The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2007, volume: 50, number: 8

  1. Diane Crawford
    Editorial pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:5- [Journal]

  2. News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:7-8 [Journal]

  3. Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:13-14 [Journal]

  4. Call for nominations for ACM general election. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:14- [Journal]
  5. Hal Berghel
    Better-than-nothing security practices. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:15-18 [Journal]
  6. Amy Bruckman
    Software copyright and role models. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:19-20 [Journal]
  7. Robert L. Glass
    A deja-vu look at software engineering researchers who care about practice. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:21-23 [Journal]
  8. Alfred Kobsa
    Privacy-enhanced personalization. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:24-33 [Journal]
  9. Ahmed Elfatatry
    Dealing with change: components versus services. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:35-39 [Journal]
  10. Matt E. Thatcher, David E. Pingry
    Modeling the IT value paradox. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:41-45 [Journal]
  11. John Erickson, Keng Siau
    Theoretical and practical complexity of modeling methods. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:46-51 [Journal]
  12. Jesper Simonsen
    Involving top management in IT projects. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:52-58 [Journal]
  13. Larry J. Leblanc, Michael R. Galbreth
    Designing large-scale supply chain linear programs in spreadsheets. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:59-64 [Journal]
  14. Yun Wan, Satya Menon, Arkalgud Ramaprasad
    A classification of product comparison agents. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:65-71 [Journal]
  15. Janice C. Sipior, Burke T. Ward
    Unintended invitation: organizational wi-fi use by external roaming users. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:72-77 [Journal]
  16. T. H. Tse, Francis C. M. Lau, W. K. Chan, Peter C. K. Liu, Colin K. F. Luk
    Testing object-oriented industrial software without precise oracles or results. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:78-85 [Journal]
  17. Sagnika Sen, Haluk Demirkan, Michael Goul
    Dynamic decision support through instantiation of UEML representations. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:87-93 [Journal]
  18. W. Raghupathi
    Corporate governance of IT: a framework for development. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:94-99 [Journal]

  19. Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:100- [Journal]
  20. Sakgasit Ramingwong, A. S. M. Sajeev
    Offshore outsourcing: the risk of keeping mum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:101-103 [Journal]
  21. David Lorge Parnas
    Which is riskier: OS diversity or OS monopoly? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:8, pp:112- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002