The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2004, volume: 47, number: 3

  1. Diane Crawford
    Editorial pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:5- [Journal]

  2. News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:9-10 [Journal]
  3. Diane Crawford
    Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:11-13 [Journal]
  4. Rebecca Mercuri
    Superscaled security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:15-18 [Journal]

  5. ACM fellows. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:19-20 [Journal]
  6. Phillip G. Armour
    Beware of counting LOC. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:21-24 [Journal]
  7. Michael A. Cusumano
    Who is liable for bugs and security flaws in software? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:25-27 [Journal]
  8. John G. Messerly
    How computer games affect CS (and other) students' school performance. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:29-31 [Journal]
  9. John Yen
    Introduction to the special issue on emerging technologies for homeland security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:32-35 [Journal]
  10. Robert Popp, Thomas Armour, Ted Senator, Kristen Numrych
    Countering terrorism through information technology. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:36-43 [Journal]
  11. Thayne Coffman, Seth Greenblatt, Sherry Marcus
    Graph-based technologies for intelligence analysis. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:45-47 [Journal]
  12. Paul A. Kogut, John Yen, Yui Leung, Shuang Sun, Rui Wang, Ted Mielczarek, Ben Hellar
    Proactive information gathering for homeland security teams. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:48-50 [Journal]
  13. O. Sami Saydjari
    Cyber defense: art to science. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:52-57 [Journal]
  14. Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu
    Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal]
  15. Steve Sawyer, Andrea Tapia, Leonard Pesheck, John Davenport
    Mobility and the first responder. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:62-65 [Journal]
  16. Robin R. Murphy
    Rescue robotics for homeland security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:66-68 [Journal]
  17. Gang Wang, Hsinchun Chen, Homa Atabakhsh
    Automatically detecting deceptive criminal identities. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:70-76 [Journal]
  18. Alberto Escudero-Pascual, Ian Hosein
    Questioning lawful access to traffic data. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:77-82 [Journal]
  19. Nikunj P. Dalal, Manjunath Kamath, William J. Kolarik, Eswar Sivaraman
    Toward an integrated framework for modeling enterprise processes. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:83-87 [Journal]
  20. Luigi Suardi
    How to manage your software product life cycle with MAUI. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:89-94 [Journal]
  21. Eyong B. Kim, Marc J. Schniederjans
    The role of personality in Web-based distance education courses. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:95-98 [Journal]
  22. Vikram Sethi, Ruth C. King, James Campbell Quick
    What causes stress in information system professionals? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:99-102 [Journal]
  23. Mark Stamp
    Risks of monoculture. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:120- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002