The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
1999, volume: 42, number: 2

  1. Diane Crawford
    Editorial Pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:5- [Journal]
  2. Robert Fox
    News Track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:9-11 [Journal]
  3. Larry Press
    The Next Generation of Business Data Processing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:13-16 [Journal]
  4. Brock N. Meeks
    The Privacy Hoax. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:17-19 [Journal]
  5. Diane Crawford
    Forum: More Ugly Truths about Consulting Assignments. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:21-24 [Journal]
  6. Diane Crawford
    Forum: More Ugly Truths about Consulting Assignments. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:21-24 [Journal]
  7. Ghinwa Jalloul
    Computing in Lebanon. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:25-26 [Journal]
  8. Lorrie Faith Cranor
    Internet Privacy - Introduction. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:28-31 [Journal]
  9. Michael K. Reiter, Aviel D. Rubin
    Anonymous Web Transactions with Crowds. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:32-38 [Journal]
  10. David M. Goldschlag, Michael G. Reed, Paul F. Syverson
    Onion Routing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:39-41 [Journal]
  11. Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer
    Consistent, Yet Anonymous, Web Access with LPWA. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:42-47 [Journal]
  12. Joseph Reagle, Lorrie Faith Cranor
    The Platform for Privacy Preferences. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:48-55 [Journal]
  13. Paola Benassi
    TRUSTe: An Online Privacy Seal Program. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:56-59 [Journal]
  14. Roger Clarke
    Internet Privacy Concerns Confirm the Case for Intervention. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:60-67 [Journal]
  15. J. Arthur Gowan, Chris Jesse, Richard G. Mathieu
    Y2K Compliance and the Distributed Enterprise. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:68-73 [Journal]
  16. Robert L. Glass
    The Realities of Software Payoffs. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:74-79 [Journal]
  17. Rajiv Sabherwal
    The Role of Trust in Outsourced IS Development Projects. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:80-86 [Journal]
  18. Wilhelm Hasselbring
    On Defining Computer Science Terminology. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:88-91 [Journal]
  19. Peter G. Neumann
    Robust Open-Source Software. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:128- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002