The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2001, volume: 44, number: 2

  1. Diane Crawford
    Editorial Pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:5- [Journal]
  2. Robert Fox
    News Track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:9-10 [Journal]
  3. Diane Crawford
    Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:11-13 [Journal]
  4. Peter J. Denning
    Who Are We? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:15-19 [Journal]
  5. Meg McGinity
    Name is the Game. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:21-23 [Journal]
  6. Steven Bellman, Eric J. Johnson, Gerald L. Lohse
    To Opt-In or Opt-Out? It Depends on the Question. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:25-27 [Journal]
  7. Imran Bashir, Enrico Serafini, Kevin Wall
    Securing network software applications: introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:28-20 [Journal]
  8. John Viega, Tadayoshi Kohno, Bruce Potter
    Trust (and mistrust) in secure applications. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:31-36 [Journal]
  9. James Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford
    Security models for web-based applications. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:38-44 [Journal]
  10. David M. Martin Jr., Richard M. Smith, Michael Brittain, Ivan Fetch, Hailin Wu
    The privacy practices of web browser extensions. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:45-50 [Journal]
  11. Anup K. Ghosh, Tara M. Swaminatha
    Software security and privacy risks in mobile e-commerce. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:51-57 [Journal]
  12. Chris I. Dalton, Tse Huong Choo
    An operating system approach to securing e-services. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:58-64 [Journal]
  13. Pamela Samuelson
    Intellectual property for an information age: introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:66-68 [Journal]
  14. Dan L. Burk
    Copyrightable functions and patentable speech. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:69-75 [Journal]
  15. Randall Davis
    The digital dilemma. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:77-83 [Journal]
  16. Yochai Benkler
    The battle over the institutional ecosystem in the digital environment. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:84-90 [Journal]
  17. A. Michael Froomkin
    The collision of trademarks, domain names, and due process in cyberspace. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:91-97 [Journal]
  18. Maureen A. O'Rourke
    Is virtual trespass an apt analogy? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:98-103 [Journal]
  19. Peter G. Neumann
    What to know about risks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:2, pp:136- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002