default search action
Communications of the ACM (CACM), Volume 51, 2008
Volume 51, Number 1, January 2008 (EE)
- Diane Crawford:
Editorial pointers. 5
- Diane Crawford:
Forum. 7-9
- Phillip G. Armour:
Digging CACM. 13-15
- Meg McGinity Shannon:
Happy anniversary, CACM. 17-19
- Peter A. Freeman:
Back to experimentation. 21-22
- Stuart I. Feldman:
Fifty years and still growing. 23
- Diane Crawford:
Introduction. 24-26 - Calvin C. Gotlieb:
A time to retrospect and prospect. 26-29 - M. Stuart Lynn:
The battle of the covers. 30-32 - Robert L. Ashenhurst:
The battle behind the scenes. 33-34 - Peter J. Denning:
Déjà vu all over again. 35-39 - Jacques Cohen:
From academia to the editorship. 41-43 - Moshe Y. Vardi:
CACM: past, present, and future. 44-48
- Andrew Rosenbloom:
Introduction. 50-51 - Jon Louis Bentley:
In the realm of insight and creativity. 52-54 - Whitfield Diffie:
Information security: 50 years behind, 50 years ahead. 55-57 - Jeannette M. Wing:
Five deep questions in computing. 58-60 - Eugene H. Spafford:
Inspiration and trust. 61-62 - Rodney A. Brooks:
The next 50 years. 63-64 - Pamela Samuelson:
Hacking intellectual property law. 65-67 - Stephen B. Jenkins:
Ode to code. 67 - Gul Agha:
Computing in pervasive cyberspace. 68-70 - Gregory J. Conti:
Could googling take down a president? 71-73 - Jon Crowcroft:
Toward a network architecture that does everything. 74-77 - Peter G. Neumann:
Reflections on computer-related risks. 78-80 - Jason Leigh, Maxine D. Brown:
Cyber-commons: merging real and virtual worlds. 82-85
- Gordon Bell:
Bell's law for the birth and death of computer classes. 86-94 - Greta L. Polites, Richard T. Watson:
The centrality and prestige of CACM. 95-100
- Diane Crawford:
Introduction. 104 - David A. Patterson:
Technical perspective: the data center is the computer. 105 - Jeffrey Dean, Sanjay Ghemawat:
MapReduce: simplified data processing on large clusters. 107-113 - Bernard Chazelle:
Technical perspective: finding a good neighbor, near and fast. 115 - Alexandr Andoni, Piotr Indyk:
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. 117-122
- Leonard S. Zegans:
The psychology of risks. 152
Volume 51, Number 2, February 2008 (EE)
- Diane Crawford:
Editorial pointers. 5-6
- News track. 7-8
- Diane Crawford:
Forum. 9-11
- Diane Crawford:
SIGs announce candidates for election. 14
- Michael A. Cusumano:
Managing software development in globally distributed teams. 15-17
- Andy Oram:
Peer to patent needs your expertise. 19-20
- Pamela Samuelson, Jerome Reichman, Graeme Dinwoodie:
How to achieve (some) balance in anti-circumvention laws. 21-25
- Stuart I. Feldman:
ACM annual report for FY07. 27-34
- Jeffrey Y. Kim, Jonathan P. Allen, Elan Lee:
Alternate reality gaming. 36-42 - Eric Chuan-Fong Shih, Kenneth L. Kraemer, Jason L. Dedrick:
IT diffusion in developing countries. 43-48 - Mark T. Keane, Maeve O'Brien, Barry Smyth:
Are people biased in their use of search engines? 49-52 - Nolan J. Taylor, Eleanor T. Loiacono, Richard T. Watson:
Alternative scenarios to the "banner" years. 53-58 - Peter V. Marks, Peter Polak, Scott McCoy, Dennis F. Galletta:
Sharing knowledge. 60-65 - Alfred Loo:
The myths and truths of wireless security. 66-71 - Munir Mandviwalla, Abhijit Jain, Julie Fesenmaier, Jeff Smith, Paul Weinberg, Greg Meyers:
Municipal broadband wireless networks. 72-80 - Vicki R. McKinney, Darryl D. Wilson, Nita Brooks, Anne O'Leary-Kelly, Bill C. Hardgrave:
Women and men in the IT profession. 81-84 - Bing Liu, Alexander Tuzhilin:
Managing large collections of data mining models. 85-89
- Min-Yen Kan, Yee Fan Tan:
Record matching in digital library metadata. 91-94
- Pascal Meunier:
Software transparency and purity. 104
Volume 51, Number 3, March 2008 (EE)
- Diane Crawford:
Editorial pointers. 5-6
- News track. 7-8
- Phillip G. Armour:
The inaccurate conception. 13-16
- Robert L. Glass:
Managing for innovation. 17-18
- Chenglie Hu:
Just say 'A Class Defines a Data Type'. 19-21
- ACM fellows. 22-23
- Dana Cuff, Mark H. Hansen, Jerry Kang:
Urban sensing: out of the woods. 24-33 - Jason O. B. Soh, Bernard C. Y. Tan:
Mobile gaming. 35-39 - Liping Zhao:
Patterns, symmetry, and symmetry breaking. 40-46 - Robert E. Pinsker, Shaomin Li:
Costs and benefits of XBRL adoption: early evidence. 47-50 - Bernd Carsten Stahl, Carole Brooke:
The contribution of critical IS research. 51-55 - David Wright, Michael Friedewald, Wim Schreurs, Michiel Verlinden, Serge Gutwirth, Yves Punie, Ioannis Maghiros, Elena Vildjiounaite, Petteri Alahuhta:
The illusion of security. 56-63 - Iris A. Junglas, Richard T. Watson:
Location-based services. 65-69 - Robert LaRose, Nora J. Rifon, Richard J. Enbody:
Promoting personal responsibility for internet safety. 71-76 - Frank R. Safayeni, P. Robert Duimering, Kimberley Zheng, Natalia Derbentseva, Christopher Poile, Bing Ran:
Requirements engineering in new product development. 77-82 - Kwangsu Cho, Tingting (Rachel) Chung, William R. King, Christian D. Schunn:
Peer-based computer-supported knowledge refinement: an empirical investigation. 83-88
- Dinesh K. Gauri, Amit Bhatnagar, H. Raghav Rao:
Role of word of mouth in online store loyalty. 89-91
- Xiaoming Lu, George Ledin Jr.:
Wireless sensor networks and the risks of vigilance. 104
Volume 51, Number 4, April 2008 (EE)
- Diane Crawford:
Editorial pointers. 5-6
- Diane Crawford:
Forum. 10
- News track. 11-12
- Hal Berghel:
Faith-based security. 13-17
- Peter J. Denning, Peter Yaholkovsky:
Getting to "we". 19-24
- Call for nominations for advanced member grades in the ACM. 25-26
- ACM honors distinguished and senior members. 27-30
- Daniel Kunkle, Gene Cooperman:
Solving Rubik's Cube: disk is the new RAM. 31-33
- Ryan West:
The psychology of security. 34-40 - Richard T. Watson, Marie-Claude Boudreau, Paul T. York, Martina E. Greiner, Donald E. Wynn Jr.:
The business of open source. 41-46 - Ziqi Liao, Michael Tow Cheung:
Measuring consumer satisfaction in internet banking: a core framework. 47-51 - Luc Moreau, Paul Groth, Simon Miles, Javier Vázquez-Salceda, John Ibbotson, Sheng Jiang, Steve Munroe, Omer F. Rana, Andreas Schreiber, Victor Tan, László Z. Varga:
The provenance of electronic data. 52-58 - Hsiu-Ping Yueh, Shihkuan Hsu:
Designing a learning management system to support instruction. 59-63 - Lawrence D. Bodin, Lawrence A. Gordon, Martin P. Loeb:
Information security and risk management. 64-68 - Dawn G. Gregg, Judy E. Scott:
A typology of complaints about eBay sellers. 69-74 - Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks:
Missing links: building critical social ties for global collaborative teamwork. 76-81 - Ivy Chan, Chee-Kwong Chao:
Knowledge management in small and medium-sized enterprises. 83-88 - Mohamed Khalifa, Kathy Ning Shen:
Demographic changes in IS research productivity and impact. 89-94 - Pamela Whitten, Deirdre Mylod, Goran Gavran, Howard Sypher:
"Most Wired Hospitals" rate patient satisfaction. 96-102
- Chuck Litecky, Bipin Prabhakar, Kirk P. Arnett:
The size of the IT job market. 107-109
- Lauren Weinstein:
A current affair. 112
Volume 51, Number 5, May 2008 (EE)
- Diane Crawford:
Editorial pointers. 5-6
- News track. 7-8
- Diane Crawford:
Forum. 9-11
- ACM A.M. Turing Award nominations solicited. 14
- Jacques Cohen:
The crucial role of CS in systems and synthetic biology. 15-18
- Meg McGinity Shannon:
This menu has changed. 19-21 - 2008 ACM Elections. 22-31
- Wingyan Chung:
Web searching in a multilingual world. 32-40 - Irit Hadar, Uri Leron:
How intuitive is object-oriented design? 41-46 - Dov Dori:
Words from pictures for dual-channel processing. 47-52 - Silvana Trimi, Hong Sheng:
Emerging trends in M-government. 53-58 - Kannan Mohan, Peng Xu, Balasubramaniam Ramesh:
Improving the change-management process. 59-64 - Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Coordination in emergency response management. 66-73 - Alessandro Garcia, Carlos José Pereira de Lucena:
Taming heterogeneous agent architectures. 75-81 - Oded Nov, Bharat Rao:
Technology-facilitated 'Give According to Your Abilities, Receive According to Your Needs'. 83-87 - Bezalel Gavish, Christopher Tucci:
Reducing internet auction fraud. 89-97
- Edgar A. Whitley, Ian Hosein:
Departmental influences on policy design. 98-100
- Steven M. Bellovin:
The physical world and the real world. 104
Volume 51, Number 6, June 2008 (EE)
- Diane Crawford:
Editorial pointers. 5-6
- News track. 7-8
- Diane Crawford:
Forum. 9-11
- Hal Berghel:
BRAP forensics. 15-20
- Robert L. Glass:
Software design and the monkey's brain. 21-22
- Arik Ragowsky, Paul S. Licker, David Gefen:
Give me information, not technology. 23-25
- Roel Vertegaal, Ivan Poupyrev:
Introduction. 26-30 - Hiroshi Ishii:
The tangible user interface and its evolution. 32-36 - Jun Rekimoto:
Organic interaction technologies: from stone to skin. 38-44 - Elise Co, Nikita Pashenkov:
Emerging display technologies for organic user interfaces. 45-47 - David Holman, Roel Vertegaal:
Organic user interfaces: designing computers in any way, shape, or form. 48-55 - Eli Blevis:
Sustainability implications of organic user interface technologies: an inky problem. 56-57 - Amanda J. Parkes, Ivan Poupyrev, Hiroshi Ishii:
Designing kinetic interactions for organic user interfaces. 58-65 - Carsten Schwesig:
What makes an interface feel organic? 67-69 - Kas Oosterhuis, Nimish Biloria:
Interactions with proactive architectural spaces: the muscle projects. 70-78 - Sachiko Kodama:
Dynamic ferrofluid sculpture: organic shape-changing art forms. 79-81
- Jim Horning, Peter G. Neumann:
Risks of neglecting infrastructure. 112 - Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Joan Feigenbaum, James A. Hendler, Gerald J. Sussman:
Information accountability. 82-87 - Charalambos L. Iacovou, Robbie T. Nakatsu:
A risk profile of offshore-outsourced development projects. 89-94 - Chon Abraham, Richard T. Watson, Marie-Claude Boudreau:
Ubiquitous access: on the front lines of patient care and safety. 95-99 - Wayne Wei Huang, Jonathon Greene, John Day:
Outsourcing and the decrease of IS program enrollment. 101-104
Volume 51, Number 7, July 2008 (EE)
- Moshe Y. Vardi:
"Where do you come from? and where are you going?". 5
- Scott E. Delman:
The art and business of revitalizing a 50-year-old science and technology magazine. 7
- David Roman:
Your attention, please. 8
- Brian Hayes:
Cloud computing. 9-11 - Michael Ross, Mark Oskin:
Quantum computing. 12-13 - Leah Hoffmann:
In search of dependable design. 14-16
- Erik Wilde, Robert J. Glushko:
XML fever. 40-46 - Adam Leventhal:
Flash storage memory. 47-51 - Margo I. Seltzer:
Beyond relational databases. 52-58
- James A. Hendler, Nigel Shadbolt, Wendy Hall, Tim Berners-Lee, Daniel J. Weitzner:
Web science: an interdisciplinary approach to understanding the web. 60-69 - Mark Oskin:
The revolution inside the box. 70-78
- James R. Larus, Christos Kozyrakis:
Transactional memory. 80-88
- David E. Shaw, Martin M. Deneroff, Ron O. Dror, Jeffrey Kuskin, Richard H. Larson, John K. Salmon, Cliff Young, Brannon Batson, Kevin J. Bowers, Jack C. Chao, Michael P. Eastwood, Joseph Gagliardo, J. P. Grossman, C. Richard Ho, Doug Ierardi, István Kolossváry, John L. Klepeis, Timothy Layman, Christine McLeavey, Mark A. Moraes, Rolf Mueller, Edward C. Priest, Yibing Shan, Jochen Spengler, Michael Theobald, Brian Towles, Stanley C. Wang:
Anton, a special-purpose machine for molecular dynamics simulation. 91-97 - Philip Alexander Levis, Eric A. Brewer, David E. Culler, David Gay, Samuel Madden, Neil Patel, Joseph Polastre, Scott Shenker, Robert Szewczyk, Alec Woo:
The emergence of a networking primitive in wireless sensor networks. 99-106
Volume 51, Number 8, August 2008 (EE)
- Stuart I. Feldman:
A new beginning, a fond farewell. 5
- Words both kind and contrary. 7
- David Roman:
Small changes hint at bigger things. 8
- Hal R. Varian:
Designing the perfect auction. 9-11 - Peggy Aycinena:
Access for all. 12-14 - Sarah Underwood:
Challenging poverty. 15-17 - Michael Ross:
Remembering Jim. 18
- Jim Waldo:
Scaling in games and virtual worlds. 38-44 - Mache Creeger:
CTO storage roundtable. 45-51 - Michi Henning:
The rise and fall of CORBA. 52-57
- Luis von Ahn, Laura Dabbish:
Designing games with a purpose. 58-67 - Diomidis Spinellis, Panagiotis Louridas:
The collaborative organization of knowledge. 68-73
- Yoav Shoham:
Computer science and game theory. 74-79
- Stephen M. Blackburn, Kathryn S. McKinley, Robin Garner, Chris Hoffmann, Asjad M. Khan, Rotem Bentzur, Amer Diwan, Daniel Feinberg, Daniel Frampton, Samuel Z. Guyer, Martin Hirzel, Antony L. Hosking, Maria Jump, Han Lee, J. Eliot B. Moss, Aashish Phansalkar, Darko Stefanovic, Thomas VanDrunen, Daniel von Dincklage, Ben Wiedermann:
Wake up and smell the coffee: evaluation methodology for the 21st century. 83-89 - Tim Harris, Simon Marlow, Simon L. Peyton Jones, Maurice Herlihy:
Composable memory transactions. 91-100
Volume 51, Number 9, September 2008 (EE)
- Wendy Hall:
ACM's place in the global picture. 5
- Scott E. Delman:
50 Years young. 7
- Knuth's art of recovering from errors. 9
- David Roman:
Current features. 10
- Kirk L. Kroeker:
Finding diamonds in the rough. 11-13 - Logan Kugler:
Ubiquitous video. 14-16 - Samuel Greengard:
Privacy matters. 17-18 - Leah Hoffmann:
Wisdom from Randy Pausch. 19
- Michael A. Cusumano:
Technology strategy and management: The puzzle of Apple. 22-24 - George V. Neville-Neil:
Kode vicious: Pride and prejudice (the Vasa). 25-26 - Cameron Wilson, Peter Harsha:
IT policy: Science policy isn't always about science. 27-29 - Richard G. Baraniuk, C. Sidney Burrus:
Viewpoint: Global warming toward open educational resources. 30-32
- Ian T. Foster, Savas Parastatidis, Paul Watson, Mark McKeown:
How do I model state?: Let me count the ways. 34-41 - Matthew Garrett:
Powering down. 42-46 - Mache Creeger:
CTO storage roundtable, part two. 47-52 - Mike Hinchey, Michael Jackson, Patrick Cousot, Byron Cook, Jonathan P. Bowen, Tiziana Margaria:
Software engineering and formal methods. 54-59
- Dmitri Roussinov, Weiguo Fan, Jose Antonio Robles-Flores:
Beyond keywords: Automated question answering on the web. 60-65 - Bertrand Meyer:
Design and code reviews in the age of the internet. 66-71
- Philip A. Bernstein, Laura M. Haas:
Information integration in the enterprise. 72-79
- Christopher J. Rossbach, Hany E. Ramadan, Owen S. Hofmann, Donald E. Porter, Bhandari Aditya, Emmett Witchel:
TxLinux and MetaTM: transactional memory and the operating system. 83-91 - Fabian Kuhn, Thomas Locher, Roger Wattenhofer:
Distributed selection: a missing piece of data aggregation. 93-99
- Robin S. Poston:
Using and fixing biased rating schemes. 105-109 - Kannan Mohan, Radhika Jain:
Using traceability to mitigate cognitive biases in software development. 110-114 - Alexander Perez-Pons, Peter Polak:
Understanding user perspectives on biometric technology. 115-118 - Lina Zhou, Dongsong Zhang:
Following linguistic footprints: automatic deception detection in online communication. 119-122 - Julia Kotlarsky, Ilan Oshri, Kuldeep Kumar, Jos van Hillegersberg:
Towards agility in design in global component-based development. 123-127 - Neset Hikmet, Eileen Z. Taylor, Christopher J. Davis:
The student productivity paradox: technology mediated learning in schools. 128-131 - Patrick Y. K. Chau, Fujun Lai, Dahui Li:
What factors drive the assimilation of internet technologies in China? 132-135
Volume 51, Number 10, October 2008 (EE)
- Moshe Y. Vardi:
Let us---together---make CACM exciting. 5
- Scott E. Delman:
The softer side of Communications. 7
- Prep students for irreversible software trends. 8-9
- David Roman:
Communications site to launch in January. 10
- Patrick Kurp:
Green computing. 11-13 - Alex Wright:
Searching the deep web. 14-15 - Cyrus Farivar:
Clean elections. 16-18 - Leah Hoffmann:
An inspiring legacy. 19
- Martin Campbell-Kelly:
Historical reflections: Will the future of software be open source? 21-23 - Deborah G. Johnson:
Computing ethics: Computer experts: guns-for-hire or professionals? 24-26 - Alex E. Bell:
From the front lines: DOA with SOA. 27-28 - David L. Dill, Daniel Castro:
Point/counterpoint: The U.S. should ban paperless electronic voting machines. 29-33
- George V. Neville-Neil:
Code spelunking redux. 36-41 - Erik Wilde, Robert J. Glushko:
Document design matters. 43-49 - Kayvon Fatahalian, Mike Houston:
A closer look at GPUs. 50-57
- Jennifer Jie Xu, Hsinchun Chen:
The topology of dark networks. 58-65 - Jacob Slonim, Sam Scully, Michael McAllister:
Crossroads for Canadian CS enrollment. 66-70
- Lila Kari, Grzegorz Rozenberg:
The many facets of natural computing. 72-83
- James Hays, Alexei A. Efros:
Scene completion using millions of photographs. 87-94 - Sanjeev Arora, Satish Rao, Umesh V. Vazirani:
Geometry, flows, and graph-partitioning algorithms. 96-105
- Leah Hoffmann:
Q&A: A complex thinker. 112
- Mary C. Jones:
Large scale project team building: beyond the basics. 113-116 - Gediminas Adomavicius, Jesse C. Bockstedt, Alok Gupta, Robert J. Kauffman:
Understanding evolution in technology ecosystems. 117-122 - Seokwoo Song, Sridhar P. Nerur, James T. C. Teng:
Understanding the influence of network positions and knowledge processing styles. 123-126 - Brian L. Dos Santos, Lars S. Smith:
RFID in the supply chain: panacea or Pandora's box? 127-131 - Chen Ye, Kevin C. Desouza, Sridhar R. Papagari Sangareddy, Sanjeev Jha:
Switching between consumer technologies. 132-136 - Mary Darking, Edgar A. Whitley, Paolo Dini:
Governing diversity in the digital ecosystem. 137-140 - Amrit Tiwana, Ashley A. Bush, Hiroshi Tsuji, Kenichi Yoshida, Akito Sakurai:
Myths and paradoxes in Japanese IT offshoring. 141-145
Volume 51, Number 11, November 2008 (EE)
- John R. White:
On the 10th anniversary of ACM's Digital Library. 5
- Diane Crawford:
Jim Gray: humble visionary. 7
- Even science would benefit from auctions. 8-9
- David Roman:
A first look at the redesigned site. 10
- Leah Hoffmann:
Damage control. 11-13 - Bill Howard:
Analyzing online social networks. 14-16 - David Lindley:
The limits of computability. 17-19
- Avi Goldfarb, Catherine Tucker:
Economic and business dimensions: Search engine advertising. 22-24 - Susan Landau:
Privacy and security: A multidimensional problem. 25-26 - Pamela Samuelson:
Legally speaking: Quantafying the value of patent exhaustion. 27-29 - Joanna Goode:
Education: Reprogramming college preparatory computer science. 31-33
- Bryan Cantrill, Jeff Bonwick:
Real-world concurrency. 34-39 - Calin Cascaval, Colin Blundell, Maged M. Michael, Harold W. Cain, Peng Wu, Stefanie Chiras, Siddhartha Chatterjee:
Software transactional memory: why is it only a research toy? 40-46 - Mache Creeger:
CTO roundtable on virtualization. 47-53
- Michael Stonebraker, David J. DeWitt:
A tribute to Jim Gray. 54-57 - Alexander S. Szalay:
Jim Gray, astronomer. 58-65
- Jon M. Kleinberg:
The convergence of social and technological networks. 66-72
- Chris Stolte, Diane Tang, Pat Hanrahan:
Polaris: a system for query, analysis, and visualization of multidimensional databases. 75-84 - Ramakrishna Kotla, Allen Clement, Edmund L. Wong, Lorenzo Alvisi, Michael Dahlin:
Zyzzyva: speculative Byzantine fault tolerance. 86-95
- Peter Winkler:
Puzzled: Circular food. 112
- DaeSoo Kim, Terence T. Ow, Minjoon Jun:
SME strategies: an assessment of high vs. low performers. 113-117 - Claudio Feijóo, José Luis Gómez Barroso, David Rojo-Alonso:
A European perspective of VoIP in market competition. 118-120 - Judy E. Scott:
Technology acceptance and ERP documentation usability. 121-124 - Faiz Currim, Sudha Ram:
Conceptually modeling windows and bounds for space and time in database constraints. 125-129 - Quan Z. Sheng, Boualem Benatallah, Zakaria Maamar:
User-centric services provisioning in wireless environments. 130-135 - DongBack Seo, Ariel I. La Paz:
Exploring the dark side of IS in achieving organizational agility. 136-139 - Srinivasan Venkatraman, Hillol Bala, Viswanath Venkatesh, Jack Bates:
Six strategies for electronic medical records systems. 140-144
Volume 51, Number 12, December 2008 (EE)
- Ronald F. Boisvert, Holly E. Rushmeier:
ACM publications: access and sustainability. 5
- Scott E. Delman:
Looking back and forward. 7
- Apple builds great platforms, too, not just products. 8
- David Roman:
Previewing the new CACM web site. 10
- Kirk L. Kroeker:
Living machines. 11-13 - Ted Selker:
Touching the future. 14-16 - Samuel Greengard:
Upwardly mobile. 17-19 - Leah Hoffmann:
Making a difference. 20
- Alok Aggarwal:
Emerging markets - Labor supply in the Indian IT industry. 21-23 - Cameron Wilson, Peter Harsha:
IT policy - Advising policymakers is more than just providing advice. 24-26 - George V. Neville-Neil:
Kode vicious - Permanence and change. 27-28 - Peter J. Denning, Chris Gunderson, Frederick Hayes-Roth:
The profession of IT - Evolutionary system development. 29-31 - James R. Hamilton:
Interview - Database dialogue with Pat Selinger. 32-35
- Steve Souders:
High-performance web sites. 36-41 - Mache Creeger:
CTO virtualization roundtable, part II. 43-49
- Francine Berman:
Got data?: a guide to data preservation in the information age. 50-56 - Ian Horrocks:
Ontologies and the semantic web. 58-67
- Oren Etzioni, Michele Banko, Stephen Soderland, Daniel S. Weld:
Open information extraction from the web. 68-74
- Michael Stonebraker:
Technical perspective - One size fits all: an idea whose time has come and gone. 76 - Peter A. Boncz, Martin L. Kersten, Stefan Manegold:
Breaking the memory wall in MonetDB. 77-85 - Martin C. Rinard:
Technical perspective - Patching program errors. 86 - Gene Novark, Emery D. Berger, Benjamin G. Zorn:
Exterminator: Automatically correcting memory errors with high probability. 87-95
- Peter Winkler:
Puzzled - Solutions and sources. 118 - Cory Doctorow:
Future tense - Pester power. 120-
- Peter Duchessi, InduShobha N. Chengalur-Smith:
Enhancing business performance via vendor managed inventory applications. 121-127 - Chee Wei Phang, Atreyi Kankanhalli:
A framework of ICT exploitation for e-participation initiatives. 128-132 - Michael J. Davern, Carla Wilkin:
Evolving innovations through design and use. 133-137 - Michael Näf, David A. Basin:
Two approaches to an information security laboratory. 138-142 - Patrick Stacey, Joe Nandhakumar:
Opening up to agile games development. 143-146 - Ross A. Malaga:
Worst practices in search engine optimization. 147-150 - Pierre R. Berthon, Leyland F. Pitt, Richard T. Watson:
From Genesis to Revelations: the technology diaspora. 151-154 - Vivien K. G. Lim, Thompson S. H. Teo, Jen Yuin Chin:
Technical opinion - Bosses and their e-manners. 155-157
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.