The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2006, volume: 49, number: 2

  1. Diane Crawford
    Editorial pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:5- [Journal]

  2. News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:9-10 [Journal]
  3. Diane Crawford
    Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:11-13 [Journal]
  4. Gary F. Templeton
    Video image stabilization and registration technology. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:15-18 [Journal]
  5. Siri Birgitte Uldal, Muhammad Aimal Marjan
    Computing in post-war Afghanistan. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:19-24 [Journal]
  6. Pamela Samuelson
    Regulating technical design. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:25-30 [Journal]
  7. Michael A. Cusumano
    Where does Russia fit into the global software industry? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:31-34 [Journal]
  8. Nanda Kumar, Abbe Mowshowitz
    Who should govern the internet? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:35-37 [Journal]
  9. Diane Crawford
    Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:39-40 [Journal]
  10. David A. Patterson
    Offshoring: finally facts vs. folklore. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:41-42 [Journal]
  11. Brajendra Panda, Joseph Giordano, Daniel Kalil
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:44-47 [Journal]
  12. Eoghan Casey
    Investigating sophisticated security breaches. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:48-55 [Journal]
  13. Brian D. Carrier
    Risks of live digital forensic analysis. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:56-61 [Journal]
  14. Frank Adelstein
    Live forensics: diagnosing your system without killing it first. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:63-66 [Journal]

  15. The Common Digital Evidence Storage Format Working Group: Standardizing digital evidence storage. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:67-68 [Journal]
  16. Chet Hosmer
    Digital evidence bag. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:69-70 [Journal]
  17. Sheldon Teelink, Robert F. Erbacher
    Improving the computer forensic analysis process through visualization. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:71-75 [Journal]
  18. Golden G. Richard III, Vassil Roussev
    Next-generation digital forensics. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:76-80 [Journal]
  19. Rahul Bhaskar
    State and local law enforcement is not ready for a cyber Katrina. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:81-83 [Journal]
  20. Simson L. Garfinkel
    AFF: a new format for storing hard drive images. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:85-87 [Journal]
  21. Ganesan Shankaranarayanan, Adir Even
    The metadata enigma. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:88-94 [Journal]
  22. Pak-Lok Poon, Amy H. L. Lau
    The present B2C implementation framework. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:96-103 [Journal]
  23. Jan Damsgaard, Mihir A. Parikh, Bharat Rao
    Wireless commons perils in the common good. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:104-109 [Journal]

  24. Student de-charter notice. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:110- [Journal]
  25. Henry M. Gladney
    Principles for digital preservation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:111-116 [Journal]
  26. Stephen Owen, Pearl Brereton, David Budgen
    Protocol analysis: a neglected practice. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:117-122 [Journal]
  27. Deborah J. Armstrong
    The quarks of object-oriented development. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:123-128 [Journal]
  28. Roli Varma
    Making computer science minority-friendly. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:129-134 [Journal]
  29. Peter G. Neumann
    Trustworthy systems revisited. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:2, pp:152- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002