default search action
Communications of the ACM (CACM), Volume 41, 1998
Volume 41, Number 1, January 1998
- Robert Fox:
News Track. 9-10
- Roy Rada:
Corporate Shortcut to Standardization. 11-15
- Neil Munro:
Access Charges under Scrutiny. 17-19
- Nora H. Sabelli:
We Are No Longer A Priesthood. 20-21
- Jennifer Burg, Stan J. Thomas:
Computers Across Campus - Introduction. 22-25 - David G. Brown, Jennifer Burg, Jay L. Dominick:
A Strategic Plan for Ubiquitous Laptop Computing. 26-31 - Glenn MacDougall:
Acadia University's "Sandbox". 32-33 - Alan Candiotti, Neil Clarke:
Combining Universal Access with Faculty Development and Academic Facilities. 36-41 - Mark D. Weiser:
The Future of Ubiquitous Computing on Campus. 41-42 - Janice Biros:
Changes in Computer Purchase, Distribution, and Maintenance. 43-44 - Lynn Kiaer, David Mutchler, Jeffrey Froyd:
Laptop Computers in an Integrated First-Year Curriculum. 45-49 - Carolyn R. Watters, Marshall Conley, Cynthia Alexander:
The Digital Agora: Using Technolgy for Learning in the Social Sciences. 50-57 - Ann Deden:
Computers and Systemic Change in Higher Education. 58-63 - Richard J. LeBlanc, Steven L. Teal:
Hardware and Software Choices for Student Computer Initiatives. 64-69 - Samuel L. Grier, Larry W. Bryant:
The Case for Desktops. 70-71
- Ho Geun Lee:
Do Electronic Marketplaces Lower the Price of Goods? 73-80 - Sonya Freeman Cohen:
Quest for Java. 81-83
- Peter G. Neumann:
Protecting the Infrastructures. 128
Volume 41, Number 2, February 1998
- Robert Fox:
News Track. 9-10
- Elliot Soloway:
No One Is Making Money In Educational Software. 11-15
- Brock N. Meeks:
No Justice, No Peace. 17-19
- Jan Guynes Clark, Vincent S. Lai:
Internet Comes to Morocco. 21-23
- Brian C. Behrens, Reuven R. Levary:
Practical Legal Aspects of Software Reverse Engineering. 27-29 - Leon A. Kappelman, Darla Fent, Kellie B. Keeling, Victor R. Prybutok:
Calculating the Cost of Year-2000 Compliance. 30-39 - Varun Grover, James T. C. Teng, Kirk D. Fiedler:
IS Investment Priorities in Contemporary Organizations. 40-48 - Philip M. Johnson:
Reengineering Inspection. 49-52
- Giri Kumar Tayi, Donald P. Ballou:
Examining Data Quality - Introduction. 54-57 - Richard Y. Wang:
A Product Perspective on Total Data Quality Management. 58-65 - Ken Orr:
Data Quality and System Theory. 66-71 - David Kaplan, Ramayya Krishnan, Rema Padman, James Peters:
Assessing Data Quality in Accouting Information Systems. 72-78 - Thomas C. Redman:
the Impact of Poor Data Quality on the Typical Enterprise. 79-82
- Mauri Laitinen, Mohamed Fayad:
Surviving a Process Performance Crash. 83-86
- Peter G. Neumann:
Internet Gambling. 112
Volume 41, Number 3, March 1998
- Robert Fox:
News Track. 9-11
- Hal Berghel:
The Year-2000 Problem and the New Riddle of Induction. 13-17
- Grey E. Burkhart, Seymour E. Goodman:
The Internet Gains Acceptance in the Persian Gulf. 19-25
- Diane Crawford:
Praises Come With a Hitch. 26-29
- Charles H. House:
It's Time for a Change. 31
- H. Raghav Rao, Al Farooq Salam, Brian DosSantos:
Marketing and the Internet - Introduction. 32-34 - P. K. Kannan, Ai-Mei Chang, Andrew B. Whinston:
Marketing Information on the I-Way: Data Junkyard or Information Gold Mine? 35-43 - Jonathan W. Palmer, David A. Griffith:
An Emerging Model of Web Site Design for Marketing. 44-51 - Lauren B. Eder, Marvin E. Darter:
Physicians in Cyberspace. 52-54 - Greg Elofson, William N. Robinson:
Creating a Custom Mass-Production Channel on the Internet. 56-62 - Huaiqing Wang, Matthew K. O. Lee, Chen Wang:
Consumer Privacy Concerns about Internet Marketing. 63-70 - Robert M. O'Keefe, Tim McEachern:
Web-based Customer Decision Support Systems. 71-78 - Al Farooq Salam, H. Raghav Rao, C. Carl Pegels:
Content of Corporate Web Pages as Advertising Media. 76-77
- Mark Bohr:
Silicon Trends and Limits for Advanced Microprocessors. 80-87 - Robert J. Hall:
How to Avoid Unwanted Email. 88-95 - Bonnie A. Nardi, James R. Miller, David J. Wright:
Collaborative, Programmable Intelligent Agents. 96-104
- John T. Nosek:
The Case for Collaborative Programming. 105-108
- Peter G. Neumann:
Are Computers Addictive? 128
Volume 41, Number 4, April 1998
- Robert Fox:
News Track. 11-12
- Pamela Samuelson:
Encoding the Law into Digital Libraries. 13-18
- Nathaniel S. Borenstein:
Whose Net Is It Anyway? 19-21
- Edward A. Fox, Gary Marchionini:
Toward a Worldwide Digital Library - Introduction. 28-32 - Andreas Paepcke, Kevin Chen-Chuan Chang, Hector Garcia-Molina, Terry Winograd:
Interoperability for Digital Libraries Worldwide. 33-43 - William E. Moen:
Accessing Distributed Cultural Heritage Information. 44-48 - H. M. Gladney, Fred Mintzer, Fabio Schiattarella, Julián Bescós, Martin Treu:
Digital Access to Antiques. 49-57 - Cathryn S. Dippo:
FedStats Promotes Statistical Literacy. 58-60 - Donald D. Cowan, Colin I. Mayfield, Frank Wm. Tompa, W. Gasparini:
New Role for Community Networks. 61-63 - Akira Maeda, Myriam Dartois, Takehisa Fujita, Tetsuo Sakaguchi, Shigeo Sugimoto, Koichi Tabata:
Viewing Multilingual Documents on Your Local Web Browser. 64-65 - M. K. Leong, Ling Cao, Ying Lu:
Distributed Chinese Bibliographic Searching. 66-68 - Judith Klavans, Peter Schäuble:
NSF-EU Multilingual Information Access. 69 - Ian H. Witten, Craig G. Nevill-Manning, Rodger J. McNab, Sally Jo Cunningham:
A Public Library Based on Full-text Retrieval. 71-75 - Albert Endres, Norbert Fuhr:
Students Access Books and Journals through MeDoc. 76-77 - László Kovács:
Discovery of Resources within a Distributed Library System. 78-79 - Marcos André Gonçalves, Claudia Bauzer Medeiros:
Initiatives That Center on Scientific Dissemination. 80-81 - Sung-Hyon Myaeng:
R&D for a Nationwide General-Purpose System. 82-85 - Cliff McKnight:
Many Projects That Depend on Collaboration. 86-87 - Andrew E. Treloar:
Libraries' New Role in Electronic Scholary Publishing. 88-89 - Annelise Mark Pejtersen:
Semantic Information Retrieval. 90-92 - Sanna Talja, Rami Heinisuo, Eija-Liisa Kasesniemi, Harri Kemppainen, Sinikka Luukkainen, Kirsi Pispa, Kalervo Järvelin:
Discourse Analysis of User Request. 93-94 - Ben Shneiderman, Donald Byrd, W. Bruce Croft:
Sorting Out Searching: A User-Interface Framework for Text Searches. 95-98
- Iris Vessey, Robert L. Glass:
Strong Vs. Weak Approaches to Systems Development. 99-102 - Angela C. Sodan:
Yin and Yang in Computer Science. 103-111
- Fred B. Schneider:
On Concurrent Programming. 128
Volume 41, Number 5, May 1998
- Robert Fox:
News Track. 9-11
- Brock N. Meeks:
Don't Shoot Me, I'm Famous. 13-15
- Robert L. Glass:
Everything Old Is New Again. 17-20
- Bruce H. Barnes:
Assessing Computer Technology in Europe. 29-32
- James Veitch, Robert Laddaga:
Distributed Dynamic Systems - Introduction. 34-36 - Narinder Singh:
Unifying Heterogeneous Information Models. 37-44 - Jeffrey P. Morrill:
Distributed Recognition of Patterns in Time Series Data. 45-51 - James Veitch:
A Conversation with Paul Graham. 52-54 - David N. Gray, John Hotchkiss, Seth LaForge, Andrew Shalit, Toby Weinberg:
Modern Languages and Microsoft's Component Object Model. 55-65 - Janos Sztipanovits, Gabor Karsai, Ted Bapty:
Self-Adaptive Software for Signal Processing. 66-73
- Vicky Hardman, Martina Angela Sasse, Isidor Kouvelas:
Successful Multiparty Audio Communication over the Internet. 74-80 - Akira K. Onoma, Wei-Tek Tsai, Mustafa H. Poonawala, Hiroshi Suganuma:
Regression Testing in an Industrial Environment. 81-86 - Peter Duchessi, InduShobha N. Chengalur-Smith:
Client/Server Benefits, Problems, Best Practices. 87-94 - William N. Robinson, Vecheslav Volkov:
Supporting the Negotiation Life Cycle. 95-102
- Mohamed E. Fayad:
The Art of Managing Mutiple Processes. 103-105
- Rebecca Mercuri:
In Search of Academic Integrity. 136
- David Alan Grier:
Politics, Control, and Computer Networks: The Chinese Student Lobby of 1989. 137-145 - Michel Keable, Maurice Landry, Claude Banville:
The Legitimacy Gap Between IS Professionals and Users. 146-156 - Albert A. Angehrn, Soumitra Dutta:
Case-Based Decision Support. 157-165 - Christine Parent, Stefano Spaccapietra:
Issues and Approaches of Database Integration. 166-178 - Uma G. Gupta:
Automatic Tools for Testing Expert Systems. 179-184 - Jay K. Joiner, Wei-Tek Tsai:
Re-Engineering Legacy Cobol Programs. 185-197 - Takashi Nishiyama, Junji Nomura, Ryoji Nakajima, Tetsuji Miyanoh:
A Semi-Autonomous Security Robot Employing Telepresence. 198-205 - Arun Sen:
From DSS to DSP: A Taxonomic Retrospective. 206-216
Volume 41, Number 6, June 1998
- Robert Fox:
News Track. 9-10
- Stephen J. Lukasik, Lawrence T. Greenberg, Seymour E. Goodman:
Protecting an Invaluable and Ever-Widening Infrastructure. 11-16
- Larry Press:
Low-Cost Estimation of Travel Trade-offs. 17-20
- Wayne Madsen:
Internet Malcontents of the World - Unite! 27-28
- Christopher Morgan:
Building an Informational Bridge to China. 29-30
- Sandeep K. Singhal, Binh Q. Nguyen:
The Java Factor - Introduction. 34-37 - Paul Týma:
Why Are We Using Java Again? 38-42 - Kathy Bohrer, Verlyn M. Johnson, Anders Nilsson, Bradley Rubin:
Business Process Components for Distributed Object Applications. 43-48 - Kelvin D. Nilsen:
Adding Real-Time Capabilities to Java. 49-56 - Donald P. Brutzman:
The Virtual Reality Modeling Language and Java. 57-64 - James W. Cooper:
Using Design Patterns. 65-68
- Annie Chabert, Ed Grossman, Larry S. Jackson, Stephen Pietrowicz, Chris Seguin:
Java Object-Sharing in Habanero. 69-76 - Soumitra Dutta, Luk N. Van Wassenhove, Selvan Kulandaiswamy:
Benchmarking European Software Management Practices. 77-86 - Larry Wos:
Programs That Offer Fast, Flawless, Logical Reasoning. 87-95 - James T. C. Teng, Seung Ryul Jeong, Varun Grover:
Profiling Successful Reengineering Projects. 96-102
- Harold W. Lawson:
Infrastructure Risk Reduction. 120
Volume 41, Number 7, July 1998
- Robert Fox:
News Track. 9-11
- Robert L. Glass:
Short-Term and Long-term Remedies for Runaway Projects. 13-15
- Roy Rada, Carl Cargill, John Klensin:
Consensus and the Web. 17-22
- Roger C. Schank:
Horses For Courses. 23-25
- Minerva M. Yeung:
Digital Watermarking - Introduction. 30-33 - Nasir D. Memon, Ping Wah Wong:
Protecting Digital Media Content. 34-43 - Scott Craver, Boon-Lock Yeo, Minerva M. Yeung:
Technical Trials and Legal Tribulations. 44-54 - Fred Mintzer, Gordon W. Braudaway, Alan E. Bell:
Opportunities for Watermarking Standards. 56-64 - Jian Zhao, Eckhard Koch, Chenghui Luo:
In Business Today and Tomorrow. 66-72 - John M. Acken:
How Watermarking Adds Value to Digital Content. 74-77
- Tomás Isakowitz, Michael Bieber, Fabio Vitali:
Web Information Systems - Introduction. 78-80 - Gerald L. Lohse, Peter Spiller:
Electronic Shopping. 81-88 - Jay M. Tenenbaum:
WISs and Electronic Commerce. 89-90 - Ajit Kambil, Mark Ginsburg:
Public Access Web Information Systems: Lessons from the Internet EDGAR Project. 91-97 - Albert L. Lederer, Dinesh A. Mirchandani, Kenneth Sims:
Using WISs to enhance Competitiveness. Commun. ACM 41(7): 94-95 (1998) - Harri Oinas-Kukkonen:
What is Inside a Link? 98 - Eric van Heck, Peter Vervest:
How Should CIOs Deal With Web-Based Auctions? 99-100 - Gustavo O. Arocena, Alberto O. Mendelzon:
Viewing WISs as Database Applications. 101-102 - Kenji Takahashi:
Metalevel Links: More Power to Your Links. 103-105 - V. Balasubramanian, Alf Bashian:
Document Management and Web Technologies: Alice Marries the Mad Hatter. 107-115 - Alan R. Dennis:
Lessons from Three Years of Web Development. 112-113 - Hermann A. Maurer:
Modern WISs. 114-115 - Murray Turoff, Starr Roxanne Hiltz:
Superconnectivity. 116 - James A. Senn:
WISs at Federal Express. 117-118
- Peter G. Neumann:
Laptops in Congress? 128
Volume 41, Number 8, August 1998
- Robert Fox:
News Track. 9-10
- Elliot Soloway, Cathleen A. Norris:
Using Technology to Address Old Problems in New Ways. 11-18
- Diane Crawford:
Shaping Public Policy in the Information Age. 21-24
- Roger A. Coldwell:
Did Chuck Babbage Predict Software Piracy? 25-27
- Robert J. Kauffman, Frederick J. Riggins:
Information Systems and Economics - Introduction. 32-34 - Yannis Bakos:
The Emerging Role of Electronic Marketplaces on the Internet. 35-42 - Rajiv M. Dewan, Marshall L. Freimer, Abraham Seidmann:
Internet Service Providers, Proprietary Content, and the Battle for Users' Dollars. 43-48 - Erik Brynjolfsson, Lorin M. Hitt:
Beyond the Productivity Paradox: Computers are the Catalyst for Bigger Changes. 49-55 - Sanjeev Dewan, Kenneth L. Kraemer:
International Dimensions of the Productivity Paradox. 56-62 - Chris F. Kemerer:
Progress, Obstacles, and Opportunities in Software Engineering Economics. 63-66 - Sandra Slaughter, Donald E. Harter, Mayuram S. Krishnan:
Evaluating the Cost of Software Quality. 67-73
- Lorrie Faith Cranor, Brian A. LaMacchia:
Spam! 74-83 - Roy T. Fielding, E. James Whitehead Jr., Kenneth M. Anderson, Gregory Alan Bolcer, Peyman Oreizy, Richard N. Taylor:
Web-Based Development of Complex Information Products. 84-92 - Stan Jarzabek, Riri Huang:
The Case for User-Centered CASE Tools. 93-99 - Sandeep Purao, Hemant K. Jain, Derek L. Nazareth:
Effective Distribution of Object-Oriented Applications. 100-108
- David S. Hamu, Mohamed Fayad:
Achieving Bottom-Line Improvements with Enterprise Frameworks. 110-113
- Peter J. Denning:
Computer Science and Software Engineering: Filing for Divorce? 128
Volume 41, Number 9, September 1998
- Robert Fox:
News Track. 9-10
- Brock N. Meeks:
Mainstreem Media Heartburn. 11-13
- Pamela Samuelson:
Does Information Really Have to be Licensed? 15-20
- Donald A. Smith:
Computerizing Computer Science. 21-23
- Arun Sen, Varghese S. Jacob:
Industrial-Strength Data Warehousing - Introduction. 28-31 - Hugh J. Watson, Barbara J. Haley:
Managerial Considerations. 32-37 - Charles Bontempo, George Zagelow:
The IBM Data Warehouse Architecture. 38-48 - Michael Sigal:
A Common Sense Development Strategy. 42-43 - James R. Sutter:
Project-Based Warehouses. 49-51 - Stephen R. Gardner:
Building the Data Warehouse. 52-60 - Cecilia Claudio:
Health Care Management. 58-59 - Katherine Glassey:
Seducing the End User. 62-69 - Jim Scott:
Warehousing Over the Web. 64-65 - Linda Huber:
Users Drive Move From Mainframe. 66-67
- Jennifer Kreie, Timothy Paul Cronan:
How Men and Woman View Ethics. 70-76 - Judith Gal-Ezer, David Harel:
What (Else) Should CS Educators Know? 77-84 - Rudolf K. Keller, Jean Tessier, Gregor von Bochmann:
A Pattern System for Network Management Interfaces. 86-93 - Asuman Dogac, Cevdet Dengi, M. Tamer Özsu:
Distributed Object Computing Platforms. 95-103
- Peter G. Neumann:
Y2K Update. 128
Volume 41, Number 10, October 1998
- Robert Fox:
News Track. 9-11
- Hal Berghel:
Who Won the Mosaic War? 13-16
- Barbara Simons:
Outlawing Technology. 17-18
- Larry Press, Grey E. Burkhart, William Foster, Seymour E. Goodman, Peter Wolcott, Jon Woodard:
An Internet Diffusion Framework. 21-26
- Richard C. Hsu:
Maintaining High Living Standards Through Innovation, Strong Patents. 27-28
- Krishnan Seetharaman:
The CORBA Connection - Introduction. 34-36 - Jon Siegel:
OMG Overview: CORBA and the OMA in Enterprise Computing. 37-43 - Steve Vinoski:
New Features for CORBA 3.0. 44-52 - Douglas C. Schmidt:
Evaluating Architectures for Multithreaded Object Request Brokers. 54-60 - Michi Henning:
Binding, Migration, and Scalability in CORBA. 62-71 - Paul Haggerty, Krishnan Seetharaman:
The Beneffits of CORBA-Based Network Management. 73-79
- Arie Segev, Jaana Porra, Malu Roldan:
Intenet Security and the Case of Bank of America. 81-87 - Frederick J. Riggins, Hyeun-Suk Rhee:
Toward a Unified View of Electronic Commerce. 88-95 - Arun Rai, Thiagarajan Ravichandran, Subhashish Samaddar:
How to Anticipate the INternet's Global Diffusion. 97-106
- Richard Gisselquist:
Engineering in Software. 107-108
- Peter G. Neumann:
Risks of E-Education. 136
Volume 41, Number 11, November 1998
- Robert Fox:
News Track. 9-10
- Herbert Schorr, Salvatore J. Stolfo:
A Digital Government for the 21st Century. 15-19
- Grey E. Burkhart, Seymour E. Goodman, Arun Mehta, Larry Press:
The Internet in India: Better Times Ahead? 21-26
- Peter Wolcott, Patrick Homer, Seymour E. Goodman:
HPC Export Controls: Navigating Choppy Waters. 27-30
- Sidney Karin, Susan L. Graham:
The High-Performance Computing Continuum - Introduction. 32-35 - Paul Messina, David E. Culler, Wayne Pfeiffer, William R. Martin, J. Tinsley Oden, Gary Smith:
Architecture. 36-44 - Andrew S. Grimshaw, Adam Ferrari, Greg Lindahl, Katherine Holcomb:
Metasystems. 46-55 - Reagan W. Moore, Thomas A. Prince, Mark H. Ellisman:
Data-Intensive Computing and Digital Libraries. 56-62 - Joel H. Saltz, Alan Sussman, Susan L. Graham, James Demmel, Scott B. Baden, Jack J. Dongarra:
Programming Tools and Environments. 64-73 - Andy Finley, Ann Redelfs, Greg Moses:
Education, Outreach, and Training. 74-75
- Mark Keil, Paul E. Cule, Kalle Lyytinen, Roy C. Schmidt:
A Framework for Identifying Software Project Risks. 76-83 - John C. Kunz, Tore R. Christiansen, Geoff P. Cohen, Yan Jin, Raymond E. Levitt:
The Virtual Design Team. 84-91 - Geng-Sheng Kuo, Jing-Pei Lin:
New Design Concepts for an Intelligent Internet. 93-98 - Herbert Maisel, Catherine Gaddy:
Employment and Salaries of Recent CS Doctorates. 99-101
- Waldemar W. Koczkodaj, Marian Orlowski, V. Wiktor Marek:
Myths about Rough Set Theory. 102-103
- Fred B. Schneider:
Toward Trustworthy Networked Information Systems. 144
Volume 41, Number 12, December 1998
- Robert Fox:
News Track. 9-10
- Robert L. Glass:
How Not To Prepare for a Consulting Assignment, and Other Ugly Consultancy Truths. 11-13
- Robert J. Aalberts, Anthony M. Townsend, Michael E. Whitman:
The Threat of Long-Arm Jurisdiction to Electronic Commerce. 15-20
- Robert E. Kraut, Sara B. Kiesler, Tridas Mukhopadhyay, William L. Scherlis, Michael Patterson:
Social Impact of the Internet: What Does It Mean? 21-22
- Vinton G. Cerf:
I Remember IANA (Tribute, Jonathan B. Postel 1943-1998). 27-28
- Clare-Marie Karat:
Guaranteeing Rights for the User. 29-31
- Matthias Jarke:
Requirements Tracing - Introduction. 32-36 - Balasubramaniam Ramesh:
Factors Incluencing Requirements Traceability Practice. 37-44 - Thomas Rose:
Visual Assessment of Engineering Processes in Virtual Enterprises. 45-52 - Ralf Dömges, Klaus Pohl:
Adapting Tracability Environments to Project-Specific Needs. 54-62 - Giorgio De Michelis, Eric Dubois, Matthias Jarke, Florian Matthes, John Mylopoulos, Joachim W. Schmidt, Carson C. Woo, Eric S. K. Yu:
A Three-Faced View of Information Systems. 64-70
- Loe M. G. Feijs, Roel de Jong:
3D Visualization of Software Architectures. 72-78 - W. B. Noffsinger, Robert Niedbalski, Michael Blanks, Niall Emmart:
Legacy Object Modelling Speeds Software Integration. 80-89 - Prabuddha De, Thomas W. Ferratt:
An Information System Involving Competing Organizations. 90-98
- C. J. Date, Hugh Darwen:
Toward a Model of Type Inheritance. 99-101
- Peter B. Ladkin:
The Risks of Hubris. 160
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.