Volume 52,
Number 1,
January 2009 (EE)
Editor's letter
Letters to the editor
- True seeds of open source software.
6
CACM online
- David Roman:
Communications preps web-enhanced articles.
8
News
Viewpoints
ACM's FY08 annual report
Practice
Contributed articles
Review articles
Research highlights
Last byte Virtual extension
- Erik T. Mueller:
Automating commonsense reasoning using the event calculus.
113-117
- Nanda Kumar, Roumen Vragov:
Active citizen participation using ICT tools.
118-121
- Yogesh Kumar Dwivedi, Zahir Irani:
Understanding the adopters and non-adopters of broadband.
122-125
- Allen C. Johnston, Ron Hale:
Improved security through information security governance.
126-129
- Judith Gebauer, Mark Ginsburg:
Exploring the black box of task-technology fit.
130-135
- Hillol Bala, Viswanath Venkatesh, Srinivasan Venkatraman, Jack Bates, Steven H. Brown:
Disaster response in health care: A design extension for enterprise data warehouse.
136-140
- Parag C. Pendharkar, James A. Rodger:
The relationship between software development team size and software development cost.
141-144
- Carol Xiaojuan Ou, Robert M. Davison:
Technical opinion: Why eBay lost to TaoBao in China: the global advantage.
145-148
Volume 52,
Number 2,
February 2009 (EE)
Policy letter
Letters to the editor
- Seven principles for secure e-voting.
8-9
CACM online
News
Viewpoints
Practice
Contributed articles
Review articles
Research highlights
Last byte
Virtual extension
- Pamela E. Carter, Gina Green:
Networks of contextualized data: a framework for cyberinfrastructure data management.
105-109
- Xiao-Bai Li, Luvai F. Motiwalla:
For sale by owner online: who gets the saved commission?
110-114
- Ergin Elmacioglu, Dongwon Lee:
Oracle, where shall I submit my papers?
115-118
- Shlomo Argamon, Moshe Koppel, James W. Pennebaker, Jonathan Schler:
Automatically profiling the author of an anonymous text.
119-123
- Sandy Behrens:
Shadow systems: the good, the bad and the ugly.
124-129
- Arik Ragowsky, David Gefen:
Why IS management is in trouble and how to save it: lessons learned in the automotive industry.
130-133
- M. Eric Johnson, Dan McGuire, Nicholas D. Willey:
Why file sharing networks are dangerous?
134-138
- Raquel Benbunan-Fich, Gregory E. Truman:
Technical opinion - Multitasking with laptops during meetings.
139-141
Volume 52,
Number 3,
March 2009 (EE)
Editor's letter
Publisher's corner
Letters to the editor
- Children's magic won't deliver the semantic web.
8-9
CACM online
News
Viewpoints
Practice
Contributed articles
Review articles
Research highlights
Last byte
Virtual extension
- Alexandre Sacchi, Emerson Giannini, Regiane Bochic, Nicolau Reinhard, Alexandre B. Lopes:
Digital inclusion with the McInternet: would you like fries with that?
113-116
- Clyde W. Holsapple:
A new map for knowledge dissemination channels.
117-125
- Mary J. Culnan, Thomas J. Carlin:
Online privacy practices in higher education: making the grade?
126-130
- Kenneth R. Fleischmann, William A. Wallace:
Ensuring transparency in computational modeling.
131-134
- Florian Mann, Benedikt von Walter, Thomas Hess, Rolf T. Wigand:
Open access publishing in science.
135-139
- Greg Linden, Kenneth L. Kraemer, Jason L. Dedrick:
Who captures value in a global innovation network?: the case of Apple's iPod.
140-144
- Anna Formica:
Concept similarity by evaluating information contents and feature vectors: a combined approach.
145-149
- Alfred Loo:
Technical opinion - Security threats of smart phones and Bluetooth.
150-152
Volume 52,
Number 4,
April 2009 (EE)
Education letter
Letters to the editor
- What role for computer science in the war on terror?
9
CACM online
News
Viewpoints
Practice
Contributed articles
Review articles
Research highlights
Last byte
Virtual extension
- Jay F. Nunamaker Jr., Bruce A. Reinig, Robert O. Briggs:
Principles for effective virtual teamwork.
113-117
- Maris G. Martinsons, Robert M. Davison, Valdis Martinsons:
How culture influences IT-enabled organizational change and information systems.
118-123
- Gee-Woo Bock, Swee Ling Ho:
Non-work related computing (NWRC).
124-128
- Kevin P. Scheibe, James C. McElroy, Paula C. Morrow:
Object language and impression management.
129-131
- France Belanger, Lemuria Carter:
The impact of the digital divide on e-government use.
132-135
- Zeinab Karake Shalhoub:
Analysis of industry-specific concentration of CPOs in Fortune 500 companies.
136-141
- Eusebio Scornavacca Jr., Sid L. Huff, Stephen Marshall:
Mobile phones in the classroom: if you can't beat them, join them.
142-146
- Paulo Goes, Yanbin Tu, Y. Alex Tung:
Technical opinion - Online auctions hidden metrics.
147-149
Volume 52,
Number 5,
May 2009 (EE)
Editor's letter
Letters to the editor
- Logic of lemmings in compiler innovation.
7-9
blog@CACM
- Recommendation algorithms, online privacy, and more.
10-11
CACM online
- David Roman:
The print-web partnership turns the page.
12
News
Viewpoints
Practice
Contributed articles
Review articles
Research highlights
- Ross J. Anderson:
Technical perspective - A chilly sense of security.
90
- J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
Lest we remember: cold-boot attacks on encryption keys.
91-98
- Maurice Herlihy:
Technical perspective - Highly concurrent data structures.
99
- William N. Scherer III, Doug Lea, Michael L. Scott:
Scalable synchronous queues.
100-111
Last byte
- Peter Winkler:
Puzzled - Understanding relationships among numbers.
112
Virtual extension
- J. Drew Procaccino, June M. Verner:
Software developers' views of end-users and project success.
113-116
- Karlene Cousins, Upkar Varshney:
Designing ubiquitous computing environments to support work life balance.
117-123
- Stuart D. Galup, Ronald Dattero, Jim J. Quan, Sue Conger:
An overview of IT service management.
124-127
- Robert K. Plice, Nigel Melville, Oleg V. Pavlov:
Toward an information-compatible anti-spam strategy.
128-130
- James A. McCart, Varol O. Kayhan, Anol Bhattacherjee:
Cross-bidding in simultaneous online auctions.
131-134
- Carol Xiaojuan Ou, Choon-Ling Sia:
To trust or to distrust, that is the question: investigating the trust-distrust paradox.
135-139
- Gary W. Brock, Denise Johnson McManus, Joanne E. Hale:
Reflections today prevent failures tomorrow.
140-144
- Michael Rebstock:
Technical opinion - Semantic ambiguity: Babylon, Rosetta or beyond?
145-146
Volume 52,
Number 6,
June 2009 (EE)
ACM-W letter
Letters to the editor
blog@CACM
CACM online
News
Viewpoints
Practice
Contributed articles
- Rakesh Agrawal, Anastasia Ailamaki, Philip A. Bernstein, Eric A. Brewer, Michael J. Carey, Surajit Chaudhuri, AnHai Doan, Daniela Florescu, Michael J. Franklin, Hector Garcia-Molina, Johannes Gehrke, Le Gruenwald, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Henry F. Korth, Donald Kossmann, Samuel Madden, Roger Magoulas, Beng Chin Ooi, Tim O'Reilly, Raghu Ramakrishnan, Sunita Sarawagi, Michael Stonebraker, Alexander S. Szalay, Gerhard Weikum:
The Claremont report on database research.
56-65
- Kenneth L. Kraemer, Jason L. Dedrick, Prakul Sharma:
One laptop per child: vision vs. reality.
66-73
Review articles
Research highlights
Last byte
Virtual extension
- Jonghun Park, Kwanho Kim:
Hyperlinking the work for self-management of flexible workflows.
113-117
- Steven M. Thompson, Matthew D. Dean:
Advancing information technology in health care.
118-121
- Amar Gupta:
Deriving mutual benefits from offshore outsourcing.
122-126
- Mark Lycett, Christopher Partridge:
The challenge of epistemic divergence in IS development.
127-131
- Nena Lim, Anne Khoo:
Forensics of computers and handheld devices: identical or fraternal twins?
132-135
- Sudip Bhattacharjee, Ram D. Gopal, James R. Marsden, Ramesh Sankaranarayanan:
Re-tuning the music industry: can they re-attain business resonance?
136-140
- Dursun Delen, Suliman Al-Hawamdeh:
A holistic framework for knowledge discovery and management.
141-145
- T. P. Liang, Andrew J. Czaplewski, Gary Klein, James J. Jiang:
Technical opinion - Leveraging first-mover advantages in internet-based consumer services.
146-148
Volume 52,
Number 7,
July 2009 (EE)
Barbara Liskov:
ACM's A.M. Turing Award Winner / Editor's letter
Publisher's corner
Letters to the editor
- Inspire with introductory computer science.
8-9
blog@CACM
CACM online
News
Viewpoints
Practice
- Goetz Graefe:
The five-minute rule 20 years later (and how flash memory changes the rules).
48-59
- Jonathan M. Smith:
Fighting physics: a tough battle.
60-65
Contributed articles
Review articles
Research highlights
Last byte
Virtual extension
- Benjamin Fabian, Oliver Günther:
Security challenges of the EPCglobal network.
121-125
- James L. Parrish Jr., James F. Courtney Jr.:
Churchman's inquirers as design templates for knowledge management systems.
126-129
- Arvind Malhotra, Claudia Kubowicz Malhotra:
A relevancy-based services view for driving adoption of wireless web services in the U.S.
130-134
- Johann Rost, Robert L. Glass:
The impact of subversive stakeholders on software projects.
135-138
- Sandip C. Patel, Ganesh D. Bhatt, James H. Graham:
Improving the cyber security of SCADA communication networks.
139-142
- Anat Hovav, Ciprian P. Popoviciu:
Adoption leadership and early planners: Comcast's IP upgrade strategy.
143-146
- Richard W. Woolridge, David P. Hale, Joanne E. Hale, Shane Sharpe:
Software project scope alignment: an outcome-based approach.
147-152
- Robert M. Davison, Maris G. Martinsons, Henry W. H. Lo, Yuan Li:
Technical opinion - The ethics of IT professionals in China.
153-155
Volume 52,
Number 8,
August 2009 (EE)
A Blind Person's Interaction with Technology - Professions board letter
Publisher's corner
Letters to the editor
- Why invention and innovation diverge.
8-9
In the virtual extension
- In the virtual extension.
10
blog@CACM
CACM online
News
Viewpoints
Practice
Contributed articles
Review articles
Research highlights
Last byte
Virtual extension
- Hoon S. Cha, David E. Pingry, Matt E. Thatcher:
What determines IT spending priorities?
105-110
- Andrew Lim, Hong Ma, Qi Wen, Zhou Xu, Brenda Cheang:
Distinguishing citation quality for journal impact assessment.
111-116
- Thomas A. Gerace, Huseyin Cavusoglu:
The critical elements of the patch management process.
117-121
- Rajiv Kohli, Nigel Melville:
Learning to build an IT innovation platform.
122-126
- Eoin Ó Conchúir, Pär J. Ågerfalk, Helena Holmström Olsson, Brian Fitzgerald:
Global software development: where are the benefits?
127-131
- Rohit Kaul, Yeogirl Yun, Seong-Gon Kim:
Ranking billions of web pages using diodes.
132-136
- Roli Varma:
Attracting Native Americans to computing.
137-140
- Indranil Bose, Alvin Chung Man Leung:
Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks?
141-143
Volume 52,
Number 9,
September 2009 (EE)
The Status of the P versus NP Problem - Editor's letter
Letters to the editor
- Computer Science does matter.
8-9
In the Virtual Extension
- In the Virtual Extension.
10
BLOG@CACM
CACM online
News
Viewpoints
Practice
Contributed articles
Review article
Research highlights
- Katherine A. Yelick:
Technical perspective - Abstraction for parallelism.
88
- Milind Kulkarni, Keshav Pingali, Bruce Walter, Ganesh Ramanarayanan, Kavita Bala, L. Paul Chew:
Optimistic parallelism requires abstractions.
89-97
- Marc Dacier:
Technical perspective - They do click, don't they?
98
- Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage:
Spamalytics: an empirical analysis of spam marketing conversion.
99-107
Last byte
Virtual extension
- Achita Muthitacharoen, Khawaja A. Saeed:
Examining user involvement in continuous software development: (a case of error reporting system).
113-117
- Alexander A. Pasko, Valery Adzhiev:
Constructive function-based modeling in multilevel education.
118-122
- Hongwei Zhu, Stuart E. Madnick:
One size does not fit all: legal protection for non-copyrightable data.
123-128
- Eleanor T. Loiacono, Nicholas C. Romano Jr., Scott McCoy:
The state of corporate website accessibility.
128-132
- Robert Willison, Mikko T. Siponen:
Overcoming the insider: reducing employee computer crime through Situational Crime Prevention.
133-137
- Mu Xia, Yun Huang, Wenjing Duan, Andrew B. Whinston:
Ballot box communication in online communities.
138-142
- Dinesh Batra:
Modified agile practices for outsourced software projects.
143-148
- James E. Katz, Ronald E. Rice:
Technical opinion - Falling into the net: main street America playing games and making friends online.
149-150
Volume 52,
Number 10,
October 2009 (EE)
A View of Parallel Computing - President's letter
Letters to the editor
In the Virtual Extension
- In the Virtual Extension.
7
blog@CACM
CACM online
- Following the leaders.
10
News
Viewpoints
Practice
Contributed articles
- Krste Asanovic, Rastislav Bodík, James Demmel, Tony Keaveny, Kurt Keutzer, John Kubiatowicz, Nelson Morgan, David A. Patterson, Koushik Sen, John Wawrzynek, David Wessel, Katherine A. Yelick:
A view of the parallel computing landscape.
56-67
- Jane Cleland-Huang, Horatiu Dumitru, Chuan Duan, Carlos Castro-Herrera:
Automated support for managing feature requests in open forums.
68-74
Review articles
Research highlights
Last byte
Virtual extension
- Richard J. Goeke, Robert H. Faley:
Technical opinion - Do SAP successes outperform themselves and their competitors?
113-117
- Girish H. Subramanian, Gary Klein, James J. Jiang, Chien-Lung Chan:
Balancing four factors in system development projects.
118-121
- Sridhar R. Papagari Sangareddy, Sanjeev Jha, Chen Ye, Kevin C. Desouza:
Attaining superior complaint resolution.
122-126
- Vivienne Waller, Robert B. Johnston:
Making ubiquitous computing available.
127-130
- Donal J. Flynn, Gary S. C. Pan, Mark Keil, Magnus Mähring:
De-escalating IT projects: the DMM model.
131-134
- Francisco Casacuberta, Jorge Civera, Elsa Cubel, Antonio L. Lagarda, Guy Lapalme, Elliott Macklovitch,