceptions of traditional and
online channels . . . . . . . . . . . . 73--76
Graeme Shanks and
Elizabeth Tansley and
Ron Weber Representing composites in conceptual
modeling . . . . . . . . . . . . . . . . 77--80
Narasimha Bolloju Improving the quality of business object
models using collaboration patterns . . 81--86
Huseyin Cavusoglu and
Birendra Mishra and
Srinivasan Raghunathan A model for evaluating IT security
investments . . . . . . . . . . . . . . 87--92
Paul Kocher and
Bruce Schneier Inside risks: Insider risks in elections 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Who Gets the Last Word? Pay
Up or Scram; Smart Stepping; China
Follows Own Drummer; Elusive
E-Government; In the Groove . . . . . . 9--10
Diane Crawford and
Donn B. Parker and
Dani Oderbolz and
Kurt Gunteroth and
Nicholas Ourosoff and
Michael J. Lewchuk and
Ian Perry Forum: The Folk Art of Information
Security Needs an Upgrade; Don't Let
Patents Inhibit Software Innovation;
Hold the Methodologies: Give Me Tools;
Measuring Project Friction and Chaos;
Less is More Code . . . . . . . . . . . 11--13
Robert L. Glass Practical programmer: The mystery of
formal methods disuse . . . . . . . . . 15--17
Peter Freeman and
David Hart Viewpoint: A science of design for
software-intensive systems . . . . . . . 19--21
Martin E. Bush On site: Computer science education in
Japan . . . . . . . . . . . . . . . . . 23--26
Andrew Rosenbloom Introduction: Interactive immersion in
$3$D graphics . . . . . . . . . . . . . 28--31
Chris Scharver and
Ray Evenhouse and
Andrew Johnson and
Jason Leigh Designing cranial implants in a haptic
augmented reality environment . . . . . 32--38
Ming Lin and
William Baxter and
Vincent Scheib and
Jeremy Wendt Physically based virtual painting . . . 40--47
Benjamin C. Lok Toward the merging of real and virtual
spaces . . . . . . . . . . . . . . . . . 48--53
Mike Houston and
Chris Niederauer and
Maneesh Agrawala and
Greg Humphreys Visualizing dynamic architectural
environments . . . . . . . . . . . . . . 54--59
Charles Jacobs and
Wil Li and
Evan Schrier and
David Bargeron and
David Salesin Adaptive document layout . . . . . . . . 60--66
Mike Burmester and
Yvo G. Desmedt Is hierarchical public-key certification
the next target for hackers? . . . . . . 68--74
Rolf Oppliger Certified mail: the next challenge for
secure messaging . . . . . . . . . . . . 75--79
John Gallaugher and
Nigel Melville Electronic frontiers in foreign exchange
trading . . . . . . . . . . . . . . . . 81--87
CACM Staff 2004 ACM awards banquet: a night to
celebrate . . . . . . . . . . . . . . . 89--92
Ralph D. Westfall Does telecommuting really increase
productivity? . . . . . . . . . . . . . 93--96
David J. Paper and
James A. Rodger and
Steven J. Simon Voice says it all in the Navy . . . . . 97--101
Ahmed Elfatatry and
Paul Layzell Negotiating in service-oriented
environments . . . . . . . . . . . . . . 103--108
Lauren Weinstein Inside risks: Close exposures of the
digital kind . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Political Lines; Virtual
Visions; E-Earache; Sensors on Ice; Coke
Promo Fizzles . . . . . . . . . . . . . 9--10
Diane Crawford and
Peter Wegner and
Kurt Gunteroth and
Joshua Stern and
David Marks and
Peter J. Denning Forum: No Scientific Discipline Was Ever
Built on a Myth . . . . . . . . . . . . 11--13
Meg McGinity Staying connected: Weaving a wireless
safety net . . . . . . . . . . . . . . . 15--18
Hal Berghel Digital village: Wireless infidelity I:
war driving . . . . . . . . . . . . . . 21--26
James A. Jacobs and
Charles Humphrey Viewpoint: Preserving research data . . 27--29
Alistair Sutcliffe and
Nikolay Mehandjiev Introduction: End-user development . . . 31--32
G. Fischer and
E. Giaccardi and
Y. Ye and
A. G. Sutcliffe and
N. Mehandjiev Meta-design: a manifesto for end-user
development . . . . . . . . . . . . . . 33--37
Joerg Beringer Reducing expertise tension . . . . . . . 39--40
Volker Wulf and
Matthias Jarke The economics of end-user development 41--42
Alexander Repenning and
Andri Ioannidou Agent-based end-user development . . . . 43--46
Brad A. Myers and
John F. Pane and
Andy Ko Natural programming languages and
environments . . . . . . . . . . . . . . 47--52
Margaret Burnett and
Curtis Cook and
Gregg Rothermel End-user software engineering . . . . . 53--58
Anders I. Mòrch and
Gunnar Stevens and
Markus Won and
Markus Klann and
Yvonne Dittrich and
Volker Wulf Component-based technologies for
end-user development . . . . . . . . . . 59--62
Silvia Berti and
Fabio Patern\`o and
Carmen Santoro Natural development of ubiquitous
interfaces . . . . . . . . . . . . . . . 63--64
Alan F. Blackwell End-user developers at home . . . . . . 65--66
Paul J. Resnick and
Derek L. Hansen and
Caroline R. Richardson Calculating error rates for filtering
software . . . . . . . . . . . . . . . . 67--71
Ozgur Turetken and
David Schuff and
Ramesh Sharda and
Terence T. Ow Supporting systems analysis and design
through fisheye views . . . . . . . . . 72--77
Hai Zhuge and
Xiaoqing Shi Toward the eco-grid: a harmoniously
evolved interconnection environment . . 78--83
Michael J. Hine and
Mark Hill and
David Ruth and
Bob Carlson and
Dave Banks and
Jim Troxell Empowering persons with disabilities
with decision-support technology . . . . 85--89
Susan K. Lippert and
Murugan Anandarajan Academic vs. practitioner systems
planning and analysis . . . . . . . . . 91--94
Jason E. Bailes and
Gary F. Templeton Technical opinion: Managing P2P security 95--98
Peter G. Neumann Inside risks: The big picture . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Experts Dispute Passport
Plan; Parliament Endorses Open Access; A
Shadow Over the Valley; Paint by
Numbers; Talk of the Future; Emotional
Ride . . . . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Scott Ambler and
Peter G. Neumann and
Peter Turk and
Hartmut Wedekind and
John Stanley and
Julian V. Noble and
Hong-Lok Li and
Michael Blaha and
Dean Wakerley Forum: Consider Long-Term Implications
Now and Forever; The Real Philosophical
Roots of Literacy; Give Me Common
Carrier Internet Service; For Science
and Math, Skip the Online Course;
Prepare CS Graduates for Industrial
Reality; Elegant Code Produces Maximal
Comprehension . . . . . . . . . . . . . 11--13
Phillip G. Armour The business of software: Not-defect:
the mature discipline of testing . . . . 15--18
David A. Patterson Hot links: Hot Links . . . . . . . . . . 19--20
Fred von Lohmann Viewpoint: Voluntary collective
licensing for music file sharing . . . . 21--24
Michael A. Cusumano Technology strategy and management:
Reflections on free and open software 25--27
Peter G. Neumann Introduction: The problems and
potentials of voting systems . . . . . . 28--30
Herb Deutsch and
Stephen Berger Voting systems standards and
certifications . . . . . . . . . . . . . 31--33
Carolyn Coggins Independent testing of voting systems 34--38
Brit J. Williams and
Merle S. King Implementing voting systems: the Georgia
method . . . . . . . . . . . . . . . . . 39--42
Anthony Di Franco and
Andrew Petro and
Emmett Shear and
Vladimir Vladimirov Small vote manipulations can swing
elections . . . . . . . . . . . . . . . 43--45
Douglas W. Jones Auditing elections . . . . . . . . . . . 46--50
Rebecca T. Mercuri and
L. Jean Camp The code of elections . . . . . . . . . 52--57
David Jefferson and
Aviel D. Rubin and
Barbara Simons and
David Wagner Analyzing Internet voting security . . . 59--64
Jason Kitcat Source availability and e-voting: an
advocate recants . . . . . . . . . . . . 65--67
Jeff Grove ACM statement on voting systems . . . . 69--70
David A. Patterson Latency lags bandwith . . . . . . . . . 71--75
Huaiqing Wang and
Shuozhong Wang Cyber warfare: steganography vs.
steganalysis . . . . . . . . . . . . . . 76--82
Ioannis Samoladas and
Ioannis Stamelos and
Lefteris Angelis and
Apostolos Oikonomou Open source software development should
strive for even greater code
maintainability . . . . . . . . . . . . 83--87
Nancy J. Lightner Evaluating e-commerce functionality with
a focus on customer service . . . . . . 88--92
Michael Alan Smith Portals: toward an application framework
for interoperability . . . . . . . . . . 93--97
Peter B. Southard and
Keng Siau A survey of online e-banking retail
initiatives . . . . . . . . . . . . . . 99--102
Casey G. Cegielski Technical opinion: Who values technology
certification? . . . . . . . . . . . . . 103--105
Bruce Schneier Inside risks: The nonsecurity of secrecy 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6
CACM Staff News track: Spam Spotting the DNA Way;
Majoring in Homeland Security; In the
Driver's Seat; Campus Security; Bay Area
Attractions; Hello, I Must be Going . . 9--10
Diane Crawford and
Alex Simonelis and
Mike Brenner and
Spike McLeary and
Jack Nilles and
Ralph D. Westfall Forum: Design Principles Are Where You
Find Them; The Computer Didn't Make You
Do It; Why Doesn't Everyone Telecommute? 11--13
Peter J. Denning The profession of IT: Network laws . . . 15--20
Diane Crawford Hot Links: Top 10 downloads from ACM's
Portal . . . . . . . . . . . . . . . . . 21--22
Robert L. Glass Practical programmer: Is this a
revolutionary idea, or not? . . . . . . 23--25
Norman Matloff Viewpoint: Globalization and the
American IT worker . . . . . . . . . . . 27--29
Craig A. Stewart Introduction: Bioinformatics:
transforming biomedical research and
medical care . . . . . . . . . . . . . . 30--33
David A. Bader Computational biology and
high-performance computing . . . . . . . 34--41
Toshikazu Ebisuzaki and
Robert Germain and
Makoto Taiji PetaFLOPS computing . . . . . . . . . . 42--45
Ross Overbeek and
Terry Disz and
Rick Stevens The SEED: a peer-to-peer environment for
genome annotation . . . . . . . . . . . 46--51
Mark Ellisman and
Michael Brady and
David Hart and
Fang-Pang Lin and
Matthias Müller and
Larry Smarr The emerging role of biogrids . . . . . 52--57
Homa Javahery and
Ahmed Seffah and
Thiruvengadam Radhakrishnan Beyond power: making bioinformatics
tools user-centered . . . . . . . . . . 58--63
Chris R. Johnson and
Rob MacLeod and
Steven G. Parker and
David Weinstein Biomedical computing and visualization
software environments . . . . . . . . . 64--71
Amrit Tiwana and
Mark Keil The one-minute risk assessment tool . . 73--77
James Y. L. Thong and
Weiyin Hong and
Kar Yan Tam What leads to acceptance of digital
libraries? . . . . . . . . . . . . . . . 78--83
Theresa Edgington and
Beomjin Choi and
Katherine Henson and
T. S. Raghu and
Ajay Vinze Adopting ontology to facilitate
knowledge sharing . . . . . . . . . . . 85--90
Shobha Ganapathy and
C. Ranganathan and
Balaji Sankaranarayanan Visualization strategies and tools for
enhancing customer relationship
management . . . . . . . . . . . . . . . 92--99
Markus Biehl and
Edmund Prater and
John R. McIntyre Remote repair, diagnostics, and
maintenance . . . . . . . . . . . . . . 100--106
Thomas F. Stafford and
Dennis Gonier What Americans like about being online 107--112
Ken Donaldson and
Vicki Stone Technical opinion: Nanoscience fact
versus fiction . . . . . . . . . . . . . 113--115
P. L. Vora and
B. Adida and
R. Bucholz and
D. Chaum and
D. L. Dill and
D. Jefferson and
D. W. Jones and
W. Lattin and
A. D. Rubin and
M. I. Shamos and
M. Yung Inside risks: Evaluation of voting
systems . . . . . . . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: A World Connected;
Invisa-Bills; Starting Over; Bots Wild;
Creative Measures; By George! . . . . . 9--10
Diane Crawford and
Ben Bederson and
Harry Hochheiser and
Jeff Johnson and
Clare-Marie Karat and
Jonathan Lazar and
John David and
Frances C. Bernstein and
Andrew D. Wolfe, Jr. and
Hong-Lok Li and
Mark Burgin and
Nicholas Roeder Forum: For a Fair Election, Ensure
Usability; Don't Skip Secrecy If
Security is the Goal; Let Users Program
Their Own Systems; Put More Science in
Computer Science; What We Don't Know . . 11--13
Hal Berghel and
Jacob Uecker Digital village: Wireless infidelity II:
airjacking . . . . . . . . . . . . . . . 15--20
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 21--22
David A. Patterson President's Letter: The health of
research conferences and the dearth of
big idea papers . . . . . . . . . . . . 23--24
Rebecca T. Mercuri Security watch: The many colors of
multimedia security . . . . . . . . . . 25--29
Andrew Rosenbloom Introduction: Special Issue: The
blogosphere . . . . . . . . . . . . . . 30--33
Ravi Kumar and
Jasmine Novak and
Prabhakar Raghavan and
Andrew Tomkins Structure and evolution of blogspace . . 35--39
Bonnie A. Nardi and
Diane J. Schiano and
Michelle Gumbrecht and
Luke Swartz Why we blog . . . . . . . . . . . . . . 41--46
Steve Cayzer Semantic blogging and decentralized
knowledge management . . . . . . . . . . 47--52
Rebecca Blood How blogging software reshapes the
online community . . . . . . . . . . . . 53--55
Cass R. Sunstein Democracy and filtering . . . . . . . . 57--59
Kenneth P. Birman Viewpoint: Like it or not, Web services
are distributed objects . . . . . . . . 60--62
CACM Staff ACM annual report for FY04 . . . . . . . 63--69
Ahmed Seffah and
Eduard Metzker The obstacles and myths of usability and
software engineering . . . . . . . . . . 71--76
Pratyush Bharati and
Abhijit Chaudhury Using choiceboards to create business
value . . . . . . . . . . . . . . . . . 77--81
Eleanor T. Loiacono Cyberaccess: Web accessibility and
corporate America . . . . . . . . . . . 82--87
Yogesh Malhotra and
Dennis F. Galletta Building systems that users want to use 88--94
Steve Sawyer Software development teams . . . . . . . 95--99
Hannes Werthner and
Francesco Ricci E-commerce and tourism . . . . . . . . . 101--105
Steven M. Bellovin Inside risks: Spamming, phishing,
authentication, and privacy . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Sniffing out Trouble; Home
Improvements; Patent Number 977; On the
Nose; Take a Number; Sick Thoughts . . . 9--10
Diane Crawford and
Brad Kidwell and
Jeffrey P. Buzen and
David A. Patterson and
Bradley Dilger and
Brit J. Williams and
Merle S. King and
Chris Morris and
David H. Jameson and
Ralph Johnson and
I. Samoladas and
I. Stamelos and
L. Angelis Forum: Bandwidth, Latency, and Physical
Reality; Share Disturbing Information on
e-Voting; Ensure Quality Assurance for
Bioinformatics Applications; Follow the
Money; Share Open Source Sources . . . . 11--13
Phillip G. Armour The business of software: The
unconscious art of software testing . . 15--18
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 19--20
Meg McGinity Staying connected: Let your fingers do
the talking . . . . . . . . . . . . . . 21--23
David A. Patterson President's letter: Minority-minority
and minority-majority technology
transfer . . . . . . . . . . . . . . . . 25--26
Deborah Anderson Viewpoint: Global linguistic diversity
for the Internet . . . . . . . . . . . . 27--28
Chris Stephenson Viewpoint: Creating a national K--12
computer science community . . . . . . . 29--31
Allison Druin and
Juan Pablo Hourcade Interaction design and children . . . . 32--34
David Kestenbaum The challenges of IDC: what have we
learned from our past? . . . . . . . . . 35--38
Mona Leigh Guha and
Allison Druin and
Gene Chipman and
Jerry Alan Fails and
Sante Simms and
Allison Farber Working with young children as
technology design partners . . . . . . . 39--42
Johanna Höysniemi and
Perttu Hämäläinen and
Laura Turkki and
Teppo Rouvi Children's intuitive gestures in
vision-based action games . . . . . . . 44--50
Michael Eisenberg The material side of educational
technology . . . . . . . . . . . . . . . 51--54
Yvonne Rogers and
Sara Price and
Cliff Randell and
Danae Stanton Fraser and
Mark Weal and
Geraldine Fitzpatrick Ubi-learning integrates indoor and
outdoor experiences . . . . . . . . . . 55--59
Judy Robertson and
Judith Good Story creation in virtual game worlds 61--65
RadhaKanta Mahapatra and
Vincent S. Lai Evaluating end-user training programs 66--70
Andreas Holzinger Usability engineering methods for
software developers . . . . . . . . . . 71--74
John Tillquist and
Waymond Rodgers Using asset specificity and asset scope
to measure the value of IT . . . . . . . 75--80
Rodrigo Fonseca and
Virgílio Almeida and
Mark Crovella Locality in a web of streams . . . . . . 82--88
Ganesh Vaidyanathan A framework for evaluating third-party
logistics . . . . . . . . . . . . . . . 89--94
Michael Ettredge and
John Gerdes Jr. Timeliness of investor relations data at
corporate Web sites . . . . . . . . . . 95--100
Ines Herrero and
Jose L. Salmeron Using the DEA methodology to rank
software technical efficiency . . . . . 101--105
Stuart J. Barnes Technical opinion: Assessing the value
of IS journals . . . . . . . . . . . . . 110--112
George Ledin, Jr. Inside risks: Not teaching viruses and
worms is harmful . . . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Not All Fun and Games; IT
Hiring Up; What Lies A-Head; IT Budget
Ups and Downs; Phishing Expeditions; The
(Really) Big Picture; Number One
``Blog'' . . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Serdar Tasiran and
Norman Matloff and
Dana Honeycutt and
Cass R. Sunstein and
Wolter Pieters and
Joseph R. Kintry and
Tyrone Grandison and
Peter G. Neumann Forum: A Global Audience Deserves a
Global Perspective; Blogs No Threat to
Democracy; Internet Voting Not
Impossible; Don't Trade Privacy for
Security . . . . . . . . . . . . . . . . 11--13
David A. Patterson President's letter: Why join ACM? . . . 14--14
Michael A. Cusumano Technology strategy and management:
Google: what it is and what it is not 15--17
Jon Crowcroft Viewpoint: On the nature of computing 19--20
CACM Staff SIGs announce candidates for election 21--22
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 23--24
Dimitris Metaxas Medical image modeling tools and
applications . . . . . . . . . . . . . . 26--29
Herve Delingette and
Nicholas Ayache Hepatic surgery simulation . . . . . . . 31--36
Arie E. Kaufman and
Sarang Lakare and
Kevin Kreeger and
Ingmar Bitter Virtual colonoscopy . . . . . . . . . . 37--41
Kyoungju Park and
Albert Montillo and
Dimitris Metaxas and
Leon Axel Volumetric heart modeling and analysis 43--48
Celina Imielinska and
Pat Molholt Incorporating $3$D virtual anatomy into
the medical curriculum . . . . . . . . . 49--54
Terry S. Yoo and
Michael J. Ackerman Open source software for medical image
processing and visualization . . . . . . 55--59
CACM Staff Notice of intent to de-charter
professional chapters . . . . . . . . . 61--62
CACM Staff Notice of intent to de-charter student
chapters . . . . . . . . . . . . . . . . 63--65
J. Roberto Evaristo and
Kevin C. Desouza and
Kevin Hollister Centralization momentum: the pendulum
swings back again . . . . . . . . . . . 66--71
A. F. Salam and
Lakshmi Iyer and
Prashant Palvia and
Rahul Singh Trust in e-commerce . . . . . . . . . . 72--77
Lawrence D. Bodin and
Lawrence A. Gordon and
Martin P. Loeb Evaluating information security
investments using the analytic hierarchy
process . . . . . . . . . . . . . . . . 78--83
Fiona Fui-Hoon Nah and
Keng Siau and
Hong Sheng The value of mobile applications: a
utility company study . . . . . . . . . 85--90
R. Kelly Rainer, Jr. and
Mark D. Miller Examining differences across journal
rankings . . . . . . . . . . . . . . . . 91--94
Yufei Yuan and
Brian Detlor Intelligent mobile crisis response
systems . . . . . . . . . . . . . . . . 95--98
Chenglie Hu Technical opinion: Dataless objects
considered harmful . . . . . . . . . . . 99--101
Shirley Ann Becker Technical opinion: E-government
usability for older adults . . . . . . . 102--104
Peter G. Neumann Inside risks: Responsibilities of
technologists . . . . . . . . . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Ominous Clouds; In the Wrong
Hands; China's Netizens to Soar; Chess
Champs in Check; Painful Plateau; War is
No Game . . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Marius Matioc and
Steven M. Bellovin and
Richard Hubert and
Andrew D. Wolfe, Jr. and
David Foulser and
Andrew R. Kilner Forum: To Block Spam, Demand Sender
Authentication; Not Revolutionary (Thank
Goodness); How to Know the Known from
the Unknowns; User First in
User-Centered Design . . . . . . . . . . 11--13
CACM Staff ACM Fellows . . . . . . . . . . . . . . 14--14
David A. Patterson President's letter: 20$^{th}$ century
vs. 21$^{st}$ century C&C: the SPUR
manifesto . . . . . . . . . . . . . . . 15--16
Phillip G. Armour The business of software: Project
portfolios: organizational management of
risk . . . . . . . . . . . . . . . . . . 17--20
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 21--22
Gregory Conti Viewpoint: Why computer scientists
should attend hacker conferences . . . . 23--24
Robert L. Glass Practical programmer: The first business
application: a significant milestone in
software history . . . . . . . . . . . . 25--26
Pamela Samuelson Legally speaking: Legislative challenges
to the \em Sony safe harbor rule . . . . 27--31
Norbert Streitz and
Paddy Nixon The disappearing computer . . . . . . . 32--35
Gaetano Borriello and
Matthew Chalmers and
Anthony LaMarca and
Paddy Nixon Delivering real-world ubiquitous
location systems . . . . . . . . . . . . 36--41
Daniel M. Russell and
Norbert A. Streitz and
Terry Winograd Building disappearing computers . . . . 42--48
Joëlle Coutaz and
James L. Crowley and
Simon Dobson and
David Garlan Context is key . . . . . . . . . . . . . 49--53
Steve Benford and
Carsten Magerkurth and
Peter Ljungstrand Bridging the physical and digital in
pervasive gaming . . . . . . . . . . . . 54--57
Saadi Lahlou and
Marc Langheinrich and
Carsten Röcker Privacy and trust issues with invisible
computers . . . . . . . . . . . . . . . 59--60
Liam Bannon and
Steve Benford and
John Bowers and
Christian Heath Hybrid design creates innovative museum
experiences . . . . . . . . . . . . . . 62--65
Hans Gellersen Smart-Its: computers for artifacts in
the physical world . . . . . . . . . . . 66--66
Spyros Lalis and
Alexandros Karypidis and
Anthony Savidis Ad-hoc composition in wearable and
mobile computing . . . . . . . . . . . . 67--68
Achilles Kameas and
Irene Mavrommati Extrovert gadgets . . . . . . . . . . . 69--69
Joseph A. Paradiso Sensate media . . . . . . . . . . . . . 70--70
Anatole Gershman and
Andrew Fano Examples of commercial applications of
ubiquitous computing . . . . . . . . . . 71--71
Jacques Cohen Computer science and bioinformatics . . 72--78
Arun Sen and
Atish P. Sinha A comparison of data warehousing
methodologies . . . . . . . . . . . . . 79--84
CACM Staff SIGs announce candidates for election 85--85
Trevor Moores Do consumers understand the role of
privacy seals in e-commerce? . . . . . . 86--91
Bonnie Rubenstein Montano and
Victoria Yoon and
Stuart Lowry and
Teresa Merlau A multiagent system for U.S. defense
research contracting . . . . . . . . . . 93--97
William Hibbard and
Curtis Rueden and
Steve Emmerson and
Tom Rink and
David Glowacki and
Tom Whittaker and
Don Murray and
David Fulker and
John Anderson Java distributed components for
numerical visualization in VisAD . . . . 98--104
Ji-Ye Mao and
Karel Vredenburg and
Paul W. Smith and
Tom Carey The state of user-centered design
practice . . . . . . . . . . . . . . . . 105--109
Xiaoni Zhang and
Victor R. Prybutok How the mobile communication markets
differ in China, the U.S., and Europe 111--114
Marco Gori and
Ian Witten Technical opinion: The bubble of Web
visibility . . . . . . . . . . . . . . . 115--117
Peter G. Neumann Inside risks: Anticipating disasters . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Setting the Bar; China's Café
Count; Portrait of Excess; U.S. Visa
Rules Relax; Knock on Wood . . . . . . . 9--10
Diane Crawford and
Rodney M. Bates and
David Armstrong and
Robin Evans and
Phillip G. Armour and
Scott Duncan and
Hong-Lok Li Forum: For Programmers: Objects Are Not
the Only Tool; Computing is Mathematical
Engineering; Blog on Blog . . . . . . . 11--13
Hal Berghel Digital Village: The two sides of ROI:
return on investment vs. risk of
incarceration . . . . . . . . . . . . . 15--20
David A. Patterson President's Letter: The state of funding
for new initiatives in computer science
and engineering . . . . . . . . . . . . 21--25
Peter J. Denning The Profession of IT: Is computer
science science? . . . . . . . . . . . . 27--31
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 33--34
Richard P. Suttmeier Viewpoint: A new technonationalism?:
China and the development of technical
standards . . . . . . . . . . . . . . . 35--37
Vinton G. Cerf Viewpoint: Spam, spim, and spit . . . . 39--43
Maris G. Martinsons Introduction: Transforming China . . . . 44--48
Jonathan J. H. Zhu and
Enhai Wang Diffusion, use, and effect of the
Internet in China . . . . . . . . . . . 49--53
Xunhua Guo and
Guoqing Chen Internet diffusion in Chinese companies 54--58
Maris G. Martinsons The Internet enlightens and empowers
Chinese society . . . . . . . . . . . . 59--60
Robert M. Davison and
Douglas R. Vogel and
Roger W. Harris The e-transformation of western China 62--67
Jing Quan and
Qing Hu and
Xinan Wang IT is not for everyone in China . . . . 69--72
Glen R. Burrows and
Damon L. Drummond and
Maris G. Martinsons Knowledge management in China . . . . . 73--76
Qiang Tu and
Kanliang Wang and
Qin Shu Computer-related technostress in China 77--81
Charalambos L. Iacovou and
Albert S. Dexter Surviving IT project cancellations . . . 83--86
Christian Collberg and
Stephen Kobourov Self-plagiarism in computer science . . 88--94
Ellen Christiaanse Performance benefits through integration
hubs . . . . . . . . . . . . . . . . . . 95--100
Bettina Berendt and
Oliver Günther and
Sarah Spiekermann Privacy in e-commerce: stated
preferences vs. actual behavior . . . . 101--106
Dursun Delen and
Nikunj P. Dalal and
Perakath C. Benjamin Integrated modeling: the key to holistic
understanding of the enterprise . . . . 107--112
K. C. Tan and
M. L. Wang and
W. Peng A P2P genetic algorithm environment for
the Internet . . . . . . . . . . . . . . 113--116
Hai Zhuge Semantic Grid: scientific issues,
infrastructure, and methodology . . . . 117--119
Bruce Schneier Two-factor authentication: too little,
too late . . . . . . . . . . . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Hackers Sacked; Back to the
Future; U.K. Alerts Netizens; Schoolyard
E-Bullies; IT and Work, Work, Work;
Clocking Family Moves \`a la Potter . . 9--10
Diane Crawford and
Richard Stallman and
Peter Denning and
Jon Crowcroft and
Herbert Kanner and
Edwin D. Reilly, Jr. and
Len Cohen and
Larry Brunelle and
Philip Burgess and
Jonathan Grudin Forum: To Defend Privacy, Don't Collect
Personal Data; Look Beyond Abstraction
to Define Computing; Voter Anonymity and
Vote Security Still Impossible; Hold the
LEO and Celebrate Tools; Must Reading
for Software Engineers; When Is It OK to
Republish? . . . . . . . . . . . . . . . 11--13
Rebecca T. Mercuri Security Watch: Trusting in transparency 15--19
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 21--22
Meg McGinity Shannon Staying Connected: It's the FCC on the
line . . . . . . . . . . . . . . . . . . 23--26
David A. Patterson President's Letter: Recognizing
individual excellence helps us all . . . 27--28
Satish Nambisan Viewpoint: How to prepare tomorrow's
technologists for global networks of
innovation . . . . . . . . . . . . . . . 29--31
Anand Desai Introduction: Special Issue: Adaptive
complex enterprises . . . . . . . . . . 32--35
Joseph Tan and
H. Joseph Wen and
Neveen Awad Health care and services delivery
systems as complex adaptive systems . . 36--44
Albert Jones and
Abhijit Deshmukh Test beds for complex systems . . . . . 45--50
Jay Ramanathan Fractal architecture for the adaptive
complex enterprise . . . . . . . . . . . 51--57
Rajiv Ramnath and
David Landsbergen IT-enabled sense-and-respond strategies
in complex public organizations . . . . 58--64
Ashley A. Bush and
Amrit Tiwana Designing sticky knowledge networks . . 66--71
Sridhar Nerur and
RadhaKanta Mahapatra and
George Mangalaraj Challenges of migrating to agile
methodologies . . . . . . . . . . . . . 72--78
Vincent S. Lai and
Bo K. Wong Business types, e-strategies, and
performance . . . . . . . . . . . . . . 80--85
Suzanne D. Pawlowski and
Pratim Datta and
Andrea L. Houston The (gradually) changing face of state
IT jobs . . . . . . . . . . . . . . . . 87--91
Kenneth R. Fleischmann and
William A. Wallace A covenant with transparency: opening
the black box of models . . . . . . . . 93--97
Alex Potanin and
James Noble and
Marcus Frean and
Robert Biddle Scale-free geometry in OO programs . . . 99--103
Baihua Zheng and
Dik Lun Lee Information dissemination via wireless
broadcast . . . . . . . . . . . . . . . 105--110
Serge Abiteboul and
Rakesh Agrawal and
Phil Bernstein and
Mike Carey and
Stefano Ceri and
Bruce Croft and
David DeWitt and
Mike Franklin and
Hector Garcia Molina and
Dieter Gawlick and
Jim Gray and
Laura Haas and
Alon Halevy and
Joe Hellerstein and
Yannis Ioannidis and
Martin Kersten and
Michael Pazzani and
Mike Lesk and
David Maier and
Jeff Naughton and
Hans Schek and
Timos Sellis and
Avi Silberschatz and
Mike Stonebraker and
Rick Snodgrass and
Jeff Ullman and
Gerhard Weikum and
Jennifer Widom and
Stan Zdonik The Lowell database research
self-assessment . . . . . . . . . . . . 111--118
Ben Light Technical Opinion: Potential pitfalls in
packaged software adoption . . . . . . . 119--121
Bruce Schneier Inside Risks: Risks of third-party data 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Betting the Pharm; Mindful
of Trust; Asian Jam Session; Schools
Unplugged, FCC Undone; Data for a Song;
A Fitting Solution . . . . . . . . . . . 9--10
Diane Crawford and
David Jameson and
Vinton Cerf and
Eugen Weinstein and
Robert M. Davison and
Douglas R. Vogel and
Matt Wimble and
Michael Cusumano and
Charles W. Neville and
Philip Wandler Forum: The Imperceptible Cost of
Eliminating Spam; Taiwan's place in
China; Don't Discount Capital Structure;
Beware the Consequences of Citing
Self-Plagiarism . . . . . . . . . . . . 11--13
Phillip G. Armour The business of software:
Sarbanes--Oxley and software projects 15--17
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 19--20
Pamela Samuelson Legally speaking: The Supreme Court
revisits the \em Sony safe harbor . . . 21--25
David A. Patterson President's letter: Do you \em Queue? 27--28
Jacques Cohen Viewpoint: Updating computer science
education . . . . . . . . . . . . . . . 29--31
Andrew Rosenbloom Introduction: $3$D hard copy . . . . . . 32--35
Paul K. Wright Rapid prototyping in consumer product
design . . . . . . . . . . . . . . . . . 36--41
Mike Bailey Layered manufacturing for scientific
visualization . . . . . . . . . . . . . 42--48
Sara McMains Layered manufacturing technologies . . . 50--56
Thomas Funkhouser and
Michael Kazhdan and
Patrick Min and
Philip Shilane Shape-based retrieval and analysis of
$3$D models . . . . . . . . . . . . . . 58--64
Carlo H. Séquin Rapid prototyping: a $3$D visualization
tool takes on sculpture and mathematical
forms . . . . . . . . . . . . . . . . . 66--73
David Koller and
Marc Levoy Protecting $3$D graphics content . . . . 74--80
U. N. Umesh and
Minh Q. Huynh and
Len Jessup Creating successful entrepreneurial
ventures in IT . . . . . . . . . . . . . 82--87
Jo Ellen Moore and
Mary Sue Love IT professionals as organizational
citizens . . . . . . . . . . . . . . . . 88--93
James A. M. McHugh and
Fadi P. Deek An incentive system for reducing malware
attacks . . . . . . . . . . . . . . . . 94--99
Jennifer Xu and
Hsinchun Chen Criminal network analysis and
visualization . . . . . . . . . . . . . 100--107
Rahul Singh and
A. F. Salam and
Lakshmi Iyer Agents in e-supply chains . . . . . . . 108--115
Fiona Fui-Hoon Nah and
Keng Siau and
Yuhong Tian Knowledge management mechanisms of
financial service sites . . . . . . . . 117--123
Tapas Kanungo and
Philip Resnik and
Song Mao and
Doe-Wan Kim and
Qigong Zheng The Bible and multilingual optical
character recognition . . . . . . . . . 124--130
Younghwa Lee Technical opinion: The CAN-SPAM Act: a
silver bullet solution? . . . . . . . . 131--132
Susan Landau Inside risks: What lessons are we
teaching? . . . . . . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Hacker Posse; Moore at Home;
Sniffing out Cancer; Retiring Old
Friends; A Rose By Any Other Name?;
Robo-Jockeys . . . . . . . . . . . . . . 9--10
Diane Crawford and
Rajesh Gupta and
Ashley Braganza and
Raymond L. Robert and
Hal Berghel and
Richard Stallman and
Michael Cusumano and
Ephraim McLean and
Ralph Westfall Forum: DARPA (and U.S.) Opportunities
Lost; Don't Ignore the CIO's Legal
Burdens; Free is Not Open Software; LEO
Lives; Resolving the Dataless Dilemma in
OO Programming . . . . . . . . . . . . . 11--13
David A. Patterson President's letter: Reflections on a
programming Olympiad . . . . . . . . . . 15--16
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 17--18
Peter J. Denning The Profession of IT: The locality
principle . . . . . . . . . . . . . . . 19--24
Michael A. Cusumano Technology Strategy and Management: The
puzzle of Japanese software . . . . . . 25--27
Naomi S. Baron Viewpoint: Instant Messaging and the
future of language . . . . . . . . . . . 29--31
Karen Holtzblatt Introduction: Designing for the Mobile
Device: Experiences, Challenges, and
Methods . . . . . . . . . . . . . . . . 32--35
Jan Blom and
Jan Chipchase and
Jaakko Lehikoinen Contextual and cultural challenges for
user mobility research . . . . . . . . . 37--41
Colleen Page Mobile research strategies for a global
market . . . . . . . . . . . . . . . . . 42--48
T. S. Balaji and
Brian Landers and
Jesse Kates and
Bob Moritz A carrier's perspective on creating a
mobile multimedia service . . . . . . . 49--53
Eeva Kangas and
Timo Kinnunen Applying user-centered design to mobile
application development . . . . . . . . 55--59
David B. Rondeau For mobile applications, branding is
experience . . . . . . . . . . . . . . . 61--66
Barbara P. Heath and
David J. McArthur and
Marilyn K. McClelland and
Ronald J. Vetter Metadata lessons from the iLumina
digital library . . . . . . . . . . . . 68--74
Gun A. Lee and
Gerard J. Kim and
Mark Billinghurst Immersive authoring: What You eXperience
Is What You Get (WYXIWYG) . . . . . . . 76--81
Dennis F. Galletta and
Alexandra Durcikova and
Andrea Everard and
Brian M. Jones Does spell-checking software need a
warning label? . . . . . . . . . . . . . 82--86
James J. Cappel and
Victor R. Prybutok and
Benny Varghese A closer look at attention to detail . . 87--92
Mike Thelwall Scientific Web intelligence: finding
relationships in university Webs . . . . 93--96
Rudy Hirschheim The Internet-based education bandwagon:
look before you leap . . . . . . . . . . 97--101
Robert Davis and
David Yung Technical Opinion: Understanding the
interactivity between television and
mobile commerce . . . . . . . . . . . . 103--105
Edward W. Felten Inside risks: DRM and public policy . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: A Scattering Flock?
Transistor Treasure; Unions Lose Legion;
Piracy Pays; Pacman Unleashed . . . . . 9--10
Diane Crawford and
Amir Ben-Amram and
Christian Collbert and
Stephen Kobourov and
Alex Simonelis and
Ashley A. Bush and
Amrit Tiwana and
Larry Bernstein and
Rich Altmaier Forum: Rights and Wrongs in Scientific
Publications; Give Users More Than
Propaganda; Define Accountability in
Software Development; Stick to Public
Safety, Not Business Software, in Laws
and Regulations . . . . . . . . . . . . 11--13
Robert L. Glass Practical programmer: ``Silver bullet''
milestones in software history . . . . . 15--18
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 19--20
Hal Berghel and
Jacob Uecker Digital village: WiFi attack vectors . . 21--28
David A. Patterson President's letter: Does ACM support
matter to conferences or journals? . . . 29--30
Sanjeev Arora and
Bernard Chazelle Viewpoint: Is the thrill gone? . . . . . 31--33
Thomas F. Stafford Introduction: Spyware . . . . . . . . . 34--36
Steve Gibson Spyware was inevitable . . . . . . . . . 37--39
Roger Thompson Why spyware poses multiple threats to
security . . . . . . . . . . . . . . . . 41--43
Xiaoni Zhang What do consumers really know about
spyware? . . . . . . . . . . . . . . . . 44--48
Lee A. Freeman and
Andrew Urbaczewski Why do people hate spyware? . . . . . . 50--53
Neveen Farag Awad and
Kristina Fitzgerald The deceptive behaviors that offend us
most about spyware . . . . . . . . . . . 55--60
Qing Hu and
Tamara Dinev Is spyware an Internet nuisance or
public menace? . . . . . . . . . . . . . 61--66
Mark B. Schmidt and
Kirk P. Arnett Spyware: a little knowledge is a
wonderful thing . . . . . . . . . . . . 67--70
Younghwa Lee and
Kenneth A. Kozar Investigating factors affecting the
adoption of anti-spyware systems . . . . 72--77
Merrill Warkentin and
Xin Luo and
Gary F. Templeton A framework for spyware assessment . . . 79--84
Sudhindra Shukla and
Fiona Fui-Hoon Nah Web browsing and spyware intrusion . . . 85--90
Kirk P. Arnett and
Mark B. Schmidt Busting the ghost in the machine . . . . 92--95
Robin Poston and
Thomas F. Stafford and
Amy Hennington Spyware: a view from the (online) street 96--99
Indranil Bose and
Raktim Pal Auto-ID: managing anything, anywhere,
anytime in the supply chain . . . . . . 100--106
Yihua Philip Sheng and
Peter P. Mykytyn, Jr. and
Charles R. Litecky Competitor analysis and its defenses in
the e-marketplace . . . . . . . . . . . 107--112
Casey G. Cegielski and
Brian J. Reithel and
Carl M. Rebman Emerging information technologies:
developing a timely IT strategy . . . . 113--117
Gregory W. Bond Software as art . . . . . . . . . . . . 118--124
Donald E. Hardaway Sharing research in the 21st Century:
borrowing a page from open source
software . . . . . . . . . . . . . . . . 125--128
Jeanette Nasem Morgan Why the software industry needs a good
ghostbuster . . . . . . . . . . . . . . 129--133
Harry L. Reif and
Michel Mitri Technical opinion: How university
professors teach project management for
information systems . . . . . . . . . . 134--136
Peter G. Neumann and
Michael D. Byrne Inside Risks: Disability-related risks 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Low-Tech Security Prevails;
Change for the Meter; Quicky Wiki;
Kicking and Screaming; Career Swings; A
News Item We Couldn't Refuse . . . . . . 9--10
Diane Crawford and
Lee Hollaar and
Edward W. Felten and
Bradley Rhodes and
Richard H. Veith and
Scott Reynolds Forum: Which Use Is Fair in Digital
Rights Management?; We All Own David;
Less Than Meets the Eye in Online
Coursework; Software Lessons From the
Dallas Cowboys . . . . . . . . . . . . . 11--13
Phillip G. Armour The Business of Software: To plan, two
plans . . . . . . . . . . . . . . . . . 15--19
Meg McGinity Shannon Staying Connected: Nanotechnology's
shadow . . . . . . . . . . . . . . . . . 21--23
David A. Patterson President's letter: Restoring the
popularity of computer science . . . . . 25--28
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 29--30
Frank Stajano RFID is x-ray vision . . . . . . . . . . 31--33
Gaetano Borriello Introduction: Special Issue: RFID:
Tagging the world . . . . . . . . . . . 34--37
Joshua R. Smith and
Kenneth P. Fishkin and
Bing Jiang and
Alexander Mamishev and
Matthai Philipose and
Adam D. Rea and
Sumit Roy and
Kishore Sundara-Rajan RFID-based techniques for human-activity
detection . . . . . . . . . . . . . . . 39--44
Ramesh Raskar and
Paul Beardsley and
Paul Dietz and
Jeroen van Baar Photosensing wireless tags for geometric
procedures . . . . . . . . . . . . . . . 46--51
Trevor Pering and
Rafael Ballagas and
Roy Want Spontaneous marriages of mobile devices
and interactive spaces . . . . . . . . . 53--59
Sherry Hsi and
Holly Fait RFID enhances visitors' museum
experience at the Exploratorium . . . . 60--65
Miyako Ohkubo and
Koutarou Suzuki and
Shingo Kinoshita RFID privacy issues and technical
challenges . . . . . . . . . . . . . . . 66--71
Oliver Günther and
Sarah Spiekermann RFID and the perception of control: the
consumer's view . . . . . . . . . . . . 73--76
Bruce Eckfeldt What does RFID do for the consumer? . . 77--79
Rajiv C. Shah and
Jay P. Kesan Nurturing software . . . . . . . . . . . 80--85
James Backhouse and
Carol Hsu and
Jimmy C. Tseng and
John Baptista A question of trust . . . . . . . . . . 87--91
Zhenhui Jiang and
Weiquan Wang and
Izak Benbasat Multimedia-based interactive advising
technology for online consumer decision
support . . . . . . . . . . . . . . . . 92--98
Charles A. Wood and
Terence T. Ow WEBVIEW: an SQL extension for joining
corporate data to data derived from the
web . . . . . . . . . . . . . . . . . . 99--104
Ping Zhang and
Na Li The importance of affective quality . . 105--108
Hai Zhuge Exploring an epidemic in an e-science
environment . . . . . . . . . . . . . . 109--114
Deborah K. Smith and
Trevor Moores and
Jerry Chang Prepare your mind for learning . . . . . 115--118
G. Anthony Gorry Technical Opinion: As simple as
possible, but not simpler . . . . . . . 119--122
Barbara Simons and
Jim Horning Inside risks: Risks of
technology-oblivious policy . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Medicare to the E-Rescue;
Virus Motors Running; Border Security
Tags; Japan Sets `Super' Sites;
Beautiful Music; Energy-Saving
Appliances . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Diomidis Spinellis and
Peter J. Denning and
Henry Baker and
Peter J. Denning and
Alex Simonelis and
David Patterson and
Jeff Johnson Forum: Why Computing Parallels Brain
Function; The Government's Response to
Tech and CS Downturns; Disband the
Hacker Posse . . . . . . . . . . . . . . 11--13
David A. Patterson President's letter: The \em new
Professional Development Centre boasts
1,000 courses, O'Reilly Books, and CS
classics . . . . . . . . . . . . . . . . 15--16
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 17--18
Pamela Samuelson Legally speaking: Did MGM really win the
\em Grokster case? . . . . . . . . . . . 19--24
Michael A. Cusumano Technology strategy and management:
Software in Ireland: a balance of
entrepreneurship and\ldots lifestyle
management? . . . . . . . . . . . . . . 25--27
Kenneth A. Ross Viewpoint: Academic dishonesty and the
Internet . . . . . . . . . . . . . . . . 29--31
Abbe Mowshowitz and
Murray Turoff Introduction: The digital society . . . 32--35
Edward N. Wolff The growth of information workers in the
U.S. economy . . . . . . . . . . . . . . 37--42
Sara J. Czaja and
Starr Roxanne Hiltz Digital aids for an aging society . . . 43--44
Elia Zureik and
Abbe Mowshowitz Consumer power in the digital society 46--51
Barry Wellman Community: from neighborhood to network 53--55
Eli M. Noam Why the Internet is bad for democracy 57--58
Starr Roxanne Hiltz and
Murray Turoff Education goes digital: the evolution of
online learning and the revolution in
higher education . . . . . . . . . . . . 59--64
Hal R. Varian Universal access to information . . . . 65--66
Peter G. Goldschmidt HIT and MIS: implications of health
information technology and medical
information systems . . . . . . . . . . 68--74
Yong Jin Kim and
Rajiv Kishore and
G. Lawrence Sanders From DQ to EQ: understanding data
quality in the context of e-business
systems . . . . . . . . . . . . . . . . 75--81
Gediminas Adomavicius and
Alexander Tuzhilin Personalization technologies: a
process-oriented perspective . . . . . . 83--90
Bipin Prabhakar and
Charles R. Litecky and
Kirk Arnett IT skills in a tough job market . . . . 91--94
Dragomir Radev and
Jahna Otterbacher and
Adam Winkel and
Sasha Blair-Goldensohn NewsInEssence: summarizing online news
topics . . . . . . . . . . . . . . . . . 95--98
Sang M. Lee and
Xin Tan and
Silvana Trimi Current practices of leading
e-government countries . . . . . . . . . 99--104
Arvind Malhotra and
Albert H. Segars Investigating wireless Web adoption
patterns in the U.S. . . . . . . . . . . 105--110
Alan R. Peslak Technical opinion: The educational
productivity paradox . . . . . . . . . . 111--114
Lauren Weinstein Inside risks: The best-laid plans: a
cautionary tale for developers . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Attracting Hackers; Super
Competition; Blog Profiles; Improvements
in Hand; Tattooed Fruit; Love Lost . . . 9--10
Diane Crawford and
Lawrence C. Paulson and
Michael A. Cusumano and
Stephen Schmid and
Fabio A. Schreiber and
Hal Lowe and
Günter Rote and
William Adams and
David Anderson and
Thomas E. Stafford and
Arthur M. Rosenberg Forum: Welcome Defects as a Sign of
Innovation?; Homage to the Relational
Database; The Cultural Roots of Computer
Science; Look to Human Nature for the
Roots of Spyware; Wireless at Work . . . 11--13
Peter J. Denning and
Andrew McGettrick The profession of IT: Recentering
computer science . . . . . . . . . . . . 15--19
Robert L. Glass Practical programmer: The plot to
deskill software engineering . . . . . . 21--24
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 25--26
Maria Klawe and
Ben Shneiderman Viewpoint: Crisis and opportunity in
computer science . . . . . . . . . . . . 27--28
David A. Patterson President's letter: Rescuing our
families, our neighbors, and ourselves 29--31
Peter Kugel It's time to think outside the
computational box . . . . . . . . . . . 32--37
Alvin T. S. Chan Mobile cookies management on a smart
card . . . . . . . . . . . . . . . . . . 38--43
Richard A. Frost Call for a public-domain SpeechWeb . . . 45--49
Benjamin A. Kuperman and
Carla E. Brodley and
Hilmi Ozdoganoglu and
T. N. Vijaykumar and
Ankit Jalote Detection and prevention of stack buffer
overflow attacks . . . . . . . . . . . . 50--56
Chuan-Fong Shih and
Jason Dedrick and
Kenneth L. Kraemer Rule of law and the international
diffusion of e-commerce . . . . . . . . 57--62
Rana Tassabehji and
Maria Vakola Business email: the killer impact . . . 64--70
Sridhar Nerur and
Riyaz Sikora and
George Mangalaraj and
VenuGopal Balijepally Assessing the relative influence of
journals in a citation network . . . . . 71--74
Radha Mookerjee Maintaining enterprise software
applications . . . . . . . . . . . . . . 75--79
Rosemary H. Wild and
Kenneth A. Griggs and
Eldon Y. Li An architecture for distributed scenario
building and evaluation . . . . . . . . 80--86
Michael Ettredge and
John Gerdes and
Gilbert Karuga Using Web-based search data to predict
macroeconomic statistics . . . . . . . . 87--92
Bill C. Hardgrave and
Deborah J. Armstrong Technical opinion: Software process
improvement: it's a journey, not a
destination . . . . . . . . . . . . . . 93--96
Steven M. Bellovin and
Matt Blaze and
Susan Landau Inside risks: The real national-security
needs for VoIP . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6
CACM Staff News track: Consumers Strike Back;
Addictive Hackers; Fish's Tale; A
Gamer's Life; Rankings Irk Profs . . . . 9--10
Diane Crawford and
Kevin Markey and
Scott Peer and
Philip Machanick and
Jim Chorn and
C. J. Fearnley and
Melvin Perez and
Jeanette Nasem Morgan Forum: No RFID Choice, No Thanks; Booms,
Bust, and CS Enrollment; Who Needs a
Certificate? . . . . . . . . . . . . . . 11--13
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 15--16
Rebecca Mercuri Security Watch: Challenges in forensic
computing . . . . . . . . . . . . . . . 17--21
Hal Berghel and
David Hoelzer Digital Village: Pernicious ports . . . 23--30
David A. Patterson Robots in the desert: a research parable
for our times . . . . . . . . . . . . . 31--33
Amy S. Bruckman Viewpoint: Student research and the
Internet . . . . . . . . . . . . . . . . 35--37
Rahul Singh and
Lakshmi S. Iyer and
A. F. Salam Introduction: The Semantic E-Business
Vision . . . . . . . . . . . . . . . . . 38--41
Jos de Bruijn and
Dieter Fensel and
Uwe Keller and
Rubén Lara Using the Web service modeling ontology
to enable semantic e-business . . . . . 43--47
JinKyu Lee and
Shambhu J. Upadhyaya and
H. Raghav Rao and
Raj Sharman Secure knowledge management and the
Semantic Web . . . . . . . . . . . . . . 48--54
Manoj Thomas and
Richard Redmond and
Victoria Yoon and
Rahul Singh A semantic approach to monitor business
process . . . . . . . . . . . . . . . . 55--59
Ejub Kajan and
Leonid Stoimenov Toward an ontology-driven architectural
framework for B2B . . . . . . . . . . . 60--66
Thomas P. Moran and
Alex Cozzi and
Stephen P. Farrell Unified activity management: supporting
people in e-business . . . . . . . . . . 67--70
Bhavani Thuraisingham Directions for security and privacy for
semantic e-business applications . . . . 71--73
Juhnyoung Lee Model-driven business transformation and
the Semantic Web . . . . . . . . . . . . 75--77
Michael J. O'Donnell Separate handles from names on the
Internet . . . . . . . . . . . . . . . . 78--83
Sanjiv Augustine and
Bob Payne and
Fred Sencindiver and
Susan Woodcock Agile project management: steering from
the edges . . . . . . . . . . . . . . . 85--89
Younghwa Lee and
Kenneth A. Kozar and
Kai R. Larsen Does avatar email improve communication? 91--95
Torgeir Dingsòyr and
Hans Karim Djarraya and
Emil Ròyrvik Practical knowledge management tool use
in a software consulting company . . . . 96--100
Akhilesh Chandra and
Thomas Calderon Challenges and constraints to the
diffusion of biometrics in information
systems . . . . . . . . . . . . . . . . 101--106
Stephan Kudyba and
G. Brent Hamar and
William M. Gandy Enhancing efficiency in the health care
industry . . . . . . . . . . . . . . . . 107--110
Philip F. Musa and
Victor W. Mbarika and
Peter Meso Calling for programmed technology
transfer and adoption strategies for
sustainable LDC growth . . . . . . . . . 111--116
Peter Denning and
Jim Horning and
David Parnas and
Lauren Weinstein Inside risks: Wikipedia risks . . . . . 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--7
CACM Staff News track: Litter Unleashed; China's
Net Preferences; Brain Drained; Cell
Phones Alter African Life; U.S. IT
Salaries to Rise; Runway Techno-Chic . . 9--10
Diane Crawford and
George Dodd and
Thomas Joos and
Anthony Ralston and
Peter J. Denning and
Andrew McGettrick and
Todd Hartle and
Robert L. Glass and
Ed Callaway and
George Hacken and
David P. Duggan Forum: Call It Anything But Programming,
Even Science; Put Creativity Back in
Programming; The Internet's Greatest
Contribution to Democracy; Japanese
Rigor for Everyone . . . . . . . . . . . 11--13
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 15--16
Phillip G. Armour The business of software: Counting
boulders and measuring mountains . . . . 17--20
David A. Patterson and
CACM Staff ACM annual report for FY05 . . . . . . . 21--30
Meg McGinity Shannon Staying connected: The network of life 29--32
David A. Patterson President's letter: New Directions for
\em CACM? . . . . . . . . . . . . . . . 33--35
Scott Campbell Viewpoint: How to think about security
failures . . . . . . . . . . . . . . . . 37--39
Jaime Teevan and
William Jones and
Benjamin B. Bederson Introduction: Personal information
management . . . . . . . . . . . . . . . 40--43
Mary Czerwinski and
Douglas W. Gage and
Jim Gemmell and
Catherine C. Marshall and
Manuel A. Pérez-Quiñonesis and
Meredith M. Skeels and
Tiziana Catarci Digital memories in an era of ubiquitous
computing and abundant storage . . . . . 44--50
Wanda Pratt and
Kenton Unruh and
Andrea Civan and
Meredith Skeels Personal health information management 51--55
Clare-Marie Karat and
Carolyn Brodie and
John Karat Usable privacy and security for personal
information management . . . . . . . . . 56--57
Edward Cutrell and
Susan T. Dumais and
Jaime Teevan Searching to eliminate personal
information management . . . . . . . . . 58--64
Catherine C. Marshall and
William Jones Keeping encountered information . . . . 66--67
Steve Whittaker and
Victoria Bellotti and
Jacek Gwizdka Email in personal information management 68--73
Thomas Erickson From PIM to GIM: personal information
management in group contexts . . . . . . 74--75
David R. Karger and
William Jones Data unification in personal information
management . . . . . . . . . . . . . . . 77--82
Diane Kelly Evaluating personal information
management behaviors and tools . . . . . 84--86
Jim Gemmell and
Gordon Bell and
Roger Lueder MyLifeBits: a personal database for
everything . . . . . . . . . . . . . . . 88--95
Kevin C. Desouza and
Yukika Awazu and
Amrit Tiwana Four dynamics for bringing use back into
software reuse . . . . . . . . . . . . . 96--100
George Pallis and
Athena Vakali Insight and perspectives for content
delivery networks . . . . . . . . . . . 101--106
Grace J. Johnson and
Paul J. Ambrose Neo-tribes: the power and potential of
online communities in health care . . . 107--113
Tim Chenoweth and
Karen Corral and
Haluk Demirkan Seven key interventions for data
warehouse success . . . . . . . . . . . 114--119
Lawrence A. Gordon and
Martin P. Loeb Budgeting process for information
security expenditures . . . . . . . . . 121--125
Matti Tedre and
Erkki Sutinen and
Esko Kähkönen and
Piet Kommers Ethnocomputing: ICT in cultural and
social context . . . . . . . . . . . . . 126--130
Christoph Meinel and
Volker Klotz Technical opinion: The first 10 years of
the ECCC digital library . . . . . . . . 131--134
John C. Knight and
Nancy G. Leveson Inside risks: Software and higher
education . . . . . . . . . . . . . . . 160--160
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Moon Match; Billboard
Ratings; StAIRway to Heaven; Google
Eyes; Owning to Nano Unknowns; What's
the Buzz? . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Kurt Guntheroth and
Andy K. Y. Poon and
John Leary and
Mike Brenner and
Robert J. DuWors and
Gediminas Adomavicius and
Alexander Tuzhilin and
Alex Simonelis Forum: Only More Original Research Can
Save Computer Science; Testing Wiki
Credibility; No One Programs From
Scratch; Emphasize Positive Feedback in
Personalization; Why the Internet is
Good for Democracy . . . . . . . . . . . 11--13
Gary F. Templeton Technical opinion: Video image
stabilization and registration
technology . . . . . . . . . . . . . . . 15--18
Siri Birgitte Uldal and
Muhammad Aimal Marjan International perspectives: Computing in
post-war Afghanistan . . . . . . . . . . 19--24
Pamela Samuelson Legally speaking: Regulating technical
design . . . . . . . . . . . . . . . . . 25--30
Michael A. Cusumano Technology strategy and management:
Where does Russia fit into the global
software industry? . . . . . . . . . . . 31--34
Nanda Kumar and
Abbe Mowshowitz Viewpoint: Who should govern the
Internet? . . . . . . . . . . . . . . . 35--37
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 39--40
David A. Patterson President's letter: Offshoring: Finally
Facts vs. Folklore . . . . . . . . . . . 41--42
Brajendra Panda and
Joseph Giordano and
Daniel Kalil Introduction: Next-generation cyber
forensics . . . . . . . . . . . . . . . 44--47
Eoghan Casey Investigating sophisticated security
breaches . . . . . . . . . . . . . . . . 48--55
Brian D. Carrier Risks of live digital forensic analysis 56--61
Frank Adelstein Live forensics: Diagnosing your system
without killing it first . . . . . . . . 63--66
The Common Digital Evidence Storage Format Working Group Standardizing digital evidence storage 67--68
Chet Hosmer Digital evidence bag . . . . . . . . . . 69--70
Sheldon Teelink and
Robert F. Erbacher Improving the computer forensic analysis
process through visualization . . . . . 71--75
Golden G. Richard, III and
Vassil Roussev Next-generation digital forensics . . . 76--80
Rahul Bhaskar State and local law enforcement is not
ready for a cyber Katrina . . . . . . . 81--83
Simson L. Garfinkel AFF: a new format for storing hard drive
images . . . . . . . . . . . . . . . . . 85--87
Ganesan Shankaranarayanan and
Adir Even The metadata enigma . . . . . . . . . . 88--94
Pak-Lok Poon and
Amy H. L. Lau The present B2C implementation framework 96--103
Jan Damsgaard and
Mihir A. Parikh and
Bharat Rao Wireless commons perils in the common
good . . . . . . . . . . . . . . . . . . 104--109
CACM Staff Student de-charter notice . . . . . . . 110--110
H. M. Gladney Principles for digital preservation . . 111--116
Stephen Owen and
Pearl Brereton and
David Budgen Protocol analysis: a neglected practice 117--122
Deborah J. Armstrong The quarks of object-oriented
development . . . . . . . . . . . . . . 123--128
Roli Varma Making computer science
minority-friendly . . . . . . . . . . . 129--134
Peter G. Neumann Inside risks: Trustworthy systems
revisited . . . . . . . . . . . . . . . 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Wars Blogged; Snap
Judgments; CMU's Robo-Receptionist; Have
We Got Mail! . . . . . . . . . . . . . . 9--10
Diane Crawford and
Peter Wegner and
Dina Goldin and
Jean-Pierre Rosen and
Curtis Rhodes and
C. J. Fearnley and
Peter J. Denning and
Andrew McGettrick and
Mike Segel and
Michael J. O'Donnell Forum: Interactive Computing is Already
Outside the Box; Lack of Ada Reflects
Software Immaturity; Be Skeptical of
Rhetorical Slight of Hand; More to
Innovation than Innovation Alone;
Handles Not a Naming Solution . . . . . 11--13
Phillip G. Armour The Business of Software: The
operational executive sponsor . . . . . 15--18
Robert L. Glass Practical programmer: Is the crouching
tiger a threat? . . . . . . . . . . . . 19--20
Bertrand Meyer and
Willy Zwaenepoel The European report: Europe's computer
scientists take fate into their own
hands . . . . . . . . . . . . . . . . . 21--24
CACM Staff Call for nominations for advanced member
grades in the ACM . . . . . . . . . . . 25--26
David A. Patterson President's letter: Computer science
education in the 21$^{st}$ century . . . 27--30
David A. Patterson Reviving your favorite CS books . . . . 31--31
Jeannette M. Wing Viewpoint: Computational thinking . . . 33--35
Jean-Philippe Martin-Flatin and
Joe Sventek and
Kurt Geihs Introduction: Self-managed systems and
services . . . . . . . . . . . . . . . . 36--39
Paul Robertson and
Brian Williams Automatic recovery from software failure 41--47
George Porter and
Randy H. Katz Effective Web service load balancing
through statistical monitoring . . . . . 48--54
Jerry Rolia and
Ludmila Cherkasova and
Martin Arlitt and
Vijay Machiraju Supporting application quality of
service in shared resource pools . . . . 55--60
Kenji Leibnitz and
Naoki Wakamiya and
Masayuki Murata Biologically inspired self-adaptive
multi-path routing in overlay networks 62--67
Atul Singh and
Mads Haahr Creating an adaptive network of hubs
using Schelling's model . . . . . . . . 69--73
CACM Staff ACM fellows . . . . . . . . . . . . . . 74--75
Martin Halvey and
Mark T. Keane and
Barry Smyth Mobile Web surfing is the same as Web
surfing . . . . . . . . . . . . . . . . 76--81
Vicki R. McKinney and
Mary M. Whiteside Maintaining distributed relationships 82--86
Zhiping Walter and
George Scott Management issues of Internet/Web
systems . . . . . . . . . . . . . . . . 87--91
Aldo de Moor and
Mark Aakhus Argumentation support: From technologies
to tools . . . . . . . . . . . . . . . . 93--98
Juan E. Gilbert Applications quest: Computing diversity 99--104
Robert C. Beatty and
Craig D. Williams ERP II: Best practices for successfully
implementing an ERP upgrade . . . . . . 105--109
Mazliza Othman and
Rodziah Latih Women in computer science: No shortage
here! . . . . . . . . . . . . . . . . . 111--114
Brian L. Dos Santos and
Andrew L. Wright Technical opinion: Using bulletin boards
in an educational setting . . . . . . . 115--118
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 126--127
Marc Rotenberg Inside risks: Real ID, real trouble? . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: The Big Sweep; BMW Blasted;
Americans turn to the Net;
High-Performance Help; ACM issues
offshoring report; The Boss is Watching;
Fast(er) Food to Go . . . . . . . . . . 9--10
Diane Crawford and
William Adams and
Phillip G. Armour and
Peter Farrel-Vinay and
Sanjiv Augustine and
Bob Payne and
Susan Woodcock and
David Lorge Parnas and
Amy S. Bruckman and
Adrian Bowyer and
Alessandro Berni and
Jack Ganssle Forum: To Produce a Good Plan, Start
with a Good Process; Who Defined the
Requirements?; Proff Depends on
Evidence; End the Tragedy of the
Wireless Commons; Look Further for
Domain Name Persistence; Before Coding,
Learn Disciplined Engineering . . . . . 11--13
Peter J. Denning The profession of IT: Hastily formed
networks . . . . . . . . . . . . . . . . 15--20
Hal Berghel Digital village: Phishing mongers and
posers . . . . . . . . . . . . . . . . . 21--25
CACM Staff Statewide databases of registered voters 26--28
Diane Crawford Hot links: Top 10 Downloads from ACM's
Digital Library . . . . . . . . . . . . 29--30
David A. Patterson President's letter: Seven reasons to
shave your head and three reasons not
to: the bald truth . . . . . . . . . . . 31--32
Shlomo Argamon and
Mark Olsen Viewpoint: Toward meaningful computing 33--35
Ryen W. White and
Bill Kules and
Steven M. Drucker and
m. c. schraefel Introduction: Supporting exploratory
search . . . . . . . . . . . . . . . . . 36--39
Gary Marchionini Exploratory search: From finding to
understanding . . . . . . . . . . . . . 41--46
m. c. schraefel and
Max Wilson and
Alistair Russell and
Daniel A. Smith mSpace: Improving information access to
multimedia domains with multimodal
exploratory search . . . . . . . . . . . 47--49
Edward Cutrell and
Susan T. Dumais Exploring personal information . . . . . 50--51
Edward A. Fox and
Fernando Das Neves and
Xiaoyan Yu and
Rao Shen and
Seonho Kim and
Weiguo Fan Exploring the computing literature with
visualization and stepping stones &
pathways . . . . . . . . . . . . . . . . 52--58
Marti A. Hearst Clustering versus faceted categories for
information exploration . . . . . . . . 59--61
John Gersh and
Bessie Lewis and
Jaime Montemayor and
Christine Piatko and
Russell Turner Supporting insight-based information
exploration in intelligence analysis . . 63--68
Ben Shneiderman and
Benjamin B. Bederson and
Steven M. Drucker Find that photo!: Interface strategies
to annotate, browse, and share . . . . . 69--71
Bernard J. Jansen Using temporal patterns of interactions
to design effective automated searching
assistance . . . . . . . . . . . . . . . 72--74
Jiexun Li and
Rong Zheng and
Hsinchun Chen From fingerprint to writeprint . . . . . 76--82
Nenad Jukic Modeling strategies and alternatives for
data warehousing projects . . . . . . . 83--88
Andrea Ordanini What drives market transactions in B2B
exchanges? . . . . . . . . . . . . . . . 89--93
Moshe Zviran and
Dov Te'eni and
Yuval Gross Does color in email make a difference? 94--99
Rosario Vidal and
Elena Mulet Thinking about computer systems to
support design synthesis . . . . . . . . 100--104
Harvey G. Enns and
Thomas W. Ferratt and
Jayesh Prasad Beyond stereotypes of IT professionals:
Implications for IT HR practices . . . . 105--109
Sang M. Lee and
Choong Kwon Lee Technical opinion: IT managers'
requisite skills . . . . . . . . . . . . 111--114
Lauren Weinstein Inside Risks: Fake ID: Batteries not
included . . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Embedded Risks; Coat of
Silence; Buggy Concept; Net Oversight;
Virtual Visitation; Campus Campaigns . . 9--10
Diane Crawford and
Bob Elias and
Claud D. Price and
Bruce Ballengee and
Jack Yang and
Heman Robinson and
Charles Betz and
Ganesan Shankaranarayanan and
Adrian Bowyer and
Peter Denning and
James Horning and
David Parnas and
Lauren Weinstein Forum: Don't Fear the Tiger; Give
Metadata its Due; Who Do You Trust? . . 11--13
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 15--16
Rebecca T. Mercuri Security watch: Scoping identity theft 17--21
Meg McGinity Shannon Staying connected: Private lives . . . . 23--26
David A. Patterson President's letter: Revisiting my
campaign statement . . . . . . . . . . . 27--30
Thomas A. Easton Viewpoint: Beyond the algorithmization
of the sciences . . . . . . . . . . . . 31--33
Hans Weigand Introduction . . . . . . . . . . . . . . 44--46
Peter J. Denning and
Robert Dunham Innovation as language action . . . . . 47--52
Göran Goldkuhl Action and media in interorganizational
interaction . . . . . . . . . . . . . . 53--57
Jan L. G. Dietz The deep structure of business processes 58--64
Dov Te'eni The language-action perspective as a
basis for communication support systems 65--70
Terry Winograd Designing a new foundation for design 71--74
Mareike Schoop and
Aldo de Moor and
Jan L. G. Dietz The pragmatic Web: a manifesto . . . . . 75--76
Dawn G. Gregg and
Steven Walczak Adaptive Web information extraction . . 78--84
Stephen J. Andriole The collaborate/integrate business
technology strategy . . . . . . . . . . 85--90
Brian Whitworth and
Jerry Fjermestad and
Edward Mahinda The web of system performance . . . . . 92--99
Hai Zhuge Discovery of knowledge flow in science 101--107
Brian Dobing and
Jeffrey Parsons How UML is used . . . . . . . . . . . . 109--113
Pairin Katerattanakul and
Bernard Han and
Alan Rea Is information systems a reference
discipline? . . . . . . . . . . . . . . 114--118
William E. Spangler and
Kathleen S. Hartzel and
Mordechai Gal-Or Exploring the privacy implications of
addressable advertising and viewer
profiling . . . . . . . . . . . . . . . 119--123
Stephen B. Jenkins Technical opinion: Musings of an
``old-school'' programmer . . . . . . . 124--126
Peter G. Neumann and
Lauren Weinstein Inside risks: Risks of RFID . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Britannica Bristles; Snooze
Headlines; The Geek Factor; Sharper
Image; Riding the Brain Train . . . . . 9--10
Diane Crawford and
Richard L. Lozes and
Andy Belk and
Wayne Huang and
Umesh Panchaksharaiah and
Zu Kim and
Collin Park and
David Evans and
Moshe Zviran and
Dov Te'eni and
Yuval Gross and
David Randolph and
Amy S. Bruckman Forum: To Make CS Relevant, Give It an
Industrial Focus; The Tiger Means
Healthy Competition; Shocked by Email
Color; Pursue Reality as a Competitive
Advantage . . . . . . . . . . . . . . . 11--13
David A. Patterson President's letter: Farewell address:
The growing and graying of ACM . . . . . 15--18
Phillip G. Armour The business of software: The learning
edge . . . . . . . . . . . . . . . . . . 19--22
Ronald F. Boisvert and
Mary Jane Irwin ACM plagiarism policy: Plagiarism on the
rise . . . . . . . . . . . . . . . . . . 23--24
Diane Crawford Hot links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 25--26
Pamela Samuelson Legally speaking: Copyrighting standards 27--31
Gregory Conti Introduction: Hacking and innovation . . 32--36
Tom Cross Academic freedom and the hacker ethic 37--40
Stephen Bono and
Aviel Rubin and
Adam Stubblefield and
Matthew Green Security through legality . . . . . . . 41--43
Joe Grand Research lessons from hardware hacking 44--49
Bruce Potter Wireless hotspots: Petri dish of
wireless security . . . . . . . . . . . 50--56
Felix F. X. Lindner Software security is software
reliability . . . . . . . . . . . . . . 57--61
Dan Kaminsky Explorations in namespace: White-hat
hacking across the domain name system 62--69
Kallol Bagchi and
Peeter Kirs and
Robert Cerveny Global software piracy: Can economic
factors alone explain the trend? . . . . 70--76
Christopher L. Carr Reciprocity: The golden rule of IS-user
service relationship quality and
cooperation . . . . . . . . . . . . . . 77--83
Timothy Paul Cronan and
C. Bryan Foltz and
Thomas W. Jones Piracy, computer crime, and IS misuse at
the university . . . . . . . . . . . . . 84--90
David Kang and
Roger Chiang A systematic approach in managing
post-deployment system changes . . . . . 91--96
Bonnie Brinton Anderson and
James V. Hansen and
Paul Benjamin Lowry and
Scott L. Summers The application of model checking for
securing e-commerce transactions . . . . 97--101
Barry Shore Enterprise integration across the
globally disbursed service organization 102--106
Thomas W. Jackson and
Anthony Burgess and
Janet Edwards Technical opinion: A simple approach to
improving email communication . . . . . 107--109
Robert Charette Inside risks: EHRs: Electronic Health
Records or Exceptional Hidden Risks? . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Weather Cells; Urban
(Ground) Legends; Coralling Bot
Rustlers; Who Do You Trust?; China's
``Pedia'' Product; The Peak of Devotion 9--10
Diane Crawford and
Richard Veith and
Gregory Aicklen and
John Knight and
Rebecca Mercuri and
D. J. Howorth and
Mazliza Othman and
Rodziah Latih and
Chin-Teng Lin Forum: Think of Programming as an
Elegant Essay; Nurture the Joy of
Engineering; Don't Equate Bankruptcy and
Identity Theft; Author's Response; What
Malaysia Looks for When Funding CS
Study; Author's Response; We're from
Taiwan, Not from China . . . . . . . . . 11--13
Diane Crawford ACM election results: ACM's 2006 general
elections . . . . . . . . . . . . . . . 13--13
Peter J. Denning The profession of IT: Infoglut . . . . . 15--19
Michael A. Cusumano Technology strategy and management: What
road ahead for Microsoft and Windows? 21--23
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 25--26
Peter Wegner and
Dina Goldin Viewpoint: Principles of problem solving 27--29
Jim Spohrer and
Doug Riecken Introduction: Special issues on services
science . . . . . . . . . . . . . . . . 30--32
Henry Chesbrough and
Jim Spohrer A research manifesto for services
science . . . . . . . . . . . . . . . . 35--40
Jerry Sheehan Understanding service sector innovation 42--47
John Zysman The algorithmic revolution---the fourth
service transformation . . . . . . . . . 48--48
Roland T. Rust and
Carol Miu What academic research tells us about
service . . . . . . . . . . . . . . . . 49--54
Amit Sheth and
Kunal Verma and
Karthik Gomadam Semantics to energize the full services
spectrum . . . . . . . . . . . . . . . . 55--61
Brenda Dietrich Resource planning for business services 62--64
William B. Rouse and
Marietta L. Baba Enterprise transformation . . . . . . . 66--72
Mary Jo Bitner and
Stephen W. Brown The evolution and discovery of services
science in business schools . . . . . . 73--78
Walter Ganz Germany: service engineering . . . . . . 79--79
Christof Weinhardt and
Dirk Neumann and
Carsten Holtmann Germany: computer-aided market
engineering . . . . . . . . . . . . . . 79--79
Paul P. Maglio and
Savitha Srinivasan and
Jeffrey T. Kreulen and
Jim Spohrer Service systems, service scientists,
SSME, and innovation . . . . . . . . . . 81--85
Stuart I. Feldman and
Krishna S. Nathan and
Thomas Li and
Kazuyoshi Hidaka and
Corinna Schulze The Clarion Call for modern services:
China, Japan, Europe, and the US . . . . 86--87
David Avison and
Shirley Gregor and
David Wilson Managerial IT unconsciousness . . . . . 88--93
Lance J. Hoffman and
Kim Lawson-Jenkins and
Jeremy Blum Trust beyond security: an expanded trust
model . . . . . . . . . . . . . . . . . 94--101
Ernst Bekkering and
J. P. Shim Trust in videoconferencing . . . . . . . 103--107
Narasimha Bolloju and
Felix S. K. Leung Assisting novice analysts in developing
quality conceptual models with UML . . . 108--112
Fred Martin Technical opinion: Toy projects
considered harmful . . . . . . . . . . . 113--116
Peter G. Neumann Inside risks: Risks relating to system
compositions . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Airport Security Afoot; Air
Fare; The Human Touch; Luddite
Politicians Seek Help; Are We There
Yet?; Tunes to Go . . . . . . . . . . . 9--10
Diane Crawford and
Umesk Panchaksharaiah and
L. Peter Deutsch and
Kallol Bagchi and
Peeter Kirs and
Robert Cerveny and
Edward J. Ferrara and
Frederick G. Volpicelli and
Diomidis Spinellis and
C. Augusto Casas Forum: Stress Fundamentals in CS
Education, Simplicity in Production; No
Room For Bias When Covering the
Copyright System; Don't Misuse or
Misteach UML; Cover to Cover; Future CS
Course Already Here; To Attract New
Members, Increase ACM Scope and Mandate 11--13
Robert L. Glass Practical programmer: The Standish
report: does it really describe a
software crisis? . . . . . . . . . . . . 15--16
Hal Berghel and
David Hoelzer Digital village: Disk wiping by any
other name . . . . . . . . . . . . . . . 17--21
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 23--24
Dan B. Goldman Viewpoint: Blockbusters and blackboards 25--27
Bryan Pardo Introduction: Music Information
Retrieval . . . . . . . . . . . . . . . 28--31
Daniel P. W. Ellis Extracting information from music audio 32--37
Roger B. Dannenberg and
Christopher Raphael Music score alignment and computer
accompaniment . . . . . . . . . . . . . 38--43
Avery Wang The Shazam music recognition service . . 44--48
William Birmingham and
Roger Dannenberg and
Bryan Pardo Query by humming with the VocalSearch
system . . . . . . . . . . . . . . . . . 49--52
Jon W. Dunn and
Donald Byrd and
Mark Notess and
Jenn Riley and
Ryan Scherle Variations2: retrieving and using music
in an academic setting . . . . . . . . . 53--58
Alexander P. Pons Biometric marketing: targeting the
online consumer . . . . . . . . . . . . 60--66
Vaclav Rajlich Changing the paradigm of software
engineering . . . . . . . . . . . . . . 67--70
G. Daryl Nord and
Tipton F. McCubbins and
Jeretta Horn Nord E-monitoring in the workplace: privacy,
legislation, and surveillance software 72--77
J. Drew Procaccino and
June M. Verner and
Steven J. Lorenzet Defining and contributing to software
development success . . . . . . . . . . 79--83
Eugenia Y. Huang Tightening access policy: the hidden
trade-off . . . . . . . . . . . . . . . 85--89
Charlie McDowell and
Linda Werner and
Heather E. Bullock and
Julian Fernald Pair programming improves student
retention, confidence, and program
quality . . . . . . . . . . . . . . . . 90--95
Mikko Siponen Technical opinion: Information security
standards focus on the existence of
process, not its content . . . . . . . . 97--100
Deirdre K. Mulligan and
Ari Schwartz and
Indrani Mondal Inside risks: Risks of online storage 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: HP's Hot Spot [memory spot];
Spare Cycles Against Malaria; The
Caveman's Disconnection [Neanderthal DNA
analysis]; Privacy Policy Advice; Take
Me Home, Country Roads . . . . . . . . . 9--10
Diane Crawford and
William Adams and
Peter G. Neumann and
John C. Nash and
Dru Lavigne and
Russell McOrmond and
Charles McDonald and
Michael Richardson and
Raymond Wood and
Kallol Bagchi and
Peeter Kirs and
Robert Cerveny and
Berhoooz Parhami and
Peter Denning and
Rodney M. Bates and
Robert L. Glass Forum: When It Comes to Software, Don't
Just Do It; Author's Response; A Single
Vested Source is Not Data; Author's
Response; How to Welcome Uninvited
Guests; Author's Response; Skip
Toy-Program Thinking in Real-World
Projects; Call it Problem Solving, Not
Computational Thinking . . . . . . . . . 11--13
Phillip G. Armour The business of software: Software: hard
data . . . . . . . . . . . . . . . . . . 15--17
Meg McGinity Shannon Staying connected: Home turf . . . . . . 19--21
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 23--24
Dennis Adams Viewpoint: Wireless laptops in the
classroom (and the Sesame Street
syndrome) . . . . . . . . . . . . . . . 25--27
Günter Müller Introduction: Privacy and security in
highly dynamic systems . . . . . . . . . 28--31
Stefan Sackmann and
Jens Strüker and
Rafael Accorsi Personalization in privacy-aware highly
dynamic systems . . . . . . . . . . . . 32--38
Alexander Pretschner and
Manuel Hilty and
David Basin Distributed usage control . . . . . . . 39--44
Arvind Seshadri and
Mark Luk and
Adrian Perrig and
Leendert van Doorn and
Pradeep Khosla Externally verifiable code execution . . 45--49
Johannes Buchmann and
Alexander May and
Ulrich Vollmer Perspectives for cryptographic long-term
security . . . . . . . . . . . . . . . . 50--55
Brian Subirana and
Malcolm Bain Legal programming . . . . . . . . . . . 57--62
Mark D. Hill and
Jean-Luc Gaudiot and
Mary Hall and
Joe Marks and
Paolo Prinetto and
Donna Baglio A Wiki for discussing and promoting best
practices in research . . . . . . . . . 63--64
Gio Wiederhold What is your software worth? . . . . . . 65--75
Weiguo Fan and
Linda Wallace and
Stephanie Rich and
Zhongju Zhang Tapping the power of text mining . . . . 76--82
Marc Stiegler and
Alan H. Karp and
Ka-Ping Yee and
Tyler Close and
Mark S. Miller Polaris: virus-safe computing for
Windows XP . . . . . . . . . . . . . . . 83--88
Se-Joon Hong and
Kar Yan Tam and
Jinwoo Kim Mobile data service fuels the desire for
uniqueness . . . . . . . . . . . . . . . 89--94
Bongsug (Kevin) Chae and
Roger McHaney Asian trio's adoption of Linux-based
open source development . . . . . . . . 95--99
Peter G. Neumann Inside risks: The foresight saga . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Outsourcing Twist; Iraq's
Cool Factor; Segway's Segue; A Picture
Is Worth Even More Spam; Blog-Free CEOs;
Sponge Count . . . . . . . . . . . . . . 9--10
Diane Crawford and
Donn B. Parker and
Phillip Armour and
Bhupinder Singh Anand Forum: Why Information Security Is Still
a Folk Art;; In Programming, as in Life,
Know the Problem Domain; Measure
Software Success as Delivered Value to
the Customer; How Definitive is the
Classical Church--Turing Thesis? . . . . 11--13
Michael A. Cusumano Technology strategy and management:
Envisioning the future of India's
software services business . . . . . . . 15--17
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 19--20
Pamela Samuelson Legally speaking: IBM's pragmatic
embrace of open source . . . . . . . . . 21--25
Pär J. Ågerfalk and
Brian Fitzgerald Introduction: Special Issue: Flexible
and distributed software processes: old
petunias in new bowls? . . . . . . . . . 26--34
Gwanhoo Lee and
William DeLone and
J. Alberto Espinosa Ambidextrous coping strategies in
globally distributed software
development projects . . . . . . . . . . 35--40
Balasubramaniam Ramesh and
Lan Cao and
Kannan Mohan and
Peng Xu Can distributed software development be
agile? . . . . . . . . . . . . . . . . . 41--46
One-Ki (Daniel) Lee and
Probir Banerjee and
Kai H. Lim and
Kuldeep Kumar and
Jos van Hillegersberg and
Kwok Kee Wei Aligning IT components to achieve
agility in globally distributed system
development . . . . . . . . . . . . . . 48--54
Patrick Wagstrom and
James Herbsleb Dependency forecasting in the
distributed agile organization . . . . . 55--56
Nick V. Flor Globally distributed software
development and pair programming . . . . 57--58
Jiming Liu and
K. C. Tsui Toward nature-inspired computing . . . . 59--64
Ray Giguette Building objects out of Plato: applying
philosophy, symbolism, and analogy to
software design . . . . . . . . . . . . 66--71
Casey G. Cegielski and
Dianne J. Hall What makes a good programmer? . . . . . 73--75
Tamara Dinev Why spoofing is serious Internet fraud 76--82
Il-Horn Hann and
Kai-Lung Hui and
Yee-Lin Lai and
S. Y. T. Lee and
I. P. L. Png Who gets spammed? . . . . . . . . . . . 83--87
Pratyush Bharati and
Abhijit Chaudhury Studying the current status of
technology adoption . . . . . . . . . . 88--93
Steven M. Bellovin Inside risks: Virtual machines, virtual
security? . . . . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Super Game Plan; E-Learning
Roots Disputed; Chinese History; U.K.
Seeks Popular Science Input; Encryption
Commitment; \em Improve-ment News; Vid
Kid . . . . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Karl Wiegers and
Marc Stiegler and
Alan H. Karp and
Ka-Ping Yee and
Tyler Close and
Mark S. Miller and
Jeffrey A. Rosenwald and
Jim Chorn and
David Dreyfus Forum: Don't Target Me, Unless I Say You
Can; Avoid the Trap of Unrealistic
Expectations; Fewer Degrees of
Separation Means More Precision in
Software Projects . . . . . . . . . . . 11--13
Robert L. Glass Practical programmer: Looking into the
challenges of complex IT projects . . . 15--17
Peter J. Denning and
Rick Hayes-Roth The profession of IT: Decision making in
very large networks . . . . . . . . . . 19--23
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 25--26
Christof Teuscher Viewpoint: Biologically uninspired
computer science . . . . . . . . . . . . 27--29
Cormac J. Sreenan and
Kobus van der Merwe Introduction to Special Issue on
Entertainment Networking . . . . . . . . 30--33
Kuan-Ta Chen and
Polly Huang and
Chin-Laung Lei How sensitive are online gamers to
network quality? . . . . . . . . . . . . 34--38
Mark Claypool and
Kajal Claypool Latency and player actions in online
games . . . . . . . . . . . . . . . . . 40--45
Jeremy Brun and
Farzad Safaei and
Paul Boustead Managing latency and fairness in
networked games . . . . . . . . . . . . 46--51
Zefir Kurtisi and
Xiaoyuan Gu and
Lars Wolf Enabling network-centric music
performance in wide-area networks . . . 52--54
Reza Rejaie Anyone can broadcast video over the
internet . . . . . . . . . . . . . . . . 55--57
Verena Kahmann and
Jens Brandt and
Lars Wolf Collaborative streaming in heterogeneous
and dynamic scenarios . . . . . . . . . 58--63
Dijiang Huang and
Qing Cao and
Amit Sinha and
Marc J. Schniederjans and
Cory Beard and
Lein Harn and
Deep Medhi New architecture for intra-domain
network security issues . . . . . . . . 64--72
Hazel Taylor Critical risks in outsourced IT
projects: the intractable and the
unforeseen . . . . . . . . . . . . . . . 74--79
Dinah Payne and
Brett J. L. Landry A uniform code of ethics: business and
IT professional ethics . . . . . . . . . 81--84
Arun Sen and
Peter A. Dacin and
Christos Pattichis Current trends in web data analysis . . 85--91
Rebecca T. Mercuri and
Vincent J. Lipsio and
Beth Feehan Inside risks: COTS and other electronic
voting backdoors . . . . . . . . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track: Tech 20/20 on 2020; Patents
Not Pending; A Matter of Style; Nano
Products, Giga Concerns; The Tiny Engine
that Could; ``Houston, We Have a
Problem'' . . . . . . . . . . . . . . . 9--10
Diane Crawford and
Girish Seshagiri and
Pär Ågerfalk and
Brian Fitzgerald and
Trevor R. H. Clarke and
Niels J. Bjergstrom and
Alex Simonelis and
Charlie McDowell and
Linda Werner and
Heather E. Bullock and
Julian Fernald and
Melvin Fitting and
Bhupinder Singh Anand and
Thorkil Naur Forum: GSD Benefits Still Not Worth the
Trouble; Let Interactive Genetic
Algorithms Provide Music Accompaniment;
Insist on Risk Management in Software
Engineering; Could One Head Be Better
Than Two?; Would Church or Turing Make
Every Function Computable?; Still No
Proof of the Unsolvability of Turing's
Halting Problem . . . . . . . . . . . . 11--13
Hal Berghel Digital village: Fungible credentials
and next-generation fraud . . . . . . . 15--19
CACM Staff ACM honors distinguished members for
contributions to computing . . . . . . . 20--21
Diane Crawford Hot links: Top 10 downloads from ACM's
digital library . . . . . . . . . . . . 23--24
Douglas Blank Viewpoint: Robots make computer science
personal . . . . . . . . . . . . . . . . 25--27
Vijayan Sugumaran and
Sooyong Park and
Kyo C. Kang Introduction: Software product line
engineering . . . . . . . . . . . . . . 28--32
Paul C. Clements and
Lawrence G. Jones and
John D. McGregor and
Linda M. Northrop Getting there from here: a roadmap for
software product line adoption . . . . . 33--36
Charles W. Krueger New methods in software product line
practice . . . . . . . . . . . . . . . . 37--40
Jan Bosch The challenges of broadening the scope
of software product families . . . . . . 41--44
Don Batory and
David Benavides and
Antonio Ruiz-Cortes Automated analysis of feature models:
challenges ahead . . . . . . . . . . . . 45--47
Magnus Eriksson and
Jürgen Börstler and
Kjell Borg Software product line modeling made
practical . . . . . . . . . . . . . . . 49--54
Jaejoon Lee and
Dirk Muthig Feature-oriented variability management
in product line engineering . . . . . . 55--59
Krzysztof Czarnecki and
Michal Antkiewicz and
Chang Hwan Peter Kim Multi-level customization in application
engineering . . . . . . . . . . . . . . 60--65
Andreas Helferich and
Klaus Schmid and
Georg Herzwurm Product management for software product
lines: an unsolved problem? . . . . . . 66--67
Kannan Mohan and
Balasubramaniam Ramesh Change management patterns in software
product lines . . . . . . . . . . . . . 68--72
Tomoji Kishi and
Natsuko Noda Formal verification and software product
lines . . . . . . . . . . . . . . . . . 73--77
Klaus Pohl and
Andreas Metzger Software product line testing . . . . . 78--81
Joaquin Peña and
Michael G. Hinchey and
Antonio Ruiz-Cortés Multi-agent system product lines:
challenges and benefits . . . . . . . . 82--84
Hoh Peter In and
Jongmoon Baik and
Sangsoo Kim and
Ye Yang and
Barry Boehm A quality-based cost estimation model
for the product line life cycle . . . . 85--88
Ian Angell and
Jan Kietzmann RFID and the end of cash? . . . . . . . 90--96
Zakaria Maamar and
Djamal Benslimane and
Nanjangud C. Narendra What can context do for Web services? 98--103
Martin Bichler and
Jayant R. Kalagnanam Software frameworks for advanced
procurement auction markets . . . . . . 104--108
Ali Reza Montazemi How they manage IT: SMEs in Canada and
the U.S. . . . . . . . . . . . . . . . . 109--112
France Belanger and
Weiguo Fan and
L. Christian Schaupp and
Anjala Krishen and
Jeannine Everhart and
David Poteet and
Kent Nakamoto Technical opinion: Web site success
metrics: addressing the duality of goals 114--116
Wilhelm Hasselbring and
Matthias Rohr and
Jurgen Taeger and
Daniel Winteler Inside risks: Liability risks in reusing
third-party software . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track . . . . . . . . . . . . . . . 9--10
Diane Crawford Forum . . . . . . . . . . . . . . . . . 11--12
Phillip G. Armour The business of software: Agile \ldots
and offshore . . . . . . . . . . . . . . 13--16
Meg McGinity Shannon Staying connected: Shannon's eleven . . 17--20
Russell Beale Viewpoint: Slanty design . . . . . . . . 21--24
CACM Staff ACM Annual Report for FY06 . . . . . . . 25--32
Patricia S. Abril and
Robert Plant The patent holder's dilemma: buy, sell,
or troll? . . . . . . . . . . . . . . . 36--44
Huimin Zhao Semantic matching across heterogeneous
data sources . . . . . . . . . . . . . . 45--50
Markus Biehl Success factors for implementing global
information systems . . . . . . . . . . 52--58
Nitin Singh and
Kee-hung Lai and
T. C. E. Cheng Intra-organizational perspectives on
IT-enabled supply chains . . . . . . . . 59--65
Sharon McDonald and
Helen M. Edwards Who should test whom? . . . . . . . . . 66--71
Sami Surakka What subjects and skills are important
for software developers? . . . . . . . . 73--78
Jaap-Henk Hoepman and
Bart Jacobs Increased security through open source 79--83
Peter Naur Computing versus human thinking . . . . 85--94
Diane Crawford Hot links: Top 10 Downloads from ACM's
Digital Library . . . . . . . . . . . . 95--96
Lauren Weinstein Inside risks: Ma Bell's revenge: the
battle for network neutrality . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track . . . . . . . . . . . . . . . 9--10
Diane Crawford Forum . . . . . . . . . . . . . . . . . 11--13
CACM Staff Student de-charter notice . . . . . . . 14--14
Michael A. Cusumano Technology strategy and management: What
road ahead for Microsoft the company? 15--18
Pamela Samuelson Legally speaking: Patent reform through
the courts . . . . . . . . . . . . . . . 19--23
Joshua Goodman and
Gordon V. Cormack and
David Heckerman Spam and the ongoing battle for the
inbox . . . . . . . . . . . . . . . . . 24--33
Rakesh Agrawal and
Tyrone Grandison and
Christopher Johnson and
Jerry Kiernan Enabling the 21st century health care
information technology revolution . . . 34--42
Grant A. Jacoby and
Luqi Intranet model and metrics . . . . . . . 43--50
Bonnie C. Glassberg Electronic markets hypothesis redux:
where are we now? . . . . . . . . . . . 51--55
Galen A. Grimes Compliance with the CAN-SPAM Act of 2003 56--62
Ranieri Baraglia and
Fabrizio Silvestri Dynamic personalization of web sites
without user intervention . . . . . . . 63--67
Joon Koh and
Young-Gul Kim and
Brian Butler and
Gee-Woo Bock Encouraging participation in virtual
communities . . . . . . . . . . . . . . 68--73
Dongsong Zhang Web content adaptation for mobile
handheld devices . . . . . . . . . . . . 75--79
CACM Staff SIGs Announce Candidates for Election 80--80
Rafae Bhatti and
Elisa Bertino and
Arif Ghafoor An integrated approach to federated
identity and privilege management in
open systems . . . . . . . . . . . . . . 81--87
Benjamin B. Shao and
Julie Smith David The impact of offshore outsourcing on IT
workers in developed countries . . . . . 89--94
Rolf Oppliger Technical opinion: IT security: in
search of the Holy Grail . . . . . . . . 96--98
Diane Crawford Hot Links: Top 10 downloads from ACM's
digital library . . . . . . . . . . . . 99--100
Peter G. Neumann Inside Risks: Widespread network
failures . . . . . . . . . . . . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track . . . . . . . . . . . . . . . 9--10
Diane Crawford Forum . . . . . . . . . . . . . . . . . 11--13
CACM Staff ACM A. M. Turing Award nominations
solicited . . . . . . . . . . . . . . . 14--14
Phillip G. Armour The business of software: Mortality play 15--18
Earl Barr and
Matt Bishop and
Mark Gondree Viewpoint: Fixing federal e-voting
standards . . . . . . . . . . . . . . . 19--24
CACM Staff SIGs announce candidates for election 25--25
CACM Staff ACM fellows . . . . . . . . . . . . . . 26--27
Bartel Van de Walle and
Murray Turoff Emergency response information systems:
Emerging trends and technologies:
Introduction . . . . . . . . . . . . . . 29--31
Liz Carver and
Murray Turoff Human-computer interaction: the human
and computer as a team in emergency
management information systems . . . . . 33--38
Simon French and
Murray Turoff Decision support systems . . . . . . . . 39--40
Frank Fiedrich and
Paul Burghardt Agent-based systems for disaster
management . . . . . . . . . . . . . . . 41--42
David Mendonça and
Theresa Jefferson and
John Harrald Collaborative adhocracies and
mix-and-match technologies in emergency
management . . . . . . . . . . . . . . . 44--49
B. S. Manoj and
Alexandra Hubenko Baker Communication challenges in emergency
response . . . . . . . . . . . . . . . . 51--53
Leysia Palen and
Starr Roxanne Hiltz and
Sophia B. Liu Online forums supporting grassroots
participation in emergency preparedness
and response . . . . . . . . . . . . . . 54--58
Art Botterell and
Ronja Addams-Moring Public warning in the networked age:
open standards to the rescue? . . . . . 59--60
Paul Currion and
Chamindra de Silva and
Bartel Van de Walle Open source software for disaster
management . . . . . . . . . . . . . . . 61--65
Stephen J. Andriole The 7 habits of highly effective
technology leaders . . . . . . . . . . . 66--72
Thomas A. Horan and
Benjamin L. Schooley Time-critical information services . . . 73--78
Sridhar Nerur and
VenuGopal Balijepally Theoretical reflections on agile
development methodologies . . . . . . . 79--83
Scott McCoy and
Andrea Everard and
Peter Polak and
Dennis F. Galletta The effects of online advertising . . . 84--88
Ning Zhong and
Jiming Liu and
Yiyu Yao Envisioning intelligent information
technologies through the prism of web
intelligence . . . . . . . . . . . . . . 89--94
James A. Hall and
Stephen L. Liedtka The Sarbanes--Oxley Act: implications
for large-scale IT outsourcing . . . . . 95--100
Diane Crawford Hot links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 101--102
Nigel Ward Technical opinion: The
(un)predictability of computer science
graduate school admissions . . . . . . . 104--106
Donn B. Parker Inside risks: Risks of risk-based
security . . . . . . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Diane Crawford Forum: Stop chasing the AI illusion . . 7--9
CACM Staff News track . . . . . . . . . . . . . . . 13--14
Hal Berghel Digital Village: Hiding data, forensics,
and anti-forensics . . . . . . . . . . . 15--20
Peter J. Denning The profession of IT: Mastering the mess 21--25
CACM Staff ACM honors distinguished members . . . . 26--27
CACM Staff Call for nominations for advanced member
grades in ACM . . . . . . . . . . . . . 28--29
CACM Staff Proposal to dissolve SIGAPL . . . . . . 29--29
Jenova Chen Viewpoint: Flow in games (and everything
else) . . . . . . . . . . . . . . . . . 31--34
Jeff Kramer Is abstraction the key to computing? . . 36--42
Dorit Nevo and
Michael R. Wade How to avoid disappointment by design 43--48
Levent V. Orman Consumer support systems . . . . . . . . 49--54
Stefano Ceri and
Maristella Matera and
Francesca Rizzo and
Vera Demaldé Designing data-intensive web
applications for content accessibility
using web marts . . . . . . . . . . . . 55--61
Ido Green and
Tzvi Raz and
Moshe Zviran Analysis of active intrusion prevention
data for predicting hostile activity in
computer networks . . . . . . . . . . . 63--68
S. Sakthivel Managing risk in offshore systems
development . . . . . . . . . . . . . . 69--75
Jeffrey A. Stone and
Elinor Madigan Inconsistencies and disconnects . . . . 76--79
Dianne J. Hall and
David Paradice Investigating value-based decision bias
and mediation: do you do as you think? 81--85
Michael Chau and
Xiao Fang and
Olivia R. Liu Sheng What are people searching on government
web sites? . . . . . . . . . . . . . . . 87--92
Diane Crawford Hot links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 93--94
E. Sonny Butler and
Cheryl Aasheim and
Susan Williams Technical opinion: Does telecommuting
improve productivity? . . . . . . . . . 101--103
Jim Horning Inside Risks: Risks of virtual
professionalism . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6
Diane Crawford Forum . . . . . . . . . . . . . . . . . 7--7
Stuart I. Feldman President's letter: ACM's past helps
steer its future . . . . . . . . . . . . 10--10
CACM Staff News track . . . . . . . . . . . . . . . 11--12
Meg McGinity Shannon Staying connected: The pearly gates of
Internet TV . . . . . . . . . . . . . . 13--15
Stephen B. Jenkins Viewpoint: The rime of the ancyent
programmer . . . . . . . . . . . . . . . 17--20
Robert L. Glass Practical programmer: One man's quest
for the state of software engineering's
practice . . . . . . . . . . . . . . . . 21--23
David S. Wise ACM at 60: a look back in time:
Introduction . . . . . . . . . . . . . . 24--26
Bernadette Longo ACM established to develop communication
about computing . . . . . . . . . . . . 27--29
Atsushi Akera Edmund Berkeley and the origins of ACM 30--35
Thomas Haigh and
Elisabeth Kaplan and
Carrie Seib Sources for ACM history: what, where,
why . . . . . . . . . . . . . . . . . . 36--41
Charles Care Not only digital: a review of ACM's
early involvement with analog computing
technology . . . . . . . . . . . . . . . 42--45
David Hemmendinger The ACM and IEEE-CS guidelines for
undergraduate CS education . . . . . . . 46--53
Judy Brown and
Steve Cunningham A history of ACM SIGGRAPH . . . . . . . 54--61
Chris Edmondson-Yurkanan SIGCOMM's archaeological journey into
networking's past . . . . . . . . . . . 63--68
Thomas J. (Tim) Bergin A history of the history of programming
languages . . . . . . . . . . . . . . . 69--74
Matthew R. McBride The software architect . . . . . . . . . 75--81
Zeljko Obrenovic and
Julio Abascal and
Dusan Starcevic Universal accessibility as a multimodal
design issue . . . . . . . . . . . . . . 83--88
Michael Harris and
Kris Aebischer and
Tim Klaus The whitewater process: software product
development in small IT businesses . . . 89--93
Bin He and
Mitesh Patel and
Zhen Zhang and
Kevin Chen-Chuan Chang Accessing the deep web . . . . . . . . . 94--101
Viviane Torres da Silva and
Carlos J. P. de Lucena Modeling multi-agent systems . . . . . . 103--108
Alessandra Devito Da Cunha and
David Greathead Does personality matter?: an analysis of
code-review ability . . . . . . . . . . 109--112
Geoffrey Goodell and
Paul Syverson Technical opinion: The right place at
the right time . . . . . . . . . . . . . 113--117
Diane Crawford Hot Links: Top 10 downloads from ACM's
digital library . . . . . . . . . . . . 124--125
Bruce Schneier Inside risks: The psychology of security 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Diane Crawford Forum . . . . . . . . . . . . . . . . . 7--9
CACM Staff News track . . . . . . . . . . . . . . . 13--14
Pamela Samuelson Legally speaking: Software patents and
the metaphysics of Section 271(f) . . . 15--19
Phillip G. Armour The business of software: Twenty percent 21--23
Ben Shneiderman Viewpoint: Web science: a provocative
invitation to computer science . . . . . 25--27
Eric van Heck and
Peter Vervest Smart business networks: how the network
wins . . . . . . . . . . . . . . . . . . 28--37
Sasha Dekleva and
J. P. Shim and
Upkar Varshney and
Geoffrey Knoerzer Evolution and emerging issues in mobile
wireless networks . . . . . . . . . . . 38--43
Amy Friedlander and
Allison Mankin and
W. Douglas Maughan and
Stephen D. Crocker DNSSEC: a protocol toward securing the
Internet infrastructure . . . . . . . . 44--50
Ioanna D. Constantiou and
Jan Damsgaard and
Lars Knutsen The four incremental steps toward
advanced mobile service adoption . . . . 51--55
Mark J. Cotteleer and
Christopher A. Cotteleer and
Andrew Prochnow Cutting checks: challenges and choices
in B2B e-payments . . . . . . . . . . . 56--61
Anand Jeyaraj and
Vicki L. Sauter An empirical investigation of the
effectiveness of systems modeling and
verification tools . . . . . . . . . . . 62--67
David Avison and
Terry Young Time to rethink health care and ICT? . . 69--74
Kary Främling and
Timo Ala-Risku and
Mikko Kärkkäinen and
Jan Holmström Design patterns for managing product
life cycle information . . . . . . . . . 75--79
Jie Ren and
Richard N. Taylor Automatic and versatile publications
ranking for research institutions and
scholars . . . . . . . . . . . . . . . . 81--85
Diane Crawford Hot Links: Top 10 downloads from ACM's
digital library . . . . . . . . . . . . 86--87
Mihail Cocosila and
Ofir Turel and
Norm Archer and
Yufei Yuan Technical opinion: Perceived health
risks of 3G cell phones: do users care? 89--92
Peter A. Freeman Inside risks: Risks are your
responsibility . . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track . . . . . . . . . . . . . . . 7--8
Peter J. Denning The profession of IT: Computing is a
natural science . . . . . . . . . . . . 13--18
Michael A. Cusumano Technology strategy and management: The
changing labyrinth of software pricing 19--22
Abbe Mowshowitz and
Nanda Kumar Viewpoint: Public vs. private interest
on the Internet . . . . . . . . . . . . 23--25
Michael Zyda Creating a science of games:
Introduction . . . . . . . . . . . . . . 26--29
Merrilea J. Mayo Games for science and engineering
education . . . . . . . . . . . . . . . 30--35
Ralph E. Chatham Games for training . . . . . . . . . . . 36--43
Henry Kelly and
Kay Howell and
Eitan Glinert and
Loring Holding and
Chris Swain and
Adam Burrowbridge and
Michelle Roper How to build serious games . . . . . . . 44--49
Randy Pausch and
Don Marinelli Carnegie Mellon's entertainment
technology center: combining the left
and right brain . . . . . . . . . . . . 50--57
Caitlin Kelleher and
Randy Pausch Using storytelling to motivate
programming . . . . . . . . . . . . . . 58--64
Nikunj Raghuvanshi and
Christian Lauterbach and
Anish Chandak and
Dinesh Manocha and
Ming C. Lin Real-time sound synthesis and
propagation for games . . . . . . . . . 66--73
Robert P. Schumaker and
Ying Liu and
Mark Ginsburg and
Hsinchun Chen Evaluating the efficacy of a terrorism
question/answer system . . . . . . . . . 74--80
In Lee An architecture for a next-generation
holistic e-recruiting system . . . . . . 81--85
Harris Wu and
Michael Gordon Collaborative structuring: organizing
document repositories effectively and
efficiently . . . . . . . . . . . . . . 86--91
Fred Niederman and
Richard G. Mathieu and
Roger Morley and
Ik-Whan Kwon Examining RFID applications in supply
chain management . . . . . . . . . . . . 92--101
Someswar Kesh and
Pauline Ratnasingam A knowledge architecture for IT security 103--108
Annie I. Antón and
Elisa Bertino and
Ninghui Li and
Ting Yu A roadmap for comprehensive online
privacy policy management . . . . . . . 109--116
Waymond Rodgers and
Solomon Negash The effects of Web-based technologies on
knowledge transfer . . . . . . . . . . . 117--122
Sabah Al-Fedaghi Technical opinion: Conferences under
scrutiny . . . . . . . . . . . . . . . . 123--126
Diane Crawford Hot Links: Top 10 downloads from ACM's
digital library . . . . . . . . . . . . 135--135
Charles Perrow Inside risks: Disasters evermore? . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track . . . . . . . . . . . . . . . 7--8
Diane Crawford Forum . . . . . . . . . . . . . . . . . 13--14
Diane Crawford Call for nominations for ACM general
election . . . . . . . . . . . . . . . . 14--14
Hal Berghel Digital village: Better-than-nothing
security practices . . . . . . . . . . . 15--18
Amy S. Bruckman Viewpoint: Software copyright and role
models . . . . . . . . . . . . . . . . . 19--20
Robert L. Glass Practical programmer: A deja-vu look at
software engineering researchers who
care about practice . . . . . . . . . . 21--23
Alfred Kobsa Privacy-enhanced personalization . . . . 24--33
Ahmed Elfatatry Dealing with change: components versus
services . . . . . . . . . . . . . . . . 35--39
Matt E. Thatcher and
David E. Pingry Modeling the IT value paradox . . . . . 41--45
John Erickson and
Keng Siau Theoretical and practical complexity of
modeling methods . . . . . . . . . . . . 46--51
Jesper Simonsen Involving top management in IT projects 52--58
Larry J. LeBlanc and
Michael R. Galbreth Designing large-scale supply chain
linear programs in spreadsheets . . . . 59--64
Yun Wan and
Satya Menon and
Arkalgud Ramaprasad A classification of product comparison
agents . . . . . . . . . . . . . . . . . 65--71
Janice C. Sipior and
Burke T. Ward Unintended invitation: organizational
wi-fi use by external roaming users . . 72--77
T. H. Tse and
Francis C. M. Lau and
W. K. Chan and
Peter C. K. Liu and
Colin K. F. Luk Testing object-oriented industrial
software without precise oracles or
results . . . . . . . . . . . . . . . . 78--85
Sagnika Sen and
Haluk Demirkan and
Michael Goul Dynamic decision support through
instantiation of UEML representations 87--93
W. ``RP'' Raghupathi Corporate governance of IT: a framework
for development . . . . . . . . . . . . 94--99
Diane Crawford Hot Links: Top 10 downloads from ACM's
digital library . . . . . . . . . . . . 100--100
Sakgasit Ramingwong and
A. S. M. Sajeev Technical opinion: Offshore outsourcing:
the risk of keeping mum . . . . . . . . 101--103
David Lorge Parnas Inside risks: Which is riskier: OS
diversity or OS monopoly? . . . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track . . . . . . . . . . . . . . . 7--8
Diane Crawford Forum . . . . . . . . . . . . . . . . . 13--14
Neil L. Waters Viewpoint: Why you can't cite Wikipedia
in my class . . . . . . . . . . . . . . 15--17
Ronald F. Boisvert and
Mary Jane Irwin and
Holly Rushmeier Online first: Evolving the ACM journal
distribution program . . . . . . . . . . 19--20
Meg McGinity Shannon Staying connected: Shaking hands,
kissing babies, and \ldots blogging? . . 21--24
Phillip G. Armour The business of software: The
conservation of uncertainty . . . . . . 25--28
Toshinori Munakata Beyond silicon: new computing paradigms:
Introduction . . . . . . . . . . . . . . 30--34
Warren Robinett and
Gregory S. Snider and
Philip J. Kuekes and
R. Stanley Williams Computing with a trillion crummy
components . . . . . . . . . . . . . . . 35--39
Jing Kong Computation with carbon nanotube devices 40--42
Robert Stadler Molecular, chemical, and organic
computing . . . . . . . . . . . . . . . 43--45
John H. Reif and
Thomas H. LaBean Autonomous programmable biomolecular
devices using self-assembled DNA
nanostructures . . . . . . . . . . . . . 46--53
Dave Bacon and
Debbie Leung Toward a world with quantum computers 55--59
Hossin Abdeldayem and
Donald O. Frazier Optical computing: need and challenge 60--62
David W. M. Marr and
Toshinori Munakata Micro/nanofluidic computing . . . . . . 64--68
Masashi Aono and
Masahiko Hara and
Kazuyuki Aihara Amoeba-based neurocomputing with chaotic
dynamics . . . . . . . . . . . . . . . . 69--72
Ami Marowka Parallel computing on any desktop . . . 74--78
George Lepouras and
Costas Vassilakis and
Constantin Halatsis and
Panagiotis Georgiadis Domain expert user development: the
SmartGov approach . . . . . . . . . . . 79--83
Joseph S. Valacich and
D. Veena Parboteeah and
John D. Wells The online consumer's hierarchy of needs 84--90
Susan A. Brown and
Norman L. Chervany and
Bryan A. Reinicke What matters when introducing new
information technology . . . . . . . . . 91--96
Ashley Braganza and
Arnoud Franken SOX, compliance, and power relationships 97--102
Irene Pollach What's wrong with online privacy
policies? . . . . . . . . . . . . . . . 103--108
Thomas F. Stafford and
Dennis Gonier Technical opinion: The online research
'bubble' . . . . . . . . . . . . . . . . 109--112
Diane Crawford Hot Links: Top 10 downloads from ACM's
digital library . . . . . . . . . . . . 118--118
Peter G. Neumann Inside risks: E-migrating risks? . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track . . . . . . . . . . . . . . . 7--8
Diane Crawford Forum . . . . . . . . . . . . . . . . . 13--14
Michael A. Cusumano Technology strategy and management:
Extreme programming compared with
Microsoft-style iterative development 15--18
Pamela Samuelson Legally speaking: Does copyright law
need to be reformed? . . . . . . . . . . 19--23
Katia Passerini and
Karen Patten and
Michael R. Bartolacci and
Jerry Fjermestad Technical opinion: Reflections and
trends in the expansion of cellular
wireless services in the U.S. and China 25--28
Sebastian Thrun Viewpoint: Why we compete in DARPA's
Urban Challenge autonomous robot race 29--31
Michael L. Best and
Kipp Jones and
Illenin Kondo and
Dhanaraj Thakur and
Edem Wornyo and
Calvin Yu International perspectives:
Post-conflict communications: the case
of Liberia . . . . . . . . . . . . . . . 33--39
Erran Carmel and
Pamela Abbott Why 'nearshore' means that distance
matters . . . . . . . . . . . . . . . . 40--46
Erran Carmel and
Pamela Abbott Nearshore locations in three principal
global clusters and their respective
attributes . . . . . . . . . . . . . . . 45--45
Matt E. Thatcher and
David E. Pingry [Software patents] The good, the bad,
and the messy . . . . . . . . . . . . . 47--52
Gregoris Mentzas and
Kostas Kafentzis and
Panos Georgolios Knowledge services on the semantic web 53--58
U. N. Umesh and
Len Jessup and
Minh Q. Huynh [Getting ideas to market] Current issues
faced by technology entrepreneurs . . . 60--66
Asli Yagmur Akbulut and
Clayton Arlen Looney Inspiring students to pursue computing
degrees . . . . . . . . . . . . . . . . 67--71
Prabhudev Konana and
Gautam Ray Physical product reengineering with
embedded information technology . . . . 72--78
Michael P. Papazoglou and
Willem-Jan van den Heuvel Business process development life cycle
methodology . . . . . . . . . . . . . . 79--85
William L. Kuechler Business applications of unstructured
text . . . . . . . . . . . . . . . . . . 86--93
Tom N. Jagatic and
Nathaniel A. Johnson and
Markus Jakobsson and
Filippo Menczer Social phishing . . . . . . . . . . . . 94--100
Wade H. Baker and
Loren Paul Rees and
Peter S. Tippett Necessary measures: metric-driven
information security risk assessment and
decision making . . . . . . . . . . . . 101--106
Richard J. Goeke and
Robert H. Faley Leveraging the flexibility of your data
warehouse . . . . . . . . . . . . . . . 107--111
John D'Arcy and
Anat Hovav Deterring internal information systems
misuse . . . . . . . . . . . . . . . . . 113--117
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 118--118
Herbert S. Lin and
Alfred Z. Spector and
Peter G. Neumann and
Seymour E. Goodman Inside risks: Toward a safer and more
secure cyberspace . . . . . . . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track . . . . . . . . . . . . . . . 7--8
Peter J. Denning The profession of IT: The choice
uncertainty principle . . . . . . . . . 9--14
Robert L. Glass Practical programmer: A research project
with important practitioner-oriented
findings . . . . . . . . . . . . . . . . 15--16
Stuart I. Feldman President's letter: The rewards of ACM's
awards . . . . . . . . . . . . . . . . . 17--18
David Lorge Parnas Viewpoint: Stop the numbers game . . . . 19--21
Dror G. Feitelson Experimental computer science:
Introduction . . . . . . . . . . . . . . 24--26
Catherine C. McGeoch Experimental algorithmics . . . . . . . 27--31
Victor R. Basili and
Marvin V. Zelkowitz Empirical studies to build a science of
computer science . . . . . . . . . . . . 33--37
Larry Peterson and
Vivek S. Pai Experience-driven experimental systems
research . . . . . . . . . . . . . . . . 38--44
Alan Jay Smith Workloads (creation and use) . . . . . . 45--50
Ellen M. Voorhees TREC: Continuing information retrieval's
tradition of experimentation . . . . . . 51--54
L. D. Jackel and
Douglas Hackett and
Eric Krotkov and
Michael Perschbacher and
James Pippine and
Charles Sullivan How DARPA structures its robotics
programs to improve locomotion and
navigation . . . . . . . . . . . . . . . 55--59
Oded Nov What motivates Wikipedians? . . . . . . 60--64
Paul P. Tallon and
Richard Scannell Information life cycle management . . . 65--69
Neil Foshay and
Avinandan Mukherjee and
Andrew Taylor Does data warehouse end-user metadata
add value? . . . . . . . . . . . . . . . 70--77
Chris Sauer and
Andrew Gemino and
Blaize Horner Reich The impact of size and volatility on IT
project performance . . . . . . . . . . 79--84
Dominic M. Thomas and
Robert P. Bostrom and
Marianne Gouge Making knowledge work in virtual teams 85--90
Hee-Woong Kim and
Yunjie Xu Drivers of price Premium in e-markets 91--95
Diane Crawford Hot Links: Top 10 downloads from ACM's
Digital Library . . . . . . . . . . . . 97--97
Matt Bishop and
David Wagner Inside risks: Risks of e-voting . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
CACM Staff News track . . . . . . . . . . . . . . . 7--8
Diane Crawford Forum . . . . . . . . . . . . . . . . . 9--10
Hal Berghel Digital village: Credit Card Forensics 11--14
Robert Gaskins Viewpoint: PowerPoint at 20: back to
basics . . . . . . . . . . . . . . . . . 15--17
Ben Shneiderman Creativity support tools: accelerating
discovery and innovation . . . . . . . . 20--32
Dongwon Lee and
Jaewoo Kang and
Prasenjit Mitra and
C. Lee Giles and
Byung-Won On Are your citations clean? . . . . . . . 33--38
CACM Staff Nominees for elections and report of the
ACM nominating committee . . . . . . . . 39--39
Robert J. Aalberts and
Percy Poon and
Paul Thistle Trespass, nuisance, and spam: 11th
century common law meets the internet 40--45
Antonio M. Lopez, Jr. and
Frederick G. Lopez and
Robert W. Lent and
Madonna G. Constantine Multidisciplinary research on the
datapath of the computing disciplines 46--50
Erica L. Wagner and
Gabriele Piccoli Moving beyond user participation to
achieve successful IS design . . . . . . 51--55
Wai Fong Boh and
Christina Soh and
Steven Yeo Standards development and diffusion: a
case study of RosettaNet . . . . . . . . 57--62
Ilan Oshri and
Sue Newell and
Shan L. Pan Implementing component reuse strategy in
complex products environments . . . . . 63--67
Kannan Mohan and
Balasubramaniam Ramesh Tracing variations in software product
families . . . . . . . . . . . . . . . . 68--73
Klaus Schild and
Stefan Bussmann Self-organization in manufacturing
operations . . . . . . . . . . . . . . . 74--79
Varun Grover and
Raymond M. Henry and
Jason B. Thatcher Fix IT-business relationships through
better decision rights . . . . . . . . . 80--86
Gautam Ray and
Waleed A. Muhanna and
Jay B. Barney Competing with IT: the role of shared
IT-business understanding . . . . . . . 87--91
Diane Crawford Hot Links: Top 10 Downloads from ACM's
Digital Library . . . . . . . . . . . . 92--92
Emmeline de Pillis and
Kimberly Furumo Technical opinion: Counting the cost of
virtual teams . . . . . . . . . . . . . 93--95
Chuan-Hoo Tan and
Hock-Hai Teo Technical opinion: Training future
software developers to acquire agile
development skills . . . . . . . . . . . 97--98
Steven M. Bellovin and
Matt Blaze and
Whitfield Diffie and
Susan Landau and
Jennifer Rexford and
Peter G. Neumann Inside risks: Internal surveillance,
external risks . . . . . . . . . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5
Diane Crawford Forum . . . . . . . . . . . . . . . . . 7--9
Phillip G. Armour The Business of software: Digging CACM 13--15
Meg McGinity Shannon Staying connected: Happy anniversary,
CACM . . . . . . . . . . . . . . . . . . 17--19
Peter A. Freeman Viewpoint: Back to experimentation . . . 21--22
Stuart I. Feldman President's letter: Fifty years and
still growing . . . . . . . . . . . . . 23--23
Diane Crawford From the editor's desk: Introduction . . 24--26
Calvin C. Gotlieb A time to retrospect and prospect . . . 26--29
M. Stuart Lynn The battle of the covers . . . . . . . . 30--32
Robert L. Ashenhurst The battle behind the scenes . . . . . . 33--34
Peter J. Denning Déj\`a vu all over again . . . . . . . . 35--39
Jacques Cohen From academia to the editorship . . . . 41--43
Moshe Y. Vardi CACM: past, present, and future . . . . 44--48
Andrew Rosenbloom Voices: Introduction . . . . . . . . . . 50--51
Jon Bentley In the realm of insight and creativity 52--54
Whitfield Diffie Information security: 50 years behind,
50 years ahead . . . . . . . . . . . . . 55--57
Jeannette M. Wing Five deep questions in computing . . . . 58--60
Eugene H. Spafford Inspiration and trust . . . . . . . . . 61--62
Rodney Brooks The next 50 years . . . . . . . . . . . 63--64
Pamela Samuelson Hacking intellectual property law . . . 65--67
Stephen B. Jenkins Ode to code . . . . . . . . . . . . . . 67--67
Gul Agha Computing in pervasive cyberspace . . . 68--70
Gregory Conti Could googling take down a president? 71--73
Jon Crowcroft Toward a network architecture that does
everything . . . . . . . . . . . . . . . 74--77
Peter G. Neumann Reflections on computer-related risks 78--80
Jason Leigh and
Maxine D. Brown Cyber-commons: merging real and virtual
worlds . . . . . . . . . . . . . . . . . 82--85
Gordon Bell Bell's law for the birth and death of
computer classes . . . . . . . . . . . . 86--94
Greta L. Polites and
Richard T. Watson The centrality and prestige of CACM . . 95--100
Diane Crawford Breakthrough research: a preview of
things to come: Introduction . . . . . . 104--104
David A. Patterson Technical perspective: the data center
is the computer . . . . . . . . . . . . 105--105
Jeffrey Dean and
Sanjay Ghemawat MapReduce: simplified data processing on
large clusters . . . . . . . . . . . . . 107--113
Bernard Chazelle Technical perspective: finding a good
neighbor, near and fast . . . . . . . . 115--115
Alexandr Andoni and
Piotr Indyk Near-optimal hashing algorithms for
approximate nearest neighbor in high
dimensions . . . . . . . . . . . . . . . 117--122
Leonard S. Zegans Inside risks: The psychology of risks 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6
CACM Staff News track . . . . . . . . . . . . . . . 7--8
Diane Crawford Forum . . . . . . . . . . . . . . . . . 9--11
Diane Crawford SIGs announce candidates for election 14--14
Michael A. Cusumano Technology strategy and management:
Managing software development in
globally distributed teams . . . . . . . 15--17
Andy Oram Viewpoint: Peer to patent needs your
expertise . . . . . . . . . . . . . . . 19--20
Pamela Samuelson and
Jerome H. Reichman and
Graeme Dinwoodie Legally speaking: How to achieve (some)
balance in anti-circumvention laws . . . 21--25
Stuart I. Feldman ACM annual report for FY07 . . . . . . . 27--34
Jeffrey Y. Kim and
Jonathan P. Allen and
Elan Lee Alternate reality gaming . . . . . . . . 36--42
Eric Shih and
Kenneth L. Kraemer and
Jason Dedrick IT diffusion in developing countries . . 43--48
Mark T. Keane and
Maeve O'Brien and
Barry Smyth Are people biased in their use of search
engines? . . . . . . . . . . . . . . . . 49--52
Nolan J. Taylor and
Eleanor T. Loiacono and
Richard T. Watson Alternative scenarios to the 'banner'
years . . . . . . . . . . . . . . . . . 53--58
Peter Marks and
Peter Polak and
Scott McCoy and
Dennis Galletta Sharing knowledge . . . . . . . . . . . 60--65
Alfred Loo The myths and truths of wireless
security . . . . . . . . . . . . . . . . 66--71
Munir Mandviwalla and
Abhijit Jain and
Julie Fesenmaier and
Jeff Smith and
Paul Weinberg and
Greg Meyers Municipal broadband wireless networks 72--80
Vicki R. McKinney and
Darryl D. Wilson and
Nita Brooks and
Anne O'Leary-Kelly and
Bill Hardgrave Women and men in the IT profession . . . 81--84
Bing Liu and
Alexander Tuzhilin Managing large collections of data
mining models . . . . . . . . . . . . . 85--89
Min-Yen Kan and
Yee Fan Tan Technical opinion: Record matching in
digital library metadata . . . . . . . . 91--94
Pascal Meunier Inside risks: Software transparency and
purity . . . . . . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6
CACM Staff News track . . . . . . . . . . . . . . . 7--8
Phillip G. Armour The business of software: The inaccurate
conception . . . . . . . . . . . . . . . 13--16
Robert L. Glass Practical programmer: Managing for
innovation . . . . . . . . . . . . . . . 17--18
Chenglie Hu Viewpoint: Just say 'A Class Defines a
Data Type' . . . . . . . . . . . . . . . 19--21
CACM Staff ACM fellows . . . . . . . . . . . . . . 22--23
Dana Cuff and
Mark Hansen and
Jerry Kang Urban sensing: out of the woods . . . . 24--33
Jason O. B. Soh and
Bernard C. Y. Tan Mobile gaming . . . . . . . . . . . . . 35--39
Liping Zhao Patterns, symmetry, and symmetry
breaking . . . . . . . . . . . . . . . . 40--46
Robert Pinsker and
Shaomin Li Costs and benefits of XBRL adoption:
early evidence . . . . . . . . . . . . . 47--50
Bernd Carsten Stahl and
Carole Brooke The contribution of critical IS research 51--55
David Wright and
Michael Friedewald and
Wim Schreurs and
Michiel Verlinden and
Serge Gutwirth and
Yves Punie and
Ioannis Maghiros and
Elena Vildjiounaite and
Petteri Alahuhta The illusion of security . . . . . . . . 56--63
Iris A. Junglas and
Richard T. Watson Location-based services . . . . . . . . 65--69
Robert LaRose and
Nora J. Rifon and
Richard Enbody Promoting personal responsibility for
internet safety . . . . . . . . . . . . 71--76
Frank Safayeni and
P. Robert Duimering and
Kimberley Zheng and
Natalia Derbentseva and
Christopher Poile and
Bing Ran Requirements engineering in new product
development . . . . . . . . . . . . . . 77--82
Kwangsu Cho and
Tingting Rachel Chung and
William R. King and
Christian Schunn Peer-based computer-supported knowledge
refinement: an empirical investigation 83--88
Dinesh K. Gauri and
Amit Bhatnagar and
Raghav Rao Technical opinion: Role of word of mouth
in online store loyalty . . . . . . . . 89--91
Xiaoming Lu and
George Ledin, Jr. Inside risks: Wireless sensor networks
and the risks of vigilance . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6
Diane Crawford Forum . . . . . . . . . . . . . . . . . 10--10
CACM Staff News track . . . . . . . . . . . . . . . 11--12
Hal Berghel Digital village: Faith-based security 13--17
Peter J. Denning and
Peter Yaholkovsky The profession of IT: Getting to 'we' 19--24
CACM Staff Call for nominations for advanced member
grades in the ACM . . . . . . . . . . . 25--26
CACM Staff ACM honors distinguished and senior
members . . . . . . . . . . . . . . . . 27--30
Daniel Kunkle and
Gene Cooperman Viewpoint: Solving Rubik's Cube: disk is
the new RAM . . . . . . . . . . . . . . 31--33
Ryan West The psychology of security . . . . . . . 34--40
Richard T. Watson and
Marie-Claude Boudreau and
Paul T. York and
Martina E. Greiner and
Donald Wynn, Jr. The business of open source . . . . . . 41--46
Ziqi Liao and
Michael Tow Cheung Measuring consumer satisfaction in
internet banking: a core framework . . . 47--51
Luc Moreau and
Paul Groth and
Simon Miles and
Javier Vazquez-Salceda and
John Ibbotson and
Sheng Jiang and
Steve Munroe and
Omer Rana and
Andreas Schreiber and
Victor Tan and
Laszlo Varga The provenance of electronic data . . . 52--58
Hsiu-Ping Yueh and
Shihkuan Hsu Designing a learning management system
to support instruction . . . . . . . . . 59--63
Lawrence D. Bodin and
Lawrence A. Gordon and
Martin P. Loeb Information security and risk management 64--68
Dawn G. Gregg and
Judy E. Scott A typology of complaints about eBay
sellers . . . . . . . . . . . . . . . . 69--74
Ilan Oshri and
Julia Kotlarsky and
Leslie Willcocks Missing links: building critical social
ties for global collaborative teamwork 76--81
Ivy Chan and
Chee-Kwong Chao Knowledge management in small and
medium-sized enterprises . . . . . . . . 83--88
Mohamed Khalifa and
Kathy Ning Demographic changes in IS research
productivity and impact . . . . . . . . 89--94
Pamela Whitten and
Deirdre Mylod and
Goran Gavran and
Howard Sypher 'Most Wired Hospitals' rate patient
satisfaction . . . . . . . . . . . . . . 96--102
Chuck Litecky and
Bipin Prabhakar and
Kirk Arnett Technical opinion: The size of the IT
job market . . . . . . . . . . . . . . . 107--109
Lauren Weinstein Inside risks: A current affair . . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6
CACM Staff News track . . . . . . . . . . . . . . . 7--8
Diane Crawford Forum . . . . . . . . . . . . . . . . . 9--11
CACM Staff ACM A. M. Turing Award nominations
solicited . . . . . . . . . . . . . . . 14--14
Jacques Cohen Viewpoint: The crucial role of CS in
systems and synthetic biology . . . . . 15--18
Meg McGinity Shannon Staying connected: This menu has changed 19--21
CACM Staff 2008 ACM Elections . . . . . . . . . . . 22--31
Wingyan Chung Web searching in a multilingual world 32--40
Irit Hadar and
Uri Leron How intuitive is object-oriented design? 41--46
Dov Dori Words from pictures for dual-channel
processing . . . . . . . . . . . . . . . 47--52
Silvana Trimi and
Hong Sheng Emerging trends in M-government . . . . 53--58
Kannan Mohan and
Peng Xu and
Balasubramaniam Ramesh Improving the change-management process 59--64
Rui Chen and
Raj Sharman and
H. Raghav Rao and
Shambhu J. Upadhyaya Coordination in emergency response
management . . . . . . . . . . . . . . . 66--73
Alessandro Garcia and
Carlos Lucena Taming heterogeneous agent architectures 75--81
Oded Nov and
Bharat Rao Technology-facilitated 'Give According
to Your Abilities, Receive According to
Your Needs' . . . . . . . . . . . . . . 83--87
Bezalel Gavish and
Christopher L. Tucci Reducing Internet auction fraud . . . . 89--97
Edgar A. Whitley and
Ian R. Hosein Technical opinion: Departmental
influences on policy design . . . . . . 98--100
Steven M. Bellovin Inside risks: The physical world and the
real world . . . . . . . . . . . . . . . 104--104
Diane Crawford Editorial pointers . . . . . . . . . . . 5--6
CACM Staff News track . . . . . . . . . . . . . . . 7--8
Diane Crawford Forum . . . . . . . . . . . . . . . . . 9--11
Hal Berghel Digital village: BRAP forensics . . . . 15--20
Robert L. Glass Practical programmer: Software design
and the monkey's brain . . . . . . . . . 21--22
Arik Ragowsky and
Paul S. Licker and
David Gefen Viewpoint: Give me information, not
technology . . . . . . . . . . . . . . . 23--25
Roel Vertegaal and
Ivan Poupyrev Organic user interfaces: Introduction 26--30
Hiroshi Ishii The tangible user interface and its
evolution . . . . . . . . . . . . . . . 32--36
Jun Rekimoto Organic interaction technologies: from
stone to skin . . . . . . . . . . . . . 38--44
Elise Co and
Nikita Pashenkov Emerging display technologies for
organic user interfaces . . . . . . . . 45--47
David Holman and
Roel Vertegaal Organic user interfaces: designing
computers in any way, shape, or form . . 48--55
Eli Blevis Sustainability implications of organic
user interface technologies: an inky
problem . . . . . . . . . . . . . . . . 56--57
Amanda Parkes and
Ivan Poupyrev and
Hiroshi Ishii Designing kinetic interactions for
organic user interfaces . . . . . . . . 58--65
Carsten Schwesig What makes an interface feel organic? 67--69
Kas Oosterhuis and
Nimish Biloria Interactions with proactive
architectural spaces: the muscle
projects . . . . . . . . . . . . . . . . 70--78
Sachiko Kodama Dynamic ferrofluid sculpture: organic
shape-changing art forms . . . . . . . . 79--81
Daniel J. Weitzner and
Harold Abelson and
Tim Berners-Lee and
Joan Feigenbaum and
James Hendler and
Gerald Jay Sussman Information accountability . . . . . . . 82--87
Charalambos L. Iacovou and
Robbie Nakatsu A risk profile of offshore-outsourced
development projects . . . . . . . . . . 89--94
Chon Abraham and
Richard T. Watson and
Marie-Claude Boudreau Ubiquitous access: on the front lines of
patient care and safety . . . . . . . . 95--99
Wayne Wei Huang and
Jonathon Greene and
John Day Outsourcing and the decrease of IS
program enrollment . . . . . . . . . . . 101--104
Jim Horning and
Peter G. Neumann Inside risks: Risks of neglecting
infrastructure . . . . . . . . . . . . . 112--112
Moshe Y. Vardi Editor's letter: 'Where do you come
from? and where are you going?' . . . . 5--5
Scott E. Delman Publisher's corner: The art and business
of revitalizing a 50-year-old science
and technology magazine . . . . . . . . 7--7
David Roman CACM online: Your attention, please . . 8--8
Brian Hayes Cloud computing . . . . . . . . . . . . 9--11
Michael Ross and
Mark Oskin Quantum computing . . . . . . . . . . . 12--13
Leah Hoffman In search of dependable design . . . . . 14--16
Alok Aggarwal Emerging Markets: India's role in the
globalization of IT . . . . . . . . . . 17--19
Pamela Samuelson Legally Speaking: Revisiting patentable
subject matter . . . . . . . . . . . . . 20--22
George V. Neville-Neil Kode Vicious: Beautiful code exists, if
you know where to look . . . . . . . . . 23--25
Stephen J. Andriole and
Eric Roberts Point/Counterpoint: Technology
curriculum for the early 21st Century 27--32
Rick Rashid Image Crisis: Inspiring a new generation
of computer scientists . . . . . . . . . 33--34
Len Shustek Interview: The 'art' of being Donald
Knuth . . . . . . . . . . . . . . . . . 35--39
Erik Wilde and
Robert J. Glushko XML fever . . . . . . . . . . . . . . . 40--46
Adam Leventhal Flash storage memory . . . . . . . . . . 47--51
Margo Seltzer Beyond relational databases . . . . . . 52--58
James Hendler and
Nigel Shadbolt and
Wendy Hall and
Tim Berners-Lee and
Daniel Weitzner Web science: an interdisciplinary
approach to understanding the Web . . . 60--69
Mark Oskin The revolution inside the box . . . . . 70--78
James Larus and
Christos Kozyrakis Transactional memory . . . . . . . . . . 80--88
Bob Colwell Technical Perspective: Computer science
takes on molecular dynamics . . . . . . 90--90
David E. Shaw and
Martin M. Deneroff and
Ron O. Dror and
Jeffrey S. Kuskin and
Richard H. Larson and
John K. Salmon and
Cliff Young and
Brannon Batson and
Kevin J. Bowers and
Jack C. Chao and
Michael P. Eastwood and
Joseph Gagliardo and
J. P. Grossman and
C. Richard Ho and
Douglas J. Lerardi and
István Kolossváry and
John L. Klepeis and
Timothy Layman and
Christine McLeavey and
Mark A. Moraes and
Rolf Mueller and
Edward C. Priest and
Yibing Shan and
Jochen Spengler and
Michael Theobald and
Brian Towles and
Stanley C. Wang Anton, a special-purpose machine for
molecular dynamics simulation . . . . . 91--97
Feng Zhao Technical Perspective: The physical side
of computing . . . . . . . . . . . . . . 98--98
Philip Levis and
Eric Brewer and
David Culler and
David Gay and
Samuel Madden and
Neil Patel and
Joe Polastre and
Scott Shenker and
Robert Szewczyk and
Alec Woo The emergence of a networking primitive
in wireless sensor networks . . . . . . 99--106
Leah Hoffman Last byte: Q&A Talking model-checking
technology . . . . . . . . . . . . . . . 112, 1??-1??
Stuart I. Feldman President's letter: A new beginning, a
fond farewell . . . . . . . . . . . . . 5--5
CACM Staff Words both kind and contrary . . . . . . 7--7
David Roman Small changes hint at bigger things . . 8--8
Hal R. Varian Designing the perfect auction . . . . . 9--11
Peggy Aycinena Access for all . . . . . . . . . . . . . 12--14
Sarah Underwood Challenging poverty . . . . . . . . . . 15--17
Michael Ross Remembering Jim . . . . . . . . . . . . 18--18
Peter J. Denning The profession of IT: Voices of
computing . . . . . . . . . . . . . . . 19--21
Alex E. Bell From the front lines: Software
development amidst the whiz of silver
bullets . . . . . . . . . . . . . . . . 22--24
Mark Guzdial Education: Paving the way for
computational thinking . . . . . . . . . 25--27
Ed Lazowska Viewpoint: Envisioning the future of
computing research . . . . . . . . . . . 28--30
Len Shustek Interview: Donald Knuth: A life's work
interrupted . . . . . . . . . . . . . . 31--35
Jim Waldo Scaling in games and virtual worlds . . 38--44
Mache Creeger CTO storage roundtable . . . . . . . . . 45--51
Michi Henning The rise and fall of CORBA . . . . . . . 52--57
Luis von Ahn and
Laura Dabbish Designing games with a purpose . . . . . 58--67
Diomidis Spinellis and
Panagiotis Louridas The collaborative organization of
knowledge . . . . . . . . . . . . . . . 68--73
Yoav Shoham Computer science and game theory . . . . 74--79
William Pugh Technical perspective: A methodology for
evaluating computer system performance 82--82
Stephen M. Blackburn and
Kathryn S. McKinley and
Robin Garner and
Chris Hoffmann and
Asjad M. Khan and
Rotem Bentzur and
Amer Diwan and
Daniel Feinberg and
Daniel Frampton and
Samuel Z. Guyer and
Martin Hirzel and
Antony Hosking and
Maria Jump and
Han Lee and
J. Eliot B. Moss and
Aashish Phansalkar and
Darko Stefanovik and
Thomas VanDrunen and
Daniel von Dincklage and
Ben Wiedermann Wake up and smell the coffee: evaluation
methodology for the 21st Century . . . . 83--89
Nir Shavit Technical perspective: Transactions are
tomorrow's loads and stores . . . . . . 90--90
Tim Harris and
Simon Marlow and
Simon Peyton Jones and
Maurice Herlihy Composable memory transactions . . . . . 91--100
Peter Winkler Last byte: Puzzled Delightful graph
theory . . . . . . . . . . . . . . . . . 104--104
Wendy Hall President's letter: ACM's place in the
global picture . . . . . . . . . . . . . 5--5
Scott E. Delman Publisher's corner: 50 Years young . . . 7--7
CACM Staff Letters to the editor: Knuth's art of
recovering from errors . . . . . . . . . 9--9
David Roman CACM online: Current features . . . . . 10--10
Kirk L. Kroeker News: Finding diamonds in the rough . . 11--13
Logan Kugler News: Ubiquitous video . . . . . . . . . 14--16
Samuel Greengard News: Privacy matters . . . . . . . . . 17--18
Leah Hoffmann News: Wisdom from Randy Pausch . . . . . 19--19
Michael Cusumano Technology strategy and management: The
puzzle of Apple . . . . . . . . . . . . 22--24
George Neville-Neil Kode vicious: Pride and prejudice (the
\em Vasa) . . . . . . . . . . . . . . . 25--26
Cameron Wilson and
Peter Harsha IT policy: Science policy isn't always
about science . . . . . . . . . . . . . 27--29
Richard G. Baraniuk and
C. Sidney Burrus Viewpoint: Global warming toward open
educational resources . . . . . . . . . 30--32
Ian Foster and
Savas Parastatidis and
Paul Watson and
Mark Mckeown Practice: How do I model state?: Let me
count the ways . . . . . . . . . . . . . 34--41
Matthew Garrett Practice: Powering down . . . . . . . . 42--46
Mache Creeger Practice: CTO storage roundtable, part
two . . . . . . . . . . . . . . . . . . 47--52
Mike Hinchey and
Michael Jackson and
Patrick Cousot and
Byron Cook and
Jonathan P. Bowen and
Tiziana Margaria Practice: Software engineering and
formal methods . . . . . . . . . . . . . 54--59
Dmitri Roussinov and
Weiguo Fan and
José Robles-Flores Beyond keywords: Automated question
answering on the Web . . . . . . . . . . 60--65
Bertrand Meyer Design and code reviews in the age of
the Internet . . . . . . . . . . . . . . 66--71
Philip A. Bernstein and
Laura M. Haas Information integration in the
enterprise . . . . . . . . . . . . . . . 72--79
Mark Moir Technical perspective: Transactional
memory in the operating system . . . . . 82--82
Christopher J. Rossbach and
Hany E. Ramadan and
Owen S. Hofmann and
Donald E. Porter and
Aditya Bhandari and
Emmett Witchel TxLinux and MetaTM: transactional memory
and the operating system . . . . . . . . 83--91
Hagit Attiya Technical perspective: Distributing your
data and having it, too . . . . . . . . 92--92
Fabian Kuhn and
Thomas Locher and
Roger Wattenhofer Distributed selection: a missing piece
of data aggregation . . . . . . . . . . 93--99
Peter Winkler Last byte: Puzzled: Solutions and
sources . . . . . . . . . . . . . . . . 103--103
William Sims Bainbridge Last byte: Future tense: Will . . . . . 104--104
Robin S. Poston Using and fixing biased rating schemes 105--109
Kannan Mohan and
Radhika Jain Using traceability to mitigate cognitive
biases in software development . . . . . 110--114
Alexander P. Pons and
Peter Polak Understanding user perspectives on
biometric technology . . . . . . . . . . 115--118
Lina Zhou and
Dongsong Zhang Following linguistic footprints:
automatic deception detection in online
communication . . . . . . . . . . . . . 119--122
Julia Kotlarsky and
Ilan Oshri and
Kuldeep Kumar and
Jos van Hillegersberg Towards agility in design in global
component-based development . . . . . . 123--127
Neset Hikmet and
Eileen Z. Taylor and
Christopher J. Davis The student productivity paradox:
technology mediated learning in schools 128--131
Patrick Y. K. Chau and
Fujun Lai and
Dahui Li What factors drive the assimilation of
Internet technologies in China? . . . . 132--135
Moshe Y. Vardi Editor's letter: Let
us---together---make CACM exciting . . . 5--5
Scott E. Delman Publisher's corner: The softer side of
\em Communications . . . . . . . . . . . 7--7
CACM Staff Letters to the editor: Prep students for
irreversible software trends . . . . . . 8--9
David Roman CACM online: \em Communications site to
launch in January . . . . . . . . . . . 10--10
Patrick Kurp News: Green computing . . . . . . . . . 11--13
Alex Wright News: Searching the Deep Web . . . . . . 14--15
Cyrus Farivar News: Clean elections . . . . . . . . . 16--18
Leah Hoffmann News: An inspiring legacy . . . . . . . 19--19
Martin Campbell-Kelly Viewpoints: Historical reflections: Will
the future of software be open source? 21--23
Deborah G. Johnson Viewpoints: Computing ethics: Computer
experts: guns-for-hire or professionals? 24--26
Alex E. Bell Viewpoints: From the front lines DOA
with SOA . . . . . . . . . . . . . . . . 27--28
David L. Dill and
Daniel Castro Viewpoints: Point/counterpoint: The U.S.
should ban paperless electronic voting
machines . . . . . . . . . . . . . . . . 29--33
George V. Neville-Neil Practice: Code spelunking redux . . . . 36--41
Erik Wilde and
Robert J. Glushko Practice: Document design matters . . . 43--49
Kayvon Fatahalian and
Mike Houston Practice: A closer look at GPUs . . . . 50--57
Jennifer Xu and
Hsinchun Chen The topology of dark networks . . . . . 58--65
Jacob Slonim and
Sam Scully and
Michael McAllister Crossroads for Canadian CS enrollment 66--70
Lila Kari and
Grzegorz Rozenberg The many facets of natural computing . . 72--83
Marc Levoy Technical perspective: Computational
photography on large collections of
images . . . . . . . . . . . . . . . . . 86--86
James Hays and
Alexei A. Efros Scene completion using millions of
photographs . . . . . . . . . . . . . . 87--94
Éva Tardos Technical perspective: New developments
in graph partitioning . . . . . . . . . 95--95
Sanjeev Arora and
Satish Rao and
Umesh Vazirani Geometry, flows, and graph-partitioning
algorithms . . . . . . . . . . . . . . . 96--105
Leah Hoffmann Last byte: Q&A: A complex thinker . . . . 112--ff
Mary C. Jones Large scale project team building:
beyond the basics . . . . . . . . . . . 113--116
Gediminas Adomavicius and
Jesse Bockstedt and
Alok Gupta and
Robert J. Kauffman Understanding evolution in technology
ecosystems . . . . . . . . . . . . . . . 117--122
Seokwoo Song and
Sridhar Nerur and
James T. C. Teng Understanding the influence of network
positions and knowledge processing
styles . . . . . . . . . . . . . . . . . 123--126
Brian L. Dos Santos and
Lars S. Smith RFID in the supply chain: panacea or
Pandora's box? . . . . . . . . . . . . . 127--131
Chen Ye and
Kevin C. Desouza and
Sridhar R. Papagari Sangareddy and
Sanjeev Jha Switching between consumer technologies 132--136
Mary Darking and
Edgar A. Whitley and
Paolo Dini Governing diversity in the digital
ecosystem . . . . . . . . . . . . . . . 137--140
Amrit Tiwana and
Ashley A. Bush and
Hiroshi Tsuji and
Kenichi Yoshida and
Akito Sakurai Myths and paradoxes in Japanese IT
offshoring . . . . . . . . . . . . . . . 141--145
Thilini Ariyachandra and
Hugh J. Watson Technical opinion: Which data warehouse
architecture is best? . . . . . . . . . 146--147
John R. White CEO's letter: On the 10th anniversary of
ACM's Digital Library . . . . . . . . . 5--5
Diane Crawford Executive editor's corner: Jim Gray:
humble visionary . . . . . . . . . . . . 7--7
CACM Staff Letters to the editor: Even science
would benefit from auctions . . . . . . 8--9
David Roman CACM online: A first look at the
redesigned site . . . . . . . . . . . . 10--10
Leah Hoffmann News: Damage control . . . . . . . . . . 11--13
Bill Howard News: Analyzing online social networks 14--16
David Lindley News: The limits of computability . . . 17--19
Avi Goldfarb and
Catherine Tucker Viewpoints: Economic and business
dimensions: Search engine advertising 22--24
Susan Landau Viewpoints: Privacy and security: A
multidimensional problem . . . . . . . . 25--26
Pamela Samuelson Viewpoints: Legally speaking: \em
Quantafying the value of patent
exhaustion . . . . . . . . . . . . . . . 27--29
Joanna Goode Viewpoints: Education: Reprogramming:
college preparatory computer science . . 31--33
Bryan Cantrill and
Jeff Bonwick Practice: Real-world concurrency . . . . 34--39
Calin Cascaval and
Colin Blundell and
Maged Michael and
Harold W. Cain and
Peng Wu and
Stefanie Chiras and
Siddhartha Chatterjee Practice: Software transactional memory:
why is it only a research toy? . . . . . 40--46
Mache Creeger Practice: CTO roundtable on
virtualization . . . . . . . . . . . . . 47--53
Michael Stonebraker and
David J. DeWitt A tribute to Jim Gray . . . . . . . . . 54--57
Alexander S. Szalay Jim Gray, astronomer . . . . . . . . . . 58--65
Jon Kleinberg The convergence of social and
technological networks . . . . . . . . . 66--72
Jim Gray Technical perspective: The Polaris
Tableau system . . . . . . . . . . . . . 74--74
Chris Stolte and
Diane Tang and
Pat Hanrahan Polaris: a system for query, analysis,
and visualization of multidimensional
databases . . . . . . . . . . . . . . . 75--84
Barbara Liskov Technical perspective: Safeguarding
online information against failures and
attacks . . . . . . . . . . . . . . . . 85--85
Ramakrishna Kotla and
Allen Clement and
Edmund Wong and
Lorenzo Alvisi and
Mike Dahlin Zyzzyva: speculative Byzantine fault
tolerance . . . . . . . . . . . . . . . 86--95
Peter Winkler Last byte: Puzzled: Circular food . . . 112--112
DaeSoo Kim and
Terence T. Ow and
Minjoon Junc SME strategies: an assessment of high
vs. low performers . . . . . . . . . . . 113--117
Claudio Feijóo and
José Luis Gómez-Barroso and
David Rojo-Alonso A European perspective of VoIP in market
competition . . . . . . . . . . . . . . 118--120
Judy E. Scott Technology acceptance and ERP
documentation usability . . . . . . . . 121--124
Faiz Currim and
Sudha Ram Conceptually modeling windows and bounds
for space and time in database
constraints . . . . . . . . . . . . . . 125--129
Quan Z. Sheng and
Boualem Benatallah and
Zakaria Maamar User-centric services provisioning in
wireless environments . . . . . . . . . 130--135
DongBack Seo and
Ariel I. La Paz Exploring the dark side of IS in
achieving organizational agility . . . . 136--139
Srinivasan Venkatraman and
Hillol Bala and
Viswanath Venkatesh and
Jack Bates Six strategies for electronic medical
records systems . . . . . . . . . . . . 140--144
Ping Zhang Technical opinion: Motivational
affordances: reasons for ICT design and
use . . . . . . . . . . . . . . . . . . 145--147
Ronald F. Boisvert and
Holly Rushmeier ACM publications: access and
sustainability . . . . . . . . . . . . . 5--5
Scott E. Delman Looking back and forward . . . . . . . . 7--7
CACM Staff Apple builds great platforms, too, not
just products . . . . . . . . . . . . . 8--8
David Roman Previewing the new CACM web site . . . . 10--10
Kirk L. Kroeker Living machines . . . . . . . . . . . . 11--13
Ted Selker Touching the future . . . . . . . . . . 14--16
Samuel Greengard Upwardly mobile . . . . . . . . . . . . 17--19
Leah Hoffmann Making a difference . . . . . . . . . . 20--20
Alok Aggarwal Emerging markets: Labor supply in the
Indian IT industry . . . . . . . . . . . 21--23
Cameron Wilson and
Peter Harsha IT policy: Advising policymakers is more
than just providing advice . . . . . . . 24--26
George V. Neville-Neil Kode vicious: Permanence and change . . 27--28
Peter J. Denning and
Chris Gunderson and
Rick Hayes-Roth The profession of IT: Evolutionary
system development . . . . . . . . . . . 29--31
James Hamilton Interview: Database dialogue with Pat
Selinger . . . . . . . . . . . . . . . . 32--35
Steve Souders High-performance web sites . . . . . . . 36--41
Mache Creeger CTO virtualization roundtable, part II 43--49
Francine Berman Got data?: a guide to data preservation
in the information age . . . . . . . . . 50--56
Ian Horrocks Ontologies and the Semantic Web . . . . 58--67
Oren Etzioni and
Michele Banko and
Stephen Soderland and
Daniel S. Weld Open information extraction from the web 68--74
Michael Stonebraker Technical perspective: One size fits
all: an idea whose time has come and
gone . . . . . . . . . . . . . . . . . . 76--76
Peter A. Boncz and
Martin L. Kersten and
Stefan Manegold Breaking the memory wall in MonetDB . . 77--85
Martin C. Rinard Technical perspective: Patching program
errors . . . . . . . . . . . . . . . . . 86--86
Gene Novark and
Emery D. Berger and
Benjamin G. Zorn Exterminator: Automatically correcting
memory errors with high probability . . 87--95
Peter Winkler Last Byte: Puzzled: Solutions and
sources . . . . . . . . . . . . . . . . 118--118
Cory Doctorow Future tense: Pester power . . . . . . . 120--ff
Peter Duchessi and
Indushobha Chengalur-Smith Enhancing business performance via
vendor managed inventory applications 121--127
Chee Wei Phang and
Atreyi Kankanhalli A framework of ICT exploitation for
e-participation initiatives . . . . . . 128--132
Michael J. Davern and
Carla L. Wilkin Evolving innovations through design and
use . . . . . . . . . . . . . . . . . . 133--137
Michael Näf and
David Basin Two approaches to an information
security laboratory . . . . . . . . . . 138--142
Patrick Stacey and
Joe Nandhakumar Opening up to agile games development 143--146
Ross A. Malaga Worst practices in search engine
optimization . . . . . . . . . . . . . . 147--150
Pierre Berthon and
Leyland F. Pitt and
Richard T. Watson From Genesis to Revelations: the
technology diaspora . . . . . . . . . . 151--154
Vivien K. G. Lim and
Thompson S. H. Teo and
Jen Yuin Chin Technical opinion: Bosses and their
e-manners . . . . . . . . . . . . . . . 155--157
Moshe Y. Vardi Editor's letter: How are we doing? . . . 5--5
CACM Staff Letters to the editor: True seeds of
open source software . . . . . . . . . . 6--6
David Roman CACM online: \em Communications preps
Web-enhanced articles . . . . . . . . . 8--8
David Lindley News: Calculating the future . . . . . . 9--11
Jeff Kanipe News: The universe in your computer . . 12--14
Alex Wright News: Get smart . . . . . . . . . . . . 15--16
Michael Ross News: A pioneer woman . . . . . . . . . 17--17
Jonathan Zittrain Viewpoints: Law and technology: The end
of the generative Internet . . . . . . . 18--20
Alex E. Bell Viewpoints: From the front lines: Ground
control to Architect Tom\ldots . . . . . 21--22
Phillip G. Armour Viewpoints: The business of software:
The ontology of paper . . . . . . . . . 23--24
Michael Cusumano Viewpoints: Technology strategy and
management: The legacy of Bill Gates . . 25--26
Jon Crowcroft and
S. Keshav and
Nick McKeown Viewpoint: Scaling the academic
publication process to Internet scale 27--30
Stuart I. Feldman ACM's annual report . . . . . . . . . . 33--37
Werner Vogels Eventually consistent . . . . . . . . . 40--44
John Mashey The long road to 64 bits . . . . . . . . 45--53
Tapan S. Parikh Engineering rural development . . . . . 54--63
Dawn N. Jutla and
Dimitri Kanevsky wisePad services for vision-,
hearing-, and speech-impaired users . . 64--69
Joan Feigenbaum and
David C. Parkes and
David M. Pennock Computational challenges in e-commerce 70--74
Harry Shum Technical perspective: Customizing media
to displays . . . . . . . . . . . . . . 76--76
Ariel Shamir and
Shai Avidan Seam carving for media retargeting . . . 77--85
Jock D. Mackinlay Technical perspective: Finding and
telling stories with data . . . . . . . 86--86
Jeffrey Heer and
Fernanda B. Viégas and
Martin Wattenberg Voyagers and voyeurs: Supporting
asynchronous collaborative visualization 87--97
Leah Hoffmann Last byte: Q&A: The upper limit . . . . . 112ff
Erik T. Mueller Automating commonsense reasoning using
the event calculus . . . . . . . . . . . 113--117
Nanda Kumar and
Roumen Vragov Active citizen participation using ICT
tools . . . . . . . . . . . . . . . . . 118--121
Yogesh Dwivedi and
Zahir Irani Understanding the adopters and
non-adopters of broadband . . . . . . . 122--125
Allen C. Johnston and
Ron Hale Improved security through information
security governance . . . . . . . . . . 126--129
Judith Gebauer and
Mark Ginsburg Exploring the black box of
task-technology fit . . . . . . . . . . 130--135
Hillol Bala and
Viswanath Venkatesh and
Srinivasan Venkatraman and
Jack Bates and
Steven H. Brown Disaster response in health care: A
design extension for enterprise data
warehouse . . . . . . . . . . . . . . . 136--140
Parag C. Pendharkar and
James A. Rodger The relationship between software
development team size and software
development cost . . . . . . . . . . . . 141--144
Carol Xiaojuan Ou and
Robert M. Davison Technical opinion: Why eBay lost to
TaoBao in China: the global advantage 145--148
Eugene H. Spafford USACM's policy role . . . . . . . . . . 5--5
CACM Staff Seven principles for secure e-voting . . 8--9
David Roman The dot-org difference . . . . . . . . . 10--10
Kirk L. Kroeker Photography's bright future . . . . . . 11--13
Alex Wright Making sense of sensors . . . . . . . . 14--15
Samuel Greengard The first Internet President . . . . . . 16--18
Kirk L. Kroeker SIGGRAPH debuts in Asia . . . . . . . . 19--19
Ashish Arora and
Matej Drev and
Chris Forman Economic and business dimensions: The
extent of globalization of software
innovation . . . . . . . . . . . . . . . 20--22
George H. L. Fletcher and
James J. Lu Education Human: computing skills:
rethinking the K-12 experience . . . . . 23--25
Kristina Irion Privacy and security: International
communications surveillance . . . . . . 26--28
Peter G. Neumann Inside risks: U.S. election after-math 29--29
Barbara van Schewick and
David Farber Point/Counterpoint: Network neutrality
nuances . . . . . . . . . . . . . . . . 31--37
Ulrich Drepper Parallel programming with transactional
memory . . . . . . . . . . . . . . . . . 38--43
Tom Leighton Improving performance on the Internet 44--51
T. V. Raman Toward $2^W$, beyond Web 2.0 . . . . . . 52--59
Mary Hall and
David Padua and
Keshav Pingali Compiler research: the next 50 years . . 60--67
Maria Klawe and
Telle Whitney and
Caroline Simard Women in computing---take 2 . . . . . . 68--76
Dan Wallach Technical perspective: Tools for
information to flow securely and
Swift-ly . . . . . . . . . . . . . . . . 78--78
Stephen Chong and
Jed Liu and
Andrew C. Myers and
Xin Qi and
K. Vikram and
Lantian Zheng and
Xin Zheng Building secure Web applications with
automatic partitioning . . . . . . . . . 79--87
Ehud Kalai Technical perspective: The complexity of
computing Nash equilibrium . . . . . . . 88--88
Constantinos Daskalakis and
Paul W. Goldberg and
Christos H. Papadimitriou The complexity of computing a Nash
equilibrium . . . . . . . . . . . . . . 89--97
Peter Winkler Last Byte: Puzzled: Will my algorithm
terminate? . . . . . . . . . . . . . . . 104--104
Pamela E. Carter and
Gina Green Networks of contextualized data: a
framework for cyberinfrastructure data
management . . . . . . . . . . . . . . . 105--109
Xiao-Bai Li and
Luvai Motiwalla For sale by owner online: who gets the
saved commission? . . . . . . . . . . . 110--114
Ergin Elmacioglu and
Dongwon Lee Oracle, where shall I submit my papers? 115--118
Shlomo Argamon and
Moshe Koppel and
James W. Pennebaker and
Jonathan Schler Automatically profiling the author of an
anonymous text . . . . . . . . . . . . . 119--123
Sandy Behrens Shadow systems: the good, the bad and
the ugly . . . . . . . . . . . . . . . . 124--129
Arik Ragowsky and
David Gefen Why IS management is in trouble and how
to save it: lessons learned in the
automotive industry . . . . . . . . . . 130--133
M. Eric Johnson and
Dan McGuire and
Nicholas D. Willey Why file sharing networks are dangerous? 134--138
Raquel Benbunan-Fich and
Gregory E. Truman Technical opinion: Multitasking with
laptops during meetings . . . . . . . . 139--141
Moshe Y. Vardi Editor's letter: 'Yes, it can be done' 5--5
Scott E. Delman Publisher's corner: Communications'
Web site to launch in March . . . . . . 7--7
CACM Staff Children's magic won't deliver the
Semantic Web . . . . . . . . . . . . . . 8--9
David Roman Prepare for launch . . . . . . . . . . . 12--12
Gregory Goth Betting on ideas . . . . . . . . . . . . 13--15
Leah Hoffmann Crowd control . . . . . . . . . . . . . 16--17
Kirk L. Kroeker The evolution of virtualization . . . . 18--20
Karen A. Frenkel A difficult, unforgettable idea . . . . 21--21
CACM Staff ACM Fellows honored . . . . . . . . . . 22--22
Peter J. Denning and
Richard D. Riehle The profession of IT: Is software
engineering engineering? . . . . . . . . 24--26
Pamela Samuelson Legally speaking: When is a 'license'
really a sale? . . . . . . . . . . . . . 27--29
David A. Patterson Viewpoint: Your students are your legacy 30--33
Jeffrey D. Ullman Viewpoint: Advising students for success 34--37
Len Shustek Interview: An interview with C. A. R.
Hoare . . . . . . . . . . . . . . . . . 38--41
Walker White and
Christoph Koch and
Johannes Gehrke and
Alan Demers Better scripts, better games . . . . . . 42--47
Jim Larson Erlang for concurrent programming . . . 48--56
Abigail Sellen and
Yvonne Rogers and
Richard Harper and
Tom Rodden Reflecting human values in the digital
age . . . . . . . . . . . . . . . . . . 58--66
David Harel Statecharts in the making: a personal
account . . . . . . . . . . . . . . . . 67--75
Madhu Sudan Probabilistically checkable proofs . . . 76--84
Daniel A. Spielman Technical perspective: The beauty of
error-correcting codes . . . . . . . . . 86--86
Venkatesan Guruswami and
Atri Rudra Error correction up to the
information-theoretic limit . . . . . . 87--95
Bud Mishra Technical perspective: Where biology
meets computing . . . . . . . . . . . . 96--96
Radu Grosu and
Scott A. Smolka and
Flavio Corradini and
Anita Wasilewska and
Emilia Entcheva and
Ezio Bartocci Learning and detecting emergent behavior
in networks of cardiac myocytes . . . . 97--105
Peter Winkler Last byte: Puzzled: Solutions and
sources . . . . . . . . . . . . . . . . 111--111
Joel Garreau Last byte: Future Tense: Radical
evolution . . . . . . . . . . . . . . . 112--ff
Alexandre Sacchi and
Emerson Giannini and
Regiane Bochic and
Nicolau Reinhard and
Alexandre B. Lopes Digital inclusion with the McInternet:
would you like fries with that? . . . . 113--116
Clyde W. Holsapple A new map for knowledge dissemination
channels . . . . . . . . . . . . . . . . 117--125
Mary J. Culnan and
Thomas J. Carlin Online privacy practices in higher
education: making the grade? . . . . . . 126--130
Kenneth R. Fleischmann and
William A. Wallace Ensuring transparency in computational
modeling . . . . . . . . . . . . . . . . 131--134
Florian Mann and
Benedikt von Walter and
Thomas Hess and
Rolf T. Wigand Open access publishing in science . . . 135--139
Greg Linden and
Kenneth L. Kraemer and
Jason Dedrick Who captures value in a global
innovation network?: the case of Apple's
iPod . . . . . . . . . . . . . . . . . . 140--144
Anna Formica Concept similarity by evaluating
information contents and feature
vectors: a combined approach . . . . . . 145--149
Alfred Loo Technical opinion: Security threats of
smart phones and Bluetooth . . . . . . . 150--152
Andrew McGettrick Education letter: Computing education
matters . . . . . . . . . . . . . . . . 5--5
CACM Staff Letters to the editor: What role for
computer science in the war on terror? 9--9
David Roman CACM online: An ongoing study in
usability . . . . . . . . . . . . . . . 10--10
Graeme Stemp-Morlock News: Learning more about active
learning . . . . . . . . . . . . . . . . 11--13
Alex Wright News: Our sentiments, exactly . . . . . 14--15
David Essex News: Did somebody say virtual
colonoscopy? . . . . . . . . . . . . . . 16--18
Bob Violino News: Time to reboot . . . . . . . . . . 19--19
Alan Joch News: IT ecosystem in peril . . . . . . 20--20
Anonymous Emerging markets IT and the world's
'bottom billion' . . . . . . . . . . . . 22--24
System changes and
side effects Kode Vicious: System changes and side
effects . . . . . . . . . . . . . . . . 25--26
Michael Cusumano Technology strategy and management:
Strategies for difficult (and Darwinian)
economic times . . . . . . . . . . . . . 27--28
Michael Buckley Viewpoint: Computing as social science 29--30
Bertrand Meyer and
Christine Choppy and
Jòrgen Staunstrup and
Jan van Leeuwen Viewpoint: Research evaluation for
computer science . . . . . . . . . . . . 31--34
Mike Shapiro Purpose-built languages . . . . . . . . 36--41
Niels Provos and
Moheeb Abu Rajab and
Panayiotis Mavrommatis Cybercrime 2.0: when the cloud turns
dark . . . . . . . . . . . . . . . . . . 42--47
Chris Richardson ORM in dynamic languages . . . . . . . . 48--55
Gerhard Weikum and
Gjergji Kasneci and
Maya Ramanath and
Fabian Suchanek Database and information-retrieval
methods for knowledge discovery . . . . 56--64
Samuel Williams and
Andrew Waterman and
David Patterson Roofline: an insightful visual
performance model for multicore
architectures . . . . . . . . . . . . . 65--76
Daniel Jackson A direct path to dependable software . . 78--88
Arif Merchan Technical perspective: Disk array models
for automating storage management . . . 90--90
Michael P. Mesnier and
Matthew Wachs and
Raja R. Sambasivan and
Alice X. Zheng and
Gregory R. Ganger Relative fitness modeling . . . . . . . 91--96
Goetz Graefe Technical perspective: Integrating flash
devices . . . . . . . . . . . . . . . . 97--97
David Roberts and
Taeho Kgil and
Trevor Mudge Integrating NAND flash devices onto
servers . . . . . . . . . . . . . . . . 98--103
Leah Hofmann Last byte: Q&A: Our dame commander . . . 112--ff
Jay F. Nunamaker, Jr. and
Bruce A. Reinig and
Robert O. Briggs Principles for effective virtual
teamwork . . . . . . . . . . . . . . . . 113--117
Maris G. Martinsons and
Robert M. Davison and
Valdis Martinsons How culture influences IT-enabled
organizational change and information
systems . . . . . . . . . . . . . . . . 118--123
Gee-Woo Bock and
Swee Ling Ho Non-work related computing (NWRC) . . . 124--128
Kevin P. Scheibe and
James C. McElroy and
Paula C. Morrow Object language and impression
management . . . . . . . . . . . . . . . 129--131
France Bélanger and
Lemuria Carter The impact of the digital divide on
e-government use . . . . . . . . . . . . 132--135
Zeinab Karake Shalhoub Analysis of industry-specific
concentration of CPOs in Fortune 500
companies . . . . . . . . . . . . . . . 136--141
Eusebio Scornavacca and
Sid Huff and
Stephen Marshall Mobile phones in the classroom: if you
can't beat them, join them . . . . . . . 142--146
Paulo Goes and
Yanbin Tu and
Y. Alex Tung Technical opinion: Online auctions
hidden metrics . . . . . . . . . . . . . 147--149
Moshe Y. Vardi Editor's letter: Conferences vs.
journals in computing research . . . . . 5--5
CACM Staff Letters to the Editor: Logic of lemmings
in compiler innovation . . . . . . . . . 7--9
CACM Staff blog@CACM: Recommendation algorithms,
online privacy, and more . . . . . . . . 10--11
David Roman CACM online: The print-Web partnership
turns the page . . . . . . . . . . . . . 12--12
Kirk L. Kroeker News: Rethinking signal processing . . . 13--15
David Essex News: Matchmaker, matchmaker . . . . . . 16--17
Samuel Greengard News: Learning goes global . . . . . . . 18--19
CACM Staff News: Liskov wins Turing Award . . . . . 21--21
Pierre Larouche Law and technology: The network
neutrality debate hits Europe . . . . . 22--24
LeAnne Coder and
Joshua L. Rosenbloom and
Ronald A. Ash and
Brandon R. Dupont Economic and business dimensions:
Increasing gender diversity in the IT
work force . . . . . . . . . . . . . . . 25--27
Martin Campbell-Kelly Historical reflections: The rise, fall,
and resurrection of software as a
service . . . . . . . . . . . . . . . . 28--30
Mark Guzdial Education: Teaching computing to
everyone . . . . . . . . . . . . . . . . 31--33
Ken Birman and
Fred B. Schneider Viewpoint: Program committee overload in
systems . . . . . . . . . . . . . . . . 34--37
Thomas Wadlow and
Vlad Gorelik Security in the browser . . . . . . . . 40--45
Michi Henning API design matters . . . . . . . . . . . 46--56
Eric Schrock Debugging AJAX in production . . . . . . 57--60
James Larus Spending Moore's dividend . . . . . . . 62--69
Edward A. Lee Computing needs time . . . . . . . . . . 70--79
Corrado Priami Algorithmic systems biology . . . . . . 80--88
Ross Anderson Technical perspective: A chilly sense of
security . . . . . . . . . . . . . . . . 90--90
J. Alex Halderman and
Seth D. Schoen and
Nadia Heninger and
William Clarkson and
William Paul and
Joseph A. Calandrino and
Ariel J. Feldman and
Jacob Appelbaum and
Edward W. Felten Lest we remember: cold-boot attacks on
encryption keys . . . . . . . . . . . . 91--98
Maurice Herlihy Technical perspective: Highly concurrent
data structures . . . . . . . . . . . . 99--99
William N. Scherer, III and
Doug Lea and
Michael L. Scott Scalable synchronous queues . . . . . . 100--111
Peter Winkler Last byte: Puzzled: Understanding
relationships among numbers . . . . . . 112--112
J. Drew Procaccino and
June M. Verner Software developers' views of end-users
and project success . . . . . . . . . . 113--116
Karlene C. Cousins and
Upkar Varshney Designing ubiquitous computing
environments to support work life
balance . . . . . . . . . . . . . . . . 117--123
Stuart D. Galup and
Ronald Dattero and
Jim J. Quan and
Sue Conger An overview of IT service management . . 124--127
Robert K. Plice and
Nigel P. Melville and
Oleg V. Pavlov Toward an information-compatible
anti-spam strategy . . . . . . . . . . . 128--130
James A. McCart and
Varol O. Kayhan and
Anol Bhattacherjee Cross-bidding in simultaneous online
auctions . . . . . . . . . . . . . . . . 131--134
Carol Xiaojuan Ou and
Choon Ling Sia To trust or to distrust, that is the
question: investigating the
trust-distrust paradox . . . . . . . . . 135--139
Gary W. Brock and
Denise J. McManus and
Joanne E. Hale Reflections today prevent failures
tomorrow . . . . . . . . . . . . . . . . 140--144
Michael Rebstock Technical opinion: Semantic ambiguity:
Babylon, Rosetta or beyond? . . . . . . 145--146
Elaine Weyuker ACM-W letter: ACM-W celebrates women in
computing . . . . . . . . . . . . . . . 5--5
CACM Staff Letters to the Editor: Share the threats 9--9
Tessa Lau and
Daniel Reed blog@CACM: Speech-activated user
interfaces and climbing Mt. Exascale . . 10--11
David Roman CACM online: Making that connection . . 12--12
Don Monroe News: Micromedicine to the rescue . . . 13--15
Leah Hoffmann News: Content control . . . . . . . . . 16--17
Gregory Goth News: Autonomous helicopters . . . . . . 18--20
Bob Violino News: Looking backward and forward . . . 21--21
Eugene H. Spafford Privacy and security: Answering the
wrong questions is no answer . . . . . . 22--24
Kevin Fu Inside risks: Reducing risks of
implantable medical devices . . . . . . 25--27
Peter J. Denning The profession of IT: Beyond
computational thinking . . . . . . . . . 28--30
Richard Stallman Viewpoint: Why `open source' misses the
point of free software . . . . . . . . . 31--33
George V. Neville-Neil Kode vicious: Obvious truths . . . . . . 34--35
Jon Elerath Hard-disk drives: the good, the bad, and
the ugly . . . . . . . . . . . . . . . . 38--45
Mike O'Dell Network front-end processors, yet again 46--50
George V. Neville-Neil Whither sockets? . . . . . . . . . . . . 51--55
Rakesh Agrawal and
Anastasia Ailamaki and
Philip A. Bernstein and
Eric A. Brewer and
Michael J. Carey and
Surajit Chaudhuri and
Anhai Doan and
Daniela Florescu and
Michael J. Franklin and
Hector Garcia-Molina and
Johannes Gehrke and
Le Gruenwald and
Laura M. Haas and
Alon Y. Halevy and
Joseph M. Hellerstein and
Yannis E. Ioannidis and
Hank F. Korth and
Donald Kossmann and
Samuel Madden and
Roger Magoulas and
Beng Chin Ooi and
Tim O'Reilly and
Raghu Ramakrishnan and
Sunita Sarawagi and
Michael Stonebraker and
Alexander S. Szalay and
Gerhard Weikum The Claremont Report on Database
Research . . . . . . . . . . . . . . . . 56--65
Kenneth L. Kraemer and
Jason Dedrick and
Prakul Sharma One laptop per child: vision vs. reality 66--73
M. Bernardine Dias and
Eric Brewer How computer science serves the
developing world . . . . . . . . . . . . 74--80
Andrew Myers Technical perspective: Reframing
security for the Web . . . . . . . . . . 82--82
Adam Barth and
Collin Jackson and
John C. Mitchell Securing frame communication in browsers 83--91
Norman P. Jouppi Technical perspective: Software and
hardware support for deterministic
replay of parallel programs . . . . . . 92--92
Derek R. Hower and
Pablo Montesinos and
Luis Ceze and
Mark D. Hill and
Josep Torrellas Two hardware-based approaches for
deterministic multiprocessor replay . . 93--100
Peter Winkler Puzzled: Solutions and sources . . . . . 103--103
Robert J. Sawyer Future tense: Webmind says hello . . . . 104--104
Jonghun Park and
Kwanho Kim Hyperlinking the work for
self-management of flexible workflows 113--117
Steven M. Thompson and
Matthew D. Dean Advancing information technology in
health care . . . . . . . . . . . . . . 118--121
Amar Gupta Deriving mutual benefits from offshore
outsourcing . . . . . . . . . . . . . . 122--126
Mark Lycett and
Chris Partridge The challenge of epistemic divergence in
IS development . . . . . . . . . . . . . 127--131
Nena Lim and
Anne Khoo Forensics of computers and handheld
devices: identical or fraternal twins? 132--135
Sudip Bhattacharjee and
Ram D. Gopal and
James R. Marsden and
Ramesh Sankaranarayanan Re-tuning the music industry: can they
re-attain business resonance? . . . . . 136--140
Dursun Delen and
Suliman Al-Hawamdeh A holistic framework for knowledge
discovery and management . . . . . . . . 141--145
T. P. Liang and
Andrew J. Czaplewski and
Gary Klein and
James J. Jiang Technical opinion: Leveraging
first-mover advantages in Internet-based
consumer services . . . . . . . . . . . 146--148
Moshe Y. Vardi Editor's letter: Open, closed, or clopen
access? . . . . . . . . . . . . . . . . 5--5
Scott E. Delman Publisher's corner: \em Communications'
annual report card . . . . . . . . . . . 6--7
CACM Staff Letters to the editor: Inspire with
introductory computer science . . . . . 8--9
Mark Guzdial and
Greg Linden and
Tessa Lau blog@CACM: Sharing ideas, writing apps,
and creating a professional Web presence 10--11
David Roman CACM online: Moving forward and backward 12--12
Alex Wright News: Contemporary approaches to fault
tolerance . . . . . . . . . . . . . . . 13--15
Kirk L. Kroeker News: Toward native Web execution . . . 16--17
Samuel Greengard News: Are we losing our ability to think
critically? . . . . . . . . . . . . . . 18--19
Karen A. Frenkel News: Liskov's creative joy . . . . . . 20--22
Alan Joch News: Master of connections . . . . . . 23--23
CACM Staff News: ACM award winners . . . . . . . . 25--25
Pamela Samuelson Legally speaking: The dead souls of the
Google book search settlement . . . . . 28--30
Mari Sako Technology strategy and management:
Globalization of knowledge-intensive
professional services . . . . . . . . . 31--33
Phillip G. Armour The business of software: The cliché
defense . . . . . . . . . . . . . . . . 34--36
Matthias Felleisen and
Shriram Krishnamurthi Viewpoint: Why computer science doesn't
matter . . . . . . . . . . . . . . . . . 37--40
Robert Dewar and
Owen Astrachan Point/counterpoint: CS education in the
U.S.: heading in the wrong direction? 41--45
Goetz Graefe The five-minute rule 20 years later (and
how flash memory changes the rules) . . 48--59
Jonathan M. Smith Fighting physics: a tough battle . . . . 60--65
Erol Gelenbe Steps toward self-aware networks . . . . 66--75
Rick Kazman and
Hong-Mei Chen The Metropolis Model: a new logic for
development of crowdsourced systems . . 76--84
Nilesh Dalvi and
Christopher Ré and
Dan Suciu Probabilistic databases: diamonds in the
dirt . . . . . . . . . . . . . . . . . . 86--94
Stuart Russell and
Lawrence Saul Technical perspective: The ultimate
pilot program . . . . . . . . . . . . . 96--96
Adam Coates and
Pieter Abbeel and
Andrew Y. Ng Apprenticeship learning for helicopter
control . . . . . . . . . . . . . . . . 97--105
Greg Morrisett Technical perspective: A compiler's
story . . . . . . . . . . . . . . . . . 106--106
Xavier Leroy Formal verification of a realistic
compiler . . . . . . . . . . . . . . . . 107--115
Leah Hoffmann Last byte: Q&A: Liskov on Liskov . . . . 120--ff
Benjamin Fabian and
Oliver Günther Virtual extension: Security challenges
of the EPCglobal network . . . . . . . . 121--125
James L. Parrish, Jr. and
James F. Courtney, Jr. Virtual extension: Churchman's inquirers
as design templates for knowledge
management systems . . . . . . . . . . . 126--129
Arvind Malhotra and
Claudia Kubowicz Malhotra Virtual extension: A relevancy-based
services view for driving adoption of
wireless Web services in the U.S. . . . 130--134
Johann Rost and
Robert L. Glass Virtual extension: The impact of
subversive stakeholders on software
projects . . . . . . . . . . . . . . . . 135--138
Sandip C. Patel and
Ganesh D. Bhatt and
James H. Graham Virtual extension: Improving the cyber
security of SCADA communication networks 139--142
Anat Hovav and
Ciprian Popoviciu Virtual extension: Adoption leadership
and early planners: Comcast's IP upgrade
strategy . . . . . . . . . . . . . . . . 143--146
Richard W. Woolridge and
David P. Hale and
Joanne E. Hale and
R. Shane Sharpe Virtual extension: Software project
scope alignment: an outcome-based
approach . . . . . . . . . . . . . . . . 147--152
Robert M. Davison and
Maris G. Martinsons and
Henry W. H. Lo and
Yuan Li Virtual extension: Technical opinion:
The ethics of IT professionals in China 153--155
Steve Bourne and
Bryan Cantrill \em Communications and the practitioner 5--5
Scott E. Delman Responding to the blogosphere . . . . . 7--7
CACM Staff Why invention and innovation diverge . . 8--9
CACM Staff In the virtual extension . . . . . . . . 10--10
Jeannette M. Wing and
Daniel Reed and
Mark Guzdial An ICT research agenda, HPC and
innovation, and why only the developed
world lacks women in computing . . . . . 12--13
David Roman The new searchers . . . . . . . . . . . 14--14
Don Monroe Just for you . . . . . . . . . . . . . . 15--17
Kirk L. Kroeker Face recognition breakthrough . . . . . 18--19
Tom Geller IT drives policy---and vice versa . . . 20--20
Leah Hoffmann Learning through games . . . . . . . . . 21--22
Gregory Goth U.S. unveils cybersecurity plan . . . . 23--23
Tim Draper Economic and business dimensions:
Entrepreneurship during a slump . . . . 24--26
Wanda Dann and
Stephen Cooper Education Alice 3: concrete to abstract 27--29
Brian Snow and
Clinton Brooks Privacy and security: An ethics code for
U.S. intelligence officers . . . . . . . 30--32
Lance Fortnow Viewpoint: Time for computer science to
grow up . . . . . . . . . . . . . . . . 33--35
Adam Jacobs The pathologies of big data . . . . . . 36--44
Charles Reis and
Adam Barth and
Carlos Pizano Browser security: lessons from Google
Chrome . . . . . . . . . . . . . . . . . 45--49
Mache Creeger CTO roundtable: cloud computing . . . . 50--56
Kristen Shinohara and
Josh Tenenberg A blind person's interactions with
technology . . . . . . . . . . . . . . . 58--66
Ralph Morelli and
Allen Tucker and
Norman Danner and
Trishan R. De Lanerolle and
Heidi J. C. Ellis and
Ozgur Izmirli and
Danny Krizanc and
Gary Parker Revitalizing computing education through
free and open source software for
humanity . . . . . . . . . . . . . . . . 67--75
Sharad Malik and
Lintao Zhang Boolean satisfiability from theoretical
hardness to practical success . . . . . 76--82
James Herbsleb Technical perspective: Maintaining
quality in the face of distributed
development . . . . . . . . . . . . . . 84--84
Christian Bird and
Nachiappan Nagappan and
Premkumar Devanbu and
Harald Gall and
Brendan Murphy Does distributed development affect
software quality?: an empirical case
study of Windows Vista . . . . . . . . . 85--93
Sachin S. Sapatnekar Technical perspective: Where the chips
may fall . . . . . . . . . . . . . . . . 94--94
Michael Orshansky and
Wei-Shen Wang Statistical analysis of circuit timing
using majorization . . . . . . . . . . . 95--100
Peter Winkler Puzzled: Probability and intuition . . . 104--104
Hoon S. Cha and
David E. Pingry and
Matt E. Thatcher What determines IT spending priorities? 105--110
Andrew Lim and
Hong Ma and
Qi Wen and
Zhou Xu and
Brenda Cheang Distinguishing citation quality for
journal impact assessment . . . . . . . 111--116
Thomas Gerace and
Huseyin Cavusoglu The critical elements of the patch
management process . . . . . . . . . . . 117--121
Rajiv Kohli and
Nigel P. Melville Learning to build an IT innovation
platform . . . . . . . . . . . . . . . . 122--126
Eoin Ó Conchúir and
Pär J. Ågerfalk and
Helena H. Olsson and
Brian Fitzgerald Global software development: where are
the benefits? . . . . . . . . . . . . . 127--131
Rohit Kaul and
Yeogirl Yun and
Seong-Gon Kim Ranking billions of Web pages using
diodes . . . . . . . . . . . . . . . . . 132--136
Roli Varma Attracting Native Americans to computing 137--140
Indranil Bose and
Alvin Chung Man Leung Technical opinion: What drives the
adoption of antiphishing measures by
Hong Kong banks? . . . . . . . . . . . . 141--143
Moshe Y. Vardi The financial meltdown and computing . . 5--5
CACM Staff Computer Science does matter . . . . . . 8--9
CACM Staff In the Virtual Extension . . . . . . . . 10--10
Michael Stonebraker and
Jason Hong Saying good-bye to DBMSs, designing
effective interfaces . . . . . . . . . . 12--13
David Roman What you read on your summer vacation 14--14
Gregory Goth Entering a parallel universe . . . . . . 15--17
Kirk L. Kroeker Medical nanobots . . . . . . . . . . . . 18--19
Samuel Greengard Facing an age-old problem . . . . . . . 20--22
Karen A. Frenkel Computer Science meets environmental
science . . . . . . . . . . . . . . . . 23--23
Paul M. Schwartz Law and technology: Keeping track of
telecommunications surveillance . . . . 24--26
Peter J. Denning and
Paul S. Rosenbloom The profession of IT: Computing: the
fourth great domain of science . . . . . 27--29
Mark Cleverley Emerging markets: How ICT advances might
help developing nations . . . . . . . . 30--32
Cameron Wilson and
Peter Harsha IT policy: The long road to Computer
Science education reform . . . . . . . . 33--35
Anwar Ghuloum Viewpoint: Face the inevitable, embrace
parallelism . . . . . . . . . . . . . . 36--38
David P. Anderson Interview: An interview with Maurice
Wilkes . . . . . . . . . . . . . . . . . 39--42
Bruce Johnson Reveling in constraints . . . . . . . . 44--48
Iosif Legrand and
Ramiro Voicu and
Catalin Cirstoiu and
Costin Grigoras and
Latchezar Betev and
Alexandru Costan Monitoring and control of large systems
with MonALISA . . . . . . . . . . . . . 49--55
Bryan O'Sullivan Making sense of revision-control systems 56--62
Varun Bhagwan and
Tyrone Grandison and
Daniel Gruhl Sound index: charts for the people, by
the people . . . . . . . . . . . . . . . 64--70
James Boyle What intellectual property law should
learn from software . . . . . . . . . . 71--76
Lance Fortnow The status of the P versus NP problem 78--86
Katherine Yelick Technical perspective: Abstraction for
parallelism . . . . . . . . . . . . . . 88--88
Milind Kulkarni and
Keshav Pingali and
Bruce Walter and
Ganesh Ramanarayanan and
Kavita Bala and
L. Paul Chew Optimistic parallelism requires
abstractions . . . . . . . . . . . . . . 89--97
Marc Dacier Technical perspective: They do click,
don't they? . . . . . . . . . . . . . . 98--98
Chris Kanich and
Christian Kreibich and
Kirill Levchenko and
Brandon Enright and
Geoffrey M. Voelker and
Vern Paxson and
Stefan Savage Spamalytics: an empirical analysis of
spam marketing conversion . . . . . . . 99--107
Peter Winkler Puzzled: Solutions and sources . . . . . 110--110
Jaron Lanier Future tense: Confusions of the hive
mind . . . . . . . . . . . . . . . . . . 112--ff
Achita (Mi) Muthitacharoen and
Khawaja A. Saeed Examining user involvement in continuous
software development: (a case of error
reporting system) . . . . . . . . . . . 113--117
Alexander Pasko and
Valery Adzhiev Constructive function-based modeling in
multilevel education . . . . . . . . . . 118--122
Hongwei Zhu and
Stuart E. Madnick One size does not fit all: legal
protection for non-copyrightable data 123--128
Eleanor T. Loiacono and
Nicholas C. Romano, Jr. and
Scott McCoy The state of corporate website
accessibility . . . . . . . . . . . . . 128--132
Robert Willison and
Mikko Siponen Overcoming the insider: reducing
employee computer crime through
Situational Crime Prevention . . . . . . 133--137
Mu Xia and
Yun Huang and
Wenjing Duan and
Andrew B. Whinston Ballot box communication in online
communities . . . . . . . . . . . . . . 138--142
Dinesh Batra Modified agile practices for outsourced
software projects . . . . . . . . . . . 143--148
James Katz and
Ronald E. Rice Technical opinion: Falling into the net:
Main Street America playing games and
making friends online . . . . . . . . . 149--150
Wendy Hall President's letter: ACM Europe . . . . . 5--5
CACM Staff Letters to the editor: Time and
computing . . . . . . . . . . . . . . . 6--6
CACM Staff In the Virtual Extension . . . . . . . . 7--7
Greg Linden and
Michael Conover and
Judy Robertson blog@CACM: The Netflix prize, computer
science outreach, and Japanese mobile
phones . . . . . . . . . . . . . . . . . 8--9
CACM Staff CACM online: Following the leaders . . . 10--10
David Lindley News: Managing data . . . . . . . . . . 11--13
Alan Joch News: Debating net neutrality . . . . . 14--15
Tom Geller News: Shaping the future . . . . . . . . 16--18
Phillip G. Armour The business of software: Contagious
craziness, spreading sanity . . . . . . 19--20
Martin Campbell-Kelly Historical reflections: Computing in the
depression era . . . . . . . . . . . . . 21--22
Phillip Porras Inside risks: Reflections on Conficker 23--24
Michael Cusumano Technology strategy and management:
Dealing with the venture capital crisis 25--27
George V. Neville-Neil Kode Vicious: Kode reviews 101 . . . . . 28--29
C. A. R. Hoare Viewpoint: Retrospective: an axiomatic
basis for computer programming . . . . . 30--32
James C. Phillips and
John E. Stone Probing biomolecular machines with
graphics processors . . . . . . . . . . 34--41
Matthew T. Dougherty and
Michael J. Folk and
Erez Zadok and
Herbert J. Bernstein and
Frances C. Bernstein and
Kevin W. Eliceiri and
Werner Benger and
Christoph Best Unifying biological image formats with
HDF5 . . . . . . . . . . . . . . . . . . 42--47
CACM Staff A conversation with David E. Shaw . . . 48--54
Krste Asanovic and
Rastislav Bodik and
James Demmel and
Tony Keaveny and
Kurt Keutzer and
John Kubiatowicz and
Nelson Morgan and
David Patterson and
Koushik Sen and
John Wawrzynek and
David Wessel and
Katherine Yelick A view of the parallel computing
landscape . . . . . . . . . . . . . . . 56--67
Jane Cleland-Huang and
Horatiu Dumitru and
Chuan Duan and
Carlos Castro-Herrera Automated support for managing feature
requests in open forums . . . . . . . . 68--74
Daniel A. Spielman and
Shang-Hua Teng Smoothed analysis: an attempt to explain
the behavior of algorithms in practice 76--84
Surajit Chaudhuri Technical perspective: Relational query
optimization: data management meets
statistical estimation . . . . . . . . . 86--86
Kevin Beyer and
Rainer Gemulla and
Peter J. Haas and
Berthold Reinwald and
Yannis Sismanis Distinct-value synopses for multiset
operations . . . . . . . . . . . . . . . 87--95
Johannes Gehrke Technical perspective: Data stream
processing: when you only get one look 96--96
Graham Cormode and
Marios Hadjieleftheriou Finding the frequent items in streams of
data . . . . . . . . . . . . . . . . . . 97--105
Leah Hoffmann Q&A: The networker . . . . . . . . . . . 112--ff
Richard J. Goeke and
Robert H. Faley Technical opinion: Do SAP successes
outperform themselves and their
competitors? . . . . . . . . . . . . . . 113--117
Girish H. Subramanian and
Gary Klein and
James J. Jiang and
Chien-Lung Chan Balancing four factors in system
development projects . . . . . . . . . . 118--121
Sridhar R. Papagari Sangareddy and
Sanjeev Jha and
Chen Ye and
Kevin C. Desouza Attaining superior complaint resolution 122--126
Vivienne Waller and
Robert B. Johnston Making ubiquitous computing available 127--130
Donal Flynn and
Gary Pan and
Mark Keil and
Magnus Mähring De-escalating IT projects: the DMM model 131--134
Francisco Casacuberta and
Jorge Civera and
Elsa Cubel and
Antonio L. Lagarda and
Guy Lapalme and
Elliott Macklovitch and
Enrique Vidal Human interaction for high-quality
machine translation . . . . . . . . . . 135--138
Jacques Savoy and
Ljiljana Dolamic How effective is Google's translation
service in search? . . . . . . . . . . . 139--143
Nan Hu and
Jie Zhang and
Paul A. Pavlou Overcoming the J-shaped distribution of
product reviews . . . . . . . . . . . . 144--147
Moshe Y. Vardi Editor's letter: Is the image crisis
over? . . . . . . . . . . . . . . . . . 5--5
CACM Staff Letters to the editor: Pay for editorial
independence . . . . . . . . . . . . . . 6--7
CACM Staff In the virtual extension . . . . . . . . 9--9
Ramana Rao and
Greg Linden blog@CACM: Computer science curriculum,
deceptive advertising . . . . . . . . . 10--11
David Roman CACM online: Internet addiction: it's
spreading, but is it real? . . . . . . . 12--12
Gary Anthes News: Deep data dives discover natural
laws . . . . . . . . . . . . . . . . . . 13--14
Kirk L. Kroeker News: Electronic paper's next chapter 15--17
Leah Hoffmann News: Implementing electronic medical
records . . . . . . . . . . . . . . . . 18--20
Gregory Goth News: Exploring new frontiers . . . . . 21--23
Butler Lampson Privacy and security: Usable security:
how to get it . . . . . . . . . . . . . 25--27
Pamela Samuelson Legally speaking: Are business methods
patentable? . . . . . . . . . . . . . . 28--30
Shane Greenstein Economic and business dimensions: The
broadband price is not right . . . . . . 31--33
Jonathan M. Smith Viewpoint: On public service and
computer science . . . . . . . . . . . . 34--35
Bob Cramblitt Interview: An interview with Ping Fu . . 36--39
Whitfield Diffie and
Susan Landau Communications surveillance: privacy and
security at risk . . . . . . . . . . . . 42--47
Katie Shilton Four billion little brothers?: privacy,
mobile phones, and ubiquitous data
collection . . . . . . . . . . . . . . . 48--53
Paul Stachour and
David Collier-Brown You don't know jack about software
maintenance . . . . . . . . . . . . . . 54--58
Mitchel Resnick and
John Maloney and
Andrés Monroy-Hernández and
Natalie Rusk and
Evelyn Eastmond and
Karen Brennan and
Amon Millner and
Eric Rosenbaum and
Jay Silver and
Brian Silverman and
Yasmin Kafai Scratch: programming for all . . . . . . 60--67
Tridib Bandyopadhyay and
Vijay S. Mookerjee and
Ram C. Rao Why IT managers don't go for
cyber-insurance products . . . . . . . . 68--73
Edmund M. Clarke and
E. Allen Emerson and
Joseph Sifakis Model checking: algorithmic verification
and debugging . . . . . . . . . . . . . 74--84
Peter Druschel Technical perspective: Narrowing the
semantic gap in distributed programming 86--86
Boon Thau Loo and
Tyson Condie and
Minos Garofalakis and
David E. Gay and
Joseph M. Hellerstein and
Petros Maniatis and
Raghu Ramakrishnan and
Timothy Roscoe and
Ion Stoica Declarative networking . . . . . . . . . 87--95
John Shawe-Taylor Technical perspective: Machine learning
for complex predictions . . . . . . . . 96--96
Thorsten Joachims and
Thomas Hofmann and
Yisong Yue and
Chun-Nam Yu Predicting structured objects with
support vector machines . . . . . . . . 97--104
Peter Winkler Last byte: Puzzled: Covering the plane 112--112
Lara Khansa and
Divakaran Liginlal Quantifying the benefits of investing in
information security . . . . . . . . . . 113--117
Wei-Lun Chang and
Soe-Tsyr Yuan and
Eldon Y. Li iCare home portal: an extended model of
quality aging e-services . . . . . . . . 118--124
Aakash Taneja and
Anil Singh and
M. K. Raja Computing journals and their emerging
roles in knowledge exchange . . . . . . 125--131
Rudy Hirschheim Offshoring and the new world order . . . 132--135
C. Bolchini and
C. A. Curino and
G. Orsi and
E. Quintarelli and
R. Rossato and
F. A. Schreiber and
L. Tanca And what can context do for data? . . . 136--140
Frank McCown and
Catherine C. Marshall and
Michael L. Nelson Why Web sites are lost (and how they're
sometimes found) . . . . . . . . . . . . 141--145
Ralph Westfall If your pearls of wisdom fall in a
forest\ldots . . . . . . . . . . . . . . 146--149
Frank Nielsen Technical opinion: Steering
self-learning distance algorithms . . . 150--152
Chris Stephenson CSTA letter: It is a pivotal time for
K--12 computer science . . . . . . . . . 5--5
CACM Staff Letters to the editor: In CS education,
educate the educators first . . . . . . 6--7
Jeannette M. Wing and
Mark Guzdial blog@CACM: CS woes: deadline-driven
research, academic inequality . . . . . 8--9
CACM Staff In the virtual extension . . . . . . . . 11--11
David Roman CACM online: Crowdsourcing and the
question of expertise . . . . . . . . . 12--12
Gary Anthes News: Blueprints for self-assembly . . . 13--15
Alex Wright News: Ready for a Web OS? . . . . . . . 16--17
Samuel Greengard News: Making automation work . . . . . . 18--19
Leah Hoffmann News: Problem solvers . . . . . . . . . 20--20
Richard E. Ladner Viewpoints: Broadening participation:
Opening remarks . . . . . . . . . . . . 22--24
Orna Berry and
Yigal Grayeff Viewpoints: Emerging markets Israel's
technology industry as an economic
growth engine . . . . . . . . . . . . . 25--27
Peter J. Denning and
Peter A. Freeman Viewpoints: The profession of IT:
Computing's paradigm . . . . . . . . . . 28--30
George V. Neville-Neil Viewpoints: Kode Vicious: Broken builds 31--32
Savas Parastatidis and
Evelyne Viegas and
Tony Hey Viewpoint: A 'smart' cyberinfrastructure
for research . . . . . . . . . . . . . . 33--37
Alan Ramos and
Weina Scott and
William Scott and
Doug Lloyd and
Katherine O'Leary and
Jim Waldo Practice: A threat analysis of RFID
passports . . . . . . . . . . . . . . . 38--42
Paul Vixie Practice: What DNS is not . . . . . . . 43--47
Alexandra Fedorova and
Juan Carlos Saez and
Daniel Shelepov and
Manuel Prieto Practice: Maximizing power efficiency
with asymmetric multicore systems . . . 48--57
Josep Torrellas and
Luis Ceze and
James Tuck and
Calin Cascaval and
Pablo Montesinos and
Wonsun Ahn and
Milos Prvulovic The Bulk Multicore architecture for
improved programmability . . . . . . . . 58--65
Michael Zyda Computer science in the conceptual age 66--72
Kelvin Sung Computer games and traditional CS
courses . . . . . . . . . . . . . . . . 74--78
James A. Landay Technical perspective: Design tools for
the rest of us . . . . . . . . . . . . . 80--80
Yuki Igarashi and
Takeo Igarashi Designing plush toys with a computer . . 81--88
Pat Hanrahan Technical perspective: A graphical sense
of touch . . . . . . . . . . . . . . . . 89--89
Shahram Izadi and
Steve Hodges and
Alex Butler and
Darren West and
Alban Rrustemi and
Mike Molloy and
William Buxton ThinSight: a thin form-factor
interactive surface technology . . . . . 90--98
Peter Winkler Last byte: Puzzled: Solutions and
sources . . . . . . . . . . . . . . . . 111--111
Joe Haldeman Last byte: Future tense: Mightier than
the pen . . . . . . . . . . . . . . . . 112--112
Niki Panteli and
Robert Tucker Power and trust in global virtual teams 113--115
Sun Sun Lim and
Hichang Cho and
Milagros Rivera Sanchez Online privacy, government surveillance
and national ID cards . . . . . . . . . 116--120
Ganesh Vaidyanathan and
Steven Mautone Security in dynamic Web Content
Management Systems applications . . . . 121--125
Lou Hafer and
Arthur E. Kirkpatrick Assessing open source software as a
scholarly contribution . . . . . . . . . 126--129
Narciso Cerpa and
June M. Verner Why did your project fail? . . . . . . . 130--134
Karen Renaud and
Antonella De Angeli Visual passwords: cure-all or snake-oil? 135--140
Nir Kshetri Positive externality, increasing
returns, and the rise in cybercrimes . . 141--144
Mikko Siponen and
M. Adam Mahmood and
Seppo Pahnila Technical opinion: Are employees putting
your company at risk by not following
information security policies? . . . . . 145--147