Journals in DBLP
Commun. ACM 2006, volume: 49, number: 2
Diane Crawford Editorial pointers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:5- [Journal ] News track. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:9-10 [Journal ] Diane Crawford Forum. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:11-13 [Journal ] Gary F. Templeton Video image stabilization and registration technology. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:15-18 [Journal ] Siri Birgitte Uldal , Muhammad Aimal Marjan Computing in post-war Afghanistan. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:19-24 [Journal ] Pamela Samuelson Regulating technical design. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:25-30 [Journal ] Michael A. Cusumano Where does Russia fit into the global software industry? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:31-34 [Journal ] Nanda Kumar , Abbe Mowshowitz Who should govern the internet? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:35-37 [Journal ] Diane Crawford Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:39-40 [Journal ] David A. Patterson Offshoring: finally facts vs. folklore. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:41-42 [Journal ] Brajendra Panda , Joseph Giordano , Daniel Kalil Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:44-47 [Journal ] Eoghan Casey Investigating sophisticated security breaches. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:48-55 [Journal ] Brian D. Carrier Risks of live digital forensic analysis. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:56-61 [Journal ] Frank Adelstein Live forensics: diagnosing your system without killing it first. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:63-66 [Journal ] The Common Digital Evidence Storage Format Working Group: Standardizing digital evidence storage. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:67-68 [Journal ] Chet Hosmer Digital evidence bag. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:69-70 [Journal ] Sheldon Teelink , Robert F. Erbacher Improving the computer forensic analysis process through visualization. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:71-75 [Journal ] Golden G. Richard III , Vassil Roussev Next-generation digital forensics. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:76-80 [Journal ] Rahul Bhaskar State and local law enforcement is not ready for a cyber Katrina. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:81-83 [Journal ] Simson L. Garfinkel AFF: a new format for storing hard drive images. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:85-87 [Journal ] Ganesan Shankaranarayanan , Adir Even The metadata enigma. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:88-94 [Journal ] Pak-Lok Poon , Amy H. L. Lau The present B2C implementation framework. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:96-103 [Journal ] Jan Damsgaard , Mihir A. Parikh , Bharat Rao Wireless commons perils in the common good. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:104-109 [Journal ] Student de-charter notice. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:110- [Journal ] Henry M. Gladney Principles for digital preservation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:111-116 [Journal ] Stephen Owen , Pearl Brereton , David Budgen Protocol analysis: a neglected practice. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:117-122 [Journal ] Deborah J. Armstrong The quarks of object-oriented development. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:123-128 [Journal ] Roli Varma Making computer science minority-friendly. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:129-134 [Journal ] Peter G. Neumann Trustworthy systems revisited. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:2, pp:152- [Journal ]