Journals in DBLP
Commun. ACM 1996, volume: 39, number: 3
Roy Rada ISO 9000 Reflects the Best in Standards. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:17-20 [Journal ] Randall Davis , Pamela Samuelson , Mitchell Kapor , Jerome Reichman A New View of Intellectual Property and Software. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:21-30 [Journal ] Ravi Ganesan How to Use Key Escrow (Introduction to the Special Section). [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:32-33 [Journal ] Dorothy E. Denning , Dennis K. Branstad A Taxonomy for Key Escrow Encryption Systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:34-40 [Journal ] Stephen T. Walker , Steven B. Lipner , Carl M. Ellison , David M. Balenson Commercial Key Recovery. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:41-47 [Journal ] David Paul Maher Crypto Backup and Key Escrow. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:48-53 [Journal ] Ravi Ganesan The Yaksha Security System. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:55-60 [Journal ] Frederick P. Brooks Jr. The Computer Scientist as a Toolsmith II. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:61-68 [Journal ] A. T. Wood-Harper , Steve Corder , J. R. G. Wood , Heather Watson How We Profess: The Ethical Systems Analyst. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:69-77 [Journal ] Anthony Ralston The Demographics of Candidates for Faculty Positions in Computer Science. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:78-84 [Journal ] Guy E. Blelloch Programming Parallel Algorithms. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:85-97 [Journal ] Robert N. Charette Taking Responsibility for Our Risks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1996, v:39, n:3, pp:122- [Journal ]