|
Journals in DBLP
Commun. ACM 2003, volume: 46, number: 8
News track. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:9-10 [Journal]
- Diane Crawford
Forum. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:11-13 [Journal]
- Hal Berghel
The discipline of Internet forensics. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:15-20 [Journal]
- Robert L. Glass
A mugwump's-eye view of Web work. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:21-23 [Journal]
- William W. Agresti
Discovery informatics. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:25-28 [Journal]
- David L. Dill, Bruce Schneier, Barbara Simons
Voting and technology: who gets to count your vote? [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:29-31 [Journal]
- Bjorn De Sutter, Koenraad De Bosschere
Introduction. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:32-34 [Journal]
- Frank Tip, Peter F. Sweeney, Chris Laffra
Extracting library-based Java applications. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:35-40 [Journal]
- Bruno De Bus, Daniel Kästner, Dominique Chanet, Ludo Van Put, Bjorn De Sutter
Post-pass compaction techniques. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:41-46 [Journal]
- Arvind Krishnaswamy, Rajiv Gupta
Mixed-width instruction sets. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:47-52 [Journal]
- Saumya K. Debray, William S. Evans
Cold code decompression at runtime. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:54-60 [Journal]
- William S. Evans, Christopher W. Fraser
Grammar-based compression of interpreted code. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:61-66 [Journal]
- Padmal Vitharana
Risks and challenges of component-based software development. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:67-72 [Journal]
- Richard E. Potter
How CIOs manage their superiors' expectations. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:74-79 [Journal]
- Thomas W. Jackson, Ray Dawson, Darren Wilson
Understanding email interaction increases organizational productivity. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:80-84 [Journal]
- Bruce Russell, Sangit Chatterjee
Relationship quality: the undervalued dimension of software quality. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:85-89 [Journal]
- Michael E. Whitman
Enemy at the gate: threats to information security. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:91-95 [Journal]
- Gert-Jan de Vreede, Robert M. Davison, Robert O. Briggs
How a silver bullet may lose its shine. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:96-101 [Journal]
- Kenneth R. Walsh
Analyzing the application ASP concept: technologies, economies, and strategies. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:103-107 [Journal]
- Thiagarajan Ravichandran, Marcus A. Rothenberger
Software reuse strategies and component markets. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:109-114 [Journal]
- Zhou Zhiying
CMM in uncertain environments. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:115-119 [Journal]
- Petros Nicopolitidis, Georgios I. Papadimitriou, Mohammad S. Obaidat, Andreas S. Pomportsis
Third generation and beyond wireless systems. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:120-124 [Journal]
- Lauren Weinstein
Spam wars. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:8, pp:136- [Journal]
|