The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2003, volume: 46, number: 8


  1. News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:9-10 [Journal]
  2. Diane Crawford
    Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:11-13 [Journal]
  3. Hal Berghel
    The discipline of Internet forensics. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:15-20 [Journal]
  4. Robert L. Glass
    A mugwump's-eye view of Web work. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:21-23 [Journal]
  5. William W. Agresti
    Discovery informatics. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:25-28 [Journal]
  6. David L. Dill, Bruce Schneier, Barbara Simons
    Voting and technology: who gets to count your vote? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:29-31 [Journal]
  7. Bjorn De Sutter, Koenraad De Bosschere
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:32-34 [Journal]
  8. Frank Tip, Peter F. Sweeney, Chris Laffra
    Extracting library-based Java applications. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:35-40 [Journal]
  9. Bruno De Bus, Daniel Kästner, Dominique Chanet, Ludo Van Put, Bjorn De Sutter
    Post-pass compaction techniques. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:41-46 [Journal]
  10. Arvind Krishnaswamy, Rajiv Gupta
    Mixed-width instruction sets. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:47-52 [Journal]
  11. Saumya K. Debray, William S. Evans
    Cold code decompression at runtime. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:54-60 [Journal]
  12. William S. Evans, Christopher W. Fraser
    Grammar-based compression of interpreted code. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:61-66 [Journal]
  13. Padmal Vitharana
    Risks and challenges of component-based software development. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:67-72 [Journal]
  14. Richard E. Potter
    How CIOs manage their superiors' expectations. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:74-79 [Journal]
  15. Thomas W. Jackson, Ray Dawson, Darren Wilson
    Understanding email interaction increases organizational productivity. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:80-84 [Journal]
  16. Bruce Russell, Sangit Chatterjee
    Relationship quality: the undervalued dimension of software quality. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:85-89 [Journal]
  17. Michael E. Whitman
    Enemy at the gate: threats to information security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:91-95 [Journal]
  18. Gert-Jan de Vreede, Robert M. Davison, Robert O. Briggs
    How a silver bullet may lose its shine. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:96-101 [Journal]
  19. Kenneth R. Walsh
    Analyzing the application ASP concept: technologies, economies, and strategies. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:103-107 [Journal]
  20. Thiagarajan Ravichandran, Marcus A. Rothenberger
    Software reuse strategies and component markets. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:109-114 [Journal]
  21. Zhou Zhiying
    CMM in uncertain environments. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:115-119 [Journal]
  22. Petros Nicopolitidis, Georgios I. Papadimitriou, Mohammad S. Obaidat, Andreas S. Pomportsis
    Third generation and beyond wireless systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:120-124 [Journal]
  23. Lauren Weinstein
    Spam wars. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:136- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002