


default search action
Communications of the ACM (CACM), Volume 49, 2006
Volume 49, Number 1, January 2006
- Diane Crawford:

Editorial pointers. 5-7
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Diane Crawford:

Top 10 downloads from ACM's digital library. 15-16
- Phillip G. Armour:

Counting boulders and measuring mountains. 17-20
- ACM annual report for FY05. 21-30

- Meg McGinity Shannon:

The network of life. 29-32
- David A. Patterson:

New Directions for CACM? 33-35
- Scott Campbell:

How to think about security failures. 37-39
- Jaime Teevan, William Jones, Benjamin B. Bederson:

Introduction. 40-43 - Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Pérez-Quiñones, Meredith M. Skeels, Tiziana Catarci

:
Digital memories in an era of ubiquitous computing and abundant storage. 44-50 - Wanda Pratt

, Kenton T. Unruh, Andrea Civan
, Meredith M. Skeels:
Personal health information management. 51-55 - Clare-Marie Karat, Carolyn Brodie, John Karat:

Usable privacy and security for personal information management. 56-57 - Edward Cutrell, Susan T. Dumais, Jaime Teevan:

Searching to eliminate personal information management. 58-64 - Catherine C. Marshall, William Jones

:
Keeping encountered information. 66-67 - Steve Whittaker, Victoria Bellotti, Jacek Gwizdka

:
Email in personal information management. 68-73 - Thomas Erickson:

From PIM to GIM: personal information management in group contexts. 74-75 - David R. Karger

, William Jones
:
Data unification in personal information management. 77-82 - Diane Kelly:

Evaluating personal information management behaviors and tools. 84-86
- Jim Gemmell, Gordon Bell, Roger Lueder:

MyLifeBits: a personal database for everything. 88-95 - Kevin C. Desouza

, Yukika Awazu, Amrit Tiwana:
Four dynamics for bringing use back into software reuse. 96-100 - George Pallis

, Athena Vakali
:
Insight and perspectives for content delivery networks. 101-106 - Grace J. Johnson, Paul J. Ambrose:

Neo-tribes: the power and potential of online communities in health care. 107-113 - Tim Chenoweth, Karen Corral, Haluk Demirkan

:
Seven key interventions for data warehouse success. 114-119 - Lawrence A. Gordon, Martin P. Loeb:

Budgeting process for information security expenditures. 121-125 - Matti Tedre, Erkki Sutinen

, Esko Kähkönen, Piet Kommers
:
Ethnocomputing: ICT in cultural and social context. 126-130
- Christoph Meinel, Volker Klotz:

The first 10 years of the ECCC digital library. 131-134
- John C. Knight, Nancy G. Leveson:

Software and higher education. 160
Volume 49, Number 2, February 2006
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Gary F. Templeton:

Video image stabilization and registration technology. 15-18
- Siri Birgitte Uldal, Muhammad Aimal Marjan:

Computing in post-war Afghanistan. 19-24
- Pamela Samuelson:

Regulating technical design. 25-30
- Michael A. Cusumano:

Where does Russia fit into the global software industry? 31-34
- Nanda Kumar, Abbe Mowshowitz:

Who should govern the internet? 35-37
- Diane Crawford:

Top 10 downloads from ACM's digital library. 39-40
- David A. Patterson:

Offshoring: finally facts vs. folklore. 41-42
- Brajendra Panda, Joseph Giordano, Daniel Kalil:

Introduction. 44-47 - Eoghan Casey

:
Investigating sophisticated security breaches. 48-55 - Brian D. Carrier:

Risks of live digital forensic analysis. 56-61 - Frank Adelstein:

Live forensics: diagnosing your system without killing it first. 63-66 - The Common Digital Evidence Storage Format Working Group: Standardizing digital evidence storage. 67-68

- Chet Hosmer:

Digital evidence bag. 69-70 - Sheldon Teelink, Robert F. Erbacher:

Improving the computer forensic analysis process through visualization. 71-75 - Golden G. Richard III

, Vassil Roussev:
Next-generation digital forensics. 76-80 - Rahul Bhaskar:

State and local law enforcement is not ready for a cyber Katrina. 81-83 - Simson L. Garfinkel

:
AFF: a new format for storing hard drive images. 85-87 - Ganesan Shankaranarayanan, Adir Even:

The metadata enigma. 88-94 - Pak-Lok Poon

, Amy H. L. Lau:
The present B2C implementation framework. 96-103 - Jan Damsgaard, Mihir A. Parikh, Bharat Rao:

Wireless commons perils in the common good. 104-109
- Student de-charter notice. 110

- Henry M. Gladney:

Principles for digital preservation. 111-116 - Stephen Owen, Pearl Brereton, David Budgen

:
Protocol analysis: a neglected practice. 117-122 - Deborah J. Armstrong:

The quarks of object-oriented development. 123-128 - Roli Varma

:
Making computer science minority-friendly. 129-134
- Peter G. Neumann:

Trustworthy systems revisited. 152
Volume 49, Number 3 , March 2006
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Phillip G. Armour:

The operational executive sponsor. 15-18
- Robert L. Glass:

Is the crouching tiger a threat? 19-20
- Bertrand Meyer

, Willy Zwaenepoel:
Europe's computer scientists take fate into their own hands. 21-24
- Call for nominations for advanced member grades in the ACM. 25-26

- David A. Patterson:

Computer science education in the 21st century. 27-30 - David A. Patterson:

Reviving your favorite CS books. 31
- Jeannette M. Wing:

Computational thinking. 33-35
- Jean-Philippe Martin-Flatin, Joseph S. Sventek, Kurt Geihs

:
Introduction. 36-39 - Paul Robertson, Brian Charles Williams:

Automatic recovery from software failure. 41-47 - George Porter, Randy H. Katz:

Effective web service load balancing through statistical monitoring. 48-54 - Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt, Vijay Machiraju:

Supporting application quality of service in shared resource pools. 55-60 - Kenji Leibnitz, Naoki Wakamiya, Masayuki Murata:

Biologically inspired self-adaptive multi-path routing in overlay networks. 62-67 - Atul Singh, Mads Haahr

:
Creating an adaptive network of hubs using Schelling's model. 69-73
- ACM fellows. 74-75

- Martin Halvey

, Mark T. Keane, Barry Smyth:
Mobile web surfing is the same as web surfing. 76-81 - Vicki R. McKinney, Mary M. Whiteside:

Maintaining distributed relationships. 82-86 - Zhiping D. Walter

, George M. Scott:
Management issues of internet/web systems. 87-91 - Aldo de Moor, Mark Aakhus

:
Argumentation support: from technologies to tools. 93-98 - Juan E. Gilbert

:
Applications quest: computing diversity. 99-104 - Robert C. Beatty, Craig D. Williams:

ERP II: best practices for successfully implementing an ERP upgrade. 105-109 - Mazliza Othman, Rodziah Latih:

Women in computer science: no shortage here! 111-114
- Brian L. Dos Santos, Andrew L. Wright:

Using bulletin boards in an educational setting. 115-118
- Top 10 downloads from ACM's digital library. 126-127

- Marc Rotenberg:

Real id, real trouble? 128
Volume 49, Number 4 , April 2006
- Diane Crawford:

Editorial pointers. 5
- News track. 9-10

- Diane Crawford:

Forum. 11-13
- Peter J. Denning:

Hastily formed networks. 15-20
- Hal Berghel:

Phishing mongers and posers. 21-25 - Statewide databases of registered voters. 26-28

- Top 10 Downloads from ACM's Digital Library. 29-30

- David A. Patterson:

Seven reasons to shave your head and three reasons not to: the bald truth. 31-32
- Shlomo Argamon, Mark Olsen:

Toward meaningful computing. 33-35
- Ryen W. White, Bill Kules, Steven Mark Drucker, Monica M. C. Schraefel

:
Introduction. 36-39 - Gary Marchionini

:
Exploratory search: from finding to understanding. 41-46 - Monica M. C. Schraefel

, Max L. Wilson
, Alistair Russell, Daniel A. Smith:
mSpace: improving information access to multimedia domains with multimodal exploratory search. 47-49 - Edward Cutrell, Susan T. Dumais:

Exploring personal information. 50-51 - Edward A. Fox

, Fernando Adrian Das Neves, Xiaoyan Yu, Rao Shen, Seonho Kim, Weiguo Fan:
Exploring the computing literature with visualization and stepping stones & pathways. 52-58 - Marti A. Hearst:

Clustering versus faceted categories for information exploration. 59-61 - John Gersh

, Bessie Lewis, Jaime Montemayor, Christine D. Piatko
, Russell Turner:
Supporting insight-based information exploration in intelligence analysis. 63-68 - Ben Shneiderman, Benjamin B. Bederson, Steven Mark Drucker:

Find that photo!: interface strategies to annotate, browse, and share. 69-71 - Bernard J. Jansen

:
Using temporal patterns of interactions to design effective automated searching assistance. 72-74
- Jiexun Li, Rong Zheng, Hsinchun Chen:

From fingerprint to writeprint. 76-82 - Nenad Jukic:

Modeling strategies and alternatives for data warehousing projects. 83-88 - Andrea Ordanini

:
What drives market transactions in B2B exchanges? 89-93 - Moshe Zviran, Dov Te'eni

, Yuval Gross:
Does color in email make a difference? 94-99 - Rosario Vidal

, Elena Mulet
:
Thinking about computer systems to support design synthesis. 100-104 - Harvey G. Enns, Thomas W. Ferratt, Jayesh Prasad:

Beyond stereotypes of IT professionals: implications for IT HR practices. 105-109
- Sang M. Lee, Choong Kwon Lee:

IT managers' requisite skills. 111-114
- Lauren Weinstein:

Fake ID: batteries not included. 120
Volume 49, Number 5, May 2006
- Diane Crawford:

Editorial pointers. 5 - News track. 9-10

- Diane Crawford:

Forum. 11-13 - Diane Crawford:

Top 10 downloads from ACM's digital library. 15-16
- Rebecca T. Mercuri:

Scoping identity theft. 17-21
- Meg McGinity Shannon:

Private lives. 23-26
- David A. Patterson:

Revisiting my campaign statement. 27-30
- Thomas A. Easton:

Beyond the algorithmization of the sciences. 31-33
- Hans Weigand:

Introduction. 44-46 - Peter J. Denning, Robert Dunham:

Innovation as language action. 47-52 - Göran Goldkuhl:

Action and media in interorganizational interaction. 53-57 - Jan L. G. Dietz:

The deep structure of business processes. 58-64 - Dov Te'eni

:
The language-action perspective as a basis for communication support systems. 65-70 - Terry Winograd:

Designing a new foundation for design. 71-74 - Mareike Schoop, Aldo de Moor, Jan L. G. Dietz:

The pragmatic web: a manifesto. 75-76
- Dawn G. Gregg

, Steven Walczak
:
Adaptive web information extraction. 78-84 - Stephen J. Andriole:

The collaborate/integrate business technology strategy. 85-90 - Brian Whitworth, Jerry Fjermestad, Edward Mahinda:

The web of system performance. 92-99 - Hai Zhuge:

Discovery of knowledge flow in science. 101-107 - Brian Dobing, Jeffrey Parsons

:
How UML is used. 109-113 - Pairin Katerattanakul, Bernard T. Han, Alan Rea:

Is information systems a reference discipline? 114-118 - William E. Spangler, Kathleen S. Hartzel, Mordechai Gal-Or:

Exploring the privacy implications of addressable advertising and viewer profiling. 119-123
- Stephen B. Jenkins:

Musings of an "old-school" programmer. 124-126
- Peter G. Neumann, Lauren Weinstein:

Risks of RFID. 136
Volume 49, Number 6, June 2006
- Diane Crawford:

Editorial pointers. 5 - News track. 9-10

- Diane Crawford:

Forum. 11-13
- David A. Patterson:

Farewell address: the growing and graying of ACM. 15-18
- Phillip G. Armour:

The learning edge. 19-22
- Ronald F. Boisvert

, Mary Jane Irwin:
Plagiarism on the rise. 23-24
- Diane Crawford:

Top 10 downloads from ACM's digital library. 25-26
- Pamela Samuelson:

Copyrighting standards. 27-31
- Gregory J. Conti:

Introduction. 32-36 - Tom Cross:

Academic freedom and the hacker ethic. 37-40 - Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green:

Security through legality. 41-43 - Joe Grand:

Research lessons from hardware hacking. 44-49 - Bruce Potter:

Wireless hotspots: petri dish of wireless security. 50-56 - Felix "FX" Lindner:

Software security is software reliability. 57-61 - Dan Kaminsky:

Explorations in namespace: white-hat hacking across the domain name system. 62-69
- Kallol Kumar Bagchi, Peeter Kirs, Robert Cerveny:

Global software piracy: can economic factors alone explain the trend? 70-76 - Christopher L. Carr:

Reciprocity: the golden rule of IS-user service relationship quality and cooperation. 77-83 - Timothy Paul Cronan, C. Bryan Foltz, Thomas W. Jones:

Piracy, computer crime, and IS misuse at the university. 84-90 - David Kang, Roger Chiang:

A systematic approach in managing post-deployment system changes. 91-96 - Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers

:
The application of model checking for securing e-commerce transactions. 97-101 - Barry Shore:

Enterprise integration across the globally disbursed service organization. 102-106
- Thomas W. Jackson

, Anthony Burgess, Janet Edwards:
A simple approach to improving email communication. 107-109
- Robert N. Charette:

EHRs: Electronic Health Records or Exceptional Hidden Risks? 120
Volume 49, Number 7, July 2006
- Diane Crawford:

Editorial pointers. 5 - News track. 9-10

- Diane Crawford:

Forum. 11-13 - Diane Crawford:

ACM's 2006 general elections. 13
- Peter J. Denning:

Infoglut. 15-19
- Michael A. Cusumano:

What road ahead for Microsoft and Windows? 21-23
- Diane Crawford:

Top 10 downloads from ACM's digital library. 25-26
- Peter Wegner, Dina Q. Goldin:

Principles of problem solving. 27-29
- Jim Spohrer, Doug Riecken:

Introduction. 30-32 - Henry Chesbrough, Jim Spohrer:

A research manifesto for services science. 35-40 - Jerry R. Sheehan:

Understanding service sector innovation. 42-47 - John Zysman:

The algorithmic revolution - the fourth service transformation. 48 - Roland T. Rust, Carol Miu:

What academic research tells us about service. 49-54 - Amit P. Sheth, Kunal Verma, Karthik Gomadam:

Semantics to energize the full services spectrum. 55-61 - Brenda Dietrich:

Resource planning for business services. 62-64 - William B. Rouse, Marietta L. Baba:

Enterprise transformation. 66-72 - Mary Jo Bitner, Stephen W. Brown:

The evolution and discovery of services science in business schools. 73-78 - Walter Ganz:

Germany: service engineering. 79 - Christof Weinhardt

, Dirk Neumann
, Carsten Holtmann:
Germany: computer-aided market engineering. 79 - Paul P. Maglio, Savitha Srinivasan, Jeffrey T. Kreulen, Jim Spohrer:

Service systems, service scientists, SSME, and innovation. 81-85 - Stuart I. Feldman, Krishna S. Nathan, Thomas Li, Kazuyoshi Hidaka, Corinna Schulze:

The Clarion Call for modern services: China, Japan, Europe, and the U.S. 86-87
- David E. Avison, Shirley Gregor

, David Wilson:
Managerial IT unconsciousness. 88-93 - Lance J. Hoffman, Kim Lawson-Jenkins, Jeremy J. Blum

:
Trust beyond security: an expanded trust model. 94-101 - Ernst Bekkering, Jung P. Shim:

Trust in videoconferencing. 103-107 - Narasimha Bolloju, Felix S. K. Leung:

Assisting novice analysts in developing quality conceptual models with UML. 108-112
- Fred Martin

:
Toy projects considered harmful. 113-116
- Peter G. Neumann:

Risks relating to system compositions. 120
Volume 49, Number 8, August 2006
- Diane Crawford:

Editorial pointers. 5 - News track. 9-10

- Diane Crawford:

Forum. 11-13
- Robert L. Glass:

The Standish report: does it really describe a software crisis? 15-16
- Hal Berghel, David Hoelzer:

Disk wiping by any other name. 17-21
- Diane Crawford:

Top 10 downloads from ACM's digital library. 23-24
- Dan B. Goldman:

Blockbusters and blackboards. 25-27
- Bryan Pardo:

Introduction. 28-31 - Daniel P. W. Ellis:

Extracting information from music audio. 32-37 - Roger B. Dannenberg, Christopher Raphael:

Music score alignment and computer accompaniment. 38-43 - Avery Wang:

The Shazam music recognition service. 44-48 - William P. Birmingham, Roger B. Dannenberg, Bryan Pardo:

Query by humming with the VocalSearch system. 49-52 - Jon W. Dunn

, Donald Byrd, Mark Notess
, Jenn Riley, Ryan Scherle
:
Variations2: retrieving and using music in an academic setting. 53-58
- Alexander Perez-Pons

:
Biometric marketing: targeting the online consumer. 60-66 - Václav Rajlich:

Changing the paradigm of software engineering. 67-70 - G. Daryl Nord, Tipton F. McCubbins, Jeretta Horn Nord:

E-monitoring in the workplace: privacy, legislation, and surveillance software. 72-77 - J. Drew Procaccino, June M. Verner, Steven J. Lorenzet:

Defining and contributing to software development success. 79-83 - Eugenia Y. Huang:

Tightening access policy: the hidden trade-off. 85-89 - Charlie McDowell, Linda L. Werner, Heather E. Bullock, Julian Fernald:

Pair programming improves student retention, confidence, and program quality. 90-95
- Mikko T. Siponen:

Information security standards focus on the existence of process, not its content. 97-100
- Deirdre K. Mulligan, Ari Schwartz, Indrani Mondal:

Risks of online storage. 112
Volume 49, Number 9, September 2006
- Diane Crawford:

Editorial pointers. 5 - News track. 9-10

- Diane Crawford:

Forum. 11-13
- Phillip G. Armour:

Software: hard data. 15-17
- Meg McGinity Shannon:

Home turf. 19-21
- Diane Crawford:

Top 10 Downloads from ACM's Digital Library. 23-24
- Dennis Adams:

Wireless laptops in the classroom (and the Sesame Street syndrome). 25-27
- Günter Müller:

Introduction. 28-31 - Stefan Sackmann, Jens Strüker

, Rafael Accorsi:
Personalization in privacy-aware highly dynamic systems. 32-38 - Alexander Pretschner, Manuel Hilty, David A. Basin:

Distributed usage control. 39-44 - Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:

Externally verifiable code execution. 45-49 - Johannes Buchmann, Alexander May

, Ulrich Vollmer:
Perspectives for cryptographic long-term security. 50-55 - Brian Subirana, Malcolm Bain:

Legal programming. 57-62
- Mark D. Hill, Jean-Luc Gaudiot, Mary W. Hall

, Joe Marks, Paolo Prinetto, Donna Baglio:
A Wiki for discussing and promoting best practices in research. 63-64 - Gio Wiederhold:

What is your software worth? 65-75 - Weiguo Fan, Linda G. Wallace, Stephanie Rich, Zhongju Zhang:

Tapping the power of text mining. 76-82 - Marc Stiegler, Alan H. Karp, Ka-Ping Yee, Tyler Close, Mark S. Miller:

Polaris: virus-safe computing for Windows XP. 83-88 - Se-Joon Hong, Kar Yan Tam

, Jinwoo Kim:
Mobile data service fuels the desire for uniqueness. 89-94 - Bongsug Chae, Roger McHaney

:
Asian trio's adoption of Linux-based open source development. 95-99
- Peter G. Neumann:

The foresight saga. 112
Volume 49, Number 10, October 2006
- Diane Crawford:

Editorial pointers. 5 - News track. 9-10

- Diane Crawford:

Forum. 11-13
- Michael A. Cusumano:

Envisioning the future of India's software services business. 15-17
- Diane Crawford:

Forum. 11-13
- Pamela Samuelson:

IBM's pragmatic embrace of open source. 21-25
- Pär J. Ågerfalk, Brian Fitzgerald:

Introduction. 26-34 - Gwanhoo Lee

, William H. DeLone, J. Alberto Espinosa:
Ambidextrous coping strategies in globally distributed software development projects. 35-40 - Balasubramaniam Ramesh

, Lan Cao, Kannan Mohan, Peng Xu:
Can distributed software development be agile? 41-46 - One-Ki Daniel Lee, Probir Banerjee, Kai H. Lim, Kuldeep Kumar, Jos van Hillegersberg, Kwok Kee Wei:

Aligning IT components to achieve agility in globally distributed system development. 48-54 - Patrick Wagstrom, James D. Herbsleb

:
Dependency forecasting in the distributed agile organization. 55-56 - Nick V. Flor:

Globally distributed software development and pair programming. 57-58
- Jiming Liu, Kwok Ching Tsui:

Toward nature-inspired computing. 59-64 - Ray Giguette:

Building objects out of Plato: applying philosophy, symbolism, and analogy to software design. 66-71 - Casey G. Cegielski, Dianne J. Hall:

What makes a good programmer? 73-75 - Tamara Dinev:

Why spoofing is serious internet fraud. 76-82 - Il-Horn Hann, Kai Lung Hui

, Yee-Lin Lai, Sang-Yong Tom Lee
, Ivan P. L. Png:
Who gets spammed? 83-87 - Pratyush Bharati

, Abhijit Chaudhury:
Studying the current status of technology adoption. 88-93
- Steven M. Bellovin:

Virtual machines, virtual security? 104
Volume 49, Number 11, November 2006
- Diane Crawford:

Editorial pointers. 5 - News track. 9-10

- Diane Crawford:

Top 10 downloads from ACM's digital library. 19-20
- Robert L. Glass:

Looking into the challenges of complex IT projects. 15-17
- Peter J. Denning, Frederick Hayes-Roth:

Decision making in very large networks. 19-23
- Diane Crawford:

Top 10 downloads from ACM's Digital Library. 25-26
- Christof Teuscher:

Biologically uninspired computer science. 27-29
- Cormac J. Sreenan, Jacobus E. van der Merwe:

Introduction. 30-33 - Kuan-Ta Chen, Polly Huang, Chin-Laung Lei:

How sensitive are online gamers to network quality? 34-38 - Mark Claypool, Kajal T. Claypool:

Latency and player actions in online games. 40-45 - Jeremy Brun, Farzad Safaei

, Paul Boustead:
Managing latency and fairness in networked games. 46-51 - Zefir Kurtisi, Xiaoyuan Gu, Lars C. Wolf:

Enabling network-centric music performance in wide-area networks. 52-54 - Reza Rejaie:

Anyone can broadcast video over the internet. 55-57 - Verena Kahmann, Jens Brandt, Lars C. Wolf:

Collaborative streaming in heterogeneous and dynamic scenarios. 58-63
- Dijiang Huang

, Qing Cao, Amit Sinha, Marc J. Schniederjans, Cory C. Beard, Lein Harn, Deep Medhi:
New architecture for intra-domain network security issues. 64-72 - Hazel Taylor:

Critical risks in outsourced IT projects: the intractable and the unforeseen. 74-79 - Dinah M. Payne, Brett J. L. Landry

:
A uniform code of ethics: business and IT professional ethics. 81-84 - Arun Sen, Peter A. Dacin, Christos Pattichis:

Current trends in web data analysis. 85-91
- Rebecca T. Mercuri, Vincent J. Lipsio, Beth Feehan:

COTS and other electronic voting backdoors. 112
Volume 49, Number 12, December 2006
- Diane Crawford:

Editorial pointers. 5 - News track. 9-10

- Diane Crawford:

Forum. 11-13
- Hal Berghel:

Fungible credentials and next-generation fraud. 15-19
- ACM honors distinguished members for contributions to computing. 20-21

- Diane Crawford:

Top 10 downloads from ACM's digital library. 23-24
- Douglas S. Blank:

Robots make computer science personal. 25-27
- Vijayan Sugumaran

, Sooyong Park, Kyo Chul Kang:
Introduction. 28-32 - Paul C. Clements, Lawrence G. Jones, John D. McGregor, Linda M. Northrop:

Getting there from here: a roadmap for software product line adoption. 33-36 - Charles W. Krueger:

New methods in software product line practice. 37-40 - Jan Bosch:

The challenges of broadening the scope of software product families. 41-44 - Don S. Batory, David Benavides

, Antonio Ruiz Cortés
:
Automated analysis of feature models: challenges ahead. 45-47 - Magnus Eriksson, Jürgen Börstler

, Kjell Borg:
Software product line modeling made practical. 49-54 - Jaejoon Lee, Dirk Muthig:

Feature-oriented variability management in product line engineering. 55-59 - Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan Peter Kim:

Multi-level customization in application engineering. 60-65 - Andreas Helferich, Klaus Schmid

, Georg Herzwurm
:
Product management for software product lines: an unsolved problem? 66-67 - Kannan Mohan, Balasubramaniam Ramesh

:
Change management patterns in software product lines. 68-72 - Tomoji Kishi, Natsuko Noda:

Formal verification and software product lines. 73-77 - Klaus Pohl, Andreas Metzger:

Software product line testing. 78-81 - Joaquín Peña

, Michael G. Hinchey, Antonio Ruiz Cortés
:
Multi-agent system product lines: challenges and benefits. 82-84 - Hoh Peter In, Jongmoon Baik, Sangsoo Kim, Ye Yang, Barry W. Boehm:

A quality-based cost estimation model for the product line life cycle. 85-88
- Ian O. Angell, Jan Kietzmann

:
RFID and the end of cash? 90-96 - Zakaria Maamar, Djamal Benslimane, Nanjangud C. Narendra:

What can context do for web services? 98-103 - Martin Bichler, Jayant Kalagnanam:

Software frameworks for advanced procurement auction markets. 104-108 - Ali R. Montazemi:

How they manage IT: SMEs in Canada and the U.S. 109-112
- France Bélanger, Weiguo Fan, L. Christian Schaupp, Anjala S. Krishen

, Jeannine Everhart, David Poteet, Kent Nakamoto:
Web site success metrics: addressing the duality of goals. 114-116
- Wilhelm Hasselbring

, Matthias Rohr, Jürgen Taeger, Daniel Winteler:
Liability risks in reusing third-party software. 144

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














