The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2006, volume: 49, number: 6

  1. Diane Crawford
    Editorial pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:5- [Journal]

  2. News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:9-10 [Journal]
  3. Diane Crawford
    Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:11-13 [Journal]
  4. David A. Patterson
    Farewell address: the growing and graying of ACM. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:15-18 [Journal]
  5. Phillip G. Armour
    The learning edge. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:19-22 [Journal]
  6. Ronald F. Boisvert, Mary Jane Irwin
    Plagiarism on the rise. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:23-24 [Journal]
  7. Diane Crawford
    Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:25-26 [Journal]
  8. Pamela Samuelson
    Copyrighting standards. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:27-31 [Journal]
  9. Gregory J. Conti
    Introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:32-36 [Journal]
  10. Tom Cross
    Academic freedom and the hacker ethic. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:37-40 [Journal]
  11. Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green
    Security through legality. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:41-43 [Journal]
  12. Joe Grand
    Research lessons from hardware hacking. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:44-49 [Journal]
  13. Bruce Potter
    Wireless hotspots: petri dish of wireless security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:50-56 [Journal]
  14. Felix F. X. Lindner
    Software security is software reliability. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:57-61 [Journal]
  15. Dan Kaminsky
    Explorations in namespace: white-hat hacking across the domain name system. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:62-69 [Journal]
  16. Kallol Bagchi, Peeter Kirs, Robert Cerveny
    Global software piracy: can economic factors alone explain the trend? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:70-76 [Journal]
  17. Christopher L. Carr
    Reciprocity: the golden rule of IS-user service relationship quality and cooperation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:77-83 [Journal]
  18. Timothy Paul Cronan, C. Bryan Foltz, Thomas W. Jones
    Piracy, computer crime, and IS misuse at the university. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:84-90 [Journal]
  19. David Kang, Roger Chiang
    A systematic approach in managing post-deployment system changes. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:91-96 [Journal]
  20. Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers
    The application of model checking for securing e-commerce transactions. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:97-101 [Journal]
  21. Barry Shore
    Enterprise integration across the globally disbursed service organization. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:102-106 [Journal]
  22. Thomas W. Jackson, Anthony Burgess, Janet Edwards
    A simple approach to improving email communication. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:107-109 [Journal]
  23. Robert N. Charette
    EHRs: Electronic Health Records or Exceptional Hidden Risks? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:6, pp:120- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002