The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2000, volume: 43, number: 12

  1. Diane Crawford
    Editorial Pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:5- [Journal]
  2. Robert Fox
    News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:9-10 [Journal]
  3. Diane Crawford
    Forum: Software piracy is not just economics anymore. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:11-13 [Journal]
  4. Elliot Soloway, Cathleen A. Norris, Phyllis Blumenfeld, Ronald Marx, Joseph Krajcik, Barry Fishman
    The three Ts of elementary education. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:15-19 [Journal]
  5. Roy Rada, John Craparo
    Sharing standards: standardizing software projects. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:21-25 [Journal]
  6. Boaz Gelbord
    Signing your 011001010 - The problems of digital signatures. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:27-28 [Journal]
  7. Andrew Rosenbloom
    Trusting technology: Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:31-32 [Journal]
  8. Batya Friedman, Peter H. Kahn Jr., Daniel C. Howe
    Trust online. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:34-40 [Journal]
  9. Judith S. Olson, Gary M. Olson
    i2i trust in e-commerce. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:41-44 [Journal]
  10. Paul Resnick, Ko Kuwabara, Richard Zeckhauser, Eric Friedman
    Reputation systems. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:45-48 [Journal]
  11. Justine Cassell, Timothy W. Bickmore
    External manifestations of trustworthiness in the interface. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:50-56 [Journal]
  12. Ben Shneiderman
    Designing trust into online experiences. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:57-59 [Journal]
  13. Eric M. Uslaner
    Social capital and the net. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:60-64 [Journal]
  14. Jennifer Kreie, Timothy Paul Cronan
    Making ethical decisions. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:66-71 [Journal]
  15. Detlef Schoder, Pai-Ling Yin
    Building firm trust online. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:73-79 [Journal]
  16. Sara Jones, Marc Wilikens, Philip Morris, Marcelo Masera
    Trust requirements in e-business. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:81-87 [Journal]
  17. Trevor T. Moores, Gurpreet Dhillon
    Software piracy: a view from Hong Kong. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:88-93 [Journal]
  18. Masud Ahmad Malik
    On the perils of programming. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:95-97 [Journal]
  19. Bruce Schneier
    Semantic network attacks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:168- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002