Volume 49,
Number 1,
January 2006
Personal information management Editorial pointers
News track
Forum
Hot links
The business of software
Report
- ACM annual report for FY05.
21-30
Staying connected
President's letter
Viewpoint
Personal information management
- Jaime Teevan, William Jones, Benjamin B. Bederson:
Introduction.
40-43
- Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Pérez-Quiñones, Meredith M. Skeels, Tiziana Catarci:
Digital memories in an era of ubiquitous computing and abundant storage.
44-50
- Wanda Pratt, Kenton T. Unruh, Andrea Civan, Meredith M. Skeels:
Personal health information management.
51-55
- Clare-Marie Karat, Carolyn Brodie, John Karat:
Usable privacy and security for personal information management.
56-57
- Edward Cutrell, Susan T. Dumais, Jaime Teevan:
Searching to eliminate personal information management.
58-64
- Catherine C. Marshall, William Jones:
Keeping encountered information.
66-67
- Steve Whittaker, Victoria Bellotti, Jacek Gwizdka:
Email in personal information management.
68-73
- Thomas Erickson:
From PIM to GIM: personal information management in group contexts.
74-75
- David R. Karger, William Jones:
Data unification in personal information management.
77-82
- Diane Kelly:
Evaluating personal information management behaviors and tools.
84-86
Articles
- Jim Gemmell, Gordon Bell, Roger Lueder:
MyLifeBits: a personal database for everything.
88-95
- Kevin C. Desouza, Yukika Awazu, Amrit Tiwana:
Four dynamics for bringing use back into software reuse.
96-100
- George Pallis, Athena Vakali:
Insight and perspectives for content delivery networks.
101-106
- Grace J. Johnson, Paul J. Ambrose:
Neo-tribes: the power and potential of online communities in health care.
107-113
- Tim Chenoweth, Karen Corral, Haluk Demirkan:
Seven key interventions for data warehouse success.
114-119
- Lawrence A. Gordon, Martin P. Loeb:
Budgeting process for information security expenditures.
121-125
- Matti Tedre, Erkki Sutinen, Esko Kähkönen, Piet Kommers:
Ethnocomputing: ICT in cultural and social context.
126-130
Technical opinion
Inside risks
Volume 49,
Number 2,
February 2006
Next-generation cyber forensics Editorial pointers
News track
Forum
Technical opinion
International perspectives
Legally speaking
Technology strategy and management
Viewpoint
Hot links
President's letter
Next-generation cyber forensics
Student de-charter notice
- Student de-charter notice.
110
Inside risks
Volume 49,
Number 3 ,
March 2006
Editorial pointers
News track
Forum
The business of software
Practical programmer
The European report
Call for nominations for advanced member grades in the ACM
- Call for nominations for advanced member grades in the ACM.
25-26
President's letter
Viewpoint
Self-managed systems and services
- Jean-Philippe Martin-Flatin, Joseph S. Sventek, Kurt Geihs:
Introduction.
36-39
- Paul Robertson, Brian C. Williams:
Automatic recovery from software failure.
41-47
- George Porter, Randy H. Katz:
Effective web service load balancing through statistical monitoring.
48-54
- Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt, Vijay Machiraju:
Supporting application quality of service in shared resource pools.
55-60
- Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata:
Biologically inspired self-adaptive multi-path routing in overlay networks.
62-67
- Atul Singh, Mads Haahr:
Creating an adaptive network of hubs using Schelling's model.
69-73
ACM fellows
Articles
Technical opinion
Hot links
- Top 10 downloads from ACM's digital library.
126-127
Inside risks
Volume 49,
Number 4 ,
April 2006
Editorial pointers
News track
Forum
The profession of IT
Digital village
- Statewide databases of registered voters.
26-28
Hot links
- Top 10 Downloads from ACM's Digital Library.
29-30
President's letter
- David A. Patterson:
Seven reasons to shave your head and three reasons not to: the bald truth.
31-32
Viewpoint
Supporting exploratory search
- Ryen W. White, Bill Kules, Steven M. Drucker, Monica M. C. Schraefel:
Introduction.
36-39
- Gary Marchionini:
Exploratory search: from finding to understanding.
41-46
- Monica M. C. Schraefel, Max Wilson, Alistair Russell, Daniel A. Smith:
mSpace: improving information access to multimedia domains with multimodal exploratory search.
47-49
- Edward Cutrell, Susan T. Dumais:
Exploring personal information.
50-51
- Edward A. Fox, Fernando A. Das Neves, Xiaoyan Yu, Rao Shen, Seonho Kim, Weiguo Fan:
Exploring the computing literature with visualization and stepping stones & pathways.
52-58
- Marti A. Hearst:
Clustering versus faceted categories for information exploration.
59-61
- John Gersh, Bessie Lewis, Jaime Montemayor, Christine D. Piatko, Russell Turner:
Supporting insight-based information exploration in intelligence analysis.
63-68
- Ben Shneiderman, Benjamin B. Bederson, Steven M. Drucker:
Find that photo!: interface strategies to annotate, browse, and share.
69-71
- Bernard J. Jansen:
Using temporal patterns of interactions to design effective automated searching assistance.
72-74
Articles
Technical opinion
Inside Risks
Volume 49,
Number 5,
May 2006
Security watch
Staying connected
President's letter
Viewpoint
Two decades of the language-action perspective
Articles
Technical opinion
Inside risks
Volume 49,
Number 6,
June 2006
President's letter
The business of software
ACM plagiarism policy
Hot links
Legally speaking
Hacking and innovation
Articles
- Kallol Kumar Bagchi, Peeter Kirs, Robert Cerveny:
Global software piracy: can economic factors alone explain the trend?
70-76
- Christopher L. Carr:
Reciprocity: the golden rule of IS-user service relationship quality and cooperation.
77-83
- Timothy Paul Cronan, C. Bryan Foltz, Thomas W. Jones:
Piracy, computer crime, and IS misuse at the university.
84-90
- David Kang, Roger Chiang:
A systematic approach in managing post-deployment system changes.
91-96
- Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers:
The application of model checking for securing e-commerce transactions.
97-101
- Barry Shore:
Enterprise integration across the globally disbursed service organization.
102-106
Technical opinion
Inside risks
Volume 49,
Number 7,
July 2006
The profession of IT
Technology strategy and management
Hot links
Viewpoint
Services science
- Jim Spohrer, Doug Riecken:
Introduction.
30-32
- Henry Chesbrough, Jim Spohrer:
A research manifesto for services science.
35-40
- Jerry R. Sheehan:
Understanding service sector innovation.
42-47
- John Zysman:
The algorithmic revolution---the fourth service transformation.
48
- Roland T. Rust, Carol Miu:
What academic research tells us about service.
49-54
- Amit P. Sheth, Kunal Verma, Karthik Gomadam:
Semantics to energize the full services spectrum.
55-61
- Brenda Dietrich:
Resource planning for business services.
62-64
- William B. Rouse, Marietta L. Baba:
Enterprise transformation.
66-72
- Mary Jo Bitner, Stephen W. Brown:
The evolution and discovery of services science in business schools.
73-78
- Walter Ganz:
Germany: service engineering.
79
- Christof Weinhardt, Dirk Neumann, Carsten Holtmann:
Germany: computer-aided market engineering.
79
- Paul P. Maglio, Savitha Srinivasan, Jeffrey T. Kreulen, Jim Spohrer:
Service systems, service scientists, SSME, and innovation.
81-85
- Stuart I. Feldman, Krishna S. Nathan, Thomas Li, Kazuyoshi Hidaka, Corinna Schulze:
The Clarion Call for modern services: China, Japan, Europe, and the U.S.
86-87
Articles
Technical opinion
Inside risks
Volume 49,
Number 8,
August 2006
Practical programmer
- Robert L. Glass:
The Standish report: does it really describe a software crisis?
15-16
Digital village
Hot links
Viewpoint
Music information retrieval
Articles
- Alexander P. Pons:
Biometric marketing: targeting the online consumer.
60-66
- Václav Rajlich:
Changing the paradigm of software engineering.
67-70
- G. Daryl Nord, Tipton F. McCubbins, Jeretta Horn Nord:
E-monitoring in the workplace: privacy, legislation, and surveillance software.
72-77
- J. Drew Procaccino, June M. Verner, Steven J. Lorenzet:
Defining and contributing to software development success.
79-83
- Eugenia Y. Huang:
Tightening access policy: the hidden trade-off.
85-89
- Charlie McDowell, Linda L. Werner, Heather E. Bullock, Julian Fernald:
Pair programming improves student retention, confidence, and program quality.
90-95
Technical opinion
- Mikko T. Siponen:
Information security standards focus on the existence of process, not its content.
97-100
Inside risks
Volume 49,
Number 9,
September 2006
The business of software
Staying connected