|
Journals in DBLP
Commun. ACM 2004, volume: 47, number: 10
- Diane Crawford
Editorial pointers. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:5- [Journal]
News track. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:9-10 [Journal]
- Diane Crawford
Forum. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:11-13 [Journal]
- Phillip G. Armour
Not-defect: the mature discipline of testing. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:15-18 [Journal]
- David A. Patterson
Hot links. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:19-20 [Journal]
- Fred von Lohmann
Voluntary collective licensing for music file sharing. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:21-24 [Journal]
- Michael A. Cusumano
Reflections on free and open software. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:25-27 [Journal]
- Peter G. Neumann
Introduction. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:28-30 [Journal]
- Herb Deutsch, Stephen Berger
Voting systems standards and certifications. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:31-33 [Journal]
- Carolyn Coggins
Independent testing of voting systems. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:34-38 [Journal]
- Brit J. Williams, Merle S. King
Implementing voting systems: the Georgia method. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:39-42 [Journal]
- Anthony Di Franco, Andrew Petro, Emmett Shear, Vladimir Vladimirov
Small vote manipulations can swing elections. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:43-45 [Journal]
- Douglas W. Jones
Auditing elections. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:46-50 [Journal]
- Rebecca T. Mercuri, L. Jean Camp
The code of elections. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:52-57 [Journal]
- David Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner
Analyzing internet voting security. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:59-64 [Journal]
- Jason Kitcat
Source availability and e-voting: an advocate recants. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:65-67 [Journal]
- Jeff Grove
ACM statement on voting systems. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:69-70 [Journal]
- David A. Patterson
Latency lags bandwith. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:71-75 [Journal]
- Huaiqing Wang, Shuozhong Wang
Cyber warfare: steganography vs. steganalysis. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:76-82 [Journal]
- Ioannis Samoladas, Ioannis Stamelos, Lefteris Angelis, Apostolos Oikonomou
Open source software development should strive for even greater code maintainability. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:83-87 [Journal]
- Nancy J. Lightner
Evaluating e-commerce functionality with a focus on customer service. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:88-92 [Journal]
- Michael Alan Smith
Portals: toward an application framework for interoperability. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:93-97 [Journal]
- Peter B. Southard, Keng Siau
A survey of online e-banking retail initiatives. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:99-102 [Journal]
- Casey G. Cegielski
Who values technology certification? [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:103-105 [Journal]
- Bruce Schneier
The nonsecurity of secrecy. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2004, v:47, n:10, pp:120- [Journal]
|