The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2005, volume: 48, number: 3

  1. Diane Crawford
    Editorial pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:5- [Journal]

  2. News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:9-10 [Journal]
  3. Diane Crawford
    Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:11-13 [Journal]

  4. ACM Fellows. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:14- [Journal]
  5. David A. Patterson
    20th century vs. 21st century C&C: the SPUR manifesto. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:15-16 [Journal]
  6. Phillip G. Armour
    Project portfolios: organizational management of risk. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:17-20 [Journal]
  7. Diane Crawford
    Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:21-22 [Journal]
  8. Gregory J. Conti
    Why computer scientists should attend hacker conferences. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:23-24 [Journal]
  9. Robert L. Glass
    The first business application: a significant milestone in software history. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:25-26 [Journal]
  10. Pamela Samuelson
    Legislative challenges to the Sony safe harbor rule. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:27-31 [Journal]
  11. Norbert A. Streitz, Paddy Nixon
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:32-35 [Journal]
  12. Gaetano Borriello, Matthew Chalmers, Anthony LaMarca, Paddy Nixon
    Delivering real-world ubiquitous location systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:36-41 [Journal]
  13. Daniel M. Russell, Norbert A. Streitz, Terry Winograd
    Building disappearing computers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:42-48 [Journal]
  14. Joëlle Coutaz, James L. Crowley, Simon Dobson, David Garlan
    Context is key. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:49-53 [Journal]
  15. Steve Benford, Carsten Magerkurth, Peter Ljungstrand
    Bridging the physical and digital in pervasive gaming. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:54-57 [Journal]
  16. Saadi Lahlou, Marc Langheinrich, Carsten Röcker
    Privacy and trust issues with invisible computers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:59-60 [Journal]
  17. Liam J. Bannon, Steve Benford, John Bowers, Christian Heath
    Hybrid design creates innovative museum experiences. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:62-65 [Journal]
  18. Hans Gellersen
    Smart-Its: computers for artifacts in the physical world. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:66- [Journal]
  19. Spyros Lalis, Alexandros Karypidis, Anthony Savidis
    Ad-hoc composition in wearable and mobile computing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:67-68 [Journal]
  20. Achilles Kameas, Irene Mavrommati
    Extrovert gadgets. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:69- [Journal]
  21. Joseph A. Paradiso
    Sensate media. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:70- [Journal]
  22. Anatole Gershman, Andrew E. Fano
    Examples of commercial applications of ubiquitous computing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:71- [Journal]
  23. Jacques Cohen
    Computer science and bioinformatics. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:72-78 [Journal]
  24. Arun Sen, Atish P. Sinha
    A comparison of data warehousing methodologies. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:79-84 [Journal]

  25. SIGs announce candidates for election. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:85- [Journal]
  26. Trevor T. Moores
    Do consumers understand the role of privacy seals in e-commerce? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:86-91 [Journal]
  27. Bonnie Rubenstein-Montano, Victoria Y. Yoon, Stuart Lowry, Teresa Merlau
    A multiagent system for U.S. defense research contracting. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:93-97 [Journal]
  28. William L. Hibbard, Curtis Rueden, Steve Emmerson, Tom Rink, David Glowacki, Tom Whittaker, Don Murray, David Fulker, John Anderson
    Java distributed components for numerical visualization in VisAD. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:98-104 [Journal]
  29. Ji-Ye Mao, Karel Vredenburg, Paul W. Smith, Tom Carey
    The state of user-centered design practice. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:105-109 [Journal]
  30. Xiaoni Zhang, Victor R. Prybutok
    How the mobile communication markets differ in China, the U.S., and Europe. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:111-114 [Journal]
  31. Marco Gori, Ian H. Witten
    The bubble of web visibility. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:115-117 [Journal]
  32. Peter G. Neumann
    Anticipating disasters. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:3, pp:128- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002