Volume 47,
Number 1,
January 2004
Staying connected
The business of software
- ACM annual report for FY03.
23-29
Special Issue:
Multimodal interfaces that flex,
adapt,
and persist
- Sharon L. Oviatt, Trevor Darrell, Myron Flickner:
Introduction.
30-33
- Anil K. Jain, Arun Ross:
Multibiometric systems.
34-40
- Philip R. Cohen, David McGee:
Tangible multimodal interfaces for safety-critical applications.
41-46
- Roberto Pieraccini, Krishna Dayanidhi, Jonathan Bloom, Jean-Gui Dahan, Michael Phillips, Bryan R. Goodman, K. Venkatesh Prasad:
Multimodal conversational systems for automobiles.
47-49
- Harriet J. Nock, Giridharan Iyengar, Chalapathy Neti:
Multimodal processing by finding common cause.
51-56
- Leah Reeves, Jennifer C. Lai, James A. Larson, Sharon L. Oviatt, T. S. Balaji, Stéphanie Buisine, Penny Collings, Philip R. Cohen, Ben Kraal, Jean-Claude Martin, Michael F. McTear, T. V. Raman, Kay M. Stanney, Hui Su, Qian Ying Wang:
Guidelines for multimodal user interface design.
57-59
- Matthew Turk:
Computer vision in the interface.
60-67
- Li Deng, Xuedong Huang:
Challenges in adopting speech recognition.
69-75
Articles
- Cynthia F. Cohen, Stanley J. Birkin, Monica J. Garfield, Harold W. Webb:
Managing conflict in software testing.
76-81
- Albert B. Schwarzkopf, Roberto J. Mejias, Jon Jasperson, Carol S. Saunders, Hermann Gruenwald:
Effective practices for IT skills staffing.
83-88
- B. Craig Cumberland, Joseph S. Valacich, Leonard M. Jessup:
Understanding meteor burst communications technologies.
89-92
- Robert J. Aiken, Javad Boroumand, Stephen S. Wolff:
Network and computing research infrastructure: back to the future.
93-98
- Ronald Dattero, Stuart D. Galup:
Programming languages and gender.
99-102
- Seungkyoon Shin, Ram D. Gopal, G. Lawrence Sanders, Andrew B. Whinston:
Global software piracy revisited.
103-107
- Wenhong Luo, Mohammad Najdawi:
Trust-building measures: a review of consumer health portals.
108-113
Inside risks
Volume 47,
Number 2,
February 2004
Legally speaking
Viewpoint
Practical programmer
Special Issue:
Information cities
- Jakka Sairamesh, Alison Lee, Loretta Anania:
Introduction.
28-31
- Lee S. Sproull, John F. Patterson:
Making information cities livable.
33-37
- Elizabeth F. Churchill, Andreas Girgensohn, Les Nelson, Alison Lee:
Blending digital and physical spaces for ubiquitous community participation.
38-44
- Donald F. Ferguson, Jakka Sairamesh, Stuart I. Feldman:
Open frameworks for information cities.
45-49
- Petros Kavassalis, Stelios Lelis, Mahmoud Rafea, Seif Haridi:
What makes a Web site popular?
50-55
Articles
Technical opinion
Inside risks
Volume 47,
Number 3,
March 2004
Security Watch
The Business of Software
Technology Strategy and Management
Viewpoint
- John G. Messerly:
How computer games affect CS (and other) students' school performance.
29-31
Special Issue:
Emerging technologies for homeland security
- John Yen:
Introduction to the special issue on emerging technologies for homeland security.
32-35
- Robert Popp, Thomas Armour, Ted Senator, Kristen Numrych:
Countering terrorism through information technology.
36-43
- Thayne Coffman, Seth Greenblatt, Sherry Marcus:
Graph-based technologies for intelligence analysis.
45-47
- Paul A. Kogut, John Yen, Yui Leung, Shuang Sun, Rui Wang, Ted Mielczarek, Ben Hellar:
Proactive information gathering for homeland security teams.
48-50
- O. Sami Saydjari:
Cyber defense: art to science.
52-57
- Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation.
58-61
- Steve Sawyer, Andrea Tapia, Leonard Pesheck, John Davenport:
Mobility and the first responder.
62-65
- Robin R. Murphy:
Rescue robotics for homeland security.
66-68
Articles
Inside risks
Volume 47,
Number 4,
April 2004
ACM's Professional Development Centre expands learning opportunities
- John White:
ACM's Professional Development Centre expands learning opportunities.
14
The profession of IT
Digital village
Viewpoint
Special Issue:
Human-computer etiquette:
managing expectations with intentional agents
Articles
- Srinivas Krishna, Sundeep Sahay, Geoff Walsham:
Managing cross-cultural issues in global software outsourcing.
62-66
- Linda Wallace, Mark Keil:
Software project risks and their effect on outcomes.
68-73
- Blake Ives, Kenneth R. Walsh, Helmut Schneider:
The domino effect of password reuse.
75-78
- Anat Hovav, Paul Gray:
Managing academic e-journals.
79-82
- Petros Nicopolitidis, Georgios I. Papadimitriou, Mohammad S. Obaidat, Andreas S. Pomportsis:
The economics of wireless networks.
83-86
- Kevin C. Desouza, J. Roberto Evaristo:
Managing knowledge in distributed projects.
87-91
- Xiaotong Li:
Informational cascades in IT adoption.
93-97
Technical opinion
Inside risks
Volume 47,
Number 5,
May 2004
Staying connected
Practical programmer
Viewpoint
- Jeff Grove:
Wanted: public policies that foster creation of knowledge.
23-25
New architectures for financial services
Articles
2004 ACM elections
Technical opinion
Inside risks
Volume 47,
Number 6,
June 2004
The Business of Software
Legally Speaking
Viewpoint
- Stephen Lau:
The Spinning Cube of Potential Doom.
25-26
On Site
Wireless Sensor Networks
- David E. Culler, Wei Hong:
Wireless Sensor Networks - Introduction.
30-33
- Robert Szewczyk, Eric Osterweil, Joseph Polastre, Michael Hamilton, Alan M. Mainwaring, Deborah Estrin:
Habitat monitoring with sensor networks.
34-40
- Jason L. Hill, Mike Horton, Ralph Kling, Lakshman Krishnamurthy:
The platforms enabling wireless sensor networks.
41-46
- Alec Woo, Samuel Madden, Ramesh Govindan:
Networking support for query processing in sensor networks.
47-52
- Adrian Perrig, John A. Stankovic, David Wagner:
Security in wireless sensor networks.
53-57
Articles
- Janice C. Sipior, Burke T. Ward, P. Gregory Bonner:
Should spam be on the menu?
59-63
- Banphot Vatanasombut, Antonis C. Stylianou, Magid Igbaria:
How to retain online customers.
64-70
- Clayton A. Looney, Leonard M. Jessup, Joseph S. Valacich:
Emerging business models for mobile brokerage services.
71-77
- Narasimhaiah Gorla, Yan Wah Lam:
Who should work with whom?: building effective software project teams.
79-82
- Hal Berghel, David L. Sallach:
A paradigm shift in computing and IT education.
83-88
- Robert L. Glass, Venkataraman Ramesh, Iris Vessey:
An analysis of research in computing disciplines.
89-94
- Weiling Ke, Kwok Kee Wei:
Successful e-government in Singapore.
95-99
Technical Opinion
Inside risks
Volume 47,
Number 7,
July 2004
The profession of IT
On site
Security watch
Technology strategy and management
Viewpoint
- Catherine L. Mann:
What global sourcing means for U.S. IT workers and for the U.S. economy.
33-35
Articles
- Donna L. Hoffman, Thomas P. Novak, Alladi Venkatesh:
Has the Internet become indispensable?
37-42
- Linda A. Jackson, Alexander von Eye, Gretchen Barbatsis, Frank Biocca, Hiram E. Fitzgerald, Yong Zhao:
The impact of Internet use on the other side of the digital divide.
43-47
- Warren Harrison, George Heuston, Sarah Mocas, Mark Morrissey, John Richardson:
High-tech forensics.
49-52
- George P. Schell:
Universities marginalize online courses.
53-56
- Kaushal Chari, Saravanan Seshadri:
Demystifying integration.
59-63
- Maris G. Martinsons:
ERP in China: one package, two profiles.
65-68
- Huigang Liang, Yajiong Xue, William R. Boulton, Terry Anthony Byrd:
Why Western vendors don't dominate China's ERP market.
69-72
- Troy J. Strader, Sridhar N. Ramaswami:
Investor perceptions of traditional and online channels.
73-76
- Graeme G. Shanks, Elizabeth Tansley, Ron Weber:
Representing composites in conceptual modeling.
77-80
- Narasimha Bolloju:
Improving the quality of business object models using collaboration patterns.
81-86
- Huseyin Cavusoglu, Birendra Mishra, Srinivasan Raghunathan:
A model for evaluating IT security investments.
87-92
Inside risks
Volume 47,
Number 8,
August 2004
Practical programmer
Viewpoint
On site
Interactive immersion in 3D graphics
- Andrew Rosenbloom:
Introduction.
28-31
- Chris Scharver, Ray Evenhouse, Andrew E. Johnson, Jason Leigh:
Designing cranial implants in a haptic augmented reality environment.
32-38
- Ming C. Lin, William V. Baxter III, Vincent Scheib, Jeremy D. Wendt:
Physically based virtual painting.
40-47
- Benjamin Lok:
Toward the merging of real and virtual spaces.
48-53
- Mike Houston, Christopher Niederauer, Maneesh Agrawala, Greg Humphreys:
Visualizing dynamic architectural environments.
54-59
- Charles E. Jacobs, Wilmot Li, Evan Schrier, David Bargeron, David Salesin:
Adaptive document layout.
60-66
- Mike Burmester, Yvo Desmedt:
Is hierarchical public-key certification the next target for hackers?
68-74
- Rolf Oppliger:
Certified mail: the next challenge for secure messaging.
75-79
- John Gallaugher, Nigel Melville:
Electronic frontiers in foreign exchange trading.
81-87
- 2004 ACM awards banquet: a night to celebrate.
89-92
- Ralph D. Westfall:
Does telecommuting really increase productivity?
93-96
- David J. Paper, James A. Rodger, Steven J. Simon:
Voice says it all in the Navy.
97-101
- Ahmed Elfatatry, Paul J. Layzell:
Negotiating in service-oriented environments.
103-108
Inside Risks
Volume 47,
Number 9,
September 2004
Staying connected
Digital village
Viewpoint
End-user development
- Alistair G. Sutcliffe, Nikolay Mehandjiev:
Introduction.
31-32
- Gerhard Fischer, Elisa Giaccardi, Yunwen Ye, Alistair G. Sutcliffe, Nikolay Mehandjiev:
Meta-design: a manifesto for end-user development.
33-37
- Joerg Beringer:
Reducing expertise tension.
39-40
- Volker Wulf, Matthias Jarke:
The economics of end-user development.
41-42
- Alexander Repenning, Andri Ioannidou:
Agent-based end-user development.
43-46
- Brad A. Myers, John F. Pane, Andy Ko:
Natural programming languages and environments.
47-52
- Margaret M. Burnett, Curtis R. Cook, Gregg Rothermel:
End-user software engineering.
53-58
- Anders I. Mørch, Gunnar Stevens, Markus Won, Markus Klann, Yvonne Dittrich, Volker Wulf:
Component-based technologies for end-user development.
59-62
- Silvia Berti, Fabio Paternò, Carmen Santoro:
Natural development of ubiquitous interfaces.
63-64
- Alan F. Blackwell:
End-user developers at home.
65-66
- Paul Resnick, Derek L. Hansen, Caroline R. Richardson:
Calculating error rates for filtering software.
67-71
- Ozgur Turetken, David Schuff, Ramesh Sharda, Terence T. Ow:
Supporting systems analysis and design through fisheye views.
72-77
- Hai Zhuge, Xiaoqing Shi:
Toward the eco-grid: a harmoniously evolved interconnection environment.
78-83
- Michael J. Hine, Mark Hill, David Ruth, Bob Carlson, Dave Banks, Jim Troxell:
Empowering persons with disabilities with decision-support technology.
85-89
- Susan K. Lippert, Murugan Anandarajan:
Academic vs. practitioner systems planning and analysis.
91-94
Technical opinion
Inside risks
Volume 47,
Number 10,
October 2004
The business of software
Hot links
Viewpoint
Technology strategy and management
The problems and potentials of voting systems Introduction
- Peter G. Neumann:
Introduction.
28-30
- Herb Deutsch, Stephen Berger:
Voting systems standards and certifications.
31-33
- Carolyn Coggins:
Independent testing of voting systems.
34-38
- Brit J. Williams, Merle S. King:
Implementing voting systems: the Georgia method.
39-42
- Anthony Di Franco, Andrew Petro, Emmett Shear, Vladimir Vladimirov:
Small vote manipulations can swing elections.
43-45
- Douglas W. Jones:
Auditing elections.
46-50
- Rebecca T. Mercuri, L. Jean Camp:
The code of elections.
52-57
- David R. Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner:
Analyzing internet voting security.
59-64
- Jason Kitcat:
Source availability and e-voting: an advocate recants.
65-67
- Jeff Grove:
ACM statement on voting systems.
69-70
- David A. Patterson:
Latency lags bandwith.
71-75
- Huaiqing Wang, Shuozhong Wang:
Cyber warfare: steganography vs. steganalysis.
76-82
- Ioannis Samoladas, Ioannis Stamelos, Lefteris Angelis, Apostolos Oikonomou:
Open source software development should strive for even greater code maintainability.
83-87
- Nancy J. Lightner:
Evaluating e-commerce functionality with a focus on customer service.
88-92
- Michael Alan Smith:
Portals: toward an application framework for interoperability.
93-97
- Peter B. Southard, Keng Siau:
A survey of online e-banking retail initiatives.
99-102
Technical opinion
Inside risks
Volume 47,
Number 11,
November 2004
The profession of IT
Hot links
Practical programmer
Viewpoint
Bioinformatics:
transforming biomedical research and medical care
- Craig A. Stewart:
Introduction.
30-33
- David A. Bader:
Computational biology and high-performance computing.
34-41
- Toshikazu Ebisuzaki, Robert S. Germain, Makoto Taiji:
PetaFLOPS computing.
42-45
- Ross A. Overbeek, Terry Disz, Rick L. Stevens:
The SEED: a peer-to-peer environment for genome annotation.
46-51
- Mark H. Ellisman, Michael Brady, David Hart, Fang-Pang Lin, Matthias S. Müller, Larry Smarr:
The emerging role of biogrids.
52-57
- Homa Javahery, Ahmed Seffah, Thiruvengadam Radhakrishnan:
Beyond power: making bioinformatics tools user-centered.
58-63
- Christopher R. Johnson, Robert S. MacLeod, Steven G. Parker, David M. Weinstein:
Biomedical computing and visualization software environments.
64-71
- Amrit Tiwana, Mark Keil:
The one-minute risk assessment tool.
73-77
- James Y. L. Thong, Weiyin Hong, Kar Yan Tam:
What leads to acceptance of digital libraries?
78-83
- Theresa Edgington, Beomjin Choi, Katherine Henson, T. S. Raghu, Ajay S. Vinze:
Adopting ontology to facilitate knowledge sharing.
85-90
- Shobha Ganapathy, C. Ranganathan, Balaji Sankaranarayanan:
Visualization strategies and tools for enhancing customer relationship management.
92-99
- Markus Biehl, Edmund Prater, John R. McIntyre:
Remote repair, diagnostics, and maintenance.
100-106
- Thomas F. Stafford, Dennis Gonier:
What Americans like about being online.
107-112
Technical opinion
Inside risks
- Poorvi L. Vora, Ben Adida, Ren Bucholz, David Chaum, David L. Dill, David R. Jefferson, Douglas W. Jones, William Lattin, Aviel D. Rubin, Michael I. Shamos, Moti Yung:
Evaluation of voting systems.
144
Volume 47,
Number 12,
December 2004
Forum
Digital village
Hot links
President's letter
- David A. Patterson:
The health of research conferences and the dearth of big idea papers.
23-24
Security watch
The blogosphere
Columns
Inside risks
Copyright © Fri Mar 12 17:24:57 2010
by Michael Ley (ley@uni-trier.de)