Volume 42,
Number 1,
January 1999
Legally Speaking
Digital Village
Viewpoint
- Max Hailperin:
The COPA Battle and the Future of Free Speech.
24-25
From the President
Symbolic Modeling in Practice
Articles
Technical Opinion
Inside Risks
Volume 42,
Number 2,
February 1999
Personal Computing
- Larry Press:
The Next Generation of Business Data Processing.
13-16
Electronic Frontier
On Site
Internet Privacy
- Lorrie Faith Cranor:
Internet Privacy - Introduction.
28-31
- Michael K. Reiter, Aviel D. Rubin:
Anonymous Web Transactions with Crowds.
32-38
- David M. Goldschlag, Michael G. Reed, Paul F. Syverson:
Onion Routing.
39-41
- Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer:
Consistent, Yet Anonymous, Web Access with LPWA.
42-47
- Joseph Reagle, Lorrie Faith Cranor:
The Platform for Privacy Preferences.
48-55
- Paola Benassi:
TRUSTe: An Online Privacy Seal Program.
56-59
- Roger Clarke:
Internet Privacy Concerns Confirm the Case for Intervention.
60-67
Articles
Technical Opinion
Inside Risks
Volume 42,
Number 3,
March 1999
International Perspectives
Legally Speaking
- Pamela Samuelson:
Good News and Bad News on the Intellactual Property Front.
19-24
Viewpoint
Multiagent Systems on the Net
- Anupam Joshi, Munindar P. Singh:
Multiagent Systems on the Net - Introduction.
38-40
- Rune Gustavsson:
Agents with Power.
41-47
- Tzvetan T. Drashansky, Elias N. Houstis, Naren Ramakrishnan, John R. Rice:
Networked Agents for Scientific Computing.
48-54
- Douglas E. Dyer:
Multiagent Systems and DARPA.
53
- Fumio Hattori, Takeshi Ohguro, Makoto Yokoo, Shigeo Matsubara, Sen Yoshida:
Socialware: Multiagent Systems for Supporting Network Communities.
55-61
- Alok R. Chaturvedi, Shailendra Raj Mehta:
Simulations in Economics and Management.
60-61
- Anuj K. Jain, Manuel Aparicio IV, Munindar P. Singh:
Agents for Process Coherence in Virtual Enterprises.
62-69
- Richard Green, Sangam Pant:
Multiagent Data Collection in Lycos.
70
- Aaron Sloman, Brian Logan:
Building Cognitively Rich Agents Using the SIM_AGENT Toolkit.
71-77
- Jeremy W. Baxter, Richard T. Hepplewhite:
Agents in Tank Battle Simulations.
74-75
Agents in E-Commerce
- Moses Ma:
Agents in E-Commerce - Introduction.
78-80
- Pattie Maes, Robert H. Guttman, Alexandros Moukas:
Agents That Buy and Sell.
81-91
- Tuomas Sandholm:
Automated Negotiation.
84-85
- Danny B. Lange, Mitsuru Oshima:
Seven Good Reasons for Mobile Agents.
88-89
- David Wong, Noemi Paciorek, Dana Moore:
Java-based Mobile Agents.
92-102
- Reuven Koblick:
Concordia.
96-97
- Hideki Tai, Kazuya Kosaka:
The Aglets Project.
100-101
- Barbara Hayes-Roth, M. Vaughan Johnson Jr., Robert van Gent, Keith Wescourt:
Staffing the Web with Interactive Characters.
103-105
- Robert J. Glushko, Jay M. Tenenbaum, Bart Meltzer:
An XML Framework for Agent-Based E-Commerce.
106-114
- Howard Smith, Kevin Poulter:
Share the Ontology in XML-based Trading Architectures.
110-111
Technical Opinion
Inside Risks
Volume 42,
Number 4,
April 1999
Practical Programmer
Sharing Standards
Viewpoint
Open-Source Software Development
Evolvable Hardware
Articles
Thinking Oobjectively
Inside Risks
Volume 42,
Number 5,
May 1999
Digital Village
- Hal Berghel:
How Xday Figures in the Y2K Countdown.
11-15
Personal Computing
Viewpoint
Persuasive Technologies
The Diversity of Usability Practices
Technical Opinion:
Inside Risks
Volume 42,
Number 6,
June 1999
Practical Grogrammer
- Robert L. Glass:
Is Criticism of Computing Academe Inevitably Divisive?
11-13
International Perspectives
Viewpoint
From the President
Emerging Internet Infrastructures Worldwide
Articles
Technical Opinion
Inside Risks
Volume 42,
Number 7,
July 1999
Staying Connected
From Washington
- Neil Munro:
Inforwar: AK-47s, Lies, and Videotape.
19-22
On Site
Viewpoint
- John Gallaugher:
Challenging to New Conventional Wisdom of Net Commerce Strategies.
27-29
Defensive Information Warfare
- Brajendra Panda, Joseph Giordano:
Defensive Information Warfare - Introduction.
30-32
- Shiu-Kai Chin:
High-Confidence Design for Security: Don't Trust - Verify.
33-37
- Anup K. Ghosh, Jeffrey M. Voas:
Inoculating Software for Survivability.
38-44
- Terrance Goan:
A Cop on the Beat Collecting and Appraising Intrusion Evidence.
46-52
- Robert Durst, Terrence Champion, Brian Witten, Eric Miller, Luigi Spagnuolo:
Testing and Evaluating: Computer Intrusion Detection Systems.
53-61
- Matthew Stillerman, Carla Marceau, Maureen Stillman:
Intrusion Detection for Distributed Applications.
62-69
- Sushil Jajodia, Catherine D. McCollum, Paul Ammann:
Trusted Recovery.
71-75
Articles
Inside Risks
Volume 42,
Number 8,
August 1999
Practical Programmer
- Robert L. Glass:
Buzzwordism and the Epic $150 Million Software Debacle.
17-19
Log on Education
Toward an Image Indistinguishable from Reality
- Andrew Rosenbloom:
Toward an Image Indistinguishable from Reality - Introduction.
28-31
- Demetri Terzopoulos:
Artificial Life for Computer Graphics.
32-42
- Donald P. Greenberg:
A Framework for Realistic Image Synthesis.
44-53
- George W. Fitzmaurice, Ravin Balakrishnan, Gordon Kurtenbach:
Sampling, Synthesis, and Input Devices.
54-63
- Norman I. Badler, Martha Stone Palmer, Rama Bindiganavale:
Animation Control for Real-Time Virtual Humans.
64-73
- John Kenneth Salisbury Jr.:
Making Graphics Physically Tangible.
74-81
- Steve Bryson, David N. Kenwright, Michael Cox, David Ellsworth, Robert Haimes:
Visually Exploring Gigabyte Data Sets in Real Time.
82-90
Articles
- Surendra N. Singh, Nikunj P. Dalal:
Web Home Pages as Advertisements.
91-98
- David S. Ebert, Edward Bedwell, Stephen Maher, Laura Smoliar, Elizabeth Downing:
Realizing 3D Visualization Using Grossed-beam Volumetric Displays.
100-107
- Richard G. Vedder, Michael T. Vanecek, Carl Stephen Guynes, James J. Cappel:
CEO and CIO Perspectives on Competitive Intelligence.
108-116
- Duane P. Truex, Richard Baskerville, Heinz K. Klein:
Growing Systems in Emergent Organizations.
117-123
Thinking Objectively
Inside Risks
Volume 42,
Number 9,
September 1999
Legally Speaking
International Perspectives
Viewpoint
- Vir V. Phoha:
Can a Course Be Taught Entirely Via Email?
29-30
Articles
Distributed Mission Training:
Teams,
Virtual Reality,
and Real-time Networking
Technical Opinion
- Eric W. Tatham:
Getting the Best of Both Real and Virtual Worlds.
96-98
Inside Risks
Volume 42,
Number 10,
October 1999
From Washington
- Neil Munro:
The Ongoing Tug-of-War for E-Commerce Control.
17-20
Personal Computing
From the President
UML in Action
- Grady Booch:
UML in Action - Guest Editor's Introduction.
26-28
- Cris Kobryn:
UML 2001: A Standardization Odyssey.
29-37
- Grant Larsen:
Designing Component-Based Frameworks Using Patterns in the UML.
38-45
- Bran Selic:
Turning Clockwise: Using UML in the Real-Time Domain.
46-54
- Alex E. Bell, Ryan W. Schmidt:
UMLoquent Expression of AWACS Software Design.
55-61
- Jim Conallen:
Modeling Web Application Architectures with UML.
63-70
Articles
- Michael A. Cusumano, David B. Yoffie:
What Netscape Learned from Cross-Platform Software Development.
72-78
- Michael Mattsson, Jan Bosch, Mohamed Fayad:
Framework Integration Problems, Causes, Solutions.
80-87
- Tessa A. Lau, Oren Etzioni, Daniel S. Weld:
Privacy Interfaces for Information Management.
88-94
- Håkon Wium Lie, Janne Saarela:
Multipurpose Web Publishing Using HTML, XML, and CSS.
95-101
- Donald Gotterbarn, Keith W. Miller, Simon Rogerson:
Software Engineering Code of Ethics is Approved.
102-107
Technical Opinion
- Lutz Prechelt:
Comparing Java vs. C/C++ Efficiency Differences to Interpersonal Differences.
109-112
Inside Risks
Volume 42,
Number 11,
November 1999
Digital Village
- Hal Berghel:
The Cost of Having Analog Executives in a Digital World.
11-15
Practical Programmer
Knowledge Discovery
Articles
Thinking Oobjectively
Inside Risks
Volume 42,
Number 12,
December 1999
From Washington
Staying Connected
- Meg McGinity:
Staying Connected: Flying Wireless, With a Net.
19-21
On Site
Viewpoint
Articles
- Steven Bellman, Gerald L. Lohse, Eric J. Johnson:
Predictors of Online Buying Behavior.
32-38
- Anne Adams, Martina Angela Sasse:
Users Are Not The Enemy.
40-46
- William H. Dutton, Anita Elberse, Matthew Hale:
A Case Study of a Netizen's Guide to Elections.
48-54
- Kai R. T. Larsen:
Voting Technology Implementation.
55-57
- Richard T. Watson, Sigmund Akselsen, Bente Evjemo, Nils Aaraæther:
Teledemocracy in Local Government.
58-63
- Magid Igbaria:
The Driving Forces in the Virtual Society.
64-70
- Hilda Tellioglu, Ina Wagner:
Software Cultures.
71-77
- Pearl Brereton, David Budgen, Keith H. Bennett, Malcolm Munro, Paul J. Layzell, Linda A. Macaulay, David Griffiths, Charles Stannett:
The Future of Software.
78-84
- Fay Cobb Payton, Patricia Flatley Brennan:
How a Community Health Information Network is Really Used.
85-89
Are We Ready?
Inside Risks
Copyright © Fri Mar 12 17:24:56 2010
by Michael Ley (ley@uni-trier.de)