The SCEAS System
Navigation Menu

Journals in DBLP

Commun. ACM
2007, volume: 50, number: 10

  1. Diane Crawford
    Editorial pointers. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:5- [Journal]

  2. News track. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:7-8 [Journal]

  3. Forum. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:13-14 [Journal]
  4. Michael A. Cusumano
    Extreme programming compared with Microsoft-style iterative development. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:15-18 [Journal]
  5. Pamela Samuelson
    Does copyright law need to be reformed? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:19-23 [Journal]
  6. Katia Passerini, Karen Patten, Michael R. Bartolacci, Jerry Fjermestad
    Reflections and trends in the expansion of cellular wireless services in the U.S. and China. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:25-28 [Journal]
  7. Sebastian Thrun
    Why we compete in DARPA's Urban Challenge autonomous robot race. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:29-31 [Journal]
  8. Michael L. Best, Kipp Jones, Illenin Kondo, Dhanaraj Thakur, Edem Wornyo, Calvin Yu
    Post-conflict communications: the case of Liberia. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:33-39 [Journal]
  9. Erran Carmel, Pamela Abbott
    Why 'nearshore' means that distance matters. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:40-46 [Journal]
  10. Erran Carmel, Pamela Abbott
    Nearshore locations in three principal global clusters and their respective attributes. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:45- [Journal]
  11. Matt E. Thatcher, David E. Pingry
    [Software patents] The good, the bad, and the messy. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:47-52 [Journal]
  12. Gregoris Mentzas, Kostas Kafentzis, Panos Georgolios
    Knowledge services on the semantic web. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:53-58 [Journal]
  13. U. N. Umesh, Len Jessup, Minh Q. Huynh
    [Getting ideas to market] Current issues faced by technology entrepreneurs. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:60-66 [Journal]
  14. Asli Yagmur Akbulut, Clayton A. Looney
    Inspiring students to pursue computing degrees. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:67-71 [Journal]
  15. Prabhudev Konana, Gautam Ray
    Physical product reengineering with embedded information technology. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:72-78 [Journal]
  16. Mike P. Papazoglou, Willem-Jan van den Heuvel
    Business process development life cycle methodology. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:79-85 [Journal]
  17. William L. Kuechler
    Business applications of unstructured text. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:86-93 [Journal]
  18. Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer
    Social phishing. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:94-100 [Journal]
  19. Wade H. Baker, Loren Paul Rees, Peter S. Tippett
    Necessary measures: metric-driven information security risk assessment and decision making. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:101-106 [Journal]
  20. Richard J. Goeke, Robert H. Faley
    Leveraging the flexibility of your data warehouse. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:107-111 [Journal]
  21. John D'Arcy, Anat Hovav
    Deterring internal information systems misuse. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:113-117 [Journal]

  22. Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:118- [Journal]
  23. Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman
    Toward a safer and more secure cyberspace. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:10, pp:128- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002