CACM - volume 50 - 2007 论文列表 |
点击这里查看 Communications of the ACM 的JCR分区、影响因子等信息 |
Steven M. Bellovin Matt Blaze Whitfield Diffie Susan Landau Jennifer Rexford Peter G. Neumann
Training future software developers to acquire agile development skills. Counting the cost of virtual teams.Emmeline de Pillis Kimberly A. Furumo
Competing with IT: the role of shared IT-business understanding.Gautam Ray Waleed A. Muhanna Jay B. Barney
Fix IT-business relationships through better decision rights.Varun Grover Raymond M. Henry Jason Bennett Thatcher
Self-organization in manufacturing operations. Tracing variations in software product families.Kannan Mohan Balasubramaniam Ramesh
Implementing component reuse strategy in complex products environments.Ilan Oshri Sue Newell Shan Ling Pan
Standards development and diffusion: a case study of RosettaNet.Wai Fong Boh Christina Soh Steven Yeo
Moving beyond user participation to achieve successful IS design.Erica L. Wagner Gabriele Piccoli
Multidisciplinary research on the datapath of the computing disciplines.Antonio M. Lopez Jr. Frederick G. Lopez Robert W. Lent Madonna G. Constantine
Trespass, nuisance, and spam: 11th century common law meets the internet.Robert J. Aalberts Percy Poon Paul D. Thistle
Nominees for elections and report of the ACM nominating committee.Are your citations clean?
Dongwon Lee Jaewoo Kang Prasenjit Mitra C. Lee Giles Byung-Won On
Creativity support tools: accelerating discovery and innovation. PowerPoint at 20: back to basics. Credit Card Forensics. Forum. News track.Editorial pointers.
Drivers of price Premium in e-markets. Making knowledge work in virtual teams.
Dominic M. Thomas Robert P. Bostrom Marianne Gouge
The impact of size and volatility on IT project performance.Chris Sauer Andrew Gemino Blaize Horner Reich
Does data warehouse end-user metadata add value?Neil Foshay Avinandan Mukherjee Andrew Taylor
Information life cycle management.Paul P. Tallon Richard Scannell
What motivates Wikipedians? How DARPA structures its robotics programs to improve locomotion and navigation.Larry D. Jackel Douglas Hackett Eric Krotkov Michael Perschbacher James Pippine Charles Sullivan
TREC: Continuing information retrieval's tradition of experimentation. Workloads (creation and use). Experience-driven experimental systems research.Larry L. Peterson Vivek S. Pai
Empirical studies to build a science of computer science.Victor R. Basili Marvin V. Zelkowitz
Experimental algorithmics. Introduction. Stop the numbers game. The rewards of ACM's awards. A research project with important practitioner-oriented findings. The choice uncertainty principle. News track.Editorial pointers.
Herbert S. Lin Alfred Z. Spector Peter G. Neumann Seymour E. Goodman
Top 10 downloads from ACM's digital library.Deterring internal information systems misuse. Leveraging the flexibility of your data warehouse.
Richard J. Goeke Robert H. Faley
Necessary measures: metric-driven information security risk assessment and decision making.Wade H. Baker Loren Paul Rees Peter S. Tippett
Social phishing.Tom N. Jagatic Nathaniel A. Johnson Markus Jakobsson Filippo Menczer
Business applications of unstructured text. Business process development life cycle methodology.Mike P. Papazoglou Willem-Jan van den Heuvel
Physical product reengineering with embedded information technology. Inspiring students to pursue computing degrees.Asli Yagmur Akbulut Clayton A. Looney
[Getting ideas to market] Current issues faced by technology entrepreneurs.U. N. Umesh Leonard M. Jessup Minh Q. Huynh
Knowledge services on the semantic web.Gregoris Mentzas Kostas Kafentzis Panos Georgolios
[Software patents] The good, the bad, and the messy.Matt E. Thatcher David E. Pingry
Nearshore locations in three principal global clusters and their respective attributes. Why 'nearshore' means that distance matters. Post-conflict communications: the case of Liberia.Michael L. Best Kipp Jones Illenin Kondo Dhanaraj Thakur Edem Wornyo Calvin Yu
Why we compete in DARPA's Urban Challenge autonomous robot race. Reflections and trends in the expansion of cellular wireless services in the U.S. and China.Katia Passerini Karen P. Patten Michael R. Bartolacci Jerry Fjermestad
Does copyright law need to be reformed? Extreme programming compared with Microsoft-style iterative development. Forum.News track.
Editorial pointers.
The online research "bubble".
Thomas F. Stafford Dennis Gonier
What's wrong with online privacy policies? SOX, compliance, and power relationships.Ashley Braganza Arnoud Franken
What matters when introducing new information technology.Susan A. Brown Norman L. Chervany Bryan A. Reinicke
The online consumer's hierarchy of needs.Joseph S. Valacich D. Veena Parboteeah John D. Wells
Domain expert user development: the smartgov approach.George Lepouras Costas Vassilakis Constantin Halatsis Panagiotis Georgiadis
Parallel computing on any desktop. Amoeba-based neurocomputing with chaotic dynamics.Masashi Aono Masahiko Hara Kazuyuki Aihara
Micro/nanofluidic computing.David W. M. Marr Toshinori Munakata
Optical computing: need and challenge.Hossin Abdeldayem Donald O. Frazier
Toward a world with quantum computers. Autonomous programmable biomolecular devices using self-assembled DNA nanostructures. Molecular, chemical, and organic computing. Computation with carbon nanotube devices. Computing with a trillion crummy components.Warren Robinett Gregory S. Snider Philip Kuekes R. Stanley Williams
Introduction. The conservation of uncertainty. Shaking hands, kissing babies, and ... blogging? Evolving the ACM journal distribution program.Ronald F. Boisvert Mary Jane Irwin Holly E. Rushmeier
Why you can't cite Wikipedia in my class. Forum.News track.
Editorial pointers.
Sakgasit Ramingwong A. S. M. Sajeev
Top 10 downloads from ACM's digital library.Corporate governance of IT: a framework for development. Dynamic decision support through instantiation of UEML representations.
Sagnika Sen Haluk Demirkan Michael Goul
Testing object-oriented industrial software without precise oracles or results.T. H. Tse Francis C. M. Lau W. K. Chan Peter C. K. Liu Colin K. F. Luk
Unintended invitation: organizational wi-fi use by external roaming users.Janice C. Sipior Burke T. Ward
A classification of product comparison agents.Yun Wan Satya Menon Arkalgud Ramaprasad
Designing large-scale supply chain linear programs in spreadsheets.Larry J. LeBlanc Michael R. Galbreth
Involving top management in IT projects. Theoretical and practical complexity of modeling methods. Modeling the IT value paradox.Matt E. Thatcher David E. Pingry
Dealing with change: components versus services. Privacy-enhanced personalization. A deja-vu look at software engineering researchers who care about practice. Software copyright and role models. Better-than-nothing security practices. Call for nominations for ACM general election.Forum.
News track.
Editorial pointers.
Conferences under scrutiny. The effects of web-based technologies on knowledge transfer.
Waymond Rodgers Solomon Negash
A roadmap for comprehensive online privacy policy management.Annie I. Antón Elisa Bertino Ninghui Li Ting Yu
A knowledge architecture for IT security.Someswar Kesh Pauline Ratnasingam
Examining RFID applications in supply chain management.Fred Niederman Richard G. Mathieu Roger Morley Ik-Whan Kwon
Collaborative structuring: organizing document repositories effectively and efficiently. An architecture for a next-generation holistic e-recruiting system. Evaluating the efficacy of a terrorism question/answer system.Robert P. Schumaker Ying Liu Mark Ginsburg Hsinchun Chen
Real-time sound synthesis and propagation for games.Nikunj Raghuvanshi Christian Lauterbach Anish Chandak Dinesh Manocha Ming C. Lin
Using storytelling to motivate programming. Carnegie Mellon's entertainment technology center: combining the left and right brain. How to build serious games.Henry Kelly Kay Howell Eitan Glinert Loring Holding Chris Swain Adam Burrowbridge Michelle Roper
Games for training. Games for science and engineering education. Introduction. Public vs. private interest on the internet. The changing labyrinth of software pricing. Computing is a natural science. News track.Editorial pointers.
Mihail Cocosila Ofir Turel Norman P. Archer Yufei Yuan
Top 10 downloads from ACM's digital library.Automatic and versatile publications ranking for research institutions and scholars. Design patterns for managing product life cycle information.
Kary Främling Timo Ala-Risku Mikko Kärkkäinen Jan Holmström
Time to rethink health care and ICT? An empirical investigation of the effectiveness of systems modeling and verification tools. Cutting checks: challenges and choices in B2B e-payments.Mark J. Cotteleer Christopher A. Cotteleer Andrew Prochnow
The four incremental steps toward advanced mobile service adoption.Ioanna D. Constantiou Jan Damsgaard Lars Andreas Knutsen
DNSSEC: a protocol toward securing the internet infrastructure.Amy Friedlander Allison Mankin W. Douglas Maughan Stephen D. Crocker
Evolution and emerging issues in mobile wireless networks.Sasha Dekleva Jung P. Shim Upkar Varshney Geoffrey Knoerzer
Smart business networks: how the network wins. Web science: a provocative invitation to computer science. Twenty percent. Software patents and the metaphysics of Section 271(f). News track.Forum.
Editorial pointers.
The right place at the right time.
Geoffrey Goodell Paul F. Syverson
Does personality matter?: an analysis of code-review ability.Alessandra Devito Da Cunha David Greathead
Modeling multi-agent systems.Viviane Torres da Silva Carlos José Pereira de Lucena
Accessing the deep web.Bin He Mitesh Patel Zhen Zhang Kevin Chen-Chuan Chang
The whitewater process: software product development in small IT businesses.Michael L. Harris Kris Aebischer Tim Klaus
Universal accessibility as a multimodal design issue.Zeljko Obrenovic Julio Abascal Dusan Starcevic
The software architect. A history of the history of programming languages. SIGCOMM's archaeological journey into networking's past. A history of ACM SIGGRAPH. The ACM and IEEE-CS guidelines for undergraduate CS education. Not only digital: a review of ACM's early involvement with analog computing technology. Sources for ACM history: what, where, why. Edmund Berkeley and the origins of ACM. ACM established to develop communication about computing. Introduction. One man's quest for the state of software engineering's practice. The rime of the ancyent programmer. The pearly gates of Internet TV. News track.ACM's past helps steer its future. Forum.
Editorial pointers.
E. Sonny Butler Cheryl Aasheim Susan Rebstock Williams
Top 10 downloads from ACM's digital library.What are people searching on government web sites?
Michael Chau Xiao Fang Olivia R. Liu Sheng
Investigating value-based decision bias and mediation: do you do as you think?Dianne J. Hall David B. Paradice
Inconsistencies and disconnects.Jeffrey A. Stone Elinor M. Madigan
Managing risk in offshore systems development. Analysis of active intrusion prevention data for predicting hostile activity in computer networks.Ido Green Tzvi Raz Moshe Zviran
Designing data-intensive web applications for content accessibility using web marts.Stefano Ceri Maristella Matera Francesca Rizzo Vera Demaldé
Consumer support systems. How to avoid disappointment by design. Is abstraction the key to computing? Flow in games (and everything else). Proposal to dissolve SIGAPL.Call for nominations for advanced member grades in ACM.
ACM honors distinguished members.
Mastering the mess. Hiding data, forensics, and anti-forensics. News track.
Stop chasing the AI illusion. Editorial pointers.
The Sarbanes-Oxley Act: implications for large-scale IT outsourcing.
James A. Hall Stephen L. Liedtka
Envisioning intelligent information technologies through the prism of web intelligence.Ning Zhong Jiming Liu Yiyu Yao
The effects of online advertising.Scott McCoy Andrea Everard Peter Polak Dennis F. Galletta
Theoretical reflections on agile development methodologies.Sridhar P. Nerur Venugopal Balijepally
Time-critical information services.Thomas A. Horan Benjamin L. Schooley
The 7 habits of highly effective technology leaders. Open source software for disaster management.Paul Currion Chamindra de Silva Bartel Van de Walle
Public warning in the networked age: open standards to the rescue?Art Botterell Ronja Addams-Moring
Online forums supporting grassroots participation in emergency preparedness and response.Leysia Palen Starr Roxanne Hiltz Sophia B. Liu
Communication challenges in emergency response.B. S. Manoj Alexandra Hubenko Baker
Collaborative adhocracies and mix-and-match technologies in emergency management.David Mendonça Theresa I. Jefferson John R. Harrald
Agent-based systems for disaster management. Decision support systems. Human-computer interaction: the human and computer as a team in emergency management information systems. Introduction.Bartel Van de Walle Murray Turoff
ACM fellows.SIGs announce candidates for election.
Fixing federal e-voting standards.
Earl T. Barr Matt Bishop Mark A. Gondree
Mortality play. ACM A.M. Turing Award nominations solicited.Forum.
News track.
Editorial pointers.