Volume 49,
Number 1,
January 2006
Personal information management Editorial pointers
News track
Forum
Hot links
The business of software
Report
- ACM annual report for FY05.
21-30
Staying connected
President's letter
Viewpoint
Personal information management
- Jaime Teevan, William Jones, Benjamin B. Bederson:
Introduction.
40-43
- Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Pérez-Quiñones, Meredith M. Skeels, Tiziana Catarci:
Digital memories in an era of ubiquitous computing and abundant storage.
44-50
- Wanda Pratt, Kenton T. Unruh, Andrea Civan, Meredith M. Skeels:
Personal health information management.
51-55
- Clare-Marie Karat, Carolyn Brodie, John Karat:
Usable privacy and security for personal information management.
56-57
- Edward Cutrell, Susan T. Dumais, Jaime Teevan:
Searching to eliminate personal information management.
58-64
- Catherine C. Marshall, William Jones:
Keeping encountered information.
66-67
- Steve Whittaker, Victoria Bellotti, Jacek Gwizdka:
Email in personal information management.
68-73
- Thomas Erickson:
From PIM to GIM: personal information management in group contexts.
74-75
- David R. Karger, William Jones:
Data unification in personal information management.
77-82
- Diane Kelly:
Evaluating personal information management behaviors and tools.
84-86
Articles
- Jim Gemmell, Gordon Bell, Roger Lueder:
MyLifeBits: a personal database for everything.
88-95
- Kevin C. Desouza, Yukika Awazu, Amrit Tiwana:
Four dynamics for bringing use back into software reuse.
96-100
- George Pallis, Athena Vakali:
Insight and perspectives for content delivery networks.
101-106
- Grace J. Johnson, Paul J. Ambrose:
Neo-tribes: the power and potential of online communities in health care.
107-113
- Tim Chenoweth, Karen Corral, Haluk Demirkan:
Seven key interventions for data warehouse success.
114-119
- Lawrence A. Gordon, Martin P. Loeb:
Budgeting process for information security expenditures.
121-125
- Matti Tedre, Erkki Sutinen, Esko Kähkönen, Piet Kommers:
Ethnocomputing: ICT in cultural and social context.
126-130
Technical opinion
Inside risks
Volume 49,
Number 2,
February 2006
Next-generation cyber forensics Editorial pointers
News track
Forum
Technical opinion
International perspectives
Legally speaking
Technology strategy and management
Viewpoint
Hot links
President's letter
Next-generation cyber forensics
Student de-charter notice
- Student de-charter notice.
110
Inside risks
Volume 49,
Number 3 ,
March 2006
Editorial pointers
News track
Forum
The business of software
Practical programmer
The European report
Call for nominations for advanced member grades in the ACM
- Call for nominations for advanced member grades in the ACM.
25-26
President's letter
Viewpoint
Self-managed systems and services
- Jean-Philippe Martin-Flatin, Joseph S. Sventek, Kurt Geihs:
Introduction.
36-39
- Paul Robertson, Brian Williams:
Automatic recovery from software failure.
41-47
- George Porter, Randy H. Katz:
Effective web service load balancing through statistical monitoring.
48-54
- Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt, Vijay Machiraju:
Supporting application quality of service in shared resource pools.
55-60
- Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata:
Biologically inspired self-adaptive multi-path routing in overlay networks.
62-67
- Atul Singh, Mads Haahr:
Creating an adaptive network of hubs using Schelling's model.
69-73
ACM fellows
Articles
Technical opinion
Hot links
- Top 10 downloads from ACM's digital library.
126-127
Inside risks
Volume 49,
Number 4 ,
April 2006
Editorial pointers
News track
Forum
The profession of IT
Digital village
- Statewide databases of registered voters.
26-28
Hot links
- Top 10 Downloads from ACM's Digital Library.
29-30
President's letter
- David A. Patterson:
Seven reasons to shave your head and three reasons not to: the bald truth.
31-32
Viewpoint
Supporting exploratory search
- Ryen W. White, Bill Kules, Steven M. Drucker, Monica M. C. Schraefel:
Introduction.
36-39
- Gary Marchionini:
Exploratory search: from finding to understanding.
41-46
- Monica M. C. Schraefel, Max Wilson, Alistair Russell, Daniel A. Smith:
mSpace: improving information access to multimedia domains with multimodal exploratory search.
47-49
- Edward Cutrell, Susan T. Dumais:
Exploring personal information.
50-51
- Edward A. Fox, Fernando A. Das Neves, Xiaoyan Yu, Rao Shen, Seonho Kim, Weiguo Fan:
Exploring the computing literature with visualization and stepping stones & pathways.
52-58
- Marti A. Hearst:
Clustering versus faceted categories for information exploration.
59-61
- John Gersh, Bessie Lewis, Jaime Montemayor, Christine D. Piatko, Russell Turner:
Supporting insight-based information exploration in intelligence analysis.
63-68
- Ben Shneiderman, Benjamin B. Bederson, Steven M. Drucker:
Find that photo!: interface strategies to annotate, browse, and share.
69-71
- Bernard J. Jansen:
Using temporal patterns of interactions to design effective automated searching assistance.
72-74
Articles
Technical opinion
Inside Risks
Volume 49,
Number 5,
May 2006
Security watch
Staying connected
President's letter
Viewpoint
Two decades of the language-action perspective
Articles
Technical opinion
Inside risks
Volume 49,
Number 6,
June 2006
President's letter
The business of software
ACM plagiarism policy
Hot links
Legally speaking
Hacking and innovation
Articles
- Kallol Kumar Bagchi, Peeter Kirs, Robert Cerveny:
Global software piracy: can economic factors alone explain the trend?
70-76
- Christopher L. Carr:
Reciprocity: the golden rule of IS-user service relationship quality and cooperation.
77-83
- Timothy Paul Cronan, C. Bryan Foltz, Thomas W. Jones:
Piracy, computer crime, and IS misuse at the university.
84-90
- David Kang, Roger Chiang:
A systematic approach in managing post-deployment system changes.
91-96
- Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers:
The application of model checking for securing e-commerce transactions.
97-101
- Barry Shore:
Enterprise integration across the globally disbursed service organization.
102-106
Technical opinion
Inside risks
Volume 49,
Number 7,
July 2006
The profession of IT
Technology strategy and management
Hot links
Viewpoint
Services science
- Jim Spohrer, Doug Riecken:
Introduction.
30-32
- Henry Chesbrough, Jim Spohrer:
A research manifesto for services science.
35-40
- Jerry R. Sheehan:
Understanding service sector innovation.
42-47
- John Zysman:
The algorithmic revolution---the fourth service transformation.
48
- Roland T. Rust, Carol Miu:
What academic research tells us about service.
49-54
- Amit P. Sheth, Kunal Verma, Karthik Gomadam:
Semantics to energize the full services spectrum.
55-61
- Brenda Dietrich:
Resource planning for business services.
62-64
- William B. Rouse, Marietta L. Baba:
Enterprise transformation.
66-72
- Mary Jo Bitner, Stephen W. Brown:
The evolution and discovery of services science in business schools.
73-78
- Walter Ganz:
Germany: service engineering.
79
- Christof Weinhardt, Dirk Neumann, Carsten Holtmann:
Germany: computer-aided market engineering.
79
- Paul P. Maglio, Savitha Srinivasan, Jeffrey T. Kreulen, Jim Spohrer:
Service systems, service scientists, SSME, and innovation.
81-85
- Stuart I. Feldman, Krishna S. Nathan, Thomas Li, Kazuyoshi Hidaka, Corinna Schulze:
The Clarion Call for modern services: China, Japan, Europe, and the U.S.
86-87
Articles
Technical opinion
Inside risks
Volume 49,
Number 8,
August 2006
Practical programmer
- Robert L. Glass:
The Standish report: does it really describe a software crisis?
15-16
Digital village
Hot links
Viewpoint
Music information retrieval
Articles
- Alexander P. Pons:
Biometric marketing: targeting the online consumer.
60-66
- Václav Rajlich:
Changing the paradigm of software engineering.
67-70
- G. Daryl Nord, Tipton F. McCubbins, Jeretta Horn Nord:
E-monitoring in the workplace: privacy, legislation, and surveillance software.
72-77
- J. Drew Procaccino, June M. Verner, Steven J. Lorenzet:
Defining and contributing to software development success.
79-83
- Eugenia Y. Huang:
Tightening access policy: the hidden trade-off.
85-89
- Charlie McDowell, Linda L. Werner, Heather E. Bullock, Julian Fernald:
Pair programming improves student retention, confidence, and program quality.
90-95
Technical opinion
- Mikko T. Siponen:
Information security standards focus on the existence of process, not its content.
97-100
Inside risks
Volume 49,
Number 9,
September 2006
The business of software
Staying connected
Hot linksViewpoint
- Dennis Adams:
Wireless laptops in the classroom (and the Sesame Street syndrome).
25-27
Privacy and security in highly dynamic systems
- Günter Müller:
Introduction.
28-31
- Stefan Sackmann, Jens Strüker, Rafael Accorsi:
Personalization in privacy-aware highly dynamic systems.
32-38
- Alexander Pretschner, Manuel Hilty, David A. Basin:
Distributed usage control.
39-44
- Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
Externally verifiable code execution.
45-49
- Johannes Buchmann, Alexander May, Ulrich Vollmer:
Perspectives for cryptographic long-term security.
50-55
- Brian Subirana, Malcolm Bain:
Legal programming.
57-62
Articles
- Mark D. Hill, Jean-Luc Gaudiot, Mary W. Hall, Joe Marks, Paolo Prinetto, Donna Baglio:
A Wiki for discussing and promoting best practices in research.
63-64
- link:
wiki.acm.org/healthcc
- Gio Wiederhold:
What is your software worth?
65-75
- Weiguo Fan, Linda Wallace, Stephanie Rich, Zhongju Zhang:
Tapping the power of text mining.
76-82
- Marc Stiegler, Alan H. Karp, Ka-Ping Yee, Tyler Close, Mark S. Miller:
Polaris: virus-safe computing for Windows XP.
83-88
- Se-Joon Hong, Kar Yan Tam, Jinwoo Kim:
Mobile data service fuels the desire for uniqueness.
89-94
- Bongsug Chae, Roger McHaney:
Asian trio's adoption of Linux-based open source development.
95-99
Inside risks
Volume 49, Number 10, October 2006
Technology strategy and managementHot linksLegally speakingFlexible and distributed software processes: old petunias in new bowls?
- Pär J. Ågerfalk, Brian Fitzgerald:
Introduction.
26-34
- Gwanhoo Lee, William H. DeLone, J. Alberto Espinosa:
Ambidextrous coping strategies in globally distributed software development projects.
35-40
- Balasubramaniam Ramesh, Lan Cao, Kannan Mohan, Peng Xu:
Can distributed software development be agile?
41-46
- One-Ki Daniel Lee, Probir Banerjee, Kai H. Lim, Kuldeep Kumar, Jos van Hillegersberg, Kwok Kee Wei:
Aligning IT components to achieve agility in globally distributed system development.
48-54
- Patrick Wagstrom, James D. Herbsleb:
Dependency forecasting in the distributed agile organization.
55-56
- Nick V. Flor:
Globally distributed software development and pair programming.
57-58
ArticlesInside risks
Volume 49, Number 11, November 2006
Practical programmerThe profession of ITHot linksViewpointEntertainment networking
- Cormac J. Sreenan, Jacobus E. van der Merwe:
Introduction.
30-33
- Kuan-Ta Chen, Polly Huang, Chin-Laung Lei:
How sensitive are online gamers to network quality?
34-38
- Mark Claypool, Kajal T. Claypool:
Latency and player actions in online games.
40-45
- Jeremy Brun, Farzad Safaei, Paul Boustead:
Managing latency and fairness in networked games.
46-51
- Zefir Kurtisi, Xiaoyuan Gu, Lars C. Wolf:
Enabling network-centric music performance in wide-area networks.
52-54
- Reza Rejaie:
Anyone can broadcast video over the internet.
55-57
- Verena Kahmann, Jens Brandt, Lars C. Wolf:
Collaborative streaming in heterogeneous and dynamic scenarios.
58-63
ArticlesInside risks
Volume 49, Number 12, December 2006
Digital village
- Hal Berghel:
Fungible credentials and next-generation fraud.
15-19
ACM distinguished members
- ACM honors distinguished members for contributions to computing.
20-21
Hot linksViewpointSoftware product line engineering
- Vijayan Sugumaran, Sooyong Park, Kyo Chul Kang:
Introduction.
28-32
- Paul C. Clements, Lawrence G. Jones, John D. McGregor, Linda M. Northrop:
Getting there from here: a roadmap for software product line adoption.
33-36
- Charles W. Krueger:
New methods in software product line practice.
37-40
- Jan Bosch:
The challenges of broadening the scope of software product families.
41-44
- Don S. Batory, David Benavides, Antonio Ruiz Cortés:
Automated analysis of feature models: challenges ahead.
45-47
- Magnus Eriksson, Jürgen Börstler, Kjell Borg:
Software product line modeling made practical.
49-54
- Jaejoon Lee, Dirk Muthig:
Feature-oriented variability management in product line engineering.
55-59
- Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan Peter Kim:
Multi-level customization in application engineering.
60-65
- Andreas Helferich, Klaus Schmid, Georg Herzwurm:
Product management for software product lines: an unsolved problem?
66-67
- Kannan Mohan, Balasubramaniam Ramesh:
Change management patterns in software product lines.
68-72
- Tomoji Kishi, Natsuko Noda:
Formal verification and software product lines.
73-77
- Klaus Pohl, Andreas Metzger:
Software product line testing.
78-81
- Joaquín Peña, Michael G. Hinchey, Antonio Ruiz Cortés:
Multi-agent system product lines: challenges and benefits.
82-84
- Hoh Peter In, Jongmoon Baik, Sangsoo Kim, Ye Yang, Barry W. Boehm:
A quality-based cost estimation model for the product line life cycle.
85-88
ArticlesTechnical opinionInside risks
Copyright © Mon Nov 2 21:26:50 2009
by Michael Ley (ley@uni-trier.de)