Journals in DBLP
Commun. ACM 2004, volume: 47, number: 3
Diane Crawford Editorial pointers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:5- [Journal ] News track. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:9-10 [Journal ] Diane Crawford Forum. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:11-13 [Journal ] Rebecca Mercuri Superscaled security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:15-18 [Journal ] ACM fellows. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:19-20 [Journal ] Phillip G. Armour Beware of counting LOC. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:21-24 [Journal ] Michael A. Cusumano Who is liable for bugs and security flaws in software? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:25-27 [Journal ] John G. Messerly How computer games affect CS (and other) students' school performance. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:29-31 [Journal ] John Yen Introduction to the special issue on emerging technologies for homeland security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:32-35 [Journal ] Robert Popp , Thomas Armour , Ted Senator , Kristen Numrych Countering terrorism through information technology. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:36-43 [Journal ] Thayne Coffman , Seth Greenblatt , Sherry Marcus Graph-based technologies for intelligence analysis. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:45-47 [Journal ] Paul A. Kogut , John Yen , Yui Leung , Shuang Sun , Rui Wang , Ted Mielczarek , Ben Hellar Proactive information gathering for homeland security teams. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:48-50 [Journal ] O. Sami Saydjari Cyber defense: art to science. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:52-57 [Journal ] Ruzena Bajcsy , Terry Benzel , Matt Bishop , Robert Braden , Carla E. Brodley , Sonia Fahmy , Sally Floyd , W. Hardaker , Anthony D. Joseph , George Kesidis , Karl N. Levitt , Robert Lindell , Peng Liu , David Miller , Russ Mundy , Cliford Neuman , Ron Ostrenga , Vern Paxson , Phillip A. Porras , Catherine Rosenberg , J. Doug Tygar , Shankar Sastry , Daniel F. Sterne , Shyhtsun Felix Wu Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal ] Steve Sawyer , Andrea Tapia , Leonard Pesheck , John Davenport Mobility and the first responder. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:62-65 [Journal ] Robin R. Murphy Rescue robotics for homeland security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:66-68 [Journal ] Gang Wang , Hsinchun Chen , Homa Atabakhsh Automatically detecting deceptive criminal identities. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:70-76 [Journal ] Alberto Escudero-Pascual , Ian Hosein Questioning lawful access to traffic data. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:77-82 [Journal ] Nikunj P. Dalal , Manjunath Kamath , William J. Kolarik , Eswar Sivaraman Toward an integrated framework for modeling enterprise processes. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:83-87 [Journal ] Luigi Suardi How to manage your software product life cycle with MAUI. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:89-94 [Journal ] Eyong B. Kim , Marc J. Schniederjans The role of personality in Web-based distance education courses. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:95-98 [Journal ] Vikram Sethi , Ruth C. King , James Campbell Quick What causes stress in information system professionals? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:99-102 [Journal ] Mark Stamp Risks of monoculture. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:120- [Journal ]