The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2005, volume: 48, number: 11

  1. Diane Crawford
    Editorial pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:5- [Journal]

  2. News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:9-10 [Journal]
  3. Diane Crawford
    Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:11-13 [Journal]
  4. Peter J. Denning, Andrew D. McGettrick
    Recentering computer science. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:15-19 [Journal]
  5. Robert L. Glass
    The plot to deskill software engineering. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:21-24 [Journal]
  6. Diane Crawford
    Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:25-26 [Journal]
  7. Maria M. Klawe, Ben Shneiderman
    Crisis and opportunity in computer science. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:27-28 [Journal]
  8. David A. Patterson
    Rescuing our families, our neighbors, and ourselves. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:29-31 [Journal]
  9. Peter Kugel
    It's time to think outside the computational box. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:32-37 [Journal]
  10. Alvin T. S. Chan
    Mobile cookies management on a smart card. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:38-43 [Journal]
  11. Richard A. Frost
    Call for a public-domain SpeechWeb. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:45-49 [Journal]
  12. Benjamin A. Kuperman, Carla E. Brodley, Hilmi Ozdoganoglu, T. N. Vijaykumar, Ankit Jalote
    Detection and prevention of stack buffer overflow attacks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:50-56 [Journal]
  13. Chuan-Fong Shih, Jason L. Dedrick, Kenneth L. Kraemer
    Rule of law and the international diffusion of e-commerce. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:57-62 [Journal]
  14. Rana Tassabehji, Maria Vakola
    Business email: the killer impact. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:64-70 [Journal]
  15. Sridhar P. Nerur, Riyaz Sikora, George Mangalaraj, Venugopal Balijepally
    Assessing the relative influence of journals in a citation network. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:71-74 [Journal]
  16. Radha V. Mookerjee
    Maintaining enterprise software applications. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:75-79 [Journal]
  17. Rosemary H. Wild, Kenneth A. Griggs, Eldon Y. Li
    An architecture for distributed scenario building and evaluation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:80-86 [Journal]
  18. Michael Ettredge, John Gerdes Jr., Gilbert G. Karuga
    Using web-based search data to predict macroeconomic statistics. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:87-92 [Journal]
  19. Bill C. Hardgrave, Deborah J. Armstrong
    Software process improvement: it's a journey, not a destination. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:93-96 [Journal]
  20. Steven M. Bellovin, Matt Blaze, Susan Landau
    The real national-security needs for VoIP. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:11, pp:120- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002