Volume 50,
Number 1,
January 2007
The business of software
Staying connected
Viewpoint
Hot links
- Top 10 Downloads from ACM's Digital Library.
95-96
Inside risks
Volume 50,
Number 2,
February 2007
- Diane Crawford:
Editorial pointers.
5
- News track.
9-10
- Forum.
11-13
- Student de-charter notice.
14
Technology strategy and management
Legally speaking
Articles
- Joshua Goodman, Gordon V. Cormack, David Heckerman:
Spam and the ongoing battle for the inbox.
24-33
- Rakesh Agrawal, Tyrone Grandison, Christopher M. Johnson, Jerry Kiernan:
Enabling the 21st century health care information technology revolution.
34-42
- Grant A. Jacoby, Luqi:
Intranet model and metrics.
43-50
- Bonnie Glassberg, Jeffrey W. Merhout:
: Electronic markets hypothesis redux: where are we now?
51-55
- Galen A. Grimes:
Compliance with the CAN-SPAM Act of 2003.
56-62
- Ranieri Baraglia, Fabrizio Silvestri:
Dynamic personalization of web sites without user intervention.
63-67
- Joon Koh, Young-Gul Kim, Brian Butler, Gee-Woo Bock:
Encouraging participation in virtual communities.
68-73
- Dongsong Zhang:
Web content adaptation for mobile handheld devices.
75-79
- SIGs Announce Candidates for Election.
80
- Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
An integrated approach to federated identity and privilege management in open systems.
81-87
- Benjamin B. M. Shao, Julie Smith David:
The impact of offshore outsourcing on IT workers in developed countries.
89-94
Technical opinion
Hot links
- Top 10 downloads from ACM's digital library.
99-100
Inside risks
Volume 50,
Number 3,
March 2007
Emergency response information systems:
emerging trends and technologies Editorial pointers
News track
Forum
ACM A.M. Turing Award nominations solicited
- ACM A.M. Turing Award nominations solicited.
14
The business of software
Viewpoint
SIGs announce candidates for election
- SIGs announce candidates for election.
25
ACM fellows
Emergency response information systems:
emerging trends and technologies
- Bartel Van de Walle, Murray Turoff:
Introduction.
29-31
- Liz Carver, Murray Turoff:
Human-computer interaction: the human and computer as a team in emergency management information systems.
33-38
- Simon French, Murray Turoff:
Decision support systems.
39-40
- Frank Fiedrich, Paul Burghardt:
Agent-based systems for disaster management.
41-42
- David Mendonça, Theresa Jefferson, John R. Harrald:
Collaborative adhocracies and mix-and-match technologies in emergency management.
44-49
- B. S. Manoj, Alexandra Hubenko Baker:
Communication challenges in emergency response.
51-53
- Leysia Palen, Starr Roxanne Hiltz, Sophia B. Liu:
Online forums supporting grassroots participation in emergency preparedness and response.
54-58
- Art Botterell, Ronja Addams-Moring:
Public warning in the networked age: open standards to the rescue?
59-60
- Paul Currion, Chamindra de Silva, Bartel Van de Walle:
Open source software for disaster management.
61-65
Hot links
- Top 10 downloads from ACM's Digital Library.
101-102
Technical opinion
- Nigel Ward:
The (un)predictability of computer science graduate school admissions.
104-106
Inside risks
Volume 50,
Number 4,
April 2007
Editorial pointers
Forum
News track
Digital village
- Hal Berghel:
Hiding data, forensics, and anti-forensics.
15-20
The profession of IT
ACM honors distinguished members
- ACM honors distinguished members.
26-27
Call for nominations for advanced member grades in ACM
- Call for nominations for advanced member grades in ACM.
28-29
- Proposal to dissolve SIGAPL.
29
Viewpoint
- Jenova Chen:
Flow in games (and everything else).
31-34
- Jeff Kramer:
Is abstraction the key to computing?
36-42
- Dorit Nevo, Michael R. Wade:
How to avoid disappointment by design.
43-48
- Levent V. Orman:
Consumer support systems.
49-54
- Stefano Ceri, Maristella Matera, Francesca Rizzo, Vera Demaldé:
Designing data-intensive web applications for content accessibility using web marts.
55-61
- Ido Green, Tzvi Raz, Moshe Zviran:
Analysis of active intrusion prevention data for predicting hostile activity in computer networks.
63-68
- Sachidanandam Sakthivel:
Managing risk in offshore systems development.
69-75
- Jeffrey A. Stone, Elinor M. Madigan:
Inconsistencies and disconnects.
76-79
- Dianne Hall, David B. Paradice:
Investigating value-based decision bias and mediation: do you do as you think?
81-85
- Michael Chau, Xiao Fang, Olivia R. Liu Sheng:
What are people searching on government web sites?
87-92
Hot links
- Top 10 downloads from ACM's digital library.
93-94
Technical opinion
Inside risks
Volume 50,
Number 5,
May 2007
ACM at sixty:
a look back in time Editorial pointers
Forum
President's letter
News track
Staying connected
Viewpoint
Practical programmer
- Robert L. Glass:
One man's quest for the state of software engineering's practice.
21-23
ACM at 60:
a look back in time
Technical opinion
Hot links
- Top 10 downloads from ACM's digital library.
124-125
Inside risks
Volume 50,
Number 6,
June 2007
Editorial pointers
Forum
News track
Legally speaking
The business of software
Viewpoint
- Ben Shneiderman:
Web science: a provocative invitation to computer science.
25-27
- Eric van Heck, Peter Vervest:
Smart business networks: how the network wins.
28-37
- Sasha Dekleva, J. P. Shim, Upkar Varshney, Geoffrey Knoerzer:
Evolution and emerging issues in mobile wireless networks.
38-43
- Amy Friedlander, Allison Mankin, W. Douglas Maughan, Stephen D. Crocker:
DNSSEC: a protocol toward securing the internet infrastructure.
44-50
- Ioanna D. Constantiou, Jan Damsgaard, Lars Andreas Knutsen:
The four incremental steps toward advanced mobile service adoption.
51-55
- Mark J. Cotteleer, Christopher A. Cotteleer, Andrew Prochnow:
Cutting checks: challenges and choices in B2B e-payments.
56-61
- Anand Jeyaraj, Vicki L. Sauter:
An empirical investigation of the effectiveness of systems modeling and verification tools.
62-67
- David E. Avison, Terry Young:
Time to rethink health care and ICT?
69-74
- Kary Främling, Timo Ala-Risku, Mikko Kärkkäinen, Jan Holmström:
Design patterns for managing product life cycle information.
75-79
- Jie Ren, Richard N. Taylor:
Automatic and versatile publications ranking for research institutions and scholars.
81-85
Hot links
- Top 10 downloads from ACM's digital library.
86-87
Technical opinion
Inside risks
Volume 50,
Number 7,
July 2007
Editorial pointers
News track
The profession of IT
Technology strategy and management
Viewpoint
Creating a science of games
- Merrilea J. Mayo:
Games for science and engineering education.
30-35
- Ralph E. Chatham:
Games for training.
36-43
- Henry Kelly, Kay Howell, Eitan Glinert, Loring Holding, Chris Swain, Adam Burrowbridge, Michelle Roper:
How to build serious games.
44-49
- Randy Pausch, Donald Marinelli:
Carnegie Mellon's entertainment technology center: combining the left and right brain.
50-57
- Caitlin Kelleher, Randy Pausch:
Using storytelling to motivate programming.
58-64
- Nikunj Raghuvanshi, Christian Lauterbach, Anish Chandak, Dinesh Manocha, Ming C. Lin:
Real-time sound synthesis and propagation for games.
66-73
- Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen:
Evaluating the efficacy of a terrorism question/answer system.
74-80
- In Lee:
An architecture for a next-generation holistic e-recruiting system.
81-85
- Harris Wu, Michael D. Gordon:
Collaborative structuring: organizing document repositories effectively and efficiently.
86-91
- Fred Niederman, Richard G. Mathieu, Roger Morley, Ik-Whan Kwon:
Examining RFID applications in supply chain management.
92-101
- Someswar Kesh, Pauline Ratnasingam:
A knowledge architecture for IT security.
103-108
- Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu:
A roadmap for comprehensive online privacy policy management.
109-116
- Waymond Rodgers, Solomon Negash:
The effects of web-based technologies on knowledge transfer.
117-122
Technical opinion
Hot Links
- Top 10 downloads from ACM's digital library.
135
Inside risks
Volume 50,
Number 8,
August 2007
Editorial pointers
News track
Forum
ACM call for nominations
- Call for nominations for ACM general election.
14
Digital village
- Hal Berghel:
Better-than-nothing security practices.
15-18
Viewpoint
Practical programmer
- Robert L. Glass:
A deja-vu look at software engineering researchers who care about practice.
21-23
- Alfred Kobsa:
Privacy-enhanced personalization.
24-33
- Ahmed Elfatatry:
Dealing with change: components versus services.
35-39
- Matt E. Thatcher, David E. Pingry:
Modeling the IT value paradox.
41-45
- John Erickson, Keng Siau:
Theoretical and practical complexity of modeling methods.
46-51
- Jesper Simonsen:
Involving top management in IT projects.
52-58
- Larry J. LeBlanc, Michael R. Galbreth:
Designing large-scale supply chain linear programs in spreadsheets.
59-64
- Yun Wan, Satya Menon, Arkalgud Ramaprasad:
A classification of product comparison agents.
65-71
- Janice C. Sipior, Burke T. Ward:
Unintended invitation: organizational wi-fi use by external roaming users.
72-77
- T. H. Tse, Francis C. M. Lau, W. K. Chan, Peter C. K. Liu, Colin K. F. Luk:
Testing object-oriented industrial software without precise oracles or results.
78-85
- Sagnika Sen, Haluk Demirkan, Michael Goul:
Dynamic decision support through instantiation of UEML representations.
87-93
- W. Raghupathi:
Corporate governance of IT: a framework for development.
94-99
Hot Links
- Top 10 downloads from ACM's digital library.
100
Technical opinion
Inside risks
Volume 50,
Number 9,
September 2007
Editorial pointers
News track
Forum
Viewpoint
Online first
Staying connected
The business of software
Beyond silicon:
new computing paradigms
- Warren Robinett, Gregory S. Snider, Philip Kuekes, R. Stanley Williams:
Computing with a trillion crummy components.
35-39
- Jing Kong:
Computation with carbon nanotube devices.
40-42
- Robert Stadler:
Molecular, chemical, and organic computing.
43-45
- John H. Reif, Thomas H. LaBean:
Autonomous programmable biomolecular devices using self-assembled DNA nanostructures.
46-53
- Dave Bacon, Debbie Leung:
Toward a world with quantum computers.
55-59
- Hossin Abdeldayem, Donald O. Frazier:
Optical computing: need and challenge.
60-62
- David W. M. Marr, Toshinori Munakata:
Micro/nanofluidic computing.
64-68
- Masashi Aono, Masahiko Hara, Kazuyuki Aihara:
Amoeba-based neurocomputing with chaotic dynamics.
69-72
- Ami Marowka:
Parallel computing on any desktop.
74-78
- George Lepouras, Costas Vassilakis, Constantin Halatsis, Panagiotis Georgiadis:
Domain expert user development: the smartgov approach.
79-83
- Joseph S. Valacich, D. Veena Parboteeah, John D. Wells:
The online consumer's hierarchy of needs.
84-90
- Susan A. Brown, Norman L. Chervany, Bryan A. Reinicke:
What matters when introducing new information technology.
91-96
- Ashley Braganza, Arnoud Franken:
SOX, compliance, and power relationships.
97-102
- Irene Pollach:
What's wrong with online privacy policies?
103-108
Technical opinion
Hot Links
- Top 10 downloads from ACM's digital library.
118
Inside risks
Volume 50,
Number 10,
October 2007
Editorial pointers
News track
Forum
Technology strategy and management
- Michael A. Cusumano:
Extreme programming compared with Microsoft-style iterative development.
15-18
Legally speaking
Technical opinion
Viewpoint
- Sebastian Thrun:
Why we compete in DARPA's Urban Challenge autonomous robot race.
29-31
International perspectives
- Erran Carmel, Pamela Abbott:
Why 'nearshore' means that distance matters.
40-46
- Erran Carmel, Pamela Abbott:
Nearshore locations in three principal global clusters and their respective attributes.
45
- Matt E. Thatcher, David E. Pingry:
[Software patents] The good, the bad, and the messy.
47-52
- Gregoris Mentzas, Kostas Kafentzis, Panos Georgolios:
Knowledge services on the semantic web.
53-58
- U. N. Umesh, Leonard M. Jessup, Minh Q. Huynh:
[Getting ideas to market] Current issues faced by technology entrepreneurs.
60-66
- Asli Yagmur Akbulut, Clayton A. Looney:
Inspiring students to pursue computing degrees.
67-71
- Prabhudev Konana, Gautam Ray:
Physical product reengineering with embedded information technology.
72-78
- Mike P. Papazoglou, Willem-Jan van den Heuvel:
Business process development life cycle methodology.
79-85
- William L. Kuechler Jr.:
Business applications of unstructured text.
86-93
- Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer:
Social phishing.
94-100
- Wade H. Baker, Loren Paul Rees, Peter S. Tippett:
Necessary measures: metric-driven information security risk assessment and decision making.
101-106
- Richard J. Goeke, Robert H. Faley:
Leveraging the flexibility of your data warehouse.
107-111
- John D'Arcy, Anat Hovav:
Deterring internal information systems misuse.
113-117
Hot links
- Top 10 downloads from ACM's digital library.
118
Inside risks
Volume 50,
Number 11,
November 2007
Editorial pointers
News track
The profession of IT
Practical programmer
- Robert L. Glass:
A research project with important practitioner-oriented findings.
15-16
President's letter
Viewpoint
Experimental computer science
- Catherine C. McGeoch:
Experimental algorithmics.
27-31
- Victor R. Basili, Marvin V. Zelkowitz:
Empirical studies to build a science of computer science.
33-37
- Larry L. Peterson, Vivek S. Pai:
Experience-driven experimental systems research.
38-44
- Alan Jay Smith:
Workloads (creation and use).
45-50
- Ellen M. Voorhees:
TREC: Continuing information retrieval's tradition of experimentation.
51-54
- Larry D. Jackel, Douglas Hackett, Eric Krotkov, Michael Perschbacher, James Pippine, Charles Sullivan:
How DARPA structures its robotics programs to improve locomotion and navigation.
55-59
- Oded Nov:
What motivates Wikipedians?
60-64
- Paul P. Tallon, Richard Scannell:
Information life cycle management.
65-69
- Neil Foshay, Avinandan Mukherjee, Andrew Taylor:
Does data warehouse end-user metadata add value?
70-77
- Chris Sauer, Andrew Gemino, Blaize Horner Reich:
The impact of size and volatility on IT project performance.
79-84
- Dominic M. Thomas, Robert P. Bostrom, Marianne Gouge:
Making knowledge work in virtual teams.
85-90
- Hee-Woong Kim, Yunjie Xu:
Drivers of price Premium in e-markets.
91-95
Hot links
- Top 10 downloads from ACM's digital library.
97
Inside risks
Volume 50,
Number 12,
December 2007
Editorial pointers
News track
Forum
Digital village
Viewpoint
Articles
- Ben Shneiderman:
Creativity support tools: accelerating discovery and innovation.
20-32
- Dongwon Lee, Jaewoo Kang, Prasenjit Mitra, C. Lee Giles, Byung-Won On:
Are your citations clean?
33-38
- Nominees for elections and report of the ACM nominating committee.
39
- Robert J. Aalberts, Percy Poon, Paul D. Thistle:
Trespass, nuisance, and spam: 11th century common law meets the internet.
40-45
- Antonio M. Lopez Jr., Frederick G. Lopez, Robert W. Lent, Madonna G. Constantine:
Multidisciplinary research on the datapath of the computing disciplines.
46-50
- Erica L. Wagner, Gabriele Piccoli:
Moving beyond user participation to achieve successful IS design.
51-55
- Wai Fong Boh, Christina Soh, Steven Yeo:
Standards development and diffusion: a case study of RosettaNet.
57-62
- Ilan Oshri, Sue Newell, Shan Ling Pan:
Implementing component reuse strategy in complex products environments.
63-67
- Kannan Mohan, Balasubramaniam Ramesh:
Tracing variations in software product families.
68-73
- Klaus Schild, Stefan Bussmann:
Self-organization in manufacturing operations.
74-79
- Varun Grover, Raymond M. Henry, Jason Bennett Thatcher:
Fix IT-business relationships through better decision rights.
80-86
- Gautam Ray, Waleed A. Muhanna, Jay B. Barney:
Competing with IT: the role of shared IT-business understanding.
87-91
Technical opinion
Inside risks
Copyright © Fri Mar 12 17:24:58 2010
by Michael Ley (ley@uni-trier.de)