The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2005, volume: 48, number: 8

  1. Diane Crawford
    Editorial pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:5- [Journal]

  2. News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:9-10 [Journal]
  3. Diane Crawford
    Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:11-13 [Journal]
  4. Robert L. Glass
    "Silver bullet" milestones in software history. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:15-18 [Journal]
  5. Diane Crawford
    Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:19-20 [Journal]
  6. Hal Berghel, Jacob Uecker
    WiFi attack vectors. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:21-28 [Journal]
  7. David A. Patterson
    Does ACM support matter to conferences or journals? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:29-30 [Journal]
  8. Sanjeev Arora, Bernard Chazelle
    Is the thrill gone? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:31-33 [Journal]
  9. Thomas F. Stafford
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:34-36 [Journal]
  10. Steve Gibson
    Spyware was inevitable. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:37-39 [Journal]
  11. Roger Thompson
    Why spyware poses multiple threats to security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:41-43 [Journal]
  12. Xiaoni Zhang
    What do consumers really know about spyware? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:44-48 [Journal]
  13. Lee A. Freeman, Andrew Urbaczewski
    Why do people hate spyware? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:50-53 [Journal]
  14. Neveen Farag Awad, Kristina Fitzgerald
    The deceptive behaviors that offend us most about spyware. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:55-60 [Journal]
  15. Qing Hu, Tamara Dinev
    Is spyware an Internet nuisance or public menace? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:61-66 [Journal]
  16. Mark B. Schmidt, Kirk P. Arnett
    Spyware: a little knowledge is a wonderful thing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:67-70 [Journal]
  17. Younghwa Lee, Kenneth A. Kozar
    Investigating factors affecting the adoption of anti-spyware systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:72-77 [Journal]
  18. Merrill Warkentin, Xin Luo, Gary F. Templeton
    A framework for spyware assessment. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:79-84 [Journal]
  19. Sudhindra Shukla, Fiona Fui-Hoon Nah
    Web browsing and spyware intrusion. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:85-90 [Journal]
  20. Kirk P. Arnett, Mark B. Schmidt
    Busting the ghost in the machine. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:92-95 [Journal]
  21. Robin Poston, Thomas F. Stafford, Amy Hennington
    Spyware: a view from the (online) street. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:96-99 [Journal]
  22. Indranil Bose, Raktim Pal
    Auto-ID: managing anything, anywhere, anytime in the supply chain. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:100-106 [Journal]
  23. Yihua Philip Sheng, Peter P. Mykytyn Jr., Charles R. Litecky
    Competitor analysis and its defenses in the e-marketplace. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:107-112 [Journal]
  24. Casey G. Cegielski, Brian J. Reithel, Carl M. Rebman
    Emerging information technologies: developing a timely IT strategy. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:113-117 [Journal]
  25. Gregory W. Bond
    Software as art. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:118-124 [Journal]
  26. Don Hardaway
    Sharing research in the 21st century: borrowing a page from open source software. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:125-128 [Journal]
  27. Jeanette Nasem Morgan
    Why the software industry needs a good ghostbuster. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:129-133 [Journal]
  28. Harry L. Reif, Michel Mitri
    How university professors teach project management for information systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:134-136 [Journal]
  29. Peter G. Neumann, Michael D. Byrne
    Disability-related risks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:8, pp:144- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002