default search action
Communications of the ACM (CACM), Volume 49, 2006
Volume 49, Number 1, January 2006
- Diane Crawford:
Editorial pointers. 5-7
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Diane Crawford:
Top 10 downloads from ACM's digital library. 15-16
- Phillip G. Armour:
Counting boulders and measuring mountains. 17-20
- ACM annual report for FY05. 21-30
- Meg McGinity Shannon:
The network of life. 29-32
- David A. Patterson:
New Directions for CACM? 33-35
- Scott Campbell:
How to think about security failures. 37-39
- Jaime Teevan, William Jones, Benjamin B. Bederson:
Introduction. 40-43 - Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Pérez-Quiñones, Meredith M. Skeels, Tiziana Catarci:
Digital memories in an era of ubiquitous computing and abundant storage. 44-50 - Wanda Pratt, Kenton T. Unruh, Andrea Civan, Meredith M. Skeels:
Personal health information management. 51-55 - Clare-Marie Karat, Carolyn Brodie, John Karat:
Usable privacy and security for personal information management. 56-57 - Edward Cutrell, Susan T. Dumais, Jaime Teevan:
Searching to eliminate personal information management. 58-64 - Catherine C. Marshall, William Jones:
Keeping encountered information. 66-67 - Steve Whittaker, Victoria Bellotti, Jacek Gwizdka:
Email in personal information management. 68-73 - Thomas Erickson:
From PIM to GIM: personal information management in group contexts. 74-75 - David R. Karger, William Jones:
Data unification in personal information management. 77-82 - Diane Kelly:
Evaluating personal information management behaviors and tools. 84-86
- Jim Gemmell, Gordon Bell, Roger Lueder:
MyLifeBits: a personal database for everything. 88-95 - Kevin C. Desouza, Yukika Awazu, Amrit Tiwana:
Four dynamics for bringing use back into software reuse. 96-100 - George Pallis, Athena Vakali:
Insight and perspectives for content delivery networks. 101-106 - Grace J. Johnson, Paul J. Ambrose:
Neo-tribes: the power and potential of online communities in health care. 107-113 - Tim Chenoweth, Karen Corral, Haluk Demirkan:
Seven key interventions for data warehouse success. 114-119 - Lawrence A. Gordon, Martin P. Loeb:
Budgeting process for information security expenditures. 121-125 - Matti Tedre, Erkki Sutinen, Esko Kähkönen, Piet Kommers:
Ethnocomputing: ICT in cultural and social context. 126-130
- Christoph Meinel, Volker Klotz:
The first 10 years of the ECCC digital library. 131-134
- John C. Knight, Nancy G. Leveson:
Software and higher education. 160
Volume 49, Number 2, February 2006
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Gary F. Templeton:
Video image stabilization and registration technology. 15-18
- Siri Birgitte Uldal, Muhammad Aimal Marjan:
Computing in post-war Afghanistan. 19-24
- Pamela Samuelson:
Regulating technical design. 25-30
- Michael A. Cusumano:
Where does Russia fit into the global software industry? 31-34
- Nanda Kumar, Abbe Mowshowitz:
Who should govern the internet? 35-37
- Diane Crawford:
Top 10 downloads from ACM's digital library. 39-40
- David A. Patterson:
Offshoring: finally facts vs. folklore. 41-42
- Brajendra Panda, Joseph Giordano, Daniel Kalil:
Introduction. 44-47 - Eoghan Casey:
Investigating sophisticated security breaches. 48-55 - Brian D. Carrier:
Risks of live digital forensic analysis. 56-61 - Frank Adelstein:
Live forensics: diagnosing your system without killing it first. 63-66 - The Common Digital Evidence Storage Format Working Group: Standardizing digital evidence storage. 67-68
- Chet Hosmer:
Digital evidence bag. 69-70 - Sheldon Teelink, Robert F. Erbacher:
Improving the computer forensic analysis process through visualization. 71-75 - Golden G. Richard III, Vassil Roussev:
Next-generation digital forensics. 76-80 - Rahul Bhaskar:
State and local law enforcement is not ready for a cyber Katrina. 81-83 - Simson L. Garfinkel:
AFF: a new format for storing hard drive images. 85-87 - Ganesan Shankaranarayanan, Adir Even:
The metadata enigma. 88-94 - Pak-Lok Poon, Amy H. L. Lau:
The present B2C implementation framework. 96-103 - Jan Damsgaard, Mihir A. Parikh, Bharat Rao:
Wireless commons perils in the common good. 104-109
- Student de-charter notice. 110
- Henry M. Gladney:
Principles for digital preservation. 111-116 - Stephen Owen, Pearl Brereton, David Budgen:
Protocol analysis: a neglected practice. 117-122 - Deborah J. Armstrong:
The quarks of object-oriented development. 123-128 - Roli Varma:
Making computer science minority-friendly. 129-134
- Peter G. Neumann:
Trustworthy systems revisited. 152
Volume 49, Number 3 , March 2006
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
The operational executive sponsor. 15-18
- Robert L. Glass:
Is the crouching tiger a threat? 19-20
- Bertrand Meyer, Willy Zwaenepoel:
Europe's computer scientists take fate into their own hands. 21-24
- Call for nominations for advanced member grades in the ACM. 25-26
- David A. Patterson:
Computer science education in the 21st century. 27-30 - David A. Patterson:
Reviving your favorite CS books. 31
- Jeannette M. Wing:
Computational thinking. 33-35
- Jean-Philippe Martin-Flatin, Joseph S. Sventek, Kurt Geihs:
Introduction. 36-39 - Paul Robertson, Brian Charles Williams:
Automatic recovery from software failure. 41-47 - George Porter, Randy H. Katz:
Effective web service load balancing through statistical monitoring. 48-54 - Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt, Vijay Machiraju:
Supporting application quality of service in shared resource pools. 55-60 - Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata:
Biologically inspired self-adaptive multi-path routing in overlay networks. 62-67 - Atul Singh, Mads Haahr:
Creating an adaptive network of hubs using Schelling's model. 69-73
- ACM fellows. 74-75
- Martin Halvey, Mark T. Keane, Barry Smyth:
Mobile web surfing is the same as web surfing. 76-81 - Vicki R. McKinney, Mary M. Whiteside:
Maintaining distributed relationships. 82-86 - Zhiping D. Walter, George M. Scott:
Management issues of internet/web systems. 87-91 - Aldo de Moor, Mark Aakhus:
Argumentation support: from technologies to tools. 93-98 - Juan E. Gilbert:
Applications quest: computing diversity. 99-104 - Robert C. Beatty, Craig D. Williams:
ERP II: best practices for successfully implementing an ERP upgrade. 105-109 - Mazliza Othman, Rodziah Latih:
Women in computer science: no shortage here! 111-114
- Brian L. Dos Santos, Andrew L. Wright:
Using bulletin boards in an educational setting. 115-118
- Top 10 downloads from ACM's digital library. 126-127
- Marc Rotenberg:
Real id, real trouble? 128
Volume 49, Number 4 , April 2006
- Diane Crawford:
Editorial pointers. 5
- News track. 9-10
- Diane Crawford:
Forum. 11-13
- Peter J. Denning:
Hastily formed networks. 15-20
- Hal Berghel:
Phishing mongers and posers. 21-25 - Statewide databases of registered voters. 26-28
- Top 10 Downloads from ACM's Digital Library. 29-30
- David A. Patterson:
Seven reasons to shave your head and three reasons not to: the bald truth. 31-32
- Shlomo Argamon, Mark Olsen:
Toward meaningful computing. 33-35
- Ryen W. White, Bill Kules, Steven Mark Drucker, Monica M. C. Schraefel:
Introduction. 36-39 - Gary Marchionini:
Exploratory search: from finding to understanding. 41-46 - Monica M. C. Schraefel, Max L. Wilson, Alistair Russell, Daniel A. Smith:
mSpace: improving information access to multimedia domains with multimodal exploratory search. 47-49 - Edward Cutrell, Susan T. Dumais:
Exploring personal information. 50-51 - Edward A. Fox, Fernando Adrian Das Neves, Xiaoyan Yu, Rao Shen, Seonho Kim, Weiguo Fan:
Exploring the computing literature with visualization and stepping stones & pathways. 52-58 - Marti A. Hearst:
Clustering versus faceted categories for information exploration. 59-61 - John Gersh, Bessie Lewis, Jaime Montemayor, Christine D. Piatko, Russell Turner:
Supporting insight-based information exploration in intelligence analysis. 63-68 - Ben Shneiderman, Benjamin B. Bederson, Steven Mark Drucker:
Find that photo!: interface strategies to annotate, browse, and share. 69-71 - Bernard J. Jansen:
Using temporal patterns of interactions to design effective automated searching assistance. 72-74
- Jiexun Li, Rong Zheng, Hsinchun Chen:
From fingerprint to writeprint. 76-82 - Nenad Jukic:
Modeling strategies and alternatives for data warehousing projects. 83-88 - Andrea Ordanini:
What drives market transactions in B2B exchanges? 89-93 - Moshe Zviran, Dov Te'eni, Yuval Gross:
Does color in email make a difference? 94-99 - Rosario Vidal, Elena Mulet:
Thinking about computer systems to support design synthesis. 100-104 - Harvey G. Enns, Thomas W. Ferratt, Jayesh Prasad:
Beyond stereotypes of IT professionals: implications for IT HR practices. 105-109
- Sang M. Lee, Choong Kwon Lee:
IT managers' requisite skills. 111-114
- Lauren Weinstein:
Fake ID: batteries not included. 120
Volume 49, Number 5, May 2006
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13 - Diane Crawford:
Top 10 downloads from ACM's digital library. 15-16
- Rebecca T. Mercuri:
Scoping identity theft. 17-21
- Meg McGinity Shannon:
Private lives. 23-26
- David A. Patterson:
Revisiting my campaign statement. 27-30
- Thomas A. Easton:
Beyond the algorithmization of the sciences. 31-33
- Hans Weigand:
Introduction. 44-46 - Peter J. Denning, Robert Dunham:
Innovation as language action. 47-52 - Göran Goldkuhl:
Action and media in interorganizational interaction. 53-57 - Jan L. G. Dietz:
The deep structure of business processes. 58-64 - Dov Te'eni:
The language-action perspective as a basis for communication support systems. 65-70 - Terry Winograd:
Designing a new foundation for design. 71-74 - Mareike Schoop, Aldo de Moor, Jan L. G. Dietz:
The pragmatic web: a manifesto. 75-76
- Dawn G. Gregg, Steven Walczak:
Adaptive web information extraction. 78-84 - Stephen J. Andriole:
The collaborate/integrate business technology strategy. 85-90 - Brian Whitworth, Jerry Fjermestad, Edward Mahinda:
The web of system performance. 92-99 - Hai Zhuge:
Discovery of knowledge flow in science. 101-107 - Brian Dobing, Jeffrey Parsons:
How UML is used. 109-113 - Pairin Katerattanakul, Bernard T. Han, Alan Rea:
Is information systems a reference discipline? 114-118 - William E. Spangler, Kathleen S. Hartzel, Mordechai Gal-Or:
Exploring the privacy implications of addressable advertising and viewer profiling. 119-123
- Stephen B. Jenkins:
Musings of an "old-school" programmer. 124-126
- Peter G. Neumann, Lauren Weinstein:
Risks of RFID. 136
Volume 49, Number 6, June 2006
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- David A. Patterson:
Farewell address: the growing and graying of ACM. 15-18
- Phillip G. Armour:
The learning edge. 19-22
- Ronald F. Boisvert, Mary Jane Irwin:
Plagiarism on the rise. 23-24
- Diane Crawford:
Top 10 downloads from ACM's digital library. 25-26
- Pamela Samuelson:
Copyrighting standards. 27-31
- Gregory J. Conti:
Introduction. 32-36 - Tom Cross:
Academic freedom and the hacker ethic. 37-40 - Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green:
Security through legality. 41-43 - Joe Grand:
Research lessons from hardware hacking. 44-49 - Bruce Potter:
Wireless hotspots: petri dish of wireless security. 50-56 - Felix "FX" Lindner:
Software security is software reliability. 57-61 - Dan Kaminsky:
Explorations in namespace: white-hat hacking across the domain name system. 62-69
- Kallol Kumar Bagchi, Peeter Kirs, Robert Cerveny:
Global software piracy: can economic factors alone explain the trend? 70-76 - Christopher L. Carr:
Reciprocity: the golden rule of IS-user service relationship quality and cooperation. 77-83 - Timothy Paul Cronan, C. Bryan Foltz, Thomas W. Jones:
Piracy, computer crime, and IS misuse at the university. 84-90 - David Kang, Roger Chiang:
A systematic approach in managing post-deployment system changes. 91-96 - Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers:
The application of model checking for securing e-commerce transactions. 97-101 - Barry Shore:
Enterprise integration across the globally disbursed service organization. 102-106
- Thomas W. Jackson, Anthony Burgess, Janet Edwards:
A simple approach to improving email communication. 107-109
- Robert N. Charette:
EHRs: Electronic Health Records or Exceptional Hidden Risks? 120
Volume 49, Number 7, July 2006
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13 - Diane Crawford:
ACM's 2006 general elections. 13
- Peter J. Denning:
Infoglut. 15-19
- Michael A. Cusumano:
What road ahead for Microsoft and Windows? 21-23
- Diane Crawford:
Top 10 downloads from ACM's digital library. 25-26
- Peter Wegner, Dina Q. Goldin:
Principles of problem solving. 27-29
- Jim Spohrer, Doug Riecken:
Introduction. 30-32 - Henry Chesbrough, Jim Spohrer:
A research manifesto for services science. 35-40 - Jerry R. Sheehan:
Understanding service sector innovation. 42-47 - John Zysman:
The algorithmic revolution - the fourth service transformation. 48 - Roland T. Rust, Carol Miu:
What academic research tells us about service. 49-54 - Amit P. Sheth, Kunal Verma, Karthik Gomadam:
Semantics to energize the full services spectrum. 55-61 - Brenda Dietrich:
Resource planning for business services. 62-64 - William B. Rouse, Marietta L. Baba:
Enterprise transformation. 66-72 - Mary Jo Bitner, Stephen W. Brown:
The evolution and discovery of services science in business schools. 73-78 - Walter Ganz:
Germany: service engineering. 79 - Christof Weinhardt, Dirk Neumann, Carsten Holtmann:
Germany: computer-aided market engineering. 79 - Paul P. Maglio, Savitha Srinivasan, Jeffrey T. Kreulen, Jim Spohrer:
Service systems, service scientists, SSME, and innovation. 81-85 - Stuart I. Feldman, Krishna S. Nathan, Thomas Li, Kazuyoshi Hidaka, Corinna Schulze:
The Clarion Call for modern services: China, Japan, Europe, and the U.S. 86-87
- David E. Avison, Shirley Gregor, David Wilson:
Managerial IT unconsciousness. 88-93 - Lance J. Hoffman, Kim Lawson-Jenkins, Jeremy J. Blum:
Trust beyond security: an expanded trust model. 94-101 - Ernst Bekkering, Jung P. Shim:
Trust in videoconferencing. 103-107 - Narasimha Bolloju, Felix S. K. Leung:
Assisting novice analysts in developing quality conceptual models with UML. 108-112
- Fred Martin:
Toy projects considered harmful. 113-116
- Peter G. Neumann:
Risks relating to system compositions. 120
Volume 49, Number 8, August 2006
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Robert L. Glass:
The Standish report: does it really describe a software crisis? 15-16
- Hal Berghel, David Hoelzer:
Disk wiping by any other name. 17-21
- Diane Crawford:
Top 10 downloads from ACM's digital library. 23-24
- Dan B. Goldman:
Blockbusters and blackboards. 25-27
- Bryan Pardo:
Introduction. 28-31 - Daniel P. W. Ellis:
Extracting information from music audio. 32-37 - Roger B. Dannenberg, Christopher Raphael:
Music score alignment and computer accompaniment. 38-43 - Avery Wang:
The Shazam music recognition service. 44-48 - William P. Birmingham, Roger B. Dannenberg, Bryan Pardo:
Query by humming with the VocalSearch system. 49-52 - Jon W. Dunn, Donald Byrd, Mark Notess, Jenn Riley, Ryan Scherle:
Variations2: retrieving and using music in an academic setting. 53-58
- Alexander Perez-Pons:
Biometric marketing: targeting the online consumer. 60-66 - Václav Rajlich:
Changing the paradigm of software engineering. 67-70 - G. Daryl Nord, Tipton F. McCubbins, Jeretta Horn Nord:
E-monitoring in the workplace: privacy, legislation, and surveillance software. 72-77 - J. Drew Procaccino, June M. Verner, Steven J. Lorenzet:
Defining and contributing to software development success. 79-83 - Eugenia Y. Huang:
Tightening access policy: the hidden trade-off. 85-89 - Charlie McDowell, Linda L. Werner, Heather E. Bullock, Julian Fernald:
Pair programming improves student retention, confidence, and program quality. 90-95
- Mikko T. Siponen:
Information security standards focus on the existence of process, not its content. 97-100
- Deirdre K. Mulligan, Ari Schwartz, Indrani Mondal:
Risks of online storage. 112
Volume 49, Number 9, September 2006
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
Software: hard data. 15-17
- Meg McGinity Shannon:
Home turf. 19-21
- Diane Crawford:
Top 10 Downloads from ACM's Digital Library. 23-24
- Dennis Adams:
Wireless laptops in the classroom (and the Sesame Street syndrome). 25-27
- Günter Müller:
Introduction. 28-31 - Stefan Sackmann, Jens Strüker, Rafael Accorsi:
Personalization in privacy-aware highly dynamic systems. 32-38 - Alexander Pretschner, Manuel Hilty, David A. Basin:
Distributed usage control. 39-44 - Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
Externally verifiable code execution. 45-49 - Johannes Buchmann, Alexander May, Ulrich Vollmer:
Perspectives for cryptographic long-term security. 50-55 - Brian Subirana, Malcolm Bain:
Legal programming. 57-62
- Mark D. Hill, Jean-Luc Gaudiot, Mary W. Hall, Joe Marks, Paolo Prinetto, Donna Baglio:
A Wiki for discussing and promoting best practices in research. 63-64 - Gio Wiederhold:
What is your software worth? 65-75 - Weiguo Fan, Linda G. Wallace, Stephanie Rich, Zhongju Zhang:
Tapping the power of text mining. 76-82 - Marc Stiegler, Alan H. Karp, Ka-Ping Yee, Tyler Close, Mark S. Miller:
Polaris: virus-safe computing for Windows XP. 83-88 - Se-Joon Hong, Kar Yan Tam, Jinwoo Kim:
Mobile data service fuels the desire for uniqueness. 89-94 - Bongsug Chae, Roger McHaney:
Asian trio's adoption of Linux-based open source development. 95-99
- Peter G. Neumann:
The foresight saga. 112
Volume 49, Number 10, October 2006
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Michael A. Cusumano:
Envisioning the future of India's software services business. 15-17
- Diane Crawford:
Forum. 11-13
- Pamela Samuelson:
IBM's pragmatic embrace of open source. 21-25
- Pär J. Ågerfalk, Brian Fitzgerald:
Introduction. 26-34 - Gwanhoo Lee, William H. DeLone, J. Alberto Espinosa:
Ambidextrous coping strategies in globally distributed software development projects. 35-40 - Balasubramaniam Ramesh, Lan Cao, Kannan Mohan, Peng Xu:
Can distributed software development be agile? 41-46 - One-Ki Daniel Lee, Probir Banerjee, Kai H. Lim, Kuldeep Kumar, Jos van Hillegersberg, Kwok Kee Wei:
Aligning IT components to achieve agility in globally distributed system development. 48-54 - Patrick Wagstrom, James D. Herbsleb:
Dependency forecasting in the distributed agile organization. 55-56 - Nick V. Flor:
Globally distributed software development and pair programming. 57-58
- Jiming Liu, Kwok Ching Tsui:
Toward nature-inspired computing. 59-64 - Ray Giguette:
Building objects out of Plato: applying philosophy, symbolism, and analogy to software design. 66-71 - Casey G. Cegielski, Dianne J. Hall:
What makes a good programmer? 73-75 - Tamara Dinev:
Why spoofing is serious internet fraud. 76-82 - Il-Horn Hann, Kai Lung Hui, Yee-Lin Lai, Sang-Yong Tom Lee, Ivan P. L. Png:
Who gets spammed? 83-87 - Pratyush Bharati, Abhijit Chaudhury:
Studying the current status of technology adoption. 88-93
- Steven M. Bellovin:
Virtual machines, virtual security? 104
Volume 49, Number 11, November 2006
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Top 10 downloads from ACM's digital library. 19-20
- Robert L. Glass:
Looking into the challenges of complex IT projects. 15-17
- Peter J. Denning, Frederick Hayes-Roth:
Decision making in very large networks. 19-23
- Diane Crawford:
Top 10 downloads from ACM's Digital Library. 25-26
- Christof Teuscher:
Biologically uninspired computer science. 27-29
- Cormac J. Sreenan, Jacobus E. van der Merwe:
Introduction. 30-33 - Kuan-Ta Chen, Polly Huang, Chin-Laung Lei:
How sensitive are online gamers to network quality? 34-38 - Mark Claypool, Kajal T. Claypool:
Latency and player actions in online games. 40-45 - Jeremy Brun, Farzad Safaei, Paul Boustead:
Managing latency and fairness in networked games. 46-51 - Zefir Kurtisi, Xiaoyuan Gu, Lars C. Wolf:
Enabling network-centric music performance in wide-area networks. 52-54 - Reza Rejaie:
Anyone can broadcast video over the internet. 55-57 - Verena Kahmann, Jens Brandt, Lars C. Wolf:
Collaborative streaming in heterogeneous and dynamic scenarios. 58-63
- Dijiang Huang, Qing Cao, Amit Sinha, Marc J. Schniederjans, Cory C. Beard, Lein Harn, Deep Medhi:
New architecture for intra-domain network security issues. 64-72 - Hazel Taylor:
Critical risks in outsourced IT projects: the intractable and the unforeseen. 74-79 - Dinah M. Payne, Brett J. L. Landry:
A uniform code of ethics: business and IT professional ethics. 81-84 - Arun Sen, Peter A. Dacin, Christos Pattichis:
Current trends in web data analysis. 85-91
- Rebecca T. Mercuri, Vincent J. Lipsio, Beth Feehan:
COTS and other electronic voting backdoors. 112
Volume 49, Number 12, December 2006
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Hal Berghel:
Fungible credentials and next-generation fraud. 15-19
- ACM honors distinguished members for contributions to computing. 20-21
- Diane Crawford:
Top 10 downloads from ACM's digital library. 23-24
- Douglas S. Blank:
Robots make computer science personal. 25-27
- Vijayan Sugumaran, Sooyong Park, Kyo Chul Kang:
Introduction. 28-32 - Paul C. Clements, Lawrence G. Jones, John D. McGregor, Linda M. Northrop:
Getting there from here: a roadmap for software product line adoption. 33-36 - Charles W. Krueger:
New methods in software product line practice. 37-40 - Jan Bosch:
The challenges of broadening the scope of software product families. 41-44 - Don S. Batory, David Benavides, Antonio Ruiz Cortés:
Automated analysis of feature models: challenges ahead. 45-47 - Magnus Eriksson, Jürgen Börstler, Kjell Borg:
Software product line modeling made practical. 49-54 - Jaejoon Lee, Dirk Muthig:
Feature-oriented variability management in product line engineering. 55-59 - Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan Peter Kim:
Multi-level customization in application engineering. 60-65 - Andreas Helferich, Klaus Schmid, Georg Herzwurm:
Product management for software product lines: an unsolved problem? 66-67 - Kannan Mohan, Balasubramaniam Ramesh:
Change management patterns in software product lines. 68-72 - Tomoji Kishi, Natsuko Noda:
Formal verification and software product lines. 73-77 - Klaus Pohl, Andreas Metzger:
Software product line testing. 78-81 - Joaquín Peña, Michael G. Hinchey, Antonio Ruiz Cortés:
Multi-agent system product lines: challenges and benefits. 82-84 - Hoh Peter In, Jongmoon Baik, Sangsoo Kim, Ye Yang, Barry W. Boehm:
A quality-based cost estimation model for the product line life cycle. 85-88
- Ian O. Angell, Jan Kietzmann:
RFID and the end of cash? 90-96 - Zakaria Maamar, Djamal Benslimane, Nanjangud C. Narendra:
What can context do for web services? 98-103 - Martin Bichler, Jayant Kalagnanam:
Software frameworks for advanced procurement auction markets. 104-108 - Ali R. Montazemi:
How they manage IT: SMEs in Canada and the U.S. 109-112
- France Bélanger, Weiguo Fan, L. Christian Schaupp, Anjala S. Krishen, Jeannine Everhart, David Poteet, Kent Nakamoto:
Web site success metrics: addressing the duality of goals. 114-116
- Wilhelm Hasselbring, Matthias Rohr, Jürgen Taeger, Daniel Winteler:
Liability risks in reusing third-party software. 144
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.