


default search action
ACM Crossroads Student Magazine, Volume 2
Volume 2, Number 1, September 1995
- Mark Allman:
Networking: introduction. 1 - Scott Ruthfield:
The Internet's history and development: from wartime tool to fish-cam. 2-4 - Ben W. Brumfield:
Website review: Charles Babbage Institute. 4 - Jay A. Kreibich:
The MBONE: the Internet's other backbone. 5-7 - Darren Bolding:
Network security, filters and firewalls. 8-10 - Sarah Elizabeth Burcham:
Harvest: effective use of Internet information. 10-11 - Jeremy Buhler:
The Fox Project: a language-structured approach to networking software. 12-18 - G. Bowden Wise:
Objective View Point: the ABCs of writing C++ classes: operators. 19-22 - Lorrie Faith Cranor, Adam T. Lake:
Conference report: conferences offer insifhts into how computers may affect our future. 23-26 - Saveen Reddy:
Book review: Fatal Defect: Chasing Killer Computer Bug. 26-27 - Sara M. Carlstead:
Down the road: meet our first European chapter. 27 - Lorrie Faith Cranor:
Road crew: students at work. 28
Volume 2, Number 2, December 1995
- Lorrie Faith Cranor:
The Road Less Traveled: it shouldn't be allowed! 2-3 - Jeff Robbins:
Computer-based decision-making: three maxims. 4-7 - Matt Rosenberg:
Copyright law meets the World Wide Web. 8-10 - Melissa Chaika:
Ethical considerations in gender-oriented entertainment technology. 11-13 - Sara M. Carlstead:
Review: Minerva's Machine. 14 - Rob Jackson:
"So how are your hands?": thoughts from a CS student with RSF. 15-17 - Scott Ramsey MacDonald:
Opinion: why are people afraid of computers? 18-19 - G. Bowden Wise:
Ojective View Point: getting the handle of handles. 20-23 - Jack Wilson:
Ask Jack: confused about careers? 24 - Sara M. Carlstead:
Down the Road: visit the University of Illinois at Urbana-Champaign. 25-26 - Lorrie Faith Cranor:
email. 27 - Lorrie Faith Cranor:
Road crew: students at work. 28
Volume 2, Number 3, March 1996
- George E. Hatoun, Brad Templeton:
An interview with Brad Templeton: founder, publisher and CEO, ClariNet Communications Corporation. 2 - Dan R. Ghica:
Software engineering: a motivation. 3 - Colin J. Fidge:
It's now or never. 4-5 - Mark Ray:
Dependency diagrams. 6-7 - Navid Sabbaghi:
Facilitating abstraction and reuse with ExpectTK. 8-10 - G. Bowden Wise:
Objective View Point: an overview of the Standard Template Library. 11-15 - Lorrie Faith Cranor:
The road less traveled: Internet collaboration: good, bad, and downright ugly. 16-18 - Scott Ramsay MacDonald:
Software review: to warp or not to warp. 19-20 - Jack Wilson:
Ask Jack: resume should reflect real you. 21 - Sara M. Carlstead:
Down the Road: University of Pennsylvania: the dining philosophers. 22 - Lorrie Faith Cranor:
Road crew: students at work. 24
Volume 2, Number 4, March 1996
- Michael Neuman, Diana Moore:
Computer security past and future. 2 - Aurobindo Sundaram:
An introduction to intrusion detection. 3-7 - Jason Evans, Deborah A. Frincke:
Trust mechanisms for Hummingbird. 8-11 - Lorrie Faith Cranor:
Electronic voting: computerized polls may save money, protect privacy. 12-16 - Charles Cavaiani, Jim Alves-Foss:
Mutual authenticating protocol with key distribution in client/server environment. 17-22 - G. Bowden Wise:
Objective View Point: statics: schizophrenia for C++ programmers. 23-26 - Jack Wilson:
Ask Jack: negotiating with companies. 27 - Lorrie Faith Cranor:
Road crew: students at work. 28

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.