Volume 46,
Number 1,
January 2003
Staying connected
Security watch
Viewpoint
- Alan H. Karp:
Making money selling content that others are giving away.
21-22
Special Issue:
Digital government
- Gary Marchionini, Hanan Samet, Larry Brandt:
Introduction.
24-27
- Hsinchun Chen, Daniel Dajun Zeng, Homa Atabakhsh, Wojciech Wyzga, Jennifer Schroeder:
COPLINK: manging law enforcement data and knowledge.
28-34
- Steve Goddard, Sherri K. Harms, Stephen E. Reichenbach, Tsegaye Tadesse, William J. Waltman:
Geospatial decision support for drought risk management.
35-37
- Lois M. L. Delcambre, Timothy Tolle:
Harvesting information to sustain forests.
38-39
- Sharon S. Dawes, Lise Préfontaine:
Understanding new models of collaboration for delivering governments services.
40-42
- Jane E. Fountain:
Prospects for improving the regulatory process using e-rulemaking.
43-44
- Sarah Nusser, Leslie L. Miller, Keith C. Clarke, Michael F. Goodchild:
Geospatial IT for mobile field data collection.
45-46
- Eduard H. Hovy:
Using an ontology to simplify data access.
47-49
- Leana Golubchik, William C. Cheng, Cheng-Fu Chou, Samir Khuller, Hanan Samet, C. Justin Wan:
Bistro: a scalable and secure data transfer service for digital government applications.
50-51
- Carol A. Hert, Elizabeth D. Liddy, Ben Shneiderman, Gary Marchionini:
Supporting statistical electronic table usage by citizens.
52-54
- Cathryn S. Dippo:
FedStats: the gateway to federal statistics.
55
- Alan F. Karr, Adrian Dobra, Ashish P. Sanil:
Table servers protect confidentiality in tabular data releases.
57-58
- Alan M. MacEachren, Frank Hardisty, Xiping Dai, Linda Pickle:
Supporting visual analysis of federal geospatial statistics.
59-60
- Hanan Samet, Houman Alborzi, Frantisek Brabec, Claudio Esperança, Gísli R. Hjaltason, Frank Morgan, Egemen Tanin:
Use of the SAND spatial browser for digital government applications.
61-64
- Peggy Agouris, Anthony Stefanidis:
Efficient summarization of spatiotemporal events.
65-66
- William L. Scherlis, Jon Eisenberg:
IT research, innovation, and e-government.
67-68
- Melvyn Ciment:
A personal history of the NSF digital government program.
69-70
Articles
Technical opinion
- Kevin C. Desouza:
Barriers to effective use of knowledge management systems in software engineering.
99-101
Inside risks
Volume 46,
Number 2,
February 2003
Electronic frontier
The business of software
On site
ACM inducts new fellows
Viewpoint
Special Issue:
Technical and social components of peer-to-peer computing
Articles
- Jinyoul Lee, Keng Siau, Soongoo Hong:
Enterprise integration with ERP and EAI.
54-60
- Bay Arinze, Murugan Anandarajan:
A framework for using OO mapping methods to rapidly configure ERP systems.
61-65
- Amitava Dutta, Rahul Roy:
Anticipating internet diffusion.
66-71
- James J. Jiang, Gary Klein, Debbie B. Tesch, Houn-Gee Chen:
Closing the user and provider service quality gap.
72-76
- Ravindra Krovi, Akhilesh Chandra, Balaji Rajagopalan:
Information flow parameters for managing organizational processes.
77-82
- Xinping Shi, Philip C. Wright:
E-commercializing business operations.
83-87
Thinking objectively
Inside risks
Volume 46,
Number 3,
March 2003
Technology strategy and management
The profession of IT
On site
- Mohammad Rob:
The rise and fall of an e-commerce program.
25-26
Viewpoint
- Bob Besaha:
Bounty hunting in the patent base.
27-29
Special issue:
Attentive user interfaces
- Roel Vertegaal:
Introduction.
30-33
- Shumin Zhai:
What's in the eyes for attentive input.
34-39
- Jeffrey S. Shell, Ted Selker, Roel Vertegaal:
Interacting with groups of computers.
40-46
- Paul P. Maglio, Christopher S. Campbell:
Attentive agents.
47-51
- Eric Horvitz, Carl Myers Kadie, Tim Paek, David Hovel:
Models of attention in computing and communication: from principles to applications.
52-59
- Patrick Baudisch, Douglas DeCarlo, Andrew T. Duchowski, Wilson S. Geisler:
Focusing on the essential: considering attention in display design.
60-66
- D. Scott McCrickard, Christa M. Chewar:
Attuning notification design to user goals and attention costs.
67-72
Articles
Technical opinion
Inside risks
Volume 46,
Number 4,
April 2003
Digital village
Viewpoint
- Jeff Grove:
Legal and technological efforts to lock up content threaten innovation.
21-22
- Ramesh Jain:
Folk computing.
27-29
Staying connected
Special Issue:
Digital rights management and fair use by design
- Deirdre K. Mulligan:
Introduction.
30-33
- John S. Erickson:
Fair use, DRM, and trusted computing.
34-39
- Pamela Samuelson:
DRM {and, or, vs.} the law.
41-45
- Julie E. Cohen:
DRM and privacy.
46-49
- Séverine Dusollier:
Fair use by design in the European copyright directive of 2001.
51-55
- Edward W. Felten:
A skeptical view of DRM and fair use.
56-59
- Barbara Fox, Brian A. LaMacchia:
Encouraging recognition of fair uses in DRM systems.
61-63
- Brian Fitzgerald, Nancy L. Russo, Tom O'Kane:
Software development method tailoring at Motorola.
64-70
- François Pachet:
Content management for electronic music distribution.
71-75
- Susan A. Brown, Viswanath Venkatesh:
Bringing non-adopters along: the challenge facing the PC industry.
76-80
- Julia Brande Earp, David L. Baumer:
Innovative web use to learn about consumer behavior and online privacy.
81-83
- Ali F. Farhoomand, Pauline S. P. Ng, William Conley:
Building a successful e-business: the FedEx story.
84-89
- Keng Siau, Zixing Shen:
Building customer trust in mobile commerce.
91-94
- Shan Ling Pan, Jae-Nam Lee:
Using e-CRM for a unified view of the customer.
95-99
Technical opinion
Inside risks
Volume 46,
Number 5,
May 2003
The business of software
Practical programmer
Viewpoint
Special Issue:
Wireless networking security
- Aviel D. Rubin:
Introduction.
28-30
- Russell Housley, William A. Arbaugh:
Security problems in 802.11-based networks.
31-34
- Nancy Cam-Winget, Russell Housley, David Wagner, Jesse Walker:
Security flaws in 802.11 data link protocols.
35-39
- Simon Byers, David P. Kormann:
802.11b access point mapping.
41-46
- Terry Schmidt, Anthony M. Townsend:
Why Wi-Fi wants to be free.
47-52
- Amir Herzberg:
Payments and banking with mobile personal devices.
53-58
- Jae Kyu Lee, Mye M. Sohn:
The eXtensible Rule Markup Language.
59-64
- Julie Smith David, William E. McCarthy, Brian S. Sommer:
Agility: the key to survival of the fittest in the software market.
65-69
- Leah Graham, Panagiotis Takis Metaxas:
"Of course it's true; I saw it on the Internet!": critical thinking in the Internet era.
70-75
- Amrit Tiwana:
Affinity to infinity in peer-to-peer knowledge platforms.
76-80
- Ziqi Liao:
Real-time taxi dispatching using Global Positioning Systems.
81-83
- Jae-Nam Lee, Minh Q. Huynh, Ron Chi-Wai Kwok, Shih-Ming Pi:
IT outsourcing evolution: past, present, and future.
84-89
Technical opinion
Inside risks
Volume 46,
Number 6,
June 2003
Security watch
Legally speaking
Viewpoint
Special Issue:
E-services
Articles
Technical opinion
Inside risks
Volume 46,
Number 7,
July 2003
Technology strategy and management
The profession of IT
Viewpoint
Special Issue:
A game experience in every application
- Andrew Rosenbloom:
Introduction.
28-31
- William R. Swartout, Michael van Lent:
Making a game of system design.
32-39
- Mary C. Whitton:
Making virtual environments compelling.
40-47
- Ramesh Jain:
Experiential computing.
48-55
- Michael Tsang, George W. Fitzmaurice, Gordon Kurtenbach, Azam Khan:
Game-like navigation and responsiveness in non-game applications.
56-61
- Joseph A. Paradiso:
Tracking contact and free gesture across large interactive surfaces.
62-69
- Carlo Tomasi, Abbas Rafii, Ilhami Torunoglu:
Full-size projection keyboard for handheld devices.
70-75
- Cynthia Breazeal, Andrew G. Brooks, Jesse Gray, Matthew D. Hancher, John McBean, Walter Dan Stiehl, Joshua Strickon:
Interactive robot theatre.
76-85
- Paul Vickers, James L. Alty:
Siren songs and swan songs debugging with music.
86-93
Articles
- Daniel May, Paul Taylor:
Knowledge management with patterns.
94-99
- Jackie Rees, Subhajyoti Bandyopadhyay, Eugene H. Spafford:
PFIRES: a policy framework for information security.
101-106
- Sudip Bhattacharjee, Ram D. Gopal, G. Lawrence Sanders:
Digital music and online sharing: software piracy 2.0?
107-111
- Alan H. Karp:
E-speak e-xplained.
112-118
- Varun Grover, Khawaja Asjad Saeed:
The telecommunication industry revisited: the changing pattern of partnerships.
119-125
- Timon C. Du, Eldon Y. Li, An-Pin Chang:
Mobile agents in distributed network management.
127-132
- D. Scott Brandt, Lorna Uden:
Insight into mental models of novice Internet searchers.
133-136
- Younghwa Lee, Zoonky Lee, Kai R. T. Larsen:
Coping with Internet channel conflict.
137-142
Technical opinion
Inside risks
Volume 46,
Number 8,
August 2003
Editorial pointers
News track
Forum
Digital village
- Hal Berghel:
The discipline of Internet forensics.
15-20
Practical programmer
Viewpoint
Software techniques for program compaction
- Bjorn De Sutter, Koenraad De Bosschere:
Introduction.
32-34
- Frank Tip, Peter F. Sweeney, Chris Laffra:
Extracting library-based Java applications.
35-40
- Bruno De Bus, Daniel Kästner, Dominique Chanet, Ludo Van Put, Bjorn De Sutter:
Post-pass compaction techniques.
41-46
- Arvind Krishnaswamy, Rajiv Gupta:
Mixed-width instruction sets.
47-52
- Saumya K. Debray, William S. Evans:
Cold code decompression at runtime.
54-60
- William S. Evans, Christopher W. Fraser:
Grammar-based compression of interpreted code.
61-66
Articles
Technical opinion
Inside risks
Volume 46,
Number 9,
September 2003
Editorial pointers
News track
Forum
Staying connected
International perspectives
The business of software
Viewpoint
Why universities require computer science students to take math
Articles
- Alfred W. Loo:
The future of peer-to-peer computing.
56-61
- Michiel Ronsse, Koenraad De Bosschere, Mark Christiaens, Jacques Chassin de Kergommeaux, Dieter Kranzlmüller:
Record/replay for nondeterministic program executions.
62-67
- Atreyi Kankanhalli, Fransiska Tanudidjaja, Juliana Sutanto, Bernard C. Y. Tan:
The role of IT in successful knowledge management initiatives.
69-73
- Roberto Di Pietro, Luigi V. Mancini:
Security and privacy issues of handheld and wearable wireless devices.
74-79
- Ali F. Farhoomand, Pauline S. P. Ng:
Creating sustainable competitive advantage through internetworked communities.
83-88
- G. Premkumar:
Alternate distribution strategies for digital music.
89-95
- Robert G. Fichman, Mary J. Cronin:
Information-rich commerce at a crossroads: business and technology adoption requirements.
96-102
- Ziqi Liao, Michael Tow Cheung:
Concurrent-convergent strategy in IT consulting.
103-104
Technical opinion
Inside risks
Virtual extension
- Ari-Veikko Anttiroiko:
Building strong e-democracy: the role of technology in developing democracy for the information age.
121-128
- Patrick Y. K. Chau, Simpson Poon:
Octopus: an e-cash payment system success story.
129-133
- John Erickson, Keng Siau:
e-ducation.
134-140
- Kiran Jude Fernandes, Vinesh Raja, Julian Eyre:
Cybersphere: the fully immersive spherical projection system.
141-146
- Lee A. Freeman:
A refresher in data flow diagramming: an effective aid for analysts.
147-151
- Chittibabu Govindarajulu:
End users: who are they?
152-159
- Ernest Goss, Uma G. Gupta:
Women and the Internet: is there an economic payoff?
160-166
- Kathleen S. Hartzel:
How self-efficacy and gender issues affect software adoption and use.
167-171
- Richard D. Holowczak, Nabil R. Adam, Francisco J. Artigas, Irfan Bora:
Data warehousing in environmental digital libraries.
172-178
- Ned Kock, Camille Auspitz, Brad King:
Web-supported course partnerships: bringing industry and academia together.
179-183
- Sarv Devaraj, Ming Fang, Rajiv Kohli:
E-loyalty: elusive ideal or competitive edge?
184-191
- James M. Laffey, Dale Musser, Herbert Remidez, Josh Gottdenker:
Networked systems for schools that learn.
192-200
- William Lewis Jr., Richard T. Watson, Ann Pickren:
An empirical assessment of IT disaster risk.
201-206
- Trevor T. Moores:
The effect of national culture and economic wealth on global software piracy rates.
207-215
- Scott L. Schneberger, Ephraim R. McLean:
The complexity cross: implications for practice.
216-225
- Jeff Hoi Yan Yeung, J. P. Shim, Andy Yin Kit Lai:
Current progress of e-commerce adoption: small and medium enterprises in Hong Kong.
226-232
- Kunihiko Higa, Bongsik Shin:
The telework experience in Japan.
233-242
- Nitin Singh:
Emerging technologies to support supply chain management.
243-247
- Ritu Agarwal, Atish P. Sinha:
Object-oriented modeling with UML: a study of developers' perceptions.
248-256
- Jarke J. van Wijk, Frank van Ham, Huub van de Wetering:
Rendering hierarchical data.
257-263
- Kevin Zhu, Bryan MacQuarrie:
The economics of digital bundling: the impact of digitization and bundling on the music industry.
264-270
Volume 46,
Number 10,
October 2003
Editorial pointers
News track
Forum
Legally speaking
Technology strategy and management
Special Issue:
Service-oriented computing
Special Issue:
Conceptual modeling and system architecting
Articles
Technical Opinion
Inside Risks
Volume 46,
Number 11,
November 2003
The Profession of IT
Practical Programmer
Viewpoint
Special Issue:
Blueprint for the future of high-performance networking
- Maxine D. Brown:
Introduction.
30-33
- Thomas A. DeFanti, Cees de Laat, Joe Mambretti, Kees Neggers, Bill St. Arnaud:
TransLight: a global-scale LambdaGrid for e-science.
34-41
- Aaron Falk, Theodore Faber, Joseph A. Bannister, Andrew A. Chien, Robert L. Grossman, Jason Leigh:
Transport protocols for high performance.
42-49
- Ian T. Foster, Robert L. Grossman:
Data integration in a bandwidth-rich world.
50-57
- Larry Smarr, Andrew A. Chien, Thomas A. DeFanti, Jason Leigh, Philip M. Papadopoulos:
The OptIPuter.
58-67
- Harvey Newman, Mark H. Ellisman, John A. Orcutt:
Data-intensive e-science frontier research.
68-77
Articles
- Stuart J. Barnes, Sid L. Huff:
Rising sun: iMode and the wireless Internet.
78-84
- Daniel P. Lorence:
The perils of data misreporting.
85-88
- Robert F. Easley, John G. Michel, Sarv Devaraj:
The MP3 open standard and the music industry's response to Internet piracy.
90-96
- Padmal Vitharana, Fatemeh Zahedi, Hemant K. Jain:
Design, retrieval, and assembly in component-based software development.
97-102
- A. Graham Peace:
Balancing free speech and censorship: academia's response to the Internet.
104-109
- Narasimhaiah Gorla:
Features to consider in a data warehousing system.
111-115
- Jeffrey P. Landry, J. Harold Pardue, Herbert E. Longenecker Jr., David L. Feinstein:
A common theme for IT degree programs.
117-120
- Donald Anselmo, Henry F. Ledgard:
Measuring productivity in the software industry.
121-125
- David Nordfors, Michel Bajuk, Lena Norberg, Jochen Brinkmann, Dan Forbush:
Introducing a country to Internet-enabled expert networks.
127-132
Inside Risks
Volume 46,
Number 12,
December 2003
Nominees for elections and report of the ACM nominating committee
- Nominees for elections and report of the ACM nominating committee.
14
Digital village
Security watch
Viewpoint
- Alan H. Karp:
Enforce POLA on processes to control viruses.
27-29
Special Issue:
Mobile commerce opportunities and challenges