|
Journals in DBLP
Commun. ACM 2003, volume: 46, number: 10
- Diane Crawford
Editorial pointers. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:5- [Journal]
News track. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:9-10 [Journal]
- Diane Crawford
Forum. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:11-13 [Journal]
- Pamela Samuelson
Unsolicited communications as trespass? [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:15-20 [Journal]
- Michael A. Cusumano
Company character and the software business. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:21-23 [Journal]
- Mike P. Papazoglou, Dimitrios Georgakopoulos
Introduction. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:24-28 [Journal]
- Francisco Curbera, Rania Khalaf, Nirmal Mukhi, Stefan Tai, Sanjiva Weerawarana
The next step in Web services. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:29-34 [Journal]
- Jian Yang
Web service componentization. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:35-40 [Journal]
- Greg Meredith, Steve Bjorg
Contracts and types. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:41-47 [Journal]
- Mark C. Little
Transactions and Web services. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:49-54 [Journal]
- Fabio Casati, Eric Shan, Umeshwar Dayal, Ming-Chien Shan
Business-oriented management of Web services. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:55-60 [Journal]
- Dov Dori
Introduction. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:62-65 [Journal]
- Nathan R. Soderborg, Edward F. Crawley, Dov Dori
System function and architecture: OPM-based definitions and operational templates. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:67-72 [Journal]
- Brian Henderson-Sellers
Method engineering for OO systems development. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:73-78 [Journal]
- Andrew Gemino, Yair Wand
Evaluating modeling techniques based on models of learning. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:79-84 [Journal]
- Graeme G. Shanks, Elizabeth Tansley, Ron Weber
Using ontology to validate conceptual models. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:85-89 [Journal]
- Hans P. Moravec
Robots, after all. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:90-97 [Journal]
- Sai Ho Kwok
Watermark-based copyright protection system security. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:98-101 [Journal]
- Willem-Jan van den Heuvel, Zakaria Maamar
Intelligent Web services moving toward a framework to compose. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:103-109 [Journal]
- Pairin Katerattanakul, Bernard T. Han, Soongoo Hong
Objective quality ranking of computing journals. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:111-114 [Journal]
- Cong-Cong Xing, Boumediene Belkhouche
On pseudo object-oriented programming considered harmful. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:115-117 [Journal]
- Peter G. Neumann
Information system security redux. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:10, pp:136- [Journal]
|