|
Journals in DBLP
Commun. ACM 2005, volume: 48, number: 11
- Diane Crawford
Editorial pointers. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:5- [Journal]
News track. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:9-10 [Journal]
- Diane Crawford
Forum. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:11-13 [Journal]
- Peter J. Denning, Andrew D. McGettrick
Recentering computer science. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:15-19 [Journal]
- Robert L. Glass
The plot to deskill software engineering. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:21-24 [Journal]
- Diane Crawford
Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:25-26 [Journal]
- Maria M. Klawe, Ben Shneiderman
Crisis and opportunity in computer science. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:27-28 [Journal]
- David A. Patterson
Rescuing our families, our neighbors, and ourselves. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:29-31 [Journal]
- Peter Kugel
It's time to think outside the computational box. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:32-37 [Journal]
- Alvin T. S. Chan
Mobile cookies management on a smart card. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:38-43 [Journal]
- Richard A. Frost
Call for a public-domain SpeechWeb. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:45-49 [Journal]
- Benjamin A. Kuperman, Carla E. Brodley, Hilmi Ozdoganoglu, T. N. Vijaykumar, Ankit Jalote
Detection and prevention of stack buffer overflow attacks. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:50-56 [Journal]
- Chuan-Fong Shih, Jason L. Dedrick, Kenneth L. Kraemer
Rule of law and the international diffusion of e-commerce. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:57-62 [Journal]
- Rana Tassabehji, Maria Vakola
Business email: the killer impact. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:64-70 [Journal]
- Sridhar P. Nerur, Riyaz Sikora, George Mangalaraj, Venugopal Balijepally
Assessing the relative influence of journals in a citation network. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:71-74 [Journal]
- Radha V. Mookerjee
Maintaining enterprise software applications. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:75-79 [Journal]
- Rosemary H. Wild, Kenneth A. Griggs, Eldon Y. Li
An architecture for distributed scenario building and evaluation. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:80-86 [Journal]
- Michael Ettredge, John Gerdes Jr., Gilbert G. Karuga
Using web-based search data to predict macroeconomic statistics. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:87-92 [Journal]
- Bill C. Hardgrave, Deborah J. Armstrong
Software process improvement: it's a journey, not a destination. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:93-96 [Journal]
- Steven M. Bellovin, Matt Blaze, Susan Landau
The real national-security needs for VoIP. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2005, v:48, n:11, pp:120- [Journal]
|