The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2003, volume: 46, number: 10

  1. Diane Crawford
    Editorial pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:5- [Journal]

  2. News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:9-10 [Journal]
  3. Diane Crawford
    Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:11-13 [Journal]
  4. Pamela Samuelson
    Unsolicited communications as trespass? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:15-20 [Journal]
  5. Michael A. Cusumano
    Company character and the software business. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:21-23 [Journal]
  6. Mike P. Papazoglou, Dimitrios Georgakopoulos
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:24-28 [Journal]
  7. Francisco Curbera, Rania Khalaf, Nirmal Mukhi, Stefan Tai, Sanjiva Weerawarana
    The next step in Web services. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:29-34 [Journal]
  8. Jian Yang
    Web service componentization. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:35-40 [Journal]
  9. Greg Meredith, Steve Bjorg
    Contracts and types. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:41-47 [Journal]
  10. Mark C. Little
    Transactions and Web services. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:49-54 [Journal]
  11. Fabio Casati, Eric Shan, Umeshwar Dayal, Ming-Chien Shan
    Business-oriented management of Web services. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:55-60 [Journal]
  12. Dov Dori
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:62-65 [Journal]
  13. Nathan R. Soderborg, Edward F. Crawley, Dov Dori
    System function and architecture: OPM-based definitions and operational templates. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:67-72 [Journal]
  14. Brian Henderson-Sellers
    Method engineering for OO systems development. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:73-78 [Journal]
  15. Andrew Gemino, Yair Wand
    Evaluating modeling techniques based on models of learning. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:79-84 [Journal]
  16. Graeme G. Shanks, Elizabeth Tansley, Ron Weber
    Using ontology to validate conceptual models. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:85-89 [Journal]
  17. Hans P. Moravec
    Robots, after all. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:90-97 [Journal]
  18. Sai Ho Kwok
    Watermark-based copyright protection system security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:98-101 [Journal]
  19. Willem-Jan van den Heuvel, Zakaria Maamar
    Intelligent Web services moving toward a framework to compose. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:103-109 [Journal]
  20. Pairin Katerattanakul, Bernard T. Han, Soongoo Hong
    Objective quality ranking of computing journals. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:111-114 [Journal]
  21. Cong-Cong Xing, Boumediene Belkhouche
    On pseudo object-oriented programming considered harmful. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:115-117 [Journal]
  22. Peter G. Neumann
    Information system security redux. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:10, pp:136- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002