default search action
Communications of the ACM (CACM), Volume 39, 1996
Volume 39, Number 1, January 1996
- Thomas Erickson:
The World-Wide Web as Social Hypertext. 15-17
- Roy Rada:
Who Will Test Conformance? 19-22
- Pamela Samuelson:
Intellectual Property Rights and the Global Information Economy. 23-28
- Hal Berghel:
The Client's Side of the World-Wide Web. 30-40 - Stephen Haag, M. K. Raja, Lawrence L. Schkade:
Quality Function Deployment Usage in Software Development. 41-49 - Matthew Cheyney, Peter A. Gloor, Donald B. Johnson, Fillia Makedon, James Matthews, Panagiotis Takis Metaxas:
Toward Multimedia Conference Proceedings. 50-59
- Yorick Wilks:
Natural Language Processing - Introduction to the Special Section. 60-62 - Louise Guthrie, James Pustejovsky, Yorick Wilks, Brian M. Slator:
The Role of Lexicons in Natural Language Processing. 63-72 - Margaret King:
Evaluating Natural Language Processing Systems. 73-79 - James R. Cowie, Wendy G. Lehnert:
Information Extraction. 80-91 - David D. Lewis, Karen Sparck Jones:
Natural Language Processing for Information Retrieval. 92-101 - Janyce Wiebe, Graeme Hirst, Diane Horton:
Language Use in Context. 102-111
- Peter G. Neumann:
Risks in Digital Commerce. 154
Volume 39, Number 2, February 1996
- Hal Berghel:
HTML Compliance and the Return of the Test Pattern. 19-22
- Larry Press:
The Role of Computer Networks in Development. 23-29
- Michael J. Wozny, William C. Regli:
Computing in Manufacturing (Introduction to the Special Section). 32-33 - Joseph W. Erkes, Kevin B. Kenny, John W. Lewis, Brion D. Sarachan, Michael W. Sobolewski, Robert N. Sum Jr.:
Implementing Shared Manufacturing Services on the World-Wide Web. 34-45 - Martin Hardwick, David L. Spooner, Tom Rando, K. C. Morris:
Sharing Manufacturing Information in Virtual Enterprises. 46-54 - Vijay Kumar, Ruzena Bajcsy, William S. Harwin, Patrick Harker:
Rapid Design and Prototyping of Customized Rehabilitation Aids. 55-61 - George A. Bekey:
Trends in Robotics. 62 - Susan Finger, M. Terk, Eswaran Subrahmanian, Chris Kasabach, Fritz B. Prinz, Daniel P. Siewiorek, Asim Smailagic, John Stivoric, Lee E. Weiss:
Rapid Design and Manufacture of Wearable Computers. 63-70 - Aristides A. G. Requicha:
Geometric Reasoning for Intelligent Manufacturing. 71-76 - Martti Mäntylä, Dana S. Nau, Jami J. Shah:
Challenges in Feature-Based Manufacturing Research. 77-85
- Philip A. Bernstein:
Middleware: A Model for Distributed System Services. 86-98 - James W. Candler, Prashant C. Palvia, Jane D. Thompson, Steven M. Zeltmann:
The ORION Project: Staged Business Process Reengineering at FedEx. 99-107 - Mohamed E. Fayad, Wei-Tek Tsai, Milton L. Fulghum:
Transition To Object-Oriented Software Development. 108-121
- Peter G. Neumann, Peter J. Denning:
W(h)ither Research and Education? 154
Volume 39, Number 3, March 1996
- Roy Rada:
ISO 9000 Reflects the Best in Standards. 17-20
- Randall Davis, Pamela Samuelson, Mitchell Kapor, Jerome Reichman:
A New View of Intellectual Property and Software. 21-30
- Ravi Ganesan:
How to Use Key Escrow (Introduction to the Special Section). 32-33 - Dorothy E. Denning, Dennis K. Branstad:
A Taxonomy for Key Escrow Encryption Systems. 34-40 - Stephen T. Walker, Steven B. Lipner, Carl M. Ellison, David M. Balenson:
Commercial Key Recovery. 41-47 - David Paul Maher:
Crypto Backup and Key Escrow. 48-53 - Ravi Ganesan:
The Yaksha Security System. 55-60
- Frederick P. Brooks Jr.:
The Computer Scientist as a Toolsmith II. 61-68 - A. T. Wood-Harper, Steve Corder, J. R. G. Wood, Heather Watson:
How We Profess: The Ethical Systems Analyst. 69-77 - Anthony Ralston:
The Demographics of Candidates for Faculty Positions in Computer Science. 78-84 - Guy E. Blelloch:
Programming Parallel Algorithms. 85-97
- Robert N. Charette:
Taking Responsibility for Our Risks. 122
Volume 39, Number 4, April 1996
- Michael D. Myers:
Can Kiwis Fly? Computing in New Zealand. 11-15
- Elliot Soloway, Amanda Pryor:
The Next Generation in Human-Computer Interaction. 16-18
- Donald A. Norman, James C. Spohrer:
Learner-Centered Education (Introduction to the Special Section). 24-27 - Roger C. Schank, Alex Kass:
A Goal-Based Scenario for High School Students. 28-29 - Beverly Park Woolf:
Intelligent Multimedia Tutoring Systems. 30-31 - Daniel C. Edelson, Roy D. Pea, Louis M. Gomez:
The Collaboratory Notebook. 32-33 - Marcia C. Linn:
Key to the Information Highway. 34-35 - Marlene Scardamalia, Carl Bereiter:
Student Cummunities for the Advancement of Knowledge. 36-37 - Yasmin B. Kafai:
Software by Kids for Kids. 38-39 - Hal Eden, Michael Eisenberg, Gerhard Fischer, Alexander Repenning:
Making Learning a Part of Life. 40-42 - Mark Guzdial, Janet L. Kolodner, Cindy E. Hmelo, N. Hari Narayanan, David Carlson, Noel Rappin, Roland Hübscher, Jennifer Turns, Wendy Newstetter:
Computer Support for Learning through Complex Problem Solving. 43-45 - Mary Beth Rosson, John M. Carroll:
Scaffolded Examples for Learning Object-Oriented Design. 46-47 - Shari L. Jackson, Steven J. Stratford, Joseph Krajcik, Elliot Soloway:
A Learner-Centered Tool for Students Building Models. 48-49
- David Powell:
Group Communication (Introduction to the Special Section). 50-53 - Louise E. Moser, P. M. Melliar-Smith, Deborah A. Agarwal, Ravi K. Budhia, Colleen A. Lingley-Papadopoulos:
Totem: A Fault-Tolerant Multicast Group Communication System. 54-63 - Danny Dolev, Dalia Malki:
The Transis Approach to High Availability Cluster Communication. 64-70 - Michael K. Reiter:
Distributed Trust with the Rampart Toolkit. 71-74 - Robbert van Renesse, Kenneth P. Birman, Silvano Maffeis:
Horus: A Flexible Group Communication System. 76-83 - André Schiper, Michel Raynal:
From Group Communication to Transactions in Distributed Systems. 84-87 - Flaviu Cristian:
Synchronous and Asynchronous Group Communication. 88-97
- Peter G. Neumann:
A Risks-related Bookshelf. 122
Volume 39, Number 5, May 1996
- Randy H. Katz:
Professor Katz Goes to Washington. Commun. ACM 39(5): 13-17 (1996)
- Larry Press:
Windows NT as a Personal or Intranet Server. 19-23
- Brock N. Meeks:
The Game Plan to Save Cyberspace. 24-26
- Peter J. Denning:
The University's Next Challenges. 27-30
- Gurminder Singh, Steven Feiner, Daniel Thalmann:
Virtual Reality Software and Technology (Introduction to the Special Section). Commun. ACM 39(5): 33-36 (1996) - Tim Poston, Luis Serra:
Dextrous Virtual Work. 37-45 - Mark Green, Sean Halliday:
A Geometric Modeling and Animation System. 46-53 - Michael F. Deering:
The HoloSketch VR Sketching System. 54-61 - Steve Bryson:
Virtual Reality in Scientific Visualization. 62-71 - Salvador Bayarri, Marcos Fernández, Mariano Pérez:
Virtual Reality for Driving Simulation. 72-76
- Ronald Fagin, Moni Naor, Peter Winkler:
Comparing Information Without Leaking It. 77-85 - Henry C. Lucas Jr., Donald J. Berndt, Greg Truman:
A Reengineering Framework for Evaluating a Financial Imaging System. 86-96 - Edward A. Feigenbaum:
How the "What" Becomes the "How" - Turing Award Lecture. 97-104 - Raj Reddy:
To Dream The Possible Dream - Turing Award Lecture. 105-112 - Raymond McLeod Jr.:
Comparing Undergraduate Courses in Systems Analysis and Design. 113-121
- Peter G. Neumann:
Linguistic Risks. 154
Volume 39, Number 6, June 1996
- Elliot Soloway:
Teachers are the Key. 11-14
- Hal Berghel:
U.S. Technology Policy in the Information Age. 15-18
- Raymond Pyle:
Electronic Commerce and the Internet (Introduction to the Special Section). Commun. ACM 39(6): 22 (1996) - John R. Sivori:
Evaluated Receipts and Settlements at Bell Atlantic. 24-28 - Anish Bhimani:
Securing The Commercial Internet. 29-35 - Nathaniel S. Borenstein:
Perils and Pitfalls of Practical Cybercommerce. 36-44 - Patiwat Panurach:
Money in Electronic Commerce: Digital Cash, Electronic Funds Transfer, and Ecash. 45-50 - Matti Hämäläinen, Andrew B. Whinston, Svetlana Vishik:
Electronic Markets for Learning: Education Brokerages on the Internet. 51-58
- Kilnam Chon:
Internet Inroads (Introduction to the Special Section). 59-60 - Robert M. Hinden:
IP Next Generation Overview. 61-71 - Peng Hwa Ang, Berlinda Nadarjan:
Censorship and the Internet: A Singapore Perspective. 72-78 - Tim O'Reilly:
Publishing Models for Internet Commerce. 79-86 - Peter T. Kirstein, Goli Montasser-Kohsari:
The C-ODA Project: Online Access to Electronic Journals. 87-99 - Bruno Mannoni:
Bringing Museums Online. 100-105
- James E. Pitkow, Colleen M. Kehoe:
Emerging Trends in the WWW User Population. 106-108
- Teresa F. Lunt:
Securing the Information Infrastructure. 130
Volume 39, Number 7, July 1996
- Lawrence T. Greenberg, Seymour E. Goodman:
Is Big Brother Hanging by His Bootstrap? 11-15
- Pamela Samuelson:
Regulation of Technologies to Protect Copyrighted Works. 17-22
- Andrew Grosso:
Why Won't the President Enforce the Constitution? 25-26
- H. Raghav Rao, Kichan Nam, Abhijit Chaudhury:
Information Systems Outsourcing (Introduction to the Special Section). 27-28 - Paul Nelson, William B. Richmond, Abraham Seidmann:
Two Dimensions of Software Acquisition. 29-35 - Kichan Nam, H. Raghav Rao, Abhijit Chaudhury:
A Two-Level Investigation of Information Systems Outsourcing. 36-44 - Vijay Gurbaxani:
The New World of Information Technology Outsourcing. 45-46 - Sandra Slaughter, Soon Ang:
Employment Outsourcing in Information Systems. 47-54
- Gordon Bell, Jim Gemmell:
On-ramp Prospects for the Information Superhighway Dream. 55-61 - Lynn A. Streeter, Robert E. Kraut, Henry C. Lucas Jr., Laurence Caby:
How Open Data Networks Influence Business Performance and Market Structure. 62-73 - Karen D. Loch, Sue A. Conger:
Evaluating Ethical Decision Making and Computer Use. 74-83 - Jack J. Dongarra, Steve W. Otto, Marc Snir, David W. Walker:
A Message Passing Standard for MPP and Workstations. 84-90
- Peter G. Neumann:
Using Formal Methods to Reduce Risks. 114
Volume 39, Number 8, August 1996
- Jonah Sieger:
Communications Decency Act is Defeated: Landmark Victory for Netizens. 13-15
- James W. Moore, Roy Rada:
Organizational Badge Collecting. 17-21
- Steve Mann:
Smart Clothing: The Shift to Wearable Computing. 23-24
- Ted Selker:
New Paradigms for Computing (Introduction to the Special Section). 28-30 - John Seely Brown:
To Dream the Invisible Dream. 30 - Nolan Bushnell:
Relationships between Fun and the Computer Business: Playing games can have serious consequences. 31-37 - Henry Lieberman:
Intelligent Graphics. 38-48 - Kenneth M. Kahn:
Drawings on Napkins, Video-Game Animation, and Other Ways to Program Computers: Programming can be as easy as child's play. 49-59 - Ted Selker:
New Paradigms for Using Computers. 60-69
- Don Gentner, Jakob Nielsen:
The Anti-Mac Interface. 70-82
- Elliot Soloway, Amanda Pryor:
Using Computational Media to Facilitate Learning (Introduction to the Special Section). 83 - Andee Rubin, Scott Bresnahan, Ted Ducas:
Cartwheeling Through CamMotion. 84-85 - Jere Confrey, Alan Maloney:
Function Probe. 86-87 - Wallace Feurzeig, John Richards:
Function Machines. 88-90 - Margo Cappo, Kathy Darling:
Measurement In Motion. 9193 - Judah L. Schwartz:
Motion Toys for Eye and Mind. 94-96 - Jeremy Roschelle, James J. Kaput:
SimCalc Mathworlds for the Mathematics of Change. 97-99 - Paul Horwitz, Eric P. Neumann, Joyce Schwartz:
Teaching Science at Multiple Space Time Scales. 100-102 - Pierre Dillenbourg, John A. Self:
What If the Computer Doesn't Know the Answer? 103-105 - A Multimedia Literacy Series. Commun. ACM 39(8): 106-109 (1996)
- Herbert Lin:
Cryptography's Role in Securing Information. Commun. ACM 39(8): 130 (1996)
Volume 39, Number 9, September 1996
- Thomas L. Sterling:
The Scientific Workstation of the Future May Be a Pile of PCs. 11-12
- Brock N. Meeks:
Dragging a Kicking-and-Screaming Government into the 21st Century. 13-15
- Ellen Isaacs, John C. Tang:
Technology Transfer: So Much Research, So Few Godd Producs (Introduction to the Special Section). 22-25 - Jean Scholtz:
Technology Transfer Through Prototypes. 26-27 - Allan Kuchinsky:
Transfer Means More Than Just Technology. 28-29 - James D. Foley:
Technology Transfer from University to Industry. 30-31 - Jeff A. Johnson:
R<->D, Not R&D. 32-34 - John L. Bennett:
Building Relationships for Technology Transfer. 35-36
- Nayeem Islam, Roy H. Campbell:
Latest Developments in Operating Systems (Introduction to the Special Section). 38-40 - Peter Druschel:
Operating System Support for High-Speed Communication: Techniques to Eliminate Processing Bottlenecks in High-Speed Networking are Present. 41-51 - Mendel Rosenblum, John Chapin, Dan Teodosiu, Scott Devine, Tirthankar Lahiri, Anoop Gupta:
Implementing Efficient Fault Containment for Multiprocessors: Confining Faults in a Shared-Memory Multiprocessor Environment. 52-61 - John Rosenberg, Alan Dearle, David Hulse, Anders Lindström, Stephen Norris:
Operating System Support for Persistant and Recoverable Computations: Guaranteeing data recovery and consistency, the authors' experimental Grasshopper persistent operating system simplifies application development and encourages construction of integrated systems. 62-69 - Jochen Liedtke:
Toward Real Microkernels: The inefficient, inflexible first generation inspired development of the vastly improved second generation, which may yet support a variety of operating systems. Commun. ACM 39(9): 70-77 (1996)
- Mark R. Cutkosky, Jay M. Tenenbaum, Jay Glicksman:
Madefast: Collaborative Engineering over the Internet. 78-87 - Uzi Vishkin:
Can Parallel Algorithms Enhance Seriel Implementation? 88-91 - Kenneth C. Laudon:
Markets and Privacy. 92-104
- Lauren Weinstein:
Behind the State of the Art. 130
Volume 39, Number 10, October 1996
- Larry Press:
Seeding Networks: The Federal Role. 11-17
- Hal Berghel:
Digital Politics. 19-25
- Mark Luker:
NSF's New Program for High-Performance Internet Connections. 27-28
- Douglas C. Schmidt, Mohamed Fayad, Ralph E. Johnson:
Software Patterns (Introduction to the Special Section). Commun. ACM 39(10): 36-39 (1996) - Alistair Cockburn:
The Interaction of Social Issues and Software Architecture. 40-46 - Marshall Cline:
The Pros and Cons of Adopting and Applying Design Patterns in the Real World. 47-49 - Amund Aarsten, Davide Brugali, Giuseppe Menga:
Designing Concurrent and Distributed Control Systems. 50-58 - Mohamed E. Fayad, Marshall Cline:
Aspects of Software Adaptability. 58-59 - Brandon Goldfedder, Linda Rising:
A Training Experience with Aptterns. 60-64 - Nayeem Islam, Murthy V. Devarakonda:
An Essential Design Pattern for Fault-Tolerant Distributed State Sharing. 65-74 - Paul E. McKenney:
Selecting Locking Primitives for Parallel Programming. 75-82
- Paul Resnick, James Miller:
PICS: Internet Access Controls Without Censorship. 87-93 - Juhani Iivari:
Why Are Case Tools Not Used? 94-103 - Victor R. Basili, Lionel C. Briand, Walcélio L. Melo:
How Reuse Influences Productivity in Object-Oriented Systems. 104-116
- Peter G. Neumann:
Disinformation Theory. 138
Volume 39, Number 11, November 1996
- Robert L. Glass:
The Relationship Between Theory and Practice in Software Engineering. 11-13
- Neil Munro:
Sketching a National Information Warfare Defense Plan. 15-17
- Usama M. Fayyad, Ramasamy Uthurusamy:
Data Mining and Knowledge Discovery in Databases (Introduction to the Special Section). 24-26 - Usama M. Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth:
The KDD Process for Extracting Useful Knowledge from Volumes of Data. 27-34 - Clark Glymour, David Madigan, Daryl Pregibon, Padhraic Smyth:
Statistical Inference and Data Mining. 35-41 - Ronald J. Brachman, Tom Khabaza, Willi Klösgen, Gregory Piatetsky-Shapiro, Evangelos Simoudis:
Mining Business Databases. 42-48 - William H. Inmon:
The Data Warehouse and Data Mining. 49-50 - Usama M. Fayyad, David Haussler, Paul E. Stolorz:
Mining Scientific Data. 51-57 - Tomasz Imielinski, Heikki Mannila:
A Database Perspective on Knowledge Discovery. 58-64 - Oren Etzioni:
The World-Wide Web: Quagmire or Gold Mine? 65-68
- David Abramson, Ian T. Foster, John Michalakes, Rok Sosic:
A New Methodology for Debugging Scientific Applications. 69-77 - David E. Culler, Richard M. Karp, David A. Patterson, Abhijit Sahay, Eunice E. Santos, Klaus E. Schauser, Ramesh Subramonian, Thorsten von Eicken:
LogP: A Practical Model of Parallel Computation. 78-85 - Yair Wand, Richard Y. Wang:
Anchoring Data Quality Dimensions in Ontological Foundations. 86-95
- Peter G. Neumann:
Distributed Systems have Distributed Risks. Commun. ACM 39(11): 130 (1996)
Volume 39, Number 12, December 1996
- Seymour E. Goodman:
War, Information Technologies, and International Asymmetries. 11-15
- Pamela Samuelson:
Legal Protection for Database Contents. 17-23
- A. Michael Noll:
CyberNetwork Technology: Issues and Uncertainties. 27-31
- Robert E. Kraut:
The Internet @ Home (Introduction to the Special Section). Commun. ACM 39(12): 33-35 (1996) - Donna L. Hoffman, William D. Kalsbeek, Thomas P. Novak:
Internet and Web Use in the US. 36-46 - Alladi Venkatesh:
Computers and Other Interactive Technologies for the Home. 47-54 - Robert E. Kraut, William L. Scherlis, Tridas Mukhopadhyay, Jane Manning, Sara B. Kiesler:
The HomeNet Field Trial of Residential Internet Services. 55-63 - Marita Franzke, Anne P. McClard:
Winona Gets Wired: Technical Difficulties in the Home. 64-66 - George T. Duncan:
Is My Research Ethical? 67-68 - John M. Carroll, Mary Beth Rosson:
Developing the Blacksburg Electronic Village. 69-74
- C. Dianne Martin, Chuck Huff, Donald Gotterbarn, Keith W. Miller:
Implementing A Tenth Strand in the CS Curriculum. 75-84 - Henry MacKay Walker, G. Michael Schneider:
A Revised Model Curriculum for a Liberal Arts Degree in Computer Science. 85-95 - Robert Geist, Madhu Chetuparambil, Stephen T. Hedetniemi, A. Joe Turner:
Computing Research Programs in the US. 96-99
- Peter G. Neumann:
Risks of Anonymity. 162
- C. David Kemp:
The Construction of Fast Portable Multiplicative Congruential Random Number Generators. 163-166 - Alejandro Barrero:
Implementation of Abstract Data Types with Arrays of Unbounded Dimensions. 167-174 - Zbigniew Michalewicz, Cezary Z. Janikow:
GENOCOP: A Genetic Algorithm for Numerical Optimization Problems with Linear Constraints. 175-201 - Barak A. Pearlmutter:
Garbage Collection with Pointers to Individual Cells. 202-206 - Raúl Rojas:
A Graph Labelling Proof of the Backpropagation Algorithm. 207-215 - Wesley W. Chu, Kuorong Chiang, Chih-Cheng Hsu, Henrick Yau:
An Error-based Conceptual Clustering Method for Providing Approximate Query Answers. 216-230 - Randolph D. Nelson:
Including Queueing Effects in Amdahl's Law. 231-238 - Ronald E. Prather:
Harmonic Analysis from the Computer Representation of a Musical Score. 239-255 - Mark G. Staskausas:
An Experience in the Formal Verification of Industrial Software. 256-272 - Guy E. Blelloch, Charles E. Leiserson, Bruce M. Maggs, C. Greg Plaxton, Stephen J. Smith, Marco Zagha:
A Comparison of Sorting Algorithms for the Connection Machine CM-2. Commun. ACM 39(12es): 273-297 (1996) - Nathaniel S. Borenstein:
CMU's Andrew Project: A Retrospective. 298-311 - James H. Morris:
War Stories from Andrew. 312-321
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.