Journals in DBLP
Commun. ACM 2006, volume: 49, number: 9
Diane Crawford Editorial pointers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:5- [Journal ] News track. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:9-10 [Journal ] Diane Crawford Forum. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:11-13 [Journal ] Phillip G. Armour Software: hard data. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:15-17 [Journal ] Meg McGinity Shannon Home turf. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:19-21 [Journal ] Diane Crawford Top 10 Downloads from ACM's Digital Library. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:23-24 [Journal ] Dennis Adams Wireless laptops in the classroom (and the Sesame Street syndrome). [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:25-27 [Journal ] Günter Müller Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:28-31 [Journal ] Stefan Sackmann , Jens Strüker , Rafael Accorsi Personalization in privacy-aware highly dynamic systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:32-38 [Journal ] Alexander Pretschner , Manuel Hilty , David A. Basin Distributed usage control. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:39-44 [Journal ] Arvind Seshadri , Mark Luk , Adrian Perrig , Leendert van Doorn , Pradeep K. Khosla Externally verifiable code execution. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:45-49 [Journal ] Johannes Buchmann , Alexander May , Ulrich Vollmer Perspectives for cryptographic long-term security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:50-55 [Journal ] Brian Subirana , Malcolm Bain Legal programming. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:57-62 [Journal ] Mark D. Hill , Jean-Luc Gaudiot , Mary W. Hall , Joe Marks , Paolo Prinetto , Donna Baglio A Wiki for discussing and promoting best practices in research. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:63-64 [Journal ] Gio Wiederhold What is your software worth? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:65-75 [Journal ] Weiguo Fan , Linda Wallace , Stephanie Rich , Zhongju Zhang Tapping the power of text mining. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:76-82 [Journal ] Marc Stiegler , Alan H. Karp , Ka-Ping Yee , Tyler Close , Mark S. Miller Polaris: virus-safe computing for Windows XP. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:83-88 [Journal ] Se-Joon Hong , Kar Yan Tam , Jinwoo Kim Mobile data service fuels the desire for uniqueness. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:89-94 [Journal ] Bongsug Chae , Roger McHaney Asian trio's adoption of Linux-based open source development. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:95-99 [Journal ] Peter G. Neumann The foresight saga. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:9, pp:112- [Journal ]