


default search action
Communications of the ACM (CACM), Volume 39, 1996
Volume 39, Number 1, January 1996
- Thomas Erickson:

The World-Wide Web as Social Hypertext. 15-17
- Roy Rada:

Who Will Test Conformance? 19-22
- Pamela Samuelson:

Intellectual Property Rights and the Global Information Economy. 23-28
- Hal Berghel:

The Client's Side of the World-Wide Web. 30-40 - Stephen Haag, M. K. Raja, Lawrence L. Schkade:

Quality Function Deployment Usage in Software Development. 41-49 - Matthew Cheyney, Peter A. Gloor, Donald B. Johnson, Fillia Makedon, James Matthews, Panagiotis Takis Metaxas:

Toward Multimedia Conference Proceedings. 50-59
- Yorick Wilks:

Natural Language Processing - Introduction to the Special Section. 60-62 - Louise Guthrie, James Pustejovsky, Yorick Wilks, Brian M. Slator:

The Role of Lexicons in Natural Language Processing. 63-72 - Margaret King:

Evaluating Natural Language Processing Systems. 73-79 - James R. Cowie, Wendy G. Lehnert:

Information Extraction. 80-91 - David D. Lewis, Karen Sparck Jones:

Natural Language Processing for Information Retrieval. 92-101 - Janyce Wiebe, Graeme Hirst, Diane Horton:

Language Use in Context. 102-111
- Peter G. Neumann:

Risks in Digital Commerce. 154
Volume 39, Number 2, February 1996
- Hal Berghel:

HTML Compliance and the Return of the Test Pattern. 19-22
- Larry Press:

The Role of Computer Networks in Development. 23-29
- Michael J. Wozny, William C. Regli:

Computing in Manufacturing (Introduction to the Special Section). 32-33 - Joseph W. Erkes, Kevin B. Kenny, John W. Lewis, Brion D. Sarachan, Michael W. Sobolewski, Robert N. Sum Jr.:

Implementing Shared Manufacturing Services on the World-Wide Web. 34-45 - Martin Hardwick, David L. Spooner, Tom Rando, K. C. Morris:

Sharing Manufacturing Information in Virtual Enterprises. 46-54 - Vijay Kumar, Ruzena Bajcsy, William S. Harwin

, Patrick Harker:
Rapid Design and Prototyping of Customized Rehabilitation Aids. 55-61 - George A. Bekey:

Trends in Robotics. 62 - Susan Finger, M. Terk, Eswaran Subrahmanian

, Chris Kasabach, Fritz B. Prinz, Daniel P. Siewiorek, Asim Smailagic, John Stivoric, Lee E. Weiss:
Rapid Design and Manufacture of Wearable Computers. 63-70 - Aristides A. G. Requicha:

Geometric Reasoning for Intelligent Manufacturing. 71-76 - Martti Mäntylä, Dana S. Nau, Jami J. Shah:

Challenges in Feature-Based Manufacturing Research. 77-85
- Philip A. Bernstein:

Middleware: A Model for Distributed System Services. 86-98 - James W. Candler, Prashant C. Palvia, Jane D. Thompson, Steven M. Zeltmann:

The ORION Project: Staged Business Process Reengineering at FedEx. 99-107 - Mohamed E. Fayad, Wei-Tek Tsai, Milton L. Fulghum:

Transition To Object-Oriented Software Development. 108-121
- Peter G. Neumann, Peter J. Denning:

W(h)ither Research and Education? 154
Volume 39, Number 3, March 1996
- Roy Rada:

ISO 9000 Reflects the Best in Standards. 17-20
- Randall Davis, Pamela Samuelson, Mitchell Kapor, Jerome Reichman:

A New View of Intellectual Property and Software. 21-30
- Ravi Ganesan:

How to Use Key Escrow (Introduction to the Special Section). 32-33 - Dorothy E. Denning, Dennis K. Branstad:

A Taxonomy for Key Escrow Encryption Systems. 34-40 - Stephen T. Walker, Steven B. Lipner, Carl M. Ellison, David M. Balenson

:
Commercial Key Recovery. 41-47 - David Paul Maher:

Crypto Backup and Key Escrow. 48-53 - Ravi Ganesan:

The Yaksha Security System. 55-60
- Frederick P. Brooks Jr.:

The Computer Scientist as a Toolsmith II. 61-68 - A. T. Wood-Harper, Steve Corder, J. R. G. Wood, Heather Watson:

How We Profess: The Ethical Systems Analyst. 69-77 - Anthony Ralston:

The Demographics of Candidates for Faculty Positions in Computer Science. 78-84 - Guy E. Blelloch:

Programming Parallel Algorithms. 85-97
- Robert N. Charette:

Taking Responsibility for Our Risks. 122
Volume 39, Number 4, April 1996
- Michael D. Myers

:
Can Kiwis Fly? Computing in New Zealand. 11-15
- Elliot Soloway, Amanda Pryor:

The Next Generation in Human-Computer Interaction. 16-18
- Donald A. Norman

, James C. Spohrer:
Learner-Centered Education (Introduction to the Special Section). 24-27 - Roger C. Schank, Alex Kass:

A Goal-Based Scenario for High School Students. 28-29 - Beverly Park Woolf:

Intelligent Multimedia Tutoring Systems. 30-31 - Daniel C. Edelson

, Roy D. Pea
, Louis M. Gomez:
The Collaboratory Notebook. 32-33 - Marcia C. Linn:

Key to the Information Highway. 34-35 - Marlene Scardamalia, Carl Bereiter:

Student Cummunities for the Advancement of Knowledge. 36-37 - Yasmin B. Kafai:

Software by Kids for Kids. 38-39 - Hal Eden, Michael Eisenberg, Gerhard Fischer, Alexander Repenning

:
Making Learning a Part of Life. 40-42 - Mark Guzdial

, Janet L. Kolodner, Cindy E. Hmelo, N. Hari Narayanan, David Carlson, Noel Rappin, Roland Hübscher, Jennifer Turns, Wendy Newstetter:
Computer Support for Learning through Complex Problem Solving. 43-45 - Mary Beth Rosson, John M. Carroll

:
Scaffolded Examples for Learning Object-Oriented Design. 46-47 - Shari L. Jackson, Steven J. Stratford, Joseph Krajcik, Elliot Soloway:

A Learner-Centered Tool for Students Building Models. 48-49
- David Powell:

Group Communication (Introduction to the Special Section). 50-53 - Louise E. Moser, P. M. Melliar-Smith, Deborah A. Agarwal

, Ravi K. Budhia, Colleen A. Lingley-Papadopoulos:
Totem: A Fault-Tolerant Multicast Group Communication System. 54-63 - Danny Dolev

, Dalia Malki:
The Transis Approach to High Availability Cluster Communication. 64-70 - Michael K. Reiter:

Distributed Trust with the Rampart Toolkit. 71-74 - Robbert van Renesse, Kenneth P. Birman

, Silvano Maffeis:
Horus: A Flexible Group Communication System. 76-83 - André Schiper, Michel Raynal:

From Group Communication to Transactions in Distributed Systems. 84-87 - Flaviu Cristian:

Synchronous and Asynchronous Group Communication. 88-97
- Peter G. Neumann:

A Risks-related Bookshelf. 122
Volume 39, Number 5, May 1996
- Randy H. Katz:

Professor Katz Goes to Washington. Commun. ACM 39(5): 13-17 (1996)
- Larry Press:

Windows NT as a Personal or Intranet Server. 19-23
- Brock N. Meeks:

The Game Plan to Save Cyberspace. 24-26
- Peter J. Denning:

The University's Next Challenges. 27-30
- Gurminder Singh, Steven Feiner, Daniel Thalmann:

Virtual Reality Software and Technology (Introduction to the Special Section). Commun. ACM 39(5): 33-36 (1996) - Tim Poston, Luis Serra:

Dextrous Virtual Work. 37-45 - Mark Green, Sean Halliday:

A Geometric Modeling and Animation System. 46-53 - Michael F. Deering:

The HoloSketch VR Sketching System. 54-61 - Steve Bryson:

Virtual Reality in Scientific Visualization. 62-71 - Salvador Bayarri, Marcos Fernández

, Mariano Pérez
:
Virtual Reality for Driving Simulation. 72-76
- Ronald Fagin, Moni Naor, Peter Winkler:

Comparing Information Without Leaking It. 77-85 - Henry C. Lucas Jr., Donald J. Berndt, Greg Truman:

A Reengineering Framework for Evaluating a Financial Imaging System. 86-96 - Edward A. Feigenbaum:

How the "What" Becomes the "How" - Turing Award Lecture. 97-104 - Raj Reddy:

To Dream The Possible Dream - Turing Award Lecture. 105-112 - Raymond McLeod Jr.:

Comparing Undergraduate Courses in Systems Analysis and Design. 113-121
- Peter G. Neumann:

Linguistic Risks. 154
Volume 39, Number 6, June 1996
- Elliot Soloway:

Teachers are the Key. 11-14
- Hal Berghel:

U.S. Technology Policy in the Information Age. 15-18
- Raymond Pyle:

Electronic Commerce and the Internet (Introduction to the Special Section). Commun. ACM 39(6): 22 (1996) - John R. Sivori:

Evaluated Receipts and Settlements at Bell Atlantic. 24-28 - Anish Bhimani:

Securing The Commercial Internet. 29-35 - Nathaniel S. Borenstein:

Perils and Pitfalls of Practical Cybercommerce. 36-44 - Patiwat Panurach:

Money in Electronic Commerce: Digital Cash, Electronic Funds Transfer, and Ecash. 45-50 - Matti Hämäläinen, Andrew B. Whinston, Svetlana Vishik:

Electronic Markets for Learning: Education Brokerages on the Internet. 51-58
- Kilnam Chon:

Internet Inroads (Introduction to the Special Section). 59-60 - Robert M. Hinden:

IP Next Generation Overview. 61-71 - Peng Hwa Ang

, Berlinda Nadarjan:
Censorship and the Internet: A Singapore Perspective. 72-78 - Tim O'Reilly:

Publishing Models for Internet Commerce. 79-86 - Peter T. Kirstein, Goli Montasser-Kohsari:

The C-ODA Project: Online Access to Electronic Journals. 87-99 - Bruno Mannoni:

Bringing Museums Online. 100-105
- James E. Pitkow, Colleen M. Kehoe:

Emerging Trends in the WWW User Population. 106-108
- Teresa F. Lunt:

Securing the Information Infrastructure. 130
Volume 39, Number 7, July 1996
- Lawrence T. Greenberg, Seymour E. Goodman:

Is Big Brother Hanging by His Bootstrap? 11-15
- Pamela Samuelson:

Regulation of Technologies to Protect Copyrighted Works. 17-22
- Andrew Grosso:

Why Won't the President Enforce the Constitution? 25-26
- H. Raghav Rao, Kichan Nam

, Abhijit Chaudhury:
Information Systems Outsourcing (Introduction to the Special Section). 27-28 - Paul Nelson, William B. Richmond, Abraham Seidmann:

Two Dimensions of Software Acquisition. 29-35 - Kichan Nam

, H. Raghav Rao, Abhijit Chaudhury:
A Two-Level Investigation of Information Systems Outsourcing. 36-44 - Vijay Gurbaxani:

The New World of Information Technology Outsourcing. 45-46 - Sandra Slaughter, Soon Ang:

Employment Outsourcing in Information Systems. 47-54
- Gordon Bell, Jim Gemmell:

On-ramp Prospects for the Information Superhighway Dream. 55-61 - Lynn A. Streeter, Robert E. Kraut, Henry C. Lucas Jr., Laurence Caby:

How Open Data Networks Influence Business Performance and Market Structure. 62-73 - Karen D. Loch, Sue A. Conger:

Evaluating Ethical Decision Making and Computer Use. 74-83 - Jack J. Dongarra, Steve W. Otto, Marc Snir, David W. Walker:

A Message Passing Standard for MPP and Workstations. 84-90
- Peter G. Neumann:

Using Formal Methods to Reduce Risks. 114
Volume 39, Number 8, August 1996
- Jonah Sieger:

Communications Decency Act is Defeated: Landmark Victory for Netizens. 13-15
- James W. Moore, Roy Rada:

Organizational Badge Collecting. 17-21
- Steve Mann:

Smart Clothing: The Shift to Wearable Computing. 23-24
- Ted Selker:

New Paradigms for Computing (Introduction to the Special Section). 28-30 - John Seely Brown:

To Dream the Invisible Dream. 30 - Nolan Bushnell:

Relationships between Fun and the Computer Business: Playing games can have serious consequences. 31-37 - Henry Lieberman:

Intelligent Graphics. 38-48 - Kenneth M. Kahn:

Drawings on Napkins, Video-Game Animation, and Other Ways to Program Computers: Programming can be as easy as child's play. 49-59 - Ted Selker:

New Paradigms for Using Computers. 60-69
- Don Gentner, Jakob Nielsen:

The Anti-Mac Interface. 70-82
- Elliot Soloway, Amanda Pryor:

Using Computational Media to Facilitate Learning (Introduction to the Special Section). 83 - Andee Rubin, Scott Bresnahan, Ted Ducas:

Cartwheeling Through CamMotion. 84-85 - Jere Confrey, Alan Maloney:

Function Probe. 86-87 - Wallace Feurzeig, John Richards:

Function Machines. 88-90 - Margo Cappo, Kathy Darling:

Measurement In Motion. 9193 - Judah L. Schwartz:

Motion Toys for Eye and Mind. 94-96 - Jeremy Roschelle

, James J. Kaput:
SimCalc Mathworlds for the Mathematics of Change. 97-99 - Paul Horwitz, Eric P. Neumann, Joyce Schwartz:

Teaching Science at Multiple Space Time Scales. 100-102 - Pierre Dillenbourg, John A. Self:

What If the Computer Doesn't Know the Answer? 103-105 - A Multimedia Literacy Series. Commun. ACM 39(8): 106-109 (1996)

- Herbert Lin:

Cryptography's Role in Securing Information. Commun. ACM 39(8): 130 (1996)
Volume 39, Number 9, September 1996
- Thomas L. Sterling:

The Scientific Workstation of the Future May Be a Pile of PCs. 11-12
- Brock N. Meeks:

Dragging a Kicking-and-Screaming Government into the 21st Century. 13-15
- Ellen Isaacs, John C. Tang:

Technology Transfer: So Much Research, So Few Godd Producs (Introduction to the Special Section). 22-25 - Jean Scholtz:

Technology Transfer Through Prototypes. 26-27 - Allan Kuchinsky:

Transfer Means More Than Just Technology. 28-29 - James D. Foley:

Technology Transfer from University to Industry. 30-31 - Jeff A. Johnson:

R<->D, Not R&D. 32-34 - John L. Bennett:

Building Relationships for Technology Transfer. 35-36
- Nayeem Islam, Roy H. Campbell:

Latest Developments in Operating Systems (Introduction to the Special Section). 38-40 - Peter Druschel:

Operating System Support for High-Speed Communication: Techniques to Eliminate Processing Bottlenecks in High-Speed Networking are Present. 41-51 - Mendel Rosenblum, John Chapin, Dan Teodosiu, Scott Devine, Tirthankar Lahiri, Anoop Gupta:

Implementing Efficient Fault Containment for Multiprocessors: Confining Faults in a Shared-Memory Multiprocessor Environment. 52-61 - John Rosenberg, Alan Dearle, David Hulse, Anders Lindström, Stephen Norris:

Operating System Support for Persistant and Recoverable Computations: Guaranteeing data recovery and consistency, the authors' experimental Grasshopper persistent operating system simplifies application development and encourages construction of integrated systems. 62-69 - Jochen Liedtke:

Toward Real Microkernels: The inefficient, inflexible first generation inspired development of the vastly improved second generation, which may yet support a variety of operating systems. Commun. ACM 39(9): 70-77 (1996)
- Mark R. Cutkosky, Jay M. Tenenbaum, Jay Glicksman:

Madefast: Collaborative Engineering over the Internet. 78-87 - Uzi Vishkin:

Can Parallel Algorithms Enhance Seriel Implementation? 88-91 - Kenneth C. Laudon:

Markets and Privacy. 92-104
- Lauren Weinstein:

Behind the State of the Art. 130
Volume 39, Number 10, October 1996
- Larry Press:

Seeding Networks: The Federal Role. 11-17
- Hal Berghel:

Digital Politics. 19-25
- Mark Luker:

NSF's New Program for High-Performance Internet Connections. 27-28
- Douglas C. Schmidt, Mohamed Fayad, Ralph E. Johnson:

Software Patterns (Introduction to the Special Section). Commun. ACM 39(10): 36-39 (1996) - Alistair Cockburn:

The Interaction of Social Issues and Software Architecture. 40-46 - Marshall Cline:

The Pros and Cons of Adopting and Applying Design Patterns in the Real World. 47-49 - Amund Aarsten, Davide Brugali

, Giuseppe Menga:
Designing Concurrent and Distributed Control Systems. 50-58 - Mohamed E. Fayad, Marshall Cline:

Aspects of Software Adaptability. 58-59 - Brandon Goldfedder, Linda Rising:

A Training Experience with Aptterns. 60-64 - Nayeem Islam, Murthy V. Devarakonda:

An Essential Design Pattern for Fault-Tolerant Distributed State Sharing. 65-74 - Paul E. McKenney:

Selecting Locking Primitives for Parallel Programming. 75-82
- Paul Resnick, James Miller:

PICS: Internet Access Controls Without Censorship. 87-93 - Juhani Iivari:

Why Are Case Tools Not Used? 94-103 - Victor R. Basili, Lionel C. Briand, Walcélio L. Melo:

How Reuse Influences Productivity in Object-Oriented Systems. 104-116
- Peter G. Neumann:

Disinformation Theory. 138
Volume 39, Number 11, November 1996
- Robert L. Glass:

The Relationship Between Theory and Practice in Software Engineering. 11-13
- Neil Munro:

Sketching a National Information Warfare Defense Plan. 15-17
- Usama M. Fayyad, Ramasamy Uthurusamy:

Data Mining and Knowledge Discovery in Databases (Introduction to the Special Section). 24-26 - Usama M. Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth

:
The KDD Process for Extracting Useful Knowledge from Volumes of Data. 27-34 - Clark Glymour, David Madigan, Daryl Pregibon, Padhraic Smyth

:
Statistical Inference and Data Mining. 35-41 - Ronald J. Brachman, Tom Khabaza, Willi Klösgen, Gregory Piatetsky-Shapiro, Evangelos Simoudis

:
Mining Business Databases. 42-48 - William H. Inmon:

The Data Warehouse and Data Mining. 49-50 - Usama M. Fayyad, David Haussler, Paul E. Stolorz:

Mining Scientific Data. 51-57 - Tomasz Imielinski

, Heikki Mannila:
A Database Perspective on Knowledge Discovery. 58-64 - Oren Etzioni:

The World-Wide Web: Quagmire or Gold Mine? 65-68
- David Abramson

, Ian T. Foster, John Michalakes, Rok Sosic:
A New Methodology for Debugging Scientific Applications. 69-77 - David E. Culler, Richard M. Karp, David A. Patterson, Abhijit Sahay, Eunice E. Santos, Klaus E. Schauser, Ramesh Subramonian, Thorsten von Eicken:

LogP: A Practical Model of Parallel Computation. 78-85 - Yair Wand, Richard Y. Wang:

Anchoring Data Quality Dimensions in Ontological Foundations. 86-95
- Peter G. Neumann:

Distributed Systems have Distributed Risks. Commun. ACM 39(11): 130 (1996)
Volume 39, Number 12, December 1996
- Seymour E. Goodman:

War, Information Technologies, and International Asymmetries. 11-15
- Pamela Samuelson:

Legal Protection for Database Contents. 17-23
- A. Michael Noll:

CyberNetwork Technology: Issues and Uncertainties. 27-31
- Robert E. Kraut:

The Internet @ Home (Introduction to the Special Section). Commun. ACM 39(12): 33-35 (1996) - Donna L. Hoffman, William D. Kalsbeek, Thomas P. Novak:

Internet and Web Use in the US. 36-46 - Alladi Venkatesh:

Computers and Other Interactive Technologies for the Home. 47-54 - Robert E. Kraut, William L. Scherlis, Tridas Mukhopadhyay, Jane Manning, Sara B. Kiesler:

The HomeNet Field Trial of Residential Internet Services. 55-63 - Marita Franzke, Anne P. McClard:

Winona Gets Wired: Technical Difficulties in the Home. 64-66 - George T. Duncan:

Is My Research Ethical? 67-68 - John M. Carroll, Mary Beth Rosson:

Developing the Blacksburg Electronic Village. 69-74
- C. Dianne Martin, Chuck Huff, Donald Gotterbarn

, Keith W. Miller
:
Implementing A Tenth Strand in the CS Curriculum. 75-84 - Henry MacKay Walker, G. Michael Schneider:

A Revised Model Curriculum for a Liberal Arts Degree in Computer Science. 85-95 - Robert Geist, Madhu Chetuparambil, Stephen T. Hedetniemi, A. Joe Turner:

Computing Research Programs in the US. 96-99
- Peter G. Neumann:

Risks of Anonymity. 162
- C. David Kemp:

The Construction of Fast Portable Multiplicative Congruential Random Number Generators. 163-166 - Alejandro Barrero:

Implementation of Abstract Data Types with Arrays of Unbounded Dimensions. 167-174 - Zbigniew Michalewicz

, Cezary Z. Janikow:
GENOCOP: A Genetic Algorithm for Numerical Optimization Problems with Linear Constraints. 175-201 - Barak A. Pearlmutter

:
Garbage Collection with Pointers to Individual Cells. 202-206 - Raúl Rojas:

A Graph Labelling Proof of the Backpropagation Algorithm. 207-215 - Wesley W. Chu, Kuorong Chiang, Chih-Cheng Hsu, Henrick Yau:

An Error-based Conceptual Clustering Method for Providing Approximate Query Answers. 216-230 - Randolph D. Nelson:

Including Queueing Effects in Amdahl's Law. 231-238 - Ronald E. Prather:

Harmonic Analysis from the Computer Representation of a Musical Score. 239-255 - Mark G. Staskausas:

An Experience in the Formal Verification of Industrial Software. 256-272 - Guy E. Blelloch, Charles E. Leiserson, Bruce M. Maggs, C. Greg Plaxton, Stephen J. Smith, Marco Zagha:

A Comparison of Sorting Algorithms for the Connection Machine CM-2. Commun. ACM 39(12es): 273-297 (1996) - Nathaniel S. Borenstein:

CMU's Andrew Project: A Retrospective. 298-311 - James H. Morris:

War Stories from Andrew. 312-321

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














