Journals in DBLP
Commun. ACM 2006, volume: 49, number: 6
Diane Crawford Editorial pointers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:5- [Journal ] News track. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:9-10 [Journal ] Diane Crawford Forum. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:11-13 [Journal ] David A. Patterson Farewell address: the growing and graying of ACM. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:15-18 [Journal ] Phillip G. Armour The learning edge. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:19-22 [Journal ] Ronald F. Boisvert , Mary Jane Irwin Plagiarism on the rise. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:23-24 [Journal ] Diane Crawford Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:25-26 [Journal ] Pamela Samuelson Copyrighting standards. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:27-31 [Journal ] Gregory J. Conti Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:32-36 [Journal ] Tom Cross Academic freedom and the hacker ethic. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:37-40 [Journal ] Stephen Bono , Aviel D. Rubin , Adam Stubblefield , Matthew Green Security through legality. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:41-43 [Journal ] Joe Grand Research lessons from hardware hacking. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:44-49 [Journal ] Bruce Potter Wireless hotspots: petri dish of wireless security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:50-56 [Journal ] Felix F. X. Lindner Software security is software reliability. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:57-61 [Journal ] Dan Kaminsky Explorations in namespace: white-hat hacking across the domain name system. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:62-69 [Journal ] Kallol Bagchi , Peeter Kirs , Robert Cerveny Global software piracy: can economic factors alone explain the trend? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:70-76 [Journal ] Christopher L. Carr Reciprocity: the golden rule of IS-user service relationship quality and cooperation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:77-83 [Journal ] Timothy Paul Cronan , C. Bryan Foltz , Thomas W. Jones Piracy, computer crime, and IS misuse at the university. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:84-90 [Journal ] David Kang , Roger Chiang A systematic approach in managing post-deployment system changes. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:91-96 [Journal ] Bonnie Brinton Anderson , James V. Hansen , Paul Benjamin Lowry , Scott L. Summers The application of model checking for securing e-commerce transactions. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:97-101 [Journal ] Barry Shore Enterprise integration across the globally disbursed service organization. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:102-106 [Journal ] Thomas W. Jackson , Anthony Burgess , Janet Edwards A simple approach to improving email communication. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:107-109 [Journal ] Robert N. Charette EHRs: Electronic Health Records or Exceptional Hidden Risks? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:6, pp:120- [Journal ]