Last update:
Thu Apr 11 09:37:25 MDT 2024
Robert S. Boyer and J. Strother Moore A Fast String Searching Algorithm . . . 762--772
Thomas E. Gerasch An insertion algorithm for a minimal internal path length binary search tree 579--585
Edsger W. Dijkstra On the Cruelty of Really Teaching Computer Science . . . . . . . . . . . . 1398--1404
Forouzan Golshani and Thaddeus Regulinski Prologue: On the Synergism of Computers and Communication . . . . . . . . . . . 8--10 Michael W. Marcellin and Thomas R. Fischer Generalized predictive TCQ of speech . . 11--19 S. S. Gaitonde and Doug W. Jacobson and A. V. Pohm Bounding Delay on a Multifarious Token Ring Network . . . . . . . . . . . . . . 20--28 Philip K. McKinley and Jane W. S. Liu Multicast tree construction in bus-based networks . . . . . . . . . . . . . . . . 29--42 Krishnan Padmanabhan Cube structures for multiprocessors . . 43--52 Bjorn N. Freeman-Benson and John Maloney and Alan Borning An incremental constraint solver . . . . 54--63 Edgar H. Sibley Editorial: New and Improved Computing Practices . . . . . . . . . . . . . . . 66--69 Chin-Wan Chung DATAPLEX: an access to heterogeneous distributed databases . . . . . . . . . 70--80 Jason Gait Phoenix: a Safe In-Memory File System 81--86 David G. Carta Two Fast Implementations of the ``Minimal Standard'' Random Number Generator . . . . . . . . . . . . . . . 87--88
Larry Press Wings for the Mind: The 1989 SIGCHI National Conference . . . . . . . . . . 115--119 Ellen Hoadley Investigating the Effects of Color . . . 120--125 Dinesh Batra and Jeffrey A. Hoffler and Robert P. Bostrom Comparing Representations with Relational and EER Models . . . . . . . 126--139 David K. Gifford Polychannel systems for mass digital communications . . . . . . . . . . . . . 141--151 Anders Kierulf and Ken Chen and Jurg Nievergelt Smart Game Board and Go Explorer: a study in software and knowledge engineering . . . . . . . . . . . . . . 152--166 Rick Joyce and Gopal Gupta Identity authentication based on keystroke latencies . . . . . . . . . . 168--176 Bezalel Gavish and Olivia R. Liu Sheng Dynamic file migration in distributed computer systems . . . . . . . . . . . . 177--189 J. Rosenberg and A. L. Ananda and B. Srinivasan Self-Assessment Procedure XX . . . . . . 190--201 Kuldeep Kumar Post implementation evaluation of computer-based information systems: current practices . . . . . . . . . . . 203--212 Matthew A. Tillman and David Chi-Chung Yen SNA and OSI: Three Strategies for Interconnection . . . . . . . . . . . . 214--224 Johnny Martin and W. T. Tsai ${N}$-Fold Inspection: a Requirements Analysis Technique . . . . . . . . . . . 225--232
Danielle R. Bernstein and Joshua Stern and William Ehrich and Michael R. Dunlavey and Leonard Zettel and Bruce B. Herbert and Mark Nelson and W. F. Smyth and Bruce W. Walker and Robert M. Gordon and Stephen N. Cole and David B. Lightstone ACM Forum: Debatable . . . . . . . . . . 264--271 Larry Press SIGGRAPH '89 --- Tomorrows's PC Today 274--279 Computer Science and Technology Board Scaling Up: a Research Agenda for Software Engineering . . . . . . . . . . 281--293 Jakob Nielsen The art of navigating through hypertext 296--310 David A. Carlson and Sudha Ram HyperIntelligence: The Next Frontier . . 311--321 Vasant Dhar and Nicky Ranganathan Integer programming vs. expert systems: an experimental comparison . . . . . . . 323--336 Rolf Molich and Jakob Nielsen Improving a Human-Computer Dialogue . . 338--348 Farahangiz Arefi and Charles E. Hughs and David A. Workman Automatically Generating Visual Syntax-Directed Editors . . . . . . . . 349--360 Christopher J. Van Wyk Literate Programming\emdashAn Assessment 361, 365
Martin Wielgus and Marvin L. Watkins and Edward Sacharuk and Srinivasarao Damerla ACM Forum: More Debatable . . . . . . . 396--397 Maurice V. Wilkes Computer Security in the Business World 399--401 Karen A. Frenkel The European community and information technology . . . . . . . . . . . . . . . 404--410 Gerrit Jeelof Europe 1992: Fraternity or Fortress? . . 412--416 Roger A. Chiarodo and Judee M. Mussehl The semiconductor market in the European community . . . . . . . . . . . . . . . 417--423 Eiichi Ono Japan's view of EC '92 . . . . . . . . . 424--425 Anonymous EC commission communication on establishing an information services market . . . . . . . . . . . . . . . . . 426--432 Anonymous Council decision of July 26, 1988 . . . 434--438 Kurt Geihs and Ulf Hollberg A Retrospective on DACNOS . . . . . . . 439--448 Daniel S. Hirschberg and Debra A. Lelewer Efficient decoding of prefix codes . . . 449--459
Pamela Samuelson and Robert J. Glushko Survey on the Look and Feel Lawsuits . . 483--487 Edgar H. Sibley Special Section on Alphabets and Language: Introduction . . . . . . . . . 488--490 Jinan Qiao and Yizheng Qiao and Sanzheng Qiao Six-digit coding method . . . . . . . . 491--494 Murat Tayli and Abdulla I. Al-Salamah Building Bilingual Microcomputer Systems 495--504 Paul W. Oman and Curtis R. Cook Typographic Style is More than Cosmetic 506--520 Subramanian Raman and Narayanan Alwar An AI-based approach to machine translation in Indian languages . . . . 521--527 Kuldeep Kumar and Niels Bjorn-Andersen A Cross-Cultural Comparison of IS Designer Values . . . . . . . . . . . . 528--538 Alan H. Karp and Horace P. Flatt Measuring parallel processor performance 539--543 Jason L. Frand and Julia A. Britt Sixth annual UCLA survey of business school computer usage . . . . . . . . . 544--562 Brain A. Rudolph Self-assessment procedure XXI: a self-assessment procedure on concurrency 563--576 M. M. Lehman Technical Correspondence: Uncertainty in Computer Application . . . . . . . . . . 584--586 Peter J. Denning Alan J. Perlis: 1922--1990: a founding father of computer science as a separate discipline . . . . . . . . . . . . . . . 604--605
Bryan Kocher President's Letter: Eschew Obfuscation 625--625 H. M. Gladney and M. L. Rinehart and F. Wagner and David H. Thornley and Justin H. Coven Letters to the Editor: More on the Cruelty . . . . . . . . . . . . . . . . 628--630, 633 Maurice Wilkes Networks, Email and Fax . . . . . . . . 631--633 David L. Parnas and A. John van Schouwen and Shu Po Kwan Evaluation of safety-critical software 636--648 Renate Rohde and Jim Haskett Disaster recovery planning for academic computing centers . . . . . . . . . . . 652--657 E. Burton Swanson and Cynthia Mathis Beath Departmentalization in software development and maintenance . . . . . . 658--667 William Pugh Skip Lists: a Probabilistic Alternative to Balanced Trees . . . . . . . . . . . 668--676 Peter K. Pearson Fast hashing of variable-length text strings . . . . . . . . . . . . . . . . 677--680 Vijay Kumar Concurrent operations on extendible hashing and its performance . . . . . . 681--694
Larry Press Personal Computing: Simple Complexity and COMDEX . . . . . . . . . . . . . . . 21--26 Diane Crawford From Washington -- Budget FY 1991: The Numbers Tell the R&D Story . . . . . . . 27--29 Thomas E. Linehan Digital Image: Digital Cinema . . . . . 30--37 Karen A. Frenkel The Politics of Standards and the EC . . 40--51 Jacques Cohen Constraint logic programming languages 52--68 Alain Colmerauer An introduction to Prolog III . . . . . 69--90 Monty Newborn and Danny Kopec The 20th Annual ACM North American Computer Chess Championship . . . . . . 92--104 S. Jerrold Kaplan and Mitchell D. Kapor and Edward J. Belove and Richard A. Landsman and Todd R. Drake AGENDA: a Personal Information Manager 105--116 Chenho Kung Object Subclass Hierarchy in SQL: a Simple Approach . . . . . . . . . . . . 117--125 Peter G. Neumann Inside RISKS: Some reflections on a telephone switching problem . . . . . . 154--154
Maurice V. Wilkes The bandwidth famine . . . . . . . . . . 19--21 Pamela Samuelson Legally speaking: Should Program Algorithms be Patented? . . . . . . . . 23--27 Douglas B. Lenat and Ramanathan V. Guha and Karen Pittman and Dexter Pratt and Mary Shepherd Cyc: Toward Programs With Common Sense 30--49 Jim Barnett and Kevin Knight and Inderjeet Mani and Elaine Rich Knowledge and natural language processing . . . . . . . . . . . . . . . 50--71 George M. White Natural language understanding and speech recognition . . . . . . . . . . . 72--82 Karen A. Frenkel Highlights from The Second Annual Computer Bowl . . . . . . . . . . . . . 84--95 Mark D. Hill and James R. Larus Cache considerations for multiprocessor programmers . . . . . . . . . . . . . . 97--102 Leslie G. Valiant A bridging model for parallel computation . . . . . . . . . . . . . . 103--111 Theodor D. Sterling and James J. Weinkam Sharing scientific data . . . . . . . . 112--119 Mark L. Gillenson Physical design equivalencies in database conversion . . . . . . . . . . 120--131 Daniel M. Sunday A Very Fast Substring Search Algorithm 132--142 Peter G. Neumann Insecurity about security? . . . . . . . 170--170
J. R. White President's Letter: Reflections on Snowbird . . . . . . . . . . . . . . . . 19--20 Diane Crawford EC directives aim for market harmony . . 21--24 Larry Press Compuvision or Teleputer? . . . . . . . 29--36 John D. McGregor and Tim Korson Introduction to the Special Issue on Object-Oriented Design . . . . . . . . . 38--39 Tim Korson and John D. McGregor Understanding Object-Oriented: a Unifying Paradigm . . . . . . . . . . . 40--60 David Jordan Implementation benefits of C++ language mechanisms . . . . . . . . . . . . . . . 61--64 Michael F. Kilian Trellis: turning designs into programs 65--67 Bertrand Meyer Lessons from the design of the Eiffel libraries . . . . . . . . . . . . . . . 68--88 Simon Gibbs and Dennis Tsichritzis and Eduardo Casais and Oscar Nierstrasz and Xavier Pintado Class management for software communities . . . . . . . . . . . . . . 90--103 Rebecca J. Wirfs-Brock and Ralph E. Johnson Surveying current research in object-oriented design . . . . . . . . . 104--124 Gul Agha Concurrent object-oriented programming 125--141 Brian Henderson-Sellers and Julian M. Edwards The object-oriented systems life cycle 142--159 David Gries and Dorothy Marsh The 1988--89 Taulbee survey report . . . 160--169 Peter G. Neumann A few old coincidences . . . . . . . . . 202--202
Maurice V. Wilkes Computing Perspectives: It's All Software, Now . . . . . . . . . . . . . 19--21 Marc Rettig Practical Programmer: Software Teams . . 23--27 Philip Heidelberger Introduction: discrete event simulation 28--29 Richard M. Fujimoto Parallel discrete event simulation . . . 30--53 Sanjay Jain and Karon Barber and David Osterfeld Expert simulation for on-line scheduling 54--60 Alexander Dupuy and Jed Schwartz and Yechiam Yemini and David Bacon NEST: a Network Simulation and Prototyping Testbed . . . . . . . . . . 63--74 Peter W. Glynn Likelihood ratio gradient estimation for stochastic systems . . . . . . . . . . . 75--84 Pierre L'Ecuyer Random Numbers for Simulation . . . . . 85--97 David J. Miller Simulation of a semiconductor manufacturing line . . . . . . . . . . . 98--108 Jakob Nielsen Traditional Dialogue Design Applied to Modern User Interfaces . . . . . . . . . 109--118 Brian D. Lynch and H. Rarghav Rao and Winston T. Lin Economic Analysis of Microcomputer Hardware . . . . . . . . . . . . . . . . 119--129 Peter G. Neumann Inside RISKS: Ghosts, Mysteries, and Uncertainty . . . . . . . . . . . . . . 170--170
Larry Press Personal computing: Windows, DOS and the MAC . . . . . . . . . . . . . . . . . . 19--26 Pamela Samuelson Legally speaking: how to interpret the Lotus decision (and how not to) . . . . 27--33 Karen A. Frenkel Women and computing . . . . . . . . . . 34--46 Amy Pearl and Martha E. Pollack and Eve Riskin and Becky Thomas and Elizabeth Wolf and Alice Wu Becoming a Computer Scientist . . . . . 47--57 Kevin Knight Connectionist Ideas and Algorithms . . . 58--74 Philip A. Bernstein Transaction processing monitors . . . . 75--86 Paul S. Jacobs and Lisa F. Rau SCISOR: Extracting Information from On-line News . . . . . . . . . . . . . . 88--97 William J. Premerlani and Michael R. Blaha and James E. Rumbaugh and Thomas A. Varwig An Object-Oriented Relational Database 99--109 Eric A. Weiss The XXII Self-Assessment: The Ethics of Computing . . . . . . . . . . . . . . . 110--132 Gio Wiederhold and John McCarthy and Ed Feigenbaum Obituary: Arthur Samuel (1901--1990). Pioneer in machine learning . . . . . . 137--138 Peter G. Neumann Inside RISKS: Risks in Computerized Elections . . . . . . . . . . . . . . . 170--170
Maurice V. Wilkes Computing perspectives: the rise of the VLSI processor . . . . . . . . . . . . . 16--17, 44 John F. Muratore and Troy A. Heindel and Terri B. Murphy and Arthur Rasmussen and Robert Z. McFarland Real-time data acquisition at mission control . . . . . . . . . . . . . . . . 18--31 Barton P. Miller and Lars Fredriksen and Bryan So An empirical study of the reliability of UNIX utilities . . . . . . . . . . . . . 32--44 Andrew S. Tanenbaum and Robbert van Renesse and Hans van Staveren and Gregory J. Sharp and Sape J. Mullender and Jack Jansen and Guido van Rossum Experiences with the Amoeba distributed operating system . . . . . . . . . . . . 46--63 Vijay Gurbaxani Diffusion in computing networks: the case of BITNET . . . . . . . . . . . . . 65--75 Jonathan Jacky Inside RISKS: risks in medical electronics . . . . . . . . . . . . . . 138--138
Seymour E. Goodman International Perspectives: The Globalization of Computing: Perspectives on a Changing World . . . . . . . . . . 19--21 Eric K. Clemons Evaluation of strategic investments in information technology . . . . . . . . . 22--36 C. A. Ellis and S. J. Gibbs and G. L. Rein Groupware: Some Issues and Experiences 38--58 Vijay Gurbaxani and Seungjin Whang The impact of information systems on organizations and markets . . . . . . . 59--73 John D. Gould and Stephen J. Boies and Clayton Lewis Making usable, useful, productivity-enhancing computer applications . . . . . . . . . . . . . . 74--85 Sirkka L. Jarvenpaa and Blake Ives and Gordon B. Davis Supply/Demand of IS Doctorates in the 1990s . . . . . . . . . . . . . . . . . 86--99 Gary L. Eerkes Profiling Computer Science Master's Programs . . . . . . . . . . . . . . . . 100--109 Leslie Lamport The Mutual Exclusion Problem has been Solved (letter) . . . . . . . . . . . . 110--113 Peter G. Neumann Inside RISKS: The Clock Grows at Midnight . . . . . . . . . . . . . . . . 170--170
Steve Steinberg Viewpoint: a Student's View of Cryptography in Computer Science . . . . 15--17 John R. Rice And the First Computer Science Department Was? . . . . . . . . . . . . 19--19 Larry Press Personal computing: personal computers and the world software market . . . . . 23--28 Elliot Soloway Log on education: Quick, where do the computers go? . . . . . . . . . . . . . 29--33 Nancy G. Leveson Software safety: in embedded computer systems . . . . . . . . . . . . . . . . 34--46 K. W. Yu and Tong Lai Yu Superimposing Encrypted Data . . . . . . 48--54 Flaviu Cristian Understanding fault-tolerant distributed systems . . . . . . . . . . . . . . . . 56--78 Isabelle Richard On Gerasch's Insertion Algorithm . . . . 79--80 Peter G. Neumann Inside RISKS: Certifying Professionals 130--130
Pamela Samuelson Legally speaking: is information property? . . . . . . . . . . . . . . . 15--18 John P. Barlow Electronic frontier: coming into the country . . . . . . . . . . . . . . . . 19--21 Dorothy E. Denning and Donn B. Parker and Steven Levy and Eugene Spafford and Paula Hawthorn and Marc Rotenberg and J. J. Buck BloomBecker and Richard Stallman The United States vs. Craig Neidorf: a debate on electronic publishing, Constitutional rights and hacking . . . 22--43 Donn D. Parker and Stephen Levy and Eugene Spafford and Paula Hawthorn and Marc Rotenberg and J. J. Buck BloomBecker and Richard Stallman Colleagues Debate Denning's Comments . . 33--41 Dorothy E. Denning Denning's Rebuttal . . . . . . . . . . . 42--43 David Gries Teaching Calculation and Discrimination: a More Effective Curriculum . . . . . . 44--55 Daniel Nussbaum and Anant Agarwal Scalability of Parallel Machines . . . . 56--61 Jukka Teuhola and Lutz Wegner Minimal Space, Average Linear Time Duplicate Deletion . . . . . . . . . . . 62--73 Deborah Hix and Robert S. Schulman Human-Computer Interface Development Tools: A Methodology for Their Evaluation . . . . . . . . . . . . . . . 74--87 Dorothea Blostein and Lippold Haken Justification of printed music . . . . . 88--99 Peter G. Neumann Inside RISKS: putting on your best interface . . . . . . . . . . . . . . . 138--138
Larry Press Personal Computing: Personal Computers as Research Tools: SIG CHI and CSCW'90 19--25 Edward A. Fox Guest Editor's Introduction: Standards and the Emergence of Digital Multimedia Systems . . . . . . . . . . . . . . . . 26--29 Gregory K. Wallace The JPEG still picture compression standard . . . . . . . . . . . . . . . . 30--44 Greg Cockroft and Leo Hourvitz NeXTstep: Putting JPEG to Multiple Uses 45, 116 Didier Le Gall MPEG: a video compression standard for multimedia applications . . . . . . . . 46--58 Ming Liou Overview of the $p \times 64$ kbit/s Video Coding Standard . . . . . . . . . 59--63 Kevin Harney and Mike Keith and Gary Lavelle and Lawrence D. Ryan and Daniel J. Stark The i750 Video Processor: a Total Multimedia Solution . . . . . . . . . . 64--78 Frans Sijstermans and Jan van der Meer CD-I full-motion video encoding on a parallel computer . . . . . . . . . . . 81--91 Andrew Lippman Feature sets for interactive images . . 92--102 Michael Liebhold and Eric M. Hoffert Toward an open environment for digital video . . . . . . . . . . . . . . . . . 103--112 Eric M. Hoffert and Greg Gretsch The Digital News System at EDUCOM: a Convergence of Interactive Computing, Newspapers, Television and High-Speed Networks . . . . . . . . . . . . . . . . 113--116 Nathaniel S. Borenstein Multimedia electronic mail: will the dream become a reality? . . . . . . . . 117--119 Peter G. Neumann Inside Risks: interpreting (MIS)information . . . . . . . . . . . . 144--144
Peter J. Denning Short Citedness (editorial) . . . . . . 17--19 Maurice V. Wilkes Computing perspectives: software and the programmer . . . . . . . . . . . . . . . 23--24 Marc Rettig Practical programmer: testing made palatable . . . . . . . . . . . . . . . 25--29 Peter A. Freeman and Marie-Claude Gaudel Building a foundation for the future of software engineering . . . . . . . . . . 30--33 Premkumar Devanbu and Ronald J. Brachman and Peter G. Selfridge and Bruce W. Ballard LaSSIE: a knowledge-based software information system . . . . . . . . . . . 34--49 Armen Gabrielian and Matthew K. Franklin Multilevel specification of real time systems . . . . . . . . . . . . . . . . 50--60 Christine Lafontaine and Yves Ledru and Pierre-Yves Schobbens An experiment in formal software development: using the B theorem prover on a VDM case study . . . . . . . . . . 62--71, 87 Jack C. Wileden and Alexander L. Wolf and William R. Rosenblatt and Peri L. Tarr Specification-level interoperability . . 72--87 Rubén Prieto-Díaz Implementing faceted classification for software reuse . . . . . . . . . . . . . 88--97 Peter G. Neumann Inside RISKS: Expecting the Unexpected Mayday . . . . . . . . . . . . . . . . . 128--128
Diane Crawford From Washington: CEOs unite to influence U.S. technology policy . . . . . . . . . 15--18 Pamela Samuelson Legally speaking: First Amendment rights for information providers? . . . . . . . 19--23 S. E. Goodman and W. K. McHenry International Perspectives: The Soviet Computer Industry: a Tale of Two Sectors 25--28 Vadim E. Kotov Project START . . . . . . . . . . . . . 30--31 Vadim E. Kotov Concurrency + modularity + programmability = MARS . . . . . . . . . 32--45 Enn Tyugu Three New-Generation Software Environments . . . . . . . . . . . . . . 46--59 Alexander S. Narin'yani Intelligent software technology for the new decade . . . . . . . . . . . . . . . 60--67 Allen B. Tucker and Bruce H. Barnes and Robert M. Aiken and Keith Barker and Kim B. Bruce and J. Thomas Cain and Susan E. Conry and Gerald L. Engel and Richard G. Epstein and Doris K. Lidtke and Michael C. Mulder and Jean B. Rogers and Eugene H. Spafford and A. Joe Turner A Summary of the ACM/IEEE-CS Joint Curriculum Task Force Report: Computing Curricula 1991 . . . . . . . . . . . . . 68--84 Robert N. Charette Inside RISKS: Risks with Risk Analysis 106--106
Marc Rettig Practical Programmer: Nobody Reads Documentation . . . . . . . . . . . . . 19--24 Larry Press Personal Computing: Notes from COMDEX 25--29 Isaac V. Kerlow Art + design + computer graphics technology . . . . . . . . . . . . . . . 30--39 J. F. Nunamaker and Alan R. Dennis and Joseph S. Valacich and Douglas R. Vogel and Joey F. George Electronic Meeting Systems to Support Group Work . . . . . . . . . . . . . . . 40--61 Joey F. George and John L. King Examining the computing and centralization debate . . . . . . . . . 62--72 Richard L. Phillips MediaView: a General Multimedia Digital Publication System . . . . . . . . . . . 74--83 Peter G. Neumann Inside RISKS: Computers, Ethics and Values . . . . . . . . . . . . . . . . . 106--106
Maurice V. Wilkes Computing Perspectives: Revisiting Computer Security in the Business World 19--22 John Perry Barlow Electronic Frontier: Private Life in Cyberspace . . . . . . . . . . . . . . . 23--25 Marcel Schoppers Real-time knowledge-based control systems . . . . . . . . . . . . . . . . 26--30 B. Chandrasekaran and R. Bhatnagar and D. D. Sharma Real-time disturbance control . . . . . 32--47 David W. Payton and Thomas E. Bihari Intelligent real-time control of robotic vehicles . . . . . . . . . . . . . . . . 48--63 Wolf Kohn Declarative control architecture . . . . 64--79 C. J. Paul and Anurag Acharya and Bryan Black and Jay K. Strosnider Reducing problem-solving variance to improve predictability . . . . . . . . . 80--93 Jeffrey E. Kottemann and Michael D. Gordon and Jack W. Stott A storage and access manager for ill-structured data . . . . . . . . . . 94--103 Edward H. Bersoff and Alan M. Davis Impacts of Life Cycle Models on Software Configuration Management . . . . . . . . 104--118 Ronni Rosenberg Inside RISKS: Mixed Signals about Social Responsibility . . . . . . . . . . . . . 146--146
Seymour E. Goodman International Perspectives: From Under the Rubble: Computing and the Resuscitation of Romania . . . . . . . . 19--22 Elliot Soloway Log on Education: How the Nintendo Generation Learns . . . . . . . . . . . 23--26, 95 John Foderaro LISP: introduction . . . . . . . . . . . 27--27 Richard P. Gabriel and Jon L. White and Daniel G. Bobrow CLOS: integrating object-oriented and functional programming . . . . . . . . . 28--38 Kenneth H. Sinclair and David A. Moon The philosophy of Lisp . . . . . . . . . 40--47 Oliver Gajek The Metal system . . . . . . . . . . . . 46--47 D. Kevin Layer and Chris Richardson Lisp Systems in the 1990s . . . . . . . 48--57 Scott McKay CLIM: the Common Lisp interface manager 58--59 Hans Muller LispView: leverage through integration 59--61 Richard Barber and George Imlah Delivering the goods with Lisp . . . . . 61--63 James R. Allard and Lowell B. Hawkinson Real-time programming in Common Lisp . . 64--69 Rocky L. Stewart Biosphere 2 nerve system . . . . . . . . 69--71 Fernando J. Corbató On building systems that will fail . . . 72--81 Karen A. Frenkel An Interview with Fernando José Corbató 82--90 Peter G. Neumann Inside RISKS: The Not-So-Accidental Holist . . . . . . . . . . . . . . . . . 122--122
Maurice V. Wilkes Computing Perspectives: Could it Have Been Predicted? . . . . . . . . . . . . 19--21 Pamela Samuelson Legally Speaking: Digital Media and the Law . . . . . . . . . . . . . . . . . . 23--28 R. G. G. Cattell Next-generation database systems . . . . 30--33 O. Deux and others The ${O}_2$ system . . . . . . . . . . . 34--48 Charles Lamb and Gordon Landis and Jack Orenstein and Dan Weinreb The ObjectStore database system . . . . 50--63 Paul Butterworth and Allen Otis and Jacob Stein The GemStone Object Database Management System . . . . . . . . . . . . . . . . . 64--77 Michael Stonebraker and Greg Kemnitz The POSTGRES Next-Generation Database Management System . . . . . . . . . . . 78--92 Guy M. Lohman and Bruce Lindsay and Hamid Pirahesh and K. Bernhard Schiefer Extensions to Starburst: objects, types, functions, and rules . . . . . . . . . . 94--109 Avi Silberschatz and Michael Stonebraker and Jeff Ullman Database systems: achievements and opportunities . . . . . . . . . . . . . 110--120 Barbara Simons and Dennis J. Frailey and A. Joe Turner and Stuart H. Zweben and Peter J. Denning Report: An ACM Response: The Scope and Directions for Computer Science . . . . 121--131 Clark Weissman Inside RISKS: a National Debate on Encryption Exportability . . . . . . . . 162--162
John R. White President's Letter: Maintaining Free Access to Scientific and Professional Activities . . . . . . . . . . . . . . . 13--14, 16 Senator Albert Gore, Jr. Viewpoint: HPCC Policy Champion Forsees Networked Nation . . . . . . . . . . . . 15--16 Diane Crawford From Washington: Supercomputing Policy Links Science and the `C' Word . . . . . 25--28 Eric S. Lander and Robert Langridge and Damian M. Saccocio A Report on Computing in Molecular Biology: Mapping and Interpreting Biological Information . . . . . . . . . 32--39 Karen A. Frenkel A Monumental Science Adventure: The Human Genome Project and Informatics . . 40--51 Cherri M. Pancake Software Support for Parallel Computing: Where Are We Headed? . . . . . . . . . . 52--64 Steven R. Newcomb and Neill A. Kipp and Victoria T. Newcomb The ``HyTime'': hypermedia/time-based document structuring language . . . . . 67--83 Monty Newborn and Danny Kopec The 21st ACM North American computer chess championship . . . . . . . . . . . 84--92 Robert D. Silverman Massively Distributed Computing and Factoring Large Integers: a Pracnique 94--103 James E. Lumpp, Jr. and Samuel A. Fineberg and Wayne G. Nation and Thomas L. Casavant and Edward C. Bronson and Howard Jay Siegel and Pierre H. Pero and Thomas Schwederski and Dan C. Marinescu CAPS: a Coding Aid for PASM . . . . . . 104--117 I. Dittmer Note on Fast Hashing of Variable Length Text Strings . . . . . . . . . . . . . . 118--118 Jacques Savoy Note on Fast Hashing of Variable Length Text Strings . . . . . . . . . . . . . . 118--119 James Litsios Note on Fast Hashing of Variable Length Text Strings . . . . . . . . . . . . . . 119--120 Peter Pearson Note on Fast Hashing of Variable Length Text Strings . . . . . . . . . . . . . . 120--120 Peter G. Neumann Inside RISKS: The Human Element . . . . 150--150
Larry Press Personal Computing: Wide-Area Collaboration . . . . . . . . . . . . . 21--24 Seymour E. Goodman International Perspectives: Computing in a Less-Developed Country . . . . . . . . 25--29 Jonathan Grudin CSCW Introduction . . . . . . . . . . . 30--34 Hiroshi Ishii and Naomi Miyake Toward an open shared workspace: computer and video fusion approach of TeamWorkStation . . . . . . . . . . . . 37--50 Ellen Francik and Susan Ehrlich Rudman and Donna Cooper and Stephen Levine Putting innovation to work: adoption strategies for multimedia communication systems . . . . . . . . . . . . . . . . 52--63 Morten Kyng Designing for cooperation: cooperating in design . . . . . . . . . . . . . . . 65--73 Constance Perin Electronic social fields in bureaucracies . . . . . . . . . . . . . 74--82 Laurence C. Rosenberg Update on National Science Foundation funding of the ``Collaboratory'' . . . . 83--83 Rob Kling Cooperation, coordination and control in computer-supported work . . . . . . . . 83--88 Donald A. Norman Collaborative computing: collaboration first, computing second . . . . . . . . 88--90 Patrick M. LaMalva and David R. Reyes-Guerra Accredited Programs in Computing, Followed by Year of Initial Accreditation . . . . . . . . . . . . . 91--96 W. Wesley Peterson More Error-Detecting Decimal Digits . . 110--113 Peter G. Neumann Inside RISKS: Collaborative Efforts . . 162--162
Frailey and Turner and Zweben Adequacy and Health of Academic-Industry Coupling . . . . . . . . . . . . . . . . ?? Simons Building a Research Agenda . . . . . . . ??
R. Stallman and S. Garfinkel Against Software Patents . . . . . . . . 17 John Perry Barlow Electronic Frontier: The Great Work . . 25--28 Marc Rettig Practical Programmer: Interface Design When You Don't Know How . . . . . . . . 29--34 Bernard J. Haan and Paul Kahn and Victor A. Riley and James H. Coombs and Norman K. Meyrowitz IRIS hypermedia services . . . . . . . . 36--51 James L. Green The evolution of DVI system software . . 52--67 Jeffrey S. Doerschler and Herbert Freeman A rule-based system for dense-map name placement . . . . . . . . . . . . . . . 68--79 Guy Lapalme and Jean-Marc Rousseau and Suzanne Chapleau and Michel Cormier and Pierre Cossette and Serge Roy GeoRoute: a Geographic Information System for Transportation Applications 80--88 Girish H. Subramanian and John Nosek and Sankaran P. Raghunathan and Santosh S. Kanitkar A comparison of the decision table and tree . . . . . . . . . . . . . . . . . . 89--94 Suzanne Bunton and Gaetano Borriello Practical dictionary management for hardware data compression . . . . . . . 95--104 Edward A. Fox and Lenwood S. Heath and Qi Fan Chen and Amjad M. Daoud Practical minimal perfect hash functions for large databases . . . . . . . . . . 105--121 Jason L. Frand and Julia A. Britt Seventh Annual UCLA Survey of Business School Computer Usage . . . . . . . . . 123--131 D. Gries and D. Marsh The 1989-1990 Taulbee Report . . . . . . 132 David Gries and Dorothy Marsh The 1989--90 Taulbee Survey . . . . . . 133--143 Peter G. Neumann Inside Risks: What's in a Name? . . . . 186--186
R. Gary Marquart and Anthony Fedanzo and Robert V. Binder and C. J. Paul and David Ibbetson ACM Forum: Readers Take Exception to Rejoinder: And the Surgeon General Warns \ldots . . . . . . . . . . . . . . . . . 22, 26 Carol Wolinsky and James Sylvester From Washington: Privacy in the Telecommunications Age . . . . . . . . . 23--25 Pamela Samuelson Legally Speaking: Copyright Law and Electronic Compilations of Data . . . . 27--32 Magid Igbaria and Jeffrey H. Greenhaus Determinants of MIS Employees' Turnover Intentions: A Structural Equation Model 34--49 Albert L. Lederer and Jayesh Prasad Nine management guidelines for better cost estimating . . . . . . . . . . . . 51--59 Thomas D. Clark, Jr. Corporate systems management: an overview and research perspective . . . 61--75 Jeffrey K. Liker and Mitchell Fleischer and Mitsuo Nagamachi and Michael S. Zonnevylle Designers and Their Machines: CAD Use and Support in the U.S. and Japan . . . 77--95 David Gelernter and Nicholas Carriero Coordination languages and their significance . . . . . . . . . . . . . . 97--107 Joobin Choobineh and Michael V. Mannino and Veronica P. Tseng A form-based approach for database analysis and design . . . . . . . . . . 108--120 Robert W. Gray and Vincent P. Heuring and Steven P. Levi and Anthony M. Sloane and William M. Waite Eli: a Complete, Flexible Compiler Construction System . . . . . . . . . . 121--130 Seymour E. Goodman Political activity and international computer networks . . . . . . . . . . . 174--174
Antonio R. Quesada and Paul Pritchard and Richard E. James, III Additional notes on a practical sieve algorithm . . . . . . . . . . . . . . . 11--14 Maurice V. Wilkes Computing Perspectives: Charles Babbage: The Great Uncle of Computing? . . . . . 15--16, 21 Larry Press Personal Computing: Dynabook Revisited: Portable Computers Past, Present and Future . . . . . . . . . . . . . . . . . 25--32 Jacques Cohen First specialize, then generalize: introduction . . . . . . . . . . . . . . 34--39 J. A. Robinson Logic and Logic Programming . . . . . . 40--65 John Grant and Jack Minker The Impact of Logic Programming on Databases . . . . . . . . . . . . . . . 66--81 Koichi Furukawa Logic programming as the integrator of the Fifth Generation Computer Systems project . . . . . . . . . . . . . . . . 82--92 David S. Warren Memoing for logic programs . . . . . . . 93--111 Toshinori Munakata Notes on implementing sets in Prolog . . 112--120 Marcia C. Linn and Michael J. Clancy The case for case studies of programming problems . . . . . . . . . . . . . . . . 121--132 Peter G. Neumann Inside RISKS: inside ``RISKS of RISKS'' 160--160
Renata L. La Rovere and S. E. Goodman International Perspectives: Computing in the Brazilian Amazon . . . . . . . . . . 21--24 Ronald J. Norman and Gene Forte Automating the software development process: CASE in the 90's . . . . . . . 27--27 Gene Forte and Ronald J. Norman A self-assessment by the software engineering community . . . . . . . . . 28--32 Terry Shepard and Steve Sibbald and Colin Wortley A visual software process language . . . 37--44 Clifford C. Huff Elements of a realistic CASE tool adoption budget . . . . . . . . . . . . 45--54 Neil A. Maiden and Alistair G. Sutcliffe Exploiting reusable specifications through analogy . . . . . . . . . . . . 55--64 Graham Tate and June Verner and Ross Jeffery CASE: a Testbed for Modeling, Measurement and Management . . . . . . . 65--72 Ira D. Baxter Design maintenance systems . . . . . . . 73--89 Iris Vessey and Sirkka L. Jarvenpaa and Noam Tractinsky Evaluation of vendor products: CASE tools as methodology companions . . . . 90--105 Barry G. Silverman Survey of expert critiquing systems: practical and theoretical frontiers . . 106--127 Jean Sammet Farewell to Grace Hopper: end of an era! 128--131 Ricardo Baeza-Yates and Fred T. Krogh and Bernard Ziegler and Peter R. Sibbald and Daniel M. Sunday Technical Correspondence: Notes on a Very Fast Substring Search Algorithm . . 132--137 Marc Rotenberg Inside RISKS: Protecting privacy . . . . 164--164
Marc Rettig A succotash of projections and insights 25--30 Ephraim P. Glinert and Bryant W. York Computers and people with disabilities 32--35 Carl Brown Assistive technology computers and persons with disabilities . . . . . . . 36--45 Norman Alm and John L. Arnott and Alan F. Newell Prediction and conversational momentum in an augmentative communication system 46--57 Norman Alm and John L. Arnott and Alan F. Newell Input acceleration techniques for severely physically disabled nonspeakers using a communication system . . . . . . 54--55 Randy Pausch and Ronald D. Williams Giving CANDY to children: user-tailored gesture input driving an articulator-based speech synthesizer . . 58--66 Patrick W. Demasco and Kathleen F. McCoy Generating text from compressed input: an intelligent interface for people with severe motor impairments . . . . . . . . 68--78 Karen Kukich Spelling correction for the telecommunications network for the deaf 80--90 Randy Dipner ADA and the ACM . . . . . . . . . . . . 90--90 Daniel K. Davies and Randy W. Dipner ACM membership survey of disability and disability issues . . . . . . . . . . . 91--93 Ronald E. Anderson ACM code of ethics and professional conduct . . . . . . . . . . . . . . . . 94--99 Peter G. Neumann Survivable systems . . . . . . . . . . . 130--130
Walter F. Tichy and Michael Philippsen and Phil Hatcher and James L. Frankel Technical Correspondence: a Critique of the Programming Language C* . . . . . . 21--24 Colin Boyd and Tong Lai Yu Remarks on a Data Encryption Scheme of Yu and Yu (letters) . . . . . . . . . . 24--25 Larry Press Collective dynabases . . . . . . . . . . 26--32 Pamela Samuelson and Michel Denber and Robert J. Glushko Developments on the intellectual property front . . . . . . . . . . . . . 33--39 John C. Hart Visualization in networked environments 42--43 Larry Smarr and Charles E. Catlett Metacomputing . . . . . . . . . . . . . 44--52 Philip J. Mercurio and T. T. Elvins and Stephen J. Young and Philip S. Cohen and Kevin R. Fall and Mark H. Ellisman The Distributed Laboratory: An Interactive Visualization Environment for Electron Microscopy and 3D Imaging 54--63 Carolina Cruz-Neira and Daniel J. Sandin and Thomas A. DeFanti and Robert V. Kenyon and John C. Hart The CAVE: audio visual experience automatic virtual environment . . . . . 64--72 Ingrid Carlbom and William M. Hsu and Gudrun Klinker and Richard Szeliski and Keith Waters and Michael Doyle and Jim Gettys and Kristen M. Harris and Thomas M. Levergood and Ricky Palmer and Larry Palmer and Marc Picart and Demetri Terzopoulos and David Tonnesen and Michael Vannier and Greg Wallace Modeling and analysis of empirical data in collaborative environments . . . . . 74--84 David DeWitt and Jim Gray Parallel database systems: the future of high performance database systems . . . 85--98 Kunihiko Higa and Mike Morrison and Joline Morrison and Olivia R. Liu Sheng An Object-Oriented Methodology for Knowledge Base/Database Coupling . . . . 99--113 David E. Ferguson Bit-Tree: a data structure for fast file processing . . . . . . . . . . . . . . . 114--120 Paul Heckel Debunking the software patent myths . . 121--140 Peter G. Neumann Leap-year problems . . . . . . . . . . . 162--162
Elliot Soloway Buying Computers for Your School: a Guide for the Perplexed . . . . . . . . 21--24 John Perry Barlow Decrypting the puzzle palace . . . . . . 25--31 Anonymous Debating encryption standards . . . . . 32--34 National Institute of Standards and Technology (NIST) The Digital Signature Standard, Proposed by NIST . . . . . . . . . . . . . . . . 36--40 Ronald L. Rivest and Martin E. Hellman and John C. Anderson and John W. Lyons Responses to NIST's proposal . . . . . . 41--54 Bala R. Vatti A generic solution to polygon clipping 56--63 Santosh Chokhani Trusted products evaluation . . . . . . 64--76 Alok Sinha Client-Server Computing: Current Technology Review . . . . . . . . . . . 77--98 Wim Hesselink and Jan Jongejan and Jukka Teuhola and Lutz Wegner Technical Correspondence: Duplicate Deletion Derived . . . . . . . . . . . . 99--107 Peter G. Neumann Aggravation by computer: life, death, and taxes . . . . . . . . . . . . . . . 122--122
Maurice V. Wilkes Computing Perspectives: Artificial Intelligence as the Year 2000 Approaches 17--23 S. E. Goodman and J. D. Green Computing in the Middle East . . . . . . 21--24 C. Gordon Bell Ultracomputers: a Teraflop Before Its Time . . . . . . . . . . . . . . . . . . 26--47 Robert H. Creecy and Brij M. Masand and Stephen J. Smith and David L. Waltz Trading MIPS and memory for knowledge engineering . . . . . . . . . . . . . . 48--64 Ken Kennedy Guest Editor's Introduction to the Special Section on Supercomputing . . . 65--65 Seema Hiranandani and Ken Kennedy and Chau-Wen Tseng Compiling Fortran D for MIMD distributed-memory machines . . . . . . 66--80 David Cann Retire Fortran? A Debate Rekindled . . . 81--89 Susan Flynn Hummel and Edith Schonberg and Lawrence E. Flynn Factoring: a Method for Scheduling Parallel Loops . . . . . . . . . . . . . 90--101 William Pugh A practical algorithm for exact array dependence analysis . . . . . . . . . . 102--114 Margaret L. Simmons and Harvey J. Wasserman and Olaf M. Lubeck and Christopher Eoyang and Raul Mendez and Hiroo Harada and Misako Ishiguro A performance comparison of four supercomputers . . . . . . . . . . . . . 116--124 Peter G. Neumann Inside RISKS: Fraud by Computer . . . . 154--154
Pamela Samuelson Updating the copyright look and feel lawsuits . . . . . . . . . . . . . . . . 25--31 Timothy D. Korson and Vijay K. Vaishnavi Analysis and modeling in software development . . . . . . . . . . . . . . 32--34 David E. Monarchi and Gretchen I. Puhr A Research Typology for Object-Oriented Analysis and Design . . . . . . . . . . 35--47 Kenneth S. Rubin and Adele Goldberg Object behavior analysis . . . . . . . . 48--62 Jean-Marc Nerson Applying object-oriented analysis and design . . . . . . . . . . . . . . . . . 63--74 Bill Curtis and Marc I. Kellner and Jim Over Process modeling . . . . . . . . . . . . 75--90 Herb Krasner and Jim Terrel and Adam Linehan and Paul Arnold and William H. Ett Lessons learned from a software process modeling system . . . . . . . . . . . . 91--100 Timothy D. Korson and Vijay K. Vaishnavi Managing Emerging Software Technologies: A Technology Transfer Framework . . . . 101--111 Shamkant B. Navathe Evolution of data modeling for databases 112--123 B. Chandrasekaran and Todd R. Johnson and Jack W. Smith Task-structure analysis for knowledge modeling . . . . . . . . . . . . . . . . 124--137 Ramayya Krishnan and Xiaoping Li and David Steier A knowledge-based mathematical model formulation system . . . . . . . . . . . 138--146 Meilir Page-Jones Comparing techniques by means of encapsulation and connascence . . . . . 147--151 Peter Coad Object-Oriented Patterns . . . . . . . . 152--159 Oscar Nierstrasz and Simon Gibbs and Dennis Tsichritzis Component-Oriented Software Development 160--165 August-Wilhelm Scheer and Alexander Hars Extending data modeling to cover the whole enterprise . . . . . . . . . . . . 166--172 Peter G. Neumann Inside RISKS: Accidental Financial Losses . . . . . . . . . . . . . . . . . 194--194
Marc Rettig Practical Programmer: Hat Racks for Understanding . . . . . . . . . . . . . 21--24 John Perry Barlow Electronic Frontier: Will Japan Jack In? 27--29 Anthony C. Stylianou and Gregory R. Madey and Robert D. Smith Selection Criteria for Expert System Shells: A Socio-Technical Framework . . 30--48 David S. Touretzky and Peter Lee Visualizing evaluation in applicative languages . . . . . . . . . . . . . . . 49--59 Yosee Feldman and Ehud Shapiro Spatial Machines: a More Realistic Approach to Parallel Computation . . . . 60--73 Ricardo Baeza-Yates and Gaston H. Gonnet A new approach to text searching . . . . 74--82 Sun Wu and Udi Manber Fast text searching allowing errors . . 83--91 Dov Dori Dimensioning analysis: toward automatic understanding of engineering drawings 92--103 Shailendra C. Palvia and Steven R. Gordon Tables, trees and formulas in decision analysis . . . . . . . . . . . . . . . . 104--113 Peter G. Neumann Inside RISKS: Where to Place Trust . . . 138--138
Stuart Zweben President's Letter: We Overplanting Our Seed Corn? . . . . . . . . . . . . . . . 15--16 Peter Likins Viewpoint: a Breach of the Social Contract . . . . . . . . . . . . . . . . 17--18, 111 Brad Knowles and Roger Schlafly and Grant D. Schultz and Lynn Zelvin and Paul Heckel and E. Robert Yoches ACM Forum: Comments on Cryptography . . 19--24, 112 Maurice V. Wilkes Computing Perspectives. The Long-Term Future of Operating Systems . . . . . . 23--24, 112 G. M. Mesher and R. O. Briggs and S. E. Goodman and L. I. Press and J. M. Snyder International Perspectives: Cuba, Communism, and Computing . . . . . . . . 27--29, 112 Juris Hartmanis Computing the future: committee to assess the scope and direction of computer science and technology for the National Research Council . . . . . . . 30--40 Benjamin M. Brosgol Ada . . . . . . . . . . . . . . . . . . 41--42 Edmond Schonberg and Mark Gerhardt and Charlene Hayden A technical tour of Ada . . . . . . . . 43--52 Michael B. Feldman Ada Experience in the Undergraduate Curriculum . . . . . . . . . . . . . . . 53--67 John W. McCormick A model railroad for Ada and software engineering . . . . . . . . . . . . . . 68--70 J. P. Rosen What orientation should Ada objects take? . . . . . . . . . . . . . . . . . 71--76 S. Tucker Taft Ada 9X: a Technical Summary . . . . . . 77--82 Chris Anderson Ada 9X Project Management . . . . . . . 83--84 Erhard Ploedereder Building consensus for Ada 9X . . . . . 85--88 Gio Wiederhold and Peter Wegner and Stefano Ceri Toward megaprogramming . . . . . . . . . 89--99 Danny Kopec and Monty Newborn and Mike Valvo The 22nd Annual ACM International Computer Chess Championship . . . . . . 100--110 Rebecca Mercuri Inside RISKS: Voting Machine Risks . . . 138--138
Judith L. Gersting Viewpoint: Intangibles for Success . . . 11--12 Patrick J. Hayes and Gordon S. Novak, Jr. and Wendy G. Lehnert ACM Forum: In Defense of Artificial Intelligence . . . . . . . . . . . . . . 13--16 Joseph F. Traub A tribute to Allen Newell: 1927--1992 20--20 Larry Press Personal Computing: The Net: Progress and Opportunity . . . . . . . . . . . . 21--25 Shoshana Loeb and Douglas Terry Information filtering . . . . . . . . . 26--28 Nicholas J. Belkin and W. Bruce Croft Information filtering and information retrieval: two sides of the same coin? 29--38 Shoshana Loeb Architecting personalized delivery of multimedia information . . . . . . . . . 39--47 Curt Stevens Automating the creation of information filters . . . . . . . . . . . . . . . . 48--48 Irene Stadnyk and Robert Kass Modeling users' interests in information filters . . . . . . . . . . . . . . . . 49--50 Paul E. Baclace Competitive agents for information filtering . . . . . . . . . . . . . . . 50--50 Peter W. Foltz and Susan T. Dumais Personalized Information Delivery: An Analysis of Information-Filtering Methods . . . . . . . . . . . . . . . . 51--60 David Goldberg and David Nichols and Brian M. Oki and Douglas Terry Using collaborative filtering to weave an information tapestry . . . . . . . . 61--70 T. F. Bowen and G. Gopal and G. Herman and T. Hickey and K. C. Lee and W. H. Mansfield and J. Raitz and A. Weinrib The Datacycle architecture . . . . . . . 71--81 Ashwin Ram Natural language understanding for information-filtering systems . . . . . 80--81 Peter J. Denning Educating a new engineer . . . . . . . . 82--97 Patrick M. LaMalva and David R. Reyes-Guerra Accredited Programs in Computing . . . . 98--101 Peter G. Neumann Inside RISKS: Avoiding Weak Links . . . 146--146
Pamela Samuelson Legally Speaking: Liability for Defective Electronic Information . . . . 21--26 Sara A. Bly and Steve R. Harrison and Susan Irwin Multimedia In The Workplace: Media Spaces: Bringing People Together in a Video, Audio, and Computing Environment 28--47 Bryan Lyles Media spaces and broadband ISDN . . . . 46--47 Robert S. Fish and Robert E. Kraut and Robert W. Root and Ronald E. Rice Video as a technology for informal communication . . . . . . . . . . . . . 48--61 Ralph D. Hill and Tom Brinck and John F. Patterson and Steven L. Rohall and Wayne T. Wilner The Rendezvous Language and Architecture 62--67 M. Arango and L. Bahler and P. Bates and M. Cochinwala and D. Cohrs and R. Fish and G. Gopal and N. Griffeth and G. E. Herman and T. Hickey and K. C. Lee and W. E. Leland and C. Lowery and V. Mak and J. Patterson and L. Ruston and M. Segal and R. C. Sekar and M. P. Vecchi and A. Weinrib and S.-Y. Wuu Touring Machine System . . . . . . . . . 68--77 Robin Milner Elements of interaction: Turing Award Lecture . . . . . . . . . . . . . . . . 78--89 Karen A. Frenkel An interview with Robin Milner . . . . . 90--97 Jean-Pierre Banâtre and Daniel Le Métayer Programming by multiset transformation 98--111 Peter G. Neumann Inside RISKS: Risks Considered Global(ly) . . . . . . . . . . . . . . . 154--154
Rob Kling and Peter Wegner and John R. Rice and Eric A. Weiss Technical Correspondence: Broadening Computer Science . . . . . . . . . . . . 15--20 Maurice V. Wilkes Computing Perspectives: Light Amplifiers and Solitons . . . . . . . . . . . . . . 21--23 M. Odedra and M. Bennett and S. Goodman and M. Lawrie International Perspectives: Sub-Saharan Africa: A Technological Desert . . . . . 25--29 Robert M. Supnik Introduction to Special Issue on Digital's Alpha Chip Project . . . . . . 30--32 Richard L. Sites Alpha AXP Architecture . . . . . . . . . 33--44 Nancy Kronenberg and Thomas R. Benson and Wayne M. Cardoza and Ravindran Jagannathan and Benjamin J. Thomas Porting OpenVMS from VAX to Alpha AXP 45--53 Charles P. Thacker and David G. Conroy and Lawrence C. Stewart The Alpha Demonstration Unit: a High-Performance Multiprocessor . . . . 55--67 Ralph Katz Tales from the Front . . . . . . . . . . 67--67 Richard L. Sites and Anton Chernoff and Matthew B. Kirk and Maurice P. Marks and Scott G. Robinson Binary translation . . . . . . . . . . . 69--81 Daniel Dobberpuhl and Kevin Fielding Design of EV-4 . . . . . . . . . . . . . 82--82 Richard Hollingsworth Advanced semiconductor technology . . . 83--83 Chris F. Kemerer Reliability of Function Points Measurement: a Field Experiment . . . . 85--97 Ronald E. Anderson and Deborah G. Johnson and Donald Gotterbarn and Judith Perrolle Using the new ACM code of ethics in decision making . . . . . . . . . . . . 98--107 Peter G. Neumann Inside RISKS: Are Dependable Systems Feasible? . . . . . . . . . . . . . . . 146--146
Varun Grover and Martin Goslar Information technologies for the 1990s: the executives' view . . . . . . . . . . 17--19 John Perry Barlow Electronic Frontier: Bill O' Rights . . 21--23 Dorothy E. Denning To tap or not to tap . . . . . . . . . . 24--33 Mike Godwin and William A. Bayse and Marc Rotenberg and Lewis M. Branscomb and Anne M. Branscomb and Ronald L. Rivest and Andrew Grosso and Gary T. Marx Commentators . . . . . . . . . . . . . . 34--41 Dorothy E. Denning Final thoughts . . . . . . . . . . . . . 42--44 Ehud Shapiro and David H. D. Warren The Fifth Generation Project: Personal Perspectives: Introduction . . . . . . . 46--49 Kazuhiro Fuchi and Robert Kowalski and Koichi Furukawa and Kazunori Ueda and Ken Kahn and Takashi Chikayama and Evan Tick Launching the new era . . . . . . . . . 49--100 Ehud Shapiro and David H. D. Warren Epilogue . . . . . . . . . . . . . . . . 100--101 Peter G. Neumann Inside Risks: Risks of Technology . . . 130--130
David Billington Using the context-free pumping lemma . . 21, 81 Marc Rettig Practical Programmer: Cooperative Software . . . . . . . . . . . . . . . . 23--28 Pamela Samuelson Legally Speaking: The Ups and Downs of Look and Feel . . . . . . . . . . . . . 29--35 David Mandelkern Graphical User Interfaces: The Next Generation: Introduction . . . . . . . . 36--39 Jeff A. Johnson and Bonnie A. Nardi and Craig L. Zarmer and James R. Miller ACE: Building Interactive Graphical Interactions . . . . . . . . . . . . . . 40--55 George G. Robertson and Stuart K. Card and Jock D. Mackinlay Information Visualization Using 3D Interactive Animation . . . . . . . . . 56--71 Alan Morse and George Reynolds Overcoming current growth limits in UI development . . . . . . . . . . . . . . 72--81 Jakob Nielsen Noncommand user interfaces . . . . . . . 82--99 Aaron Marcus Human communications issues in advanced UIs . . . . . . . . . . . . . . . . . . 101--109 Jonathan Grudin Interface: an evolving concept . . . . . 110--119 C. Dianne Martin The myth of the awesome thinking machine 120--133 Donald A. Norman Inside RISKS: Using Names As Identifiers 154--154
Gary Beach Building a foundation . . . . . . . . . 13--14 Herb Grosch Forum: In Defense of Maurice Wilkes (letter) . . . . . . . . . . . . . . . . 16--16 Larry Press Personal Computing: Technetronic Education: Answers on the cultural Horizon . . . . . . . . . . . . . . . . 17--22 Elliot Soloway Log on Education: Reading and Writing in the 21st Century . . . . . . . . . . . . 23--27 Elliot Soloway Introduction to the Issue on Technology in Education . . . . . . . . . . . . . . 28--30 Jan Hawkins Technology and the organization of schooling . . . . . . . . . . . . . . . 30--35 Dick Ruopp and Shahaf Gal The LabNetwork . . . . . . . . . . . . . 35--36 Marlene Scardamalia and Carl Bereiter Technologies for knowledge-building discourse . . . . . . . . . . . . . . . 37--41 Beverly Hunter Internetworking: coordinating technology for systemic reform . . . . . . . . . . 42--46 Robert Pearlman Designing the new American schools . . . 46--49 Denis Newman School networks: delivery or access . . 49--51 Brigid Barron and Ronald J. Kantor Tools to enhance math education: the Jasper series . . . . . . . . . . . . . 52--54 Roger C. Schank Learning via multimedia computers . . . 54--56 Wayne C. Grant Wireless Coyote: a computer-supported field trip . . . . . . . . . . . . . . . 57--59 Roy D. Pea The collaborative visualization project 60--63 Andee Rubin Video laboratories: tools for scientific investigation . . . . . . . . . . . . . 64--65 Ludwig Braun Help for all the students . . . . . . . 66--69 Henry Jay Becker Teaching with and about computers in secondary schools . . . . . . . . . . . 69--72 Ronald E. Anderson The technology infrastructure of U.S. schools . . . . . . . . . . . . . . . . 72--73 Jan Hawkins and John Frederiksen and Allan Collins and Dorothy Bennett and Elizabeth Collins Assessment and technology . . . . . . . 74--76 Carol Edwards Life-long learning . . . . . . . . . . . 76--78 Yolanda S. George and Shirley M. Malcolm and Laura Jeffers Computer equity for the future . . . . . 78--81 Coco Conn SIGKids at SIGGRAPH . . . . . . . . . . 81--82 Teri Perl ACM task force on K-12 education and technology . . . . . . . . . . . . . . . 82--83 Doris K. Lidtke and David Moursund Computers in schools: past, present, and how we can change the future . . . . . . 84--87 Susan M. Merritt and Charles J. Buen and Philip East and Darlene Grantham and Charles Rice and Viera K. Proulx and Gerry Segal and Carol Wolf ACM Model High School Computer Science Curriculum . . . . . . . . . . . . . . . 87--90 Peter G. Neumann Inside RISKS: The Role of Software Engineering . . . . . . . . . . . . . . 114--114
S. R. Nidumolu and S. E. Goodman International Perspectives: Computing in India: An Asian Elephant Learning to Dance . . . . . . . . . . . . . . . . . 15--22 Sarah Kuhn and Michael J. Muller Introduction with taxonomy of PD practices: a brief practitioner's guide 24--28 Michael J. Muller and Daniel M. Wildman and Ellen A. White Taxonomy of PD Practices: a Brief Practitioner's Guide . . . . . . . . . . 26--27 Andrew Clement and Peter Van den Besselaar A retrospective look at PD projects . . 29--37 Steven E. Miller From system design to democracy . . . . 38--39 Gro Bjerknes Some PD advice . . . . . . . . . . . . . 39--39 Erran Carmel and Randall D. Whitaker and Joey F. George PD and Joint Application Design: A Transatlantic Comparison . . . . . . . . 40--48 Joan Greenbaum PD a personal statement . . . . . . . . 47--47 William L. Anderson and William T. Crocca Engineering practice and codevelopment of product prototypes . . . . . . . . . 49--56 Jim Euchner and Patricia Sachs The benefits of intentional tension . . 53--53 Kim Halskov Madsen and Peter H. Aiken Experiences using cooperative interactive storyboard prototyping . . . 57--64 Darlene Crane Graphic facilitation . . . . . . . . . . 64--65 Michael J. Muller and Daniel M. Wildman and Ellen A. White ``Equal opportunity'' PD using PICTIVE 64--66 Kaj Grònbæk and Morten Kyng and Preben Mogensen CSCW challenges: cooperative design in engineering projects . . . . . . . . . . 67--77 Susan Harker User participation in prototyping . . . 77--81 Finn Kensing and Andreas Munk-Madsen PD: structure in the toolbox . . . . . . 78--85 Enid Mumford The ETHICS approach . . . . . . . . . . 82--82 Christiane Floyd STEPS: a methodical approach to PD . . . 83--83 Barbara Katzenberg and Peter Piela Work language analysis and the naming problem . . . . . . . . . . . . . . . . 86--92 Jeanette Blomberg and Denise McLaughlin and Lucy Suchman Work-oriented design at Xerox . . . . . 91--91 David Novick and Eleanor Wynn Participatory conversation in PD . . . . 93--93 Ina Wagner A web of fuzzy problems: confronting the ethical issues . . . . . . . . . . . . . 94--101 Marian G. Williams and Vivienne Begg Translation between software designers and users . . . . . . . . . . . . . . . 102--103 Peter G. Neumann Inside RISKS: Modeling and Simulation 124--124
Judith R. Brown Looking toward the year 2000 . . . . . . 13--14 Ian O. Angell Intelligence: logical or biological . . 15--16, 119 Guy L. Steele, Jr. and Danny Hillis and Richard Stallman and Gerald J. Sussman and Marvin Minsky and John McCarthy and John Backus and Fernando Corbató and Ronald E. Anderson Forum: Code of Ethics Reconsidered . . . 17--20 Maurice V. Wilkes Computing Perspectives: From Fortran and Algol to Object-Oriented Languages . . . 21--23 Pierre Wellner and Wendy Mackay and Rich Gold Guest Editors' Introduction to the Special Issue on Computer-Augmented Environments: Back to the Real World . . 24--27 Michael Spreitzer and Marvin Theimer Scalable, secure, mobile computing with location information . . . . . . . . . . 27--27 Thomas Baudel and Michel Beaudouin-Lafon Charade: Remote Control of Objects using Free-Hand Gestures . . . . . . . . . . . 28--35 Myron W. Krueger Environmental technology: making the real world virtual . . . . . . . . . . . 36--37 George W. Fitzmaurice Situated Information Spaces and Spatially Aware Palmtop Computers . . . 38--49 Ronald Azuma Tracking requirements for augmented reality . . . . . . . . . . . . . . . . 50--51 Steven Feiner and Blair Macintyre and Dorée Seligmann Knowledge-based augmented reality . . . 53--62 Mitchel Resnick Behavior construction kits . . . . . . . 64--71 Rich Gold This is not a pipe . . . . . . . . . . . 72--72 Mark Weiser Some Computer Science Issues in Ubiquitous Computing . . . . . . . . . . 74--84 Scott Elrod and Gene Hall and Rick Costanza and Michael Dixon and Jim Des Rivi\`eres Responsive office environments . . . . . 84--85 Pierre Wellner Interacting with Paper on the DigitalDesk . . . . . . . . . . . . . . 86--96 Wendy Mackay and Gilles Velay and Kathy Carter and Chaoying Ma and Daniele Pagani Augmenting reality: adding computational dimensions to paper . . . . . . . . . . 96--97 Peter J. Denning Designing New Principles to Sustain Research in our Universities . . . . . . 99--104 George Marsaglia Technical Correspondence: Remarks on Choosing and Implementing Random Number Generators . . . . . . . . . . . . . . . 105--108 Stephen J. Sullivan Another Test for Randomness . . . . . . 108--108 Stephen K. Park and Keith W. Miller and Paul K. Stockmeyer Another Test for Randomness: Response 108--110 Peter G. Neumann Inside RISKS: RISKS on the Rails . . . . 130--130
Jean-François Colonna Technical Correspondence: The subjectivity of computers . . . . . . . 15--18 Marc Rettig and Gary Simons and John Thomson Practical Programmer: Extended Objects 19--24 Fred W. Weingarten From Washington: Happenings on the Hill 25--27 Haruhisa Ishida and Lawrence H. Landweber Introduction to the Special Issue on Internetworking . . . . . . . . . . . . 28--30 Randy Bush FidoNet: technology, tools, and history 31--35 Janet Murray K12 network: global education through telecommunications . . . . . . . . . . . 36--41 George Sadowsky Network connectivity for developing countries . . . . . . . . . . . . . . . 42--47 Stephen T. Kent Internet Privacy Enhanced Mail . . . . . 48--60 Marc Rotenberg Communications privacy: implications for network design . . . . . . . . . . . . . 61--68 Frank M. Tuerkheimer The underpinnings of privacy protection 69--73 Tsuyoshi Hiramatsu Protecting telecommunications privacy in Japan . . . . . . . . . . . . . . . . . 74--77 Michael F. Schwartz and David C. M. Wood Discovering shared interests using graph analysis . . . . . . . . . . . . . . . . 78--89 Bradford W. Hesse and Lee S. Sproull and Sara B. Kiesler and John P. Walsh Returns to science: computer networks in oceanography . . . . . . . . . . . . . . 90--101 Peter G. Neumann Inside Risks: Risks of Surveillance . . 122--122
Lance J. Hoffman Clipping Clipper . . . . . . . . . . . . 15--17 Pamela Samuelson Legally Speaking: Computer Programs and Copyright's Fair Use Doctrine . . . . . 19--25 Larry Press Personal Computing: Before the Altair: The History of Personal Computing . . . 27--33 Anonymous Introduction to the Special Issue on Concurrent Object-Oriented Programming 34 Jacques Cohen Concurrent object-oriented programming 35--36 Rodger Lea and Christian Jacquemot and Eric Pillevesse COOL: system support for distributed programming . . . . . . . . . . . . . . 37--46 Bruno Achauer The DOWL distributed object-oriented language . . . . . . . . . . . . . . . . 48--55 Bertrand Meyer Systematic concurrent object-oriented programming . . . . . . . . . . . . . . 56--80 Klaus-Peter Löhr Concurrency annotations for reusable software . . . . . . . . . . . . . . . . 81--89 Denis Caromel Toward a method of object-oriented concurrent programming . . . . . . . . . 90--102 Murat Karaorman and John Bruno Introducing concurrency to a sequential language . . . . . . . . . . . . . . . . 103--115 Roy H. Campbell and Nayeem Islam and David Raila and Peter Madany Designing and implementing \em Choices: an object-oriented system in C++ . . . . 117--126 Max Mühlhäuser and Wolfgang Gerteis and Lutz Heuser DOCASE: a methodic approach to distributed programming . . . . . . . . 127--138 Peter G. Neumann Inside Risks: Animal Crackers . . . . . 162--162
Sasa Dekleva and Stanley Martens Technical Correspondence: First Normal Form Reconsidered . . . . . . . . . . . 19--20 Elliot Soloway Log on Education: Should We Teach Students to Program? . . . . . . . . . . 21--24 P. Wolcott and S. E. Goodman International Perspectives: Under the Stress of Reform: High-Performance Computing in the Former Soviet Union . . 25--29 Larry L. Constantine and Lucy A. D. Lockwood Introduction to the Special Section on Project Organization and Management . . 30--32 Larry L. Constantine and Lucy A. D. Lockwood Orchestrating project organization and management . . . . . . . . . . . . . . . 31--32 Larry L. Constantine Work organization: paradigms for project management and organization . . . . . . 35--43 Marc Rettig and Gary Simons A project planning and development process for small teams . . . . . . . . 45--55 Risa B. Hyman Creative chaos in high-performance teams: an experience report . . . . . . 57--60 Diane B. Walz and Joyce J. Elam and Bill Curtis Inside a software design team: knowledge acquisition, sharing, and integration 63--77 Richard E. Zultner TQM for technical teams . . . . . . . . 79--91 Karen Holtzblatt and Hugh Beyer Making customer-centered design work for teams . . . . . . . . . . . . . . . . . 92--103 Tony Hutchings and Michael G. Hyde and David Marca and Lou Cohen Process improvement that lasts: an integrated training and consulting method . . . . . . . . . . . . . . . . . 104--113 Richard A. Zahniser Design by walking around . . . . . . . . 114--123 Peter G. Neumann Inside Risks: System Development Woes 146--146
John Perry Barlow The Electronic Frontier: a Plain Text on Crypto Policy . . . . . . . . . . . . . 21--26 Fred W. Weingarten From Washington: HPCC Research Questioned . . . . . . . . . . . . . . . 27--29 W. Daniel Hillis and Lewis W. Tucker The CM-5 Connection Machine: a Scalable Supercomputer . . . . . . . . . . . . . 31--40 Clark D. Thomborson Does your workstation computation belong on a vector supercomputer? . . . . . . . 41--49 John C. Knight and E. Ann Myers An improved inspection technique . . . . 51--61 Robert B. Grady Practical results from measuring software quality . . . . . . . . . . . . 62--68 Bev Littlewood and Lorenzo Strigini Validation of ultrahigh dependability for software-based systems . . . . . . . 69--80 Rajiv D. Banker and Srikant M. Datar and Chris F. Kemerer and Dani Zweig Software complexity and maintenance costs . . . . . . . . . . . . . . . . . 81--94 Rebecca Mercuri Inside Risks: Corrupted Polling . . . . 122, 94
Roy Rada Sharing Standards: Standards: The Language for Success . . . . . . . . . . 17--23 Larry Press Personal Computing: The Internet and Interactive Television . . . . . . . . . 19--23 Henry C. Lucas, Jr. Market expert surveillance system . . . 27--34 Kenneth P. Birman The process group approach to reliable distributed computing . . . . . . . . . 37--53 M. K. El-Najdawi and Anthony C. Stylianou Expert support systems: integrating AI technologies . . . . . . . . . . . . . . 55--65 Erik Brynjolfsson The productivity paradox of information technology . . . . . . . . . . . . . . . 66--77 Leon A. Kappelman and John P. Thompson and Ephraim R. McLean Converging end-user and corporate computing . . . . . . . . . . . . . . . 79--92 H. Raghav Rao and Brian D. Lynch Hedonic price analysis of workstation attributes . . . . . . . . . . . . . . . 95--102 H. Jeff Smith Privacy policies and practices: inside the organizational maze . . . . . . . . 104--122 Peter J. Denning Inside Risks: a World Lit by Flame . . . 170--170
Edward A. Feigenbaum and Peter E. Friedland and Bruce B. Johnson and H. Penny Nii and Herbert Schnorr and Howard E. Shrobe and Robert S. Engelmore Knowledge-Based Systems in Japan (Report of the JTEC Panel) . . . . . . . . . . . 17--20 Pamela Samuelson Legally Speaking: Copyright's Fair Use Doctrine and Digital Data . . . . . . . 21--27 Doug Schuler Social computing . . . . . . . . . . . . 28--29 Gary Chapman The National Forum on Science and Technology Goals: building a democratic, post-Cold War science and technology policy . . . . . . . . . . . . . . . . . 30--37 Doug Schuler Community networks: building a new participatory medium . . . . . . . . . . 38--51 Andrew Clement Computing at work: empowering action by ``low-level users'' . . . . . . . . . . 52--63 Batya Friedman and Peter H. Kahn, Jr. Educating computer scientists: linking the social and the technical . . . . . . 64--70 Helen Nissenbaum Computing and accountability . . . . . . 72--80 W. Robert Collins and Keith W. Miller and Bethany J. Spielman and Phillip Wherry How good is good enough?: an ethical analysis of software construction and use . . . . . . . . . . . . . . . . . . 81--91 Jonathan Grudin Groupware and social dynamics: eight challenges for developers . . . . . . . 92--105 Anonymous Renewing the commitment to a public interest telecommunications policy . . . 106--108 Robert D. Dorsett Inside RISKS: Risks In Aviation (part 1 of 2) . . . . . . . . . . . . . . . . . 154--154
Elliot Soloway Log on Education: Ways of Seeing . . . . 15--20 S. E. Goodman International Perspectives: Computing in South Africa: An End to ``Apartness''? 21--25 Kaj Grònbæk and Randall H. Trigg Hypermedia system design applying the Dexter model . . . . . . . . . . . . . . 26--29 Frank Halasz and Mayer Schwartz The Dexter hypertext reference model . . 30--39 Kaj Grònbæk and Randall H. Trigg Design issues for a Dexter-based hypermedia system . . . . . . . . . . . 40--49 Lynda Hardman and Dick C. A. Bulterman and Guido van Rossum The Amsterdam hypermedia model: adding time and context to the Dexter model . . 50--62 Kaj Grònbæk and Jens A. Hem and Ole L. Madsen and Lennert Sloth Cooperative hypermedia systems: a Dexter-based architecture . . . . . . . 64--74 John J. Leggett and John L. Schnase Viewing Dexter with open eyes . . . . . 76--86 Ehud Rivlin and Rodrigo Botafogo and Ben Shneiderman Navigating in hyperspace: designing a structure-based toolbox . . . . . . . . 87--96 Gerard Salton and James Allan and Chris Buckley Automatic structuring and retrieval of large text files . . . . . . . . . . . . 97--108 Jan Vanthienen and Girish Subramanian and John Nosek Technical Correspondence: a More General Comparison of the Decision Table and Tree . . . . . . . . . . . . . . . . . . 109--113 Robert D. Dorsett Inside Risks: Safety in the Air . . . . 146--146
Larry Press Personal Computing: Emerging Dynabase Tools . . . . . . . . . . . . . . . . . 11--16 Fred W. Weingarten From Washington: Public interest and the NII . . . . . . . . . . . . . . . . . . 17--19 Toshinori Munakata Commercial and industrial AI . . . . . . 23--26 Frederick Hayes-Roth and Neil Jacobstein The State of Knowledge-Based Systems . . 26--39 Bradley P. Allen Case-based reasoning: business applications . . . . . . . . . . . . . . 40--42 W. E. L. Grimson and J. L. Mundy Computer vision applications . . . . . . 44--51 Alexander I. Rudnicky and Alexander G. Hauptmann and Kai-Fu Lee Survey of current speech technology . . 52--57 Takeo Kanade and Michael L. Reed and Lee E. Weiss New technologies and applications in robotics . . . . . . . . . . . . . . . . 58--67 Toshinori Munakata and Yashvant Jani Fuzzy systems: an overview . . . . . . . 68--76 Lotfi A. Zadeh Fuzzy logic, neural networks, and soft computing . . . . . . . . . . . . . . . 77--84 David E. Rumelhart and Bernard Widrow and Michael A. Lehr The basic ideas in neural networks . . . 87--92 Bernard Widrow and David E. Rumelhart and Michael A. Lehr Neural Networks: Applications in Industry, Business, and Science . . . . 93--105 Kazuo Asakawa and Hideyuki Takagi Neural networks in Japan . . . . . . . . 106--112 David E. Goldberg Genetic and evolutionary algorithms come of age . . . . . . . . . . . . . . . . . 113--119 Peter G. Neumann Inside Risks: Technology, Laws, and Society . . . . . . . . . . . . . . . . 138--138
Roy Rada and George S. Carson and Christopher Haynes Sharing Standards: The Role of Consensus 15--16 Marc Rettig Practical Programmer: Prototyping for Tiny Fingers . . . . . . . . . . . . . . 21--27 Adrian M. Tentner High performance computing grand challenges in simulation . . . . . . . . 28--29 W. J. Camp and S. J. Plimpton and B. A. Hendrickson and R. W. Leland Massively parallel methods for engineering and science problems . . . . 30--41 Allan S. Jacobson and Andrew L. Berkin and Martin N. Orton LinkWinds: interactive scientific data analysis and visualization . . . . . . . 42--52 A. M. Tentner and R. N. Blomquist and P. L. Garner and E. M. Gelbard and K. C. Gross and M. Minkoff and R. A. Valentin and T. R. Canfield Advances in parallel computing for reactor analysis and safety . . . . . . 54--64 Jakob Nielsen and Jonathan Levy Measuring usability: preference vs. performance . . . . . . . . . . . . . . 66--75 Richard A. Coll and Joan H. Coll and Ganesh Thakur Graphs and Tables: a Four-Factor Experiment . . . . . . . . . . . . . . . 76--86 Computer Science and Telecommunications Board Academic Careers for Experimental Computer Scientists and Engineers . . . 87--90 Peter G. Neumann Inside RISKS: Risks of Passwords . . . . 126--126
John Perry Barlow Electronic Frontier: Dad's Invisible Guard-All Shield . . . . . . . . . . . . 15--17 Roger C. Schank Log on Education: Tractor Factories and Research in Software Design . . . . . . 19--21 Richard G. Waters and Elliot Chikofsky Reverse engineering: progress along many dimensions . . . . . . . . . . . . . . . 22--25 Peter Aiken and Alice Muntz and Russ Richards DoD legacy systems: reverse engineering data requirements . . . . . . . . . . . 26--41 William J. Premerlani and Michael R. Blaha An approach for reverse engineering of relational databases . . . . . . . . . . 42--49 Jim Q. Ning and Andre Engberts and W. Voytek Kozaczynski Automated support for legacy code understanding . . . . . . . . . . . . . 50--57 Lawrence Markosian and Philip Newcomb and Russell Brand and Scott Burson and Ted Kitzmiller Using an enabling technology to reengineer legacy systems . . . . . . . 58--70 Ted J. Biggerstaff and Bharat G. Mitbander and Dallas E. Webster Program understanding and the concept assignment problem . . . . . . . . . . . 72--82 Alex Quilici A memory-based approach to recognizing programming plans . . . . . . . . . . . 84--93 Karl J. Lieberherr and Ignacio Silva-Lepe and Cun Xiao Adaptive object-oriented programming using graph-based customization . . . . 94--101 Iris Vessey and Sue A. Conger Requirements specification: learning object, process, and data methodologies 102--113 Peter G. Neumann Inside RISKS: Alternative Passwords . . 146--146
Fred W. Weingarten From Washington: The Politicizing of Science Policy . . . . . . . . . . . . . 13--15 G. Ariav and S. E. Goodman International Perspectives: Israel: Of Swords and Software Plowshares . . . . . 17--21 Nasr Ullah and Philip K. Brownfield The making of the PowerPC: introduction 22--22 Charles R. Moore and Russell C. Stanphill The PowerPC alliance . . . . . . . . . . 25--27 Keith Diefendorff History of the PowerPC architecture . . 28--33 Brad Burgess and Nasr Ullah and Peter Van Overen and Deene Ogden The PowerPC 603 microprocessor . . . . . 34--42 Brad W. Suessmith and George Paap, III PowerPC 603 microprocessor power management . . . . . . . . . . . . . . . 43--46 Ali Poursepanj The PowerPC performance modeling methodology . . . . . . . . . . . . . . 47--55 Julie Shipnes and Mike Phillip A modular approach to Motorola PowerPC compilers . . . . . . . . . . . . . . . 56--63 William Anderson An overview of Motorola's PowerPC simulator family . . . . . . . . . . . . 64--69 Stuart M. Shieber Lessons from a Restricted Turing Test 70--78 Hugh Gene Loebner In response . . . . . . . . . . . . . . 79--82 Stuart M. Shieber On Loebner's lessons . . . . . . . . . . 83--84 Patrick M. LaMalva and George D. Peterson Accredited Programs in Computing . . . . 85--88 Peter G. Neumann Inside RISKS: Risks on the Information Superhighway . . . . . . . . . . . . . . 114--114
Larry Press Personal Computing: Tomorrow's campus 13--17 Doug Riecken Intelligent agents . . . . . . . . . . . 18--21 Marvin Minsky and Doug Riecken A conversation with Marvin Minsky about agents . . . . . . . . . . . . . . . . . 22--29 Pattie Maes Agents that reduce work and information overload . . . . . . . . . . . . . . . . 30--40 Ernest A. Edmonds and Linda Candy and Rachel Jones and Bassel Soufi Support for collaborative design: agents and emergence . . . . . . . . . . . . . 41--47 Michael R. Genesereth and Steven P. Ketchpel Software agents . . . . . . . . . . . . 48--53 David Canfield Smith and Allen Cypher and Jim Spohrer KidSim: programming agents without a programming language . . . . . . . . . . 54--67 Donald A. Norman How might people interact with agents 68--71 Oren Etzioni and Daniel Weld A softbot-based interface to the Internet . . . . . . . . . . . . . . . . 72--76 Tom M. Mitchell and Rich Caruana and Dayne Freitag and John McDermott and David Zabowski Experience with a learning personal assistant . . . . . . . . . . . . . . . 80--91 Ted Selker COACH: a Teaching Agent that Learns . . 92--99 Irene Greif Desktop agents in group-enabled products 100--105 Doug Riecken M: an architecture of integrated agents 106--116 Margaret A. Boden Agents and creativity . . . . . . . . . 117--121 Joseph Bates The role of emotion in believable agents 122--125 R. V. Guha and Douglas B. Lenat Enabling agents to work together . . . . 126--142 Henry A. Kautz and Bart Selman and Michael Coen Bottom-up design of software agents . . 143--146 Barbara Simons Inside RISKS: Questions about the NII 170, 146
Robert E. Kahn Viewpoint: The Role of Government in the Evolution of the Internet . . . . . . . 15--19 Pamela Samuelson Legally Speaking: Self-Plagiarism or Fair Use? . . . . . . . . . . . . . . . 21--25 S. E. Goodman and L. I. Press and S. R. Ruth and A. M. Rutkowski International Perspectives: The Global Diffusion of the Internet: Patterns and Problems . . . . . . . . . . . . . . . . 27--31 Barry M. Leiner Internet Technology . . . . . . . . . . 32--33 Kimberly C. Claffy and Hans-Werner Braun and George C. Polyzos Tracking Long-Term Growth of the NSFNET 34--45 Håvard Eidnes Practical considerations for network addressing using CIDR . . . . . . . . . 46--53 Hans Eriksson MBONE: the multicast backbone . . . . . 54--60 John Moy Multicast routing extensions for OSPF 61--66 Fumio Teraoka and Keisuke Uehara and Hideki Sunahara and Jun Murai VIP: a Protocol Providing Host Mobility 67--75 Tim Berners-Lee and Robert Cailliau and Ari Luotonen and Henrik Frystyk Nielsen and Arthur Secret The World-Wide Web . . . . . . . . . . . 76--82 Hiroshi Ishii and Minoru Kobayashi and Kazuho Arita Iterative design of seamless collaboration media . . . . . . . . . . 83--97 C. Mic Bowman and Peter B. Danzig and Udi Manber and Michael F. Schwartz Scalable Internet resource discovery: research problems and approaches . . . . 98--107 Katherine Fithen and Barbara Fraser CERT Incident Response and the Internet 108--114 Susan Landau and Stephen Kent and Clinton C. Brooks and Scott Charney and Dorothy E. Denning and Whitfield Diffie and Anthony Lauck and Douglas Miller and Peter G. Neumann and David L. Sobel Crypto policy perspectives . . . . . . . 115--121 Peter G. Neumann Inside RISKS: Friendly Fire . . . . . . 138--138
Yasmin Kafai and Elliot Soloway Log on Education: Computational Gifts for the Barney Generation . . . . . . . 19--22 Roy Rada and George S. Carson Sharing Standards: The New Media . . . . 23--25 Robert V. Binder Object-Oriented Software Testing . . . . 28--29 Paul C. Jorgensen and Carl Erickson Object-Oriented Integration Testing . . 30--38 Gail C. Murphy and Paul Townsend and Pok Sze Wong Experiences with cluster and class testing . . . . . . . . . . . . . . . . 39--47 Robert M. Poston Automated testing from object models . . 48--58 John D. McGregor and Timothy D. Korson Integrated Object-Oriented Testing and Development Processes . . . . . . . . . 59--77 Thomas R. Arnold and William A. Fuson Testing ``In A Perfect World'' . . . . . 78--86 Robert V. Binder Design for testability in object-oriented systems . . . . . . . . 87--101 George W. Hart To decode short cryptograms . . . . . . 102--108 Lance J. Hoffman and Faraz A. Ali and Steven L. Heckler and Ann Huybrechts Cryptography policy . . . . . . . . . . 109--117 Kenneth Baclawski and Bipin Indurkhya Technical Correspondence: The Notion of Inheritance in Object-Oriented Programming . . . . . . . . . . . . . . 118--119 Peter G. Neumann Inside RISKS: Expectations of Security and Privacy . . . . . . . . . . . . . . 138--138
Fred W. Weingarten From Washington: University Research in a Squeeze . . . . . . . . . . . . . . . 15--17 Tomasz Imieli\'nski and B. R. Badrinath Mobile wireless computing: challenges in data management . . . . . . . . . . . . 18--28 Effy Oz When Professional Standards are Lax: The CONFIRM Failure and its Lessons . . . . 29--36 Juris Hartmanis Turing Award Lecture: On Computational Complexity and the Nature of Computer Science . . . . . . . . . . . . . . . . 37--43 Richard T. Watson and Teck Hua Ho and K. S. Raman Culture: a Fourth Dimension of Group Support Systems . . . . . . . . . . . . 44--55 H. Chen and P. Hsu and R. Orwig and L. Hoopes and J. F. Nunamaker Automatic concept classification of text from electronic meetings . . . . . . . . 56--73 Martin D. Fraser and Kuldeep Kumar and Vijay K. Vaishnavi Strategies for incorporating formal specifications in software development 74--86 Rosemary H. Wild and Joseph J. Pignatiello, Jr. Finding Stable System Designs: a Reverse Simulation Technique . . . . . . . . . . 87--98 Benjamin Wright Inside RISKS: The Verdict on Plaintext Signatures: They're Legal . . . . . . . 122--122
Jay J. Buck BloomBecker Viewpoint: My Three Computer Criminological Sins . . . . . . . . . . 15--16 Larry Press Commercialization of the Internet . . . 17--21 Brian A. Nejmeh Internet: a Strategic Tool for the Software Enterprise . . . . . . . . . . 23--27 Ravi Ganesan and Ravi Sandhu Securing cyberspace . . . . . . . . . . 28--31 Ross J. Anderson Why cryptosystems fail . . . . . . . . . 32--40 Roger M. Needham Denial of service: an example . . . . . 42--46 Ralf C. Hauser Does Licensing Require New Access Control Technologies? . . . . . . . . . 48--55 Gustavus J. Simmons Cryptanalysis and protocol failures . . 56--65 Paul C. Clark and Lance J. Hoffman BITS: A Smartcard Protected Operating System . . . . . . . . . . . . . . . . . 66--70 Shekhar H. Kirani and Imran A. Zualkernan and Wei-Tek Tsai Evaluation of expert system testing methods . . . . . . . . . . . . . . . . 71--81 Bruce I. Blum A taxonomy of software development methods . . . . . . . . . . . . . . . . 82--94 Richard Edwin Stearns Turing Award Lecture: It's Time to Reconsider Time . . . . . . . . . . . . 95--99 Herb Grosch Dehumanizing the workplace . . . . . . . 122--122
Robin Hanson Viewpoint: Can Wiretaps Remain Cost-Effective? . . . . . . . . . . . . 13--15 Karen Frenkel In memory: Gordon Smith 1919--1994 . . . 16--16 James W. Moore and David Emery and Roy Rada Sharing Standards: Language-Independent Standards . . . . . . . . . . . . . . . 17--20 Pamela Samuelson Legally Speaking: The NII Intellectual Property Report . . . . . . . . . . . . 21--27 John M. Carroll Making \em Use a Design Representation 28--35 Gerald L. Lohse and Kevin Biolsi and Neff Walker and Henry H. Rueter A classification of visual representations . . . . . . . . . . . . 36--49 Stephen G. Eick and Michael C. Nelson and Jeffery D. Schmidt Graphical analysis of computer log files 50--56 Kim Halskov Madsen A guide to metaphorical design . . . . . 57--62 Steven C. Bagley and Gary E. Kopec Editing images of text . . . . . . . . . 63--72 Manojit Sarkar and Marc H. Brown Graphical Fisheye Views . . . . . . . . 73--84 D. E. Stevenson Science, computational science, and computer science: at a crossroads . . . 85--96 Gerald J. Johnson Of metaphor and the difficulty of computer discourse . . . . . . . . . . . 97--102 Peter G. Neumann Inside RISKS: Inside ``Inside RISKS.'' 154--154
S. E. Goodman and L. I. Press International Perspectives: Computing in Vietnam: An Asian Tiger in the Rough . . 11--16 Elliot Soloway Log on Education: Beware, Techies Bearing Gifts . . . . . . . . . . . . . 17--24 Amy Pearl Women in Computing: Introduction . . . . 26--28 Maria Klawe and Nancy Leveson Women in computing: where are we now? 29--35 Pavani Diwanji Corporate Supported Women's Groups . . . 36--36 Sandra Johnson Baylor Graduate Fellowship Programs . . . . . . 37--42 Alison Adam Women and Computing in the UK . . . . . 43--43 Laura L. Downey Announcing a New Resource: The WCAR List 43--44 Elisabeth Freeman and Susanne Hupfer TAP: Tapping Internet Resources for Women in Computer Science . . . . . . . 44--44 Denise W. Gürer Pioneering women in computer science . . 45--54 Anita Borg and Telle Whitney The Grace Hopper Celebration . . . . . . 50--51 Kathleen Hemenway Human nature and the glass ceiling in industry . . . . . . . . . . . . . . . . 55--62 Ellen Isaacs Gender Discrimination in the Workplace: a Literature Review . . . . . . . . . . 58--59 Tracy Camp Diversity Recruiting . . . . . . . . . . 61--61 Shari Lawrence Pfleeger and Norma Mertz Executive mentoring: what makes it work? 63--73 Amita Goyal Mentoring Resources and Programs for Women . . . . . . . . . . . . . . . . . 66--67 Veronika Oechtering and Roswitha Behnke Situations and advancement measures in Germany . . . . . . . . . . . . . . . . 75--82 Iris Vessey and Ajay Paul Sravanapudi CASE tools as collaborative support technologies . . . . . . . . . . . . . . 83--95 Kurt Mehlhorn and Stefan Näher LEDA: a Platform for Combinatorial and Geometric Computing . . . . . . . . . . 96--102 Jeffrey G. Long and Dorothy E. Denning Ultra-Structure: a Design Theory for Complex Systems and Processes . . . . . 103--120 Charles Herring and Julian I. Palmore Technical Correspondence: Random Number Generators are Chaotic . . . . . . . . . 121--122 D. E. Ross Technical Correspondence: Pseudo-Random Number Generators for a Calculator . . . 122--124 Ben Shneiderman Inside Risks: The Info Superhighway: For the People . . . . . . . . . . . . . . . 162--162
Stuart Zweben President's letter: ACM Computing Week '95 . . . . . . . . . . . . . . . . . . 13--14 Fred W. Weingarten From Washington: Reforming Telecommunications Law . . . . . . . . . 19--22 Roy Rada and John Berg Sharing Standards: Standards: Free or Sold? . . . . . . . . . . . . . . . . . 23--27 Ronald J. Vetter and David H. C. Du Issues and challenges in ATM networks 28--29 Ronald J. Vetter ATM concepts, architectures, and protocols . . . . . . . . . . . . . . . 30--38 B. G. Kim and P. Wang ATM network: goals and challenges . . . 39--44 Daniel Stevenson and Nathan Hillery and Greg Byrd Secure communications in ATM networks 45--52 James A. Schnepf and David H. C. Du and E. Russell Ritenour and Aaron J. Fahrmann Building future medical education environments over ATM networks . . . . . 54--69 A. Iwata and N. Mori and C. Ikeda and H. Suzuki and M. Ott ATM Connection and Traffic Management Schemes for Multimedia Internetworking 72--89 Michael Perloff and Kurt Reiss Improvements to TCP Performance in High-Speed ATM Networks . . . . . . . . 90--100 Shivi Fotedar and Mario Gerla and Paola Crocetti and Luigi Fratta ATM virtual private networks . . . . . . 101--109 Patrick M. LaMalva and George D. Peterson Accredited Programs in Computing . . . . 110--114 Xavier A. Debest Technical Correspondence: Remark About Self-Stabilizing Systems . . . . . . . . 115--117 Peter A. Buhr Technical Correspondence: Are Safe Concurrency Libraries Possible . . . . . 117--120 C. C. Demchak and S. E. Goodman Inside Risks: Computers as Substitute Soldiers . . . . . . . . . . . . . . . . 154--154
Larry Press Personal Computing: The Internet is Not TV: Web Publishing . . . . . . . . . . . 17--23 David Heckerman and Abe Mamdani and Michael P. Wellman Real-World Applications of Bayesian Networks: Introduction . . . . . . . . . 24--26 David Heckerman and Michael P. Wellman Bayesian networks . . . . . . . . . . . 27--30 Lisa Burnell and Eric Horvitz Structure and chance: melding logic and probability for software debugging . . . 31--41, 57 Robert Fung and Brendan Del Favero Applying Bayesian networks to information retrieval . . . . . . . . . 42--48 David Heckerman and John S. Breese and Koos Rommelse Decision-Theoretic Troubleshooting . . . 49--57 Gerald Tesauro Temporal Difference Learning and TD-Gammon . . . . . . . . . . . . . . . 58--68 Robert E. Kraut and Lynn A. Streeter Coordination in software development . . 69--81 Magid Igbaria and Wayne M. Wormley Race differences in job performance and career success . . . . . . . . . . . . . 82--92 Kent A. Walstrom and Bill C. Hardgrave and Rick L. Wilson Forums for management information systems scholars . . . . . . . . . . . . 93--107 Andrew Arensburger and Azriel Rosenfeld Technical Opinion: To Take Arms Against a Sea of Email . . . . . . . . . . . . . 108--109 Peter G. Neumann Reassessing the crypto debate . . . . . 138--138
Pamela Samuelson Legally Speaking: Copyright and Digital Libraries . . . . . . . . . . . . . . . 15--21, 110 Edward A. Fox and Robert M. Akscyn and Richard K. Furuta and John J. Leggett Digital Libraries: Introduction . . . . 22--28 Ramana Rao and Jan O. Pedersen and Marti A. Hearst and Jock D. Mackinlay and Stuart K. Card and Larry Masinter and Per-Kristian Halvorsen and George G. Robertson Rich Interaction in the Digital Library 29--39 Timothy C. Bell and Alistair Moffat and Ian H. Witten and Justin Zobel The MG retrieval system: compressing for space and speed . . . . . . . . . . . . 41--42 W. Bruce Croft NSF Center for Intelligent Information Retrieval . . . . . . . . . . . . . . . 42--43 Edward A. Fox World-Wide Web and Computer Science Reports . . . . . . . . . . . . . . . . 43--44 James C. French and Edward A. Fox and Kurt Maly and Alan L. Selman Wide Area Technical Report Service: Technical Reports Online . . . . . . . . 45--45 Charles Kacmar and Dean Jue The information zone system . . . . . . 46--47 Carl Lagoze and James R. Davis Dienst: An Architecture for Distributed Document Libraries . . . . . . . . . . . 47--47 Christoph Hüser and Klaus Reichenberger and Lothar Rostek and Norbert A. Streitz Knowledge-based editing and visualization for hypermedia encyclopedias . . . . . . . . . . . . . 49--51 Deane Merrill and Nathan Parker and Fredric Gey and Chris Stuber The University of California CD-ROM Information System . . . . . . . . . . . 51--52 Lenwood S. Heath and Deborah Hix and Lucy T. Nowell and William C. Wake and Guillermo A. Averboch and Eric Labow and Scott A. Guyer and Dennis J. Brueni and Robert K. France and Kaushal Dalal and Edward A. Fox Envision: a User-Centered Database for Computer Science Literature . . . . . . 52--53 Richard Entlich and Lorrin Garson and Michael Lesk and Lorraine Normore and Jan Olsen and Stuart Weibel Making a digital library: the chemistry online retrieval experiment . . . . . . 54--54 Gary M. Olson An appreciation of Laurence Rosenberg 55--55 M. Christel and T. Kanade and M. Mauldin and R. Reddy and M. Sirbu and S. Stevens and H. Wactlar Informedia Digital Video Library . . . . 57--58 The Stanford Digital Libraries Group The Stanford Digital Library Project . . 59--60 Robert Wilensky UC Berkeley's Digital Library project 60--60 Terence R. Smith and James Frew Alexandria Digital Library . . . . . . . 61--62 Bruce Schatz Building the Interspace: The Illinois Digital Library Project . . . . . . . . 62--63 Laurie Crum University of Michigan Digital Library Project . . . . . . . . . . . . . . . . 63--64 Jonathan Purday The British Library's initiatives for access projects . . . . . . . . . . . . 65--66 Herbert S. Becker Library of Congress Digital Library Effort . . . . . . . . . . . . . . . . . 66--66 Gary Marchionini and Hermann Maurer The roles of digital libraries in teaching and learning . . . . . . . . . 67--75 David M. Levy and Catherine C. Marshall Going Digital: a Look at Assumptions Underlying Digital Libraries . . . . . . 77--84 Gio Wiederhold Digital libraries, value, and productivity . . . . . . . . . . . . . . 85--96 Peter J. Denning and Bernard Rous The ACM electronic publishing plan . . . 97--109 Peter J. Denning Inside Risks: Information Superhighway 2015 . . . . . . . . . . . . . . . . . . 138--138
Stuart Robbins Viewpoint: Turbulent Times for Information Technology . . . . . . . . . 15--16 John Perry Barlow Electronic Frontier: Death From Above 17--20 J. L. Dedrick and S. E. Goodman and K. L. Kraemer International Perspectives: Little Engines that Could: Computing in Small Energetic Countries . . . . . . . . . . 21--26 Karen Holtzblatt and Hugh R. Beyer Requirements Gathering: The Human Factor: Introduction . . . . . . . . . . 30--32 Mark Keil and Erran Carmel Customer-Developer Links in Software Development . . . . . . . . . . . . . . 33--44 Hugh R. Beyer and Karen Holtzblatt Apprenticing with the customer . . . . . 45--52 Arne Kjær and Kim Halskov Madsen Participatory analysis of flexibility 53--60 Françoise Brun-Cottan and Patricia Wall Using Video to Re-Present the User . . . 61--71 Anthony F. Hutchings and Steve T. Knox Creating products customers demand . . . 72--80 C. Dennis Allen Succeeding as a clandestine change agent 81--86 Mitchell H. Clifton Self-Assessment Procedure XXIII: Programming Languages . . . . . . . . . 89--97 L. F. Johnson Technical Opinion: C in the First Course Considered Harmful . . . . . . . . . . . 99--101 Robert N. Charette Inside Risks: How to Create a Successful Failure . . . . . . . . . . . . . . . . 122--122
David G. Moursund Viewpoint: Site-Based Management Saving Our Schools . . . . . . . . . . . . . . 13--15 David G. Moursund Site-based management: saving our schools . . . . . . . . . . . . . . . . 15--17 Brian A. Nejmeh Enterprising Innovations: Process Cost and Value Analysis . . . . . . . . . . . 19--24 Saul Rockman Log on Education: In School or Out: Technology, Equity, and the Future of our Kids . . . . . . . . . . . . . . . . 25--29 Webb Stacy Cognition and software development . . . 31--31 Marian Petre Why looking isn't always seeing: readership skills and graphical programming . . . . . . . . . . . . . . 33--44 Joseph Dumas and Paige Parsons Discovering the way programmers think about new programming environments . . . 45--56 Webb Stacy and Jean MacMillian Cognitive bias in software engineering 57--63 Terry Winograd From programming environments to environments for designing . . . . . . . 65--74 William B. Frakes and Christopher J. Fox Sixteen questions about software reuse 75--87, 112 Ross A. Gagliano and Martin D. Fraser and Mark E. Schaefer Auction allocation of computing resources . . . . . . . . . . . . . . . 88--102 Young-Gul Kim and Salvatore T. March Comparing data modeling formalisms . . . 103--115 Hal Abelson and Kim Bruce and Andy van Dam and Brian Harvey and Allen Tucker and Peter Wegner The first-course conundrum . . . . . . . 116--117 Susan Horwitz and Kenneth Appel and Theresa Cuprak and David Kay and Christopher Nevison and Leon Schram and Mark Stehlik and Owen Astrachan The first-course conundrum, why change? 117--118 Peter G. Neumann Computer vulnerabilities: exploitation or avoidance . . . . . . . . . . . . . . 138--138
John Nosek and Garth Shephard Viewpoint: Making Groupware Payoff: The British Model . . . . . . . . . . . . . 11--13 Larry Press Personal Computing: McLuhan Meets the Net . . . . . . . . . . . . . . . . . . 15--20 Fred Weingarten From Washington: The HPCC: Still a Percheron Horse . . . . . . . . . . . . 21--23 Deborah Compeau and Lorne Olfman and Maung Sei and Jane Webster End-User Training and Learning . . . . . 24--26 R. Ryan Nelson and Ellen M. Whitener and Henry H. Philcox The Assessment of End-User Training Needs . . . . . . . . . . . . . . . . . 27--39 John M. Carroll and Mary Beth Rosson Managing evaluation goals for training 40--48 Edmond P. Fitzgerald and Aileen Cater-Steel Champagne training on a beer budget . . 49--60 Judy Kay and Richard C. Thomas Studying Long-Term System Use . . . . . 61--69 Dennis F. Galletta and Manju Ahuja and Amir Hartman and Thompson Teo and A. Graham Peace Social influence and end-user training 70--79 Joline Morrison and Joey F. George Exploring the software engineering component in MIS research . . . . . . . 80--91 Gary Newman Organizing arrays for paged memory systems . . . . . . . . . . . . . . . . 93--103, 108--110 Philip E. Agre Inside Risks: My Top 10 Email Hassles 122--122
Pamela Samuelson Legally Speaking: Software Compatibility and the Law . . . . . . . . . . . . . . 15--22 Brock N. Meeks Electronic Frontier: Target: Internet 23--25 Michael Bieber and Tomás Isakowitz Designing hypermedia applications . . . 26--29 Douglas C. Engelbart Toward Augmenting the Human Intellect and Boosting our Collective IQ . . . . . 30, 32--33 Theodor Holm Nelson The heart of connection: hypermedia unified by transclusion . . . . . . . . 31--33 Tomás Isakowitz and Edward A. Stohr and P. Balasubramanian RMM: a Methodology for Structured Hypermedia Design . . . . . . . . . . . 34--44 Daniel Schwabe and Gustavo Rossi The Object-Oriented Hypermedia Design Model . . . . . . . . . . . . . . . . . 45--46 V. Balasubramanian and Bang Min Ma and Joonhee Yoo A systematic approach to designing a WWW application . . . . . . . . . . . . . . 47--48 Jocelyne Nanard and Marc Nanard Hypertext design environments and the hypertext design process . . . . . . . . 49--56 Manfred Thüring and Jörg Hannemann and Jörg M. Haake Hypermedia and cognition: designing for comprehension . . . . . . . . . . . . . 57--66 Paul Kahn Visual cues for local and global coherence in the WWW . . . . . . . . . . 67--69 Norbert A. Streitz Designing Hypermedia: a Collaborative Activity . . . . . . . . . . . . . . . . 70--71 John L. Schnase and Edward L. Cunnius and S. Bruce Dowton The StudySpace Project: Collaborative Hypermedia in Nomadic Computing Environments . . . . . . . . . . . . . . 72--73 Franca Garzotto and Luca Mainetti and Paolo Paolini Hypermedia design, analysis, and evaluation issues . . . . . . . . . . . 74--86 Scott Johnson Control for hypertext construction . . . 87--87 Catherine C. Marshall and Frank M. Shipman, III Spatial hypertext: designing for change 88--97 Andreas Dieberger and Jay D. Bolter On the Design of Hyper ``Spaces'' . . . 98--98 Michael Bieber and Charles Kacmar Designing hypertext support for computational applications . . . . . . . 99--107 Hugh Davis To Embed or Not to Embed \ldots . . . . 108--109 Uffe K. Wiil Hyperform: Rapid Prototyping of Hypermedia Services . . . . . . . . . . 109--111 Richard Furuta and David Stotts Dynamic hyperdocuments: authoring replaces programming . . . . . . . . . . 111--112 Joel M. Snyder Inside Risks: Research on the Internet 130--130
William E. Snizek Virtual offices: some neglected considerations . . . . . . . . . . . . . 15--17 Maurice V. Wilkes A tribute to Presper Eckert . . . . . . 20--22 R. A. Baeza-Yates and D. A. Fuller and J. A. Pino and S. E. Goodman International Perspectives: Computing in Chile: The Jaguar of the Pacific Rim? 23--28 Fred W. Weingarten From Washington: Obituary for an Agency 29--32 Lucy Suchman Representations of work . . . . . . . . 33--35 Patricia Sachs Transforming Work: Collaboration, Learning, and Design . . . . . . . . . . 36--44 Susan Leigh Star and Geoffrey C. Bowker Work and Infrastructure . . . . . . . . 41--41 Brigitte Jordan and Ron Goldman and Patricia Sachs Tools for the Workplace . . . . . . . . 42--42 Helga Wild and Chris Darrouzet and Ted Kahn and Susan U. Stucky Rhythms of Collaboration . . . . . . . . 45--45 Morten Kyng Making Representations Work . . . . . . 46--55 Lucy Suchman Making Work Visible . . . . . . . . . . 56--64 Rogers Hall Exploring design oriented mathematical practices in school and work settings 62--64 Michael J. Muller Ethnocritical Questions for Working with Translations, Interpretation and the Stakeholders . . . . . . . . . . . . . . 64--65 Liam J. Bannon The politics of design: representing work . . . . . . . . . . . . . . . . . . 66--68 Robert Klepper and Douglas Bock Third and Fourth Generation Language Productivity Differences . . . . . . . . 69--79 M. P. Papazoglou Unraveling the Semantics of Conceptual Schemas . . . . . . . . . . . . . . . . 80--94 Sudha Ram Deriving functional dependencies from the entity-relationship model . . . . . 95--107 Peter G. Neumann Inside Risks: Risks of Easy Answers . . 130--130
Stuart Zweben President's Letter: Widening International Boundaries . . . . . . . . 15--16 Roy Rada Sharing Standards: Consensus Versus Speed . . . . . . . . . . . . . . . . . 21--23 Larry Press Personal Computing: Net.Speech: Audio Comes to the Net . . . . . . . . . . . . 25--31 Cherri M. Pancake The Promise and the Cost of Object Technology: A Five-Year Forecast . . . . 33--49 Mohamed E. Fayad and Wei-Tek Tsai Object-Oriented Experiences . . . . . . 50--53 William Berg and Marshall Cline and Mike Girou Lessons Learned from the OS/400 OO Project . . . . . . . . . . . . . . . . 54--64 Douglas C. Schmidt Using Design Patterns to Develop Reusable Object-Oriented Communication Software . . . . . . . . . . . . . . . . 65--74 David Kung and Jerry Gao and Pei Hsia and Yasufumi Toyoshima and Chris Chen and Young-Si Kim and Young-Kee Song Developing an Object-Oriented Software Testing and Maintenance Environment . . 75--87 Charles D. Norton and Boleslaw K. Szymanski and Viktor K. Decyk Object-Oriented Parallel Computation for Plasma Simulation . . . . . . . . . . . 88--100 Yen-Ping Shan Introduction: Smalltalk on the Rise . . 102--104 Adele Goldberg Why Smalltalk? . . . . . . . . . . . . . 105--107 Jim Adamczyk Smalltalk Reaches Crossroads in the Insurance Industry . . . . . . . . . . . 107--109 Jerrold M. Grochow Smalltalk in the Telecommunications Industry . . . . . . . . . . . . . . . . 110--111 Dave Thomas Ubiquitous Applications: Embedded Systems to Mainframe . . . . . . . . . . 112--114 Ken Auer Smalltalk Training: As Innovative as the Environment . . . . . . . . . . . . . . 115--117 Simson L. Garfinkel Inside Risks: Risks of Social Security Numbers . . . . . . . . . . . . . . . . 146--146
Robert D. Rachlin Viewpoint: Learning from Litigation: Trade Secret Misappropriation . . . . . 15--17 Ben Shneiderman and Maryann Alavi and Kent Norman and Ellen Yu Borkowski Log On Education: Windows of Opportunity in Electronic Classrooms . . . . . . . . 19--24 Hal Berghel Digital Village: Maiden Voyage . . . . . 25--27 Toshinori Munakata Introduction: New Horizons in Commercial and Industrial AI . . . . . . . . . . . 28--31 Douglas B. Lenat CYC: a Large-Scale Investment in Knowledge Infrastructure . . . . . . . . 33--38 George A. Miller WordNet: a Lexical Database for English 39--41 Toshio Yokoi The EDR Electronic Dictionary . . . . . 42--44 Douglas B. Lenat and George A. Miller and Toshio Yokoi CYC, WordNet, and EDR: Critiques and Responses . . . . . . . . . . . . . . . 45--48 B. Chaib-draa Industrial Applications of Distributed AI . . . . . . . . . . . . . . . . . . . 49--53 Pat Langley and Herbert A. Simon Applications of machine learning and rule induction . . . . . . . . . . . . . 54--64 Ivan Bratko and Stephen Muggleton Applications of Inductive Logic Programming . . . . . . . . . . . . . . 65--70 Kenneth W. Church and Lisa F. Rau Commercial Applications of Natural Language Processing . . . . . . . . . . 71--79 Paul Harmon Object-Oriented AI: a Commercial Perspective . . . . . . . . . . . . . . 80--86 Zdzislaw Pawlak and Jerzy Grzymala-Busse and Roman Slowinski and Wojciech Ziarko Rough sets . . . . . . . . . . . . . . . 88--95 William Ditto and Toshinori Munakata Principles and Applications of Chaotic Systems . . . . . . . . . . . . . . . . 96--102 Kazuyuki Aihara and Ryu Katayama Chaos Engineering in Japan . . . . . . . 103--107 Pattie Maes Artificial Life Meets Enfertainment: Lifelike Autonomous Agents . . . . . . . 108--114 R. A. Coldwell Australian attitudes toward legal intervention into hacking . . . . . . . 115--117 Nancy G. Leveson Inside Risks: Safety as a System Property . . . . . . . . . . . . . . . . 146--146
Dan Lynch and Bert Herzog Guest President's Letter: a time for celebration . . . . . . . . . . . . . . 11--12 Lisa M. Zurk and Barbara Simons and Rebecca Parsons and Dawn Cohen Viewpoint: When an Advantage is Not an Advantage . . . . . . . . . . . . . . . 17--18 John Perry Barlow Electronic Frontier: Property and Speech: Who Owns What You Say in Cyberspace? . . . . . . . . . . . . . . 19--22 A. K. Danowitz and Y. Nassef and S. E. Goodman International Perspectives: Cyberspace Across the Sahara: Computing in North Africa . . . . . . . . . . . . . . . . . 23--28 Peter J. Denning Editorial: Plagiarism in the Web . . . . 29--29 Sue Conger and Karen D. Loch Ethics and Computer Use . . . . . . . . 30--32 Kenneth C. Laudon Ethical Concepts and Information Technology . . . . . . . . . . . . . . . 33--39 Suzanne P. Weisband and Bruce A. Reinig Managing User Perceptions of Email Privacy . . . . . . . . . . . . . . . . 40--47 Janice C. Sipior and Burke T. Ward The Ethical and Legal Quandary of Email Privacy . . . . . . . . . . . . . . . . 48--54 Richard O. Mason Applying Ethics to Information Technology Issues . . . . . . . . . . . 55--57 Deborah G. Johnson and John M. Mulvey Accountability and Computer Decision Systems . . . . . . . . . . . . . . . . 58--64 Sandra J. Milberg and Sandra J. Burke and H. Jeff Smith and Ernest A. Kallman Values, Personal Information Privacy, and Regulatory Approaches . . . . . . . 65--74 Chuck Huff and C. Dianne Martin Computing Consequences: a Framework for Teaching Ethical Computing . . . . . . . 75--84 Anonymous Communications of the ACM 1995 subject index . . . . . . . . . . . . . . . . . 85--90 Anonymous Communications of the ACM 1995 author index . . . . . . . . . . . . . . . . . 91--99 Peter G. Neumann Inside Risks: Reviewing the Risks Archives . . . . . . . . . . . . . . . . 138--138
Robert Fox Newstrack . . . . . . . . . . . . . . . 9--10 Stuart Zweben President's Letter: Computing Week '96 11--12 Thomas Erickson Viewpoint: The World-Wide Web as Social Hypertext . . . . . . . . . . . . . . . 15--17 Roy Rada Sharing Standards: Who Will Test Conformance? . . . . . . . . . . . . . . 19--22 Pamela Samuelson Legally Speaking: Intellectual Property Rights and the Global Information Economy . . . . . . . . . . . . . . . . 23--28 Hal Berghel The client's side of the World-Wide Web 30--40 Stephen Haag and M. K. Raja and L. L. Schkade Qaulity Function Deployment: Usage in Software Development . . . . . . . . . . 41--49 Matthew Cheyney and Peter Gloor and Donald B. Johnson and Fillia Makedon and James Matthews and Panagiotis Takis Metaxas Toward Multimedia Conference Proceedings 50--59 Yorick Wilks Natural Language Processing . . . . . . 60--62 Louise Guthrie and James Pustejovsky and Yorick Wilks and Brian M. Slator The role of Lexicons in natural language processing . . . . . . . . . . . . . . . 63--72 Margaret King Evaluating Natural Language Processing Systems . . . . . . . . . . . . . . . . 73--79 Jim Cowie and Wendy Lehnert Information Extraction . . . . . . . . . 80--91 David D. Lewis and Karen Sparck Jones Natural Language Processing for Information Retrieval . . . . . . . . . 92--101 Janyce Wiebe and Graeme Hirst and Diane Horton Language Use in Context . . . . . . . . 102--111 Peter G. Neumann Risks in Digital Commerce . . . . . . . 154--154
Franz Alt Franz Alt remembers the early years of computing and the creation of ACM . . . 1, 5, 6 Anonymous Computing week 96 ushers in ACM's 50th anniversary . . . . . . . . . . . . . . 1--2 Anonymous Finals teams: 1996 international collegiate programming contest . . . . . 3--3 Anonymous Entering its fourth decade, SIGPLAN looks ahead . . . . . . . . . . . . . . 4--4 Anonymous ACM E-guide to debut this spring. Two new books from ACM Press books . . . . . 7--7 Anonymous New on-line journal. TODAES begins publications. New focus added: Asia Pacific region . . . . . . . . . . . . . 8--8
Jeff Johnson Viewpoint: The Information Superhighway: A Worst-Case Scenario . . . . . . . . . 15--17 Hal Berghel Digital Village: HTML Compliance and the Return of the Test Pattern . . . . . . . 19--22 Larry Press Personal Computing: The Role of Computer Networks in Development . . . . . . . . 23--30 Michael J. Woxny and William C. Regli Computer science in manufacturing . . . 32--33 Michael J. Wozny and William C. Regli Computer Science in Manufacturing . . . 33--33 J. W. Erkes and K. B. Kenny and J. W. Lewis and B. D. Sarachan and M. W. Sobolewski and R. N. Sum, Jr. Implementing shared manufacturing services on the World-Wide Web . . . . . 34--45 Martin Hardwick and David L. Spooner and Tom Rando and K. C. Morris Sharing Manufacturing Information in Virtual Enterprises . . . . . . . . . . 46--54 Vijay Kumar and Ruzena Bajcsy and William Harwin and Patrick Harker Rapid Design and Prototyping of Customized Rehabilitation Aids . . . . . 55--61 George A. Bekey Commentary: Trends in Robotics . . . . . 62--62 S. Finger and M. Terk and E. Subrahmanian and C. Kasabach and F. Prinz and D. P. Siewiorek and A. Smailagic and J. Stivoric and L. Weiss Rapid Design and Manufacture of Wearable Computers . . . . . . . . . . . . . . . 63--70 Aristides A. G. Requicha Geometric Reasoning for Intelligent Manufacturing . . . . . . . . . . . . . 71--76 Martti Mäntylä and Dana Nau and Jami Shah Challenges in Feature-Based Manufacturing Research . . . . . . . . . 77--85 Philip A. Bernstein Middleware: a Model for Distributed System Services . . . . . . . . . . . . 86--98 James W. Candler and Prashant C. Palvia and Jane D. Thompson and Steven M. Zeltmann The ORION Project: Staged Business Process Reengineering at FedEx . . . . . 99--107 Mohamed E. Fayad and Wei-Tek Tsai and Milton L. Fulghum Transition to Object-Oriented Software Development . . . . . . . . . . . . . . 108--121 Peter G. Neumann and Peter J. Denning W(h)ither Research and Education? . . . 154--154
Gordon Bell Viewpoint: 1995 Observations on Supercomputing Alternatives: Did the MPP Bandwagon Lead to a Cul-de-Sac? . . . . 11--15 Roy Rada Sharing standards: ISO 9000 Reflects the Best in Standards . . . . . . . . . . . 17--20 Randall Davis and Pamela Samuelson and Mitchell Kapor and Jerome Reichman A New View of Intellectual Property and Software . . . . . . . . . . . . . . . . 21--30 Ravi Ganesan How To Use Key Escrow . . . . . . . . . 33--33 Dorothy E. Denning and Dennis K. Branstad A Taxonomy for Key Escrow Encryption Systems . . . . . . . . . . . . . . . . 34--40 Stephen T. Walker and Steven B. Lipner and Carl M. Ellison and David M. Balenson Commercial Key Recovery . . . . . . . . 41--47 David Paul Maher Crypto Backup and Key Escrow . . . . . . 48--53 Ravi Ganesan The Yaksha Security System . . . . . . . 55--60 Frederick P. Brooks, Jr. The Computer Scientist as Toolsmith II 61--68 A. T. Wood-Harper and Steve Corder and J. R. G. Wood and Heather Watson How We Profess: The Ethical Systems Analyst . . . . . . . . . . . . . . . . 69--77 Anthony Ralston The Demographics of Candidates for Faculty Positions in Computer Science 78--84 Guy E. Blelloch Programming Parallel Algorithms . . . . 85--97 Anonymous Information for Authors . . . . . . . . 98--99 Art Goldschmidt Technical Opinion: Report on NIIIP . . . 100--103 Robert N. Charette Taking Responsibility for Our Risks . . 122--122
Michael D. Myers International Perspectives: Can Kiwis Fly? Computing in New Zealand . . . . . 11--15 Elliot Soloway and Amanda Pryor Log on Education: The Next Generation in Human-Computer Interaction . . . . . . . 16--18 Donald A. Norman and James C. Spohrer Learner-centered education . . . . . . . 24--27 Roger C. Schank and Alex Kass A Goal-Based Scenario for High School Students . . . . . . . . . . . . . . . . 28--29 Beverly Park Woolf Intelligent Multimedia Tutoring Systems 30--31 Daniel C. Edelson and Roy D. Pea and Louis M. Gomez The Collaboratory Notebook . . . . . . . 32--33 Marcia C. Linn Key to the Information Highway . . . . . 34--35 Marlene Scardamalia and Carl Bereiter Student Communities for the Advancement of Knowledge . . . . . . . . . . . . . . 36--37 Yasmin B. Kafai Software by Kids for Kids . . . . . . . 38--39 Hal Eden and Mike Eisenberg and Gerhard Fischer and Alexander Repenning Making Learning a Part of Life . . . . . 40--42 M. Guzdial and J. Kolodner and C. Hmelo and H. Narayanan and D. Carlson and N. Rappin and R. Hübscher and J. Turns and W. Newstetter Computer Support for Learning through Complex Problem Solving . . . . . . . . 43--45 Mary Beth Rosson and John M. Carroll Scaffolded Examples for Learning Object-Oriented Design . . . . . . . . . 46--47 Shari L. Jackson and Steven J. Stratford and Joseph Krajcik and Elliot Soloway A Learner-Centered Tool for Students Building Models . . . . . . . . . . . . 48--49 David Powell Group communication . . . . . . . . . . 50--53 Louise E. Moser and P. M. Melliar-Smith and Deborah A. Agarwal and Ravi K. Budhia and Colleen A. Lingley-Papadopoulos Totem: a Fault-Tolerant Multicast Group Communication System . . . . . . . . . . 54--63 Danny Dolev and Dalia Malki The Transis Approach to High Availability Cluster Communication . . . 64--70 Michael K. Reiter Distributing Trust with the Rampart Toolkit . . . . . . . . . . . . . . . . 71--74 Robbert van Renesse and Kenneth P. Birman and Silvano Maffeis Horus: a Flexible Group Communication System . . . . . . . . . . . . . . . . . 76--83 André Schiper and Michael Raynat From Group Communication to Transactions in Distributed Systems . . . . . . . . . 84--87 Flaviu Cristian Synchronous and Asynchronous Group Communication . . . . . . . . . . . . . 88--97 Anonymous Information for Authors . . . . . . . . 98--99 Anonymous Calendar of Events . . . . . . . . . . . 100--101, 107--109 Peter G. Neumann Inside Risks: a Risks Related Bookshelf 122--122
Robert Fox News Track . . . . . . . . . . . . . . . 11--12 Randy H. Katz Viewpoint: Professor Katz Goes to Washington . . . . . . . . . . . . . . . 13--17 Larry Press Personal Computing: Windows NT as a Personal or Intranet Server . . . . . . 19--23 Brock N. Meeks Electronic Frontier: The Game Plan to Save Cyberspace . . . . . . . . . . . . 24--26 Peter J. Denning The university's next challenges . . . . 27--31 Gurminder Singh and Steven K. Feiner and Daniel Thalmann Virtual reality: software and technology 35--36 Timothy Poston and Luis Serra Dextrous Virtual Work . . . . . . . . . 37--45 Mark Green and Sean Halliday A Geometric Modeling and Animation System for Virtual Reality . . . . . . . 46--53 Michael F. Deering The HoloSketch VR Sketching System . . . 54--61 Steve Bryson Virtual Reality in Scientific Visualization . . . . . . . . . . . . . 62--71 Salvador Bayarri and Marcos Fernandez and Mariano Perez Virtual Reality for Driving Simulation 72--76 Ronald Fagin and Moni Naor and Peter Winkler Comparing Information Without Leaking It 77--85 Henry C. Lucas, Jr. and Donald J. Berndt and Greg Truman A Reengineering Framework for Evaluating a Financial Imaging System . . . . . . . 86--96 Edward A. Feigenbaum Turing Award Lecture: How the ``What'' Becomes the ``How'' . . . . . . . . . . 97--104 Raj Reddy Turing Award Lecture: To Dream The Possible Dream . . . . . . . . . . . . . 105--112 Raymond McLeod, Jr. Comparing Undergraduate Courses in Systems Analysis and Design . . . . . . 113--121 Anonymous Accredited Programs in Computing . . . . 122--127 Anonymous ACM General Elections . . . . . . . . . 128--135 Peter G. Neumann Inside Risks: Linguistic Risks . . . . . 154--154
Elliot Soloway Log on Education: Teachers are the Key 11--14 Hal Berghel Digital Village: U.S. Technology Policy in the Information Age . . . . . . . . . 15--18 Raymond Pyle Electronic Commerce and the Internet . . 22--23 John R. Sivori Evaluated Receipts and Settlement at Bell Atlantic . . . . . . . . . . . . . 24--28 Anish Bhimani Securing the Commercial Internet . . . . 29--35 Nathaniel S. Borenstein Perils and Pitfalls of Practical Cybercommerce . . . . . . . . . . . . . 36--44 Patiwat Panurach Money in electronic commerce: digital cash, electronic fund transfer, and Ecash . . . . . . . . . . . . . . . . . 45--50 Matti Hämäläinen and Andrew B. Whinston and Svetlana Vishik Electronic Markets for Learning: Education Brokerages on the Internet . . 51--58 Kilnam Chon Internet Inroads . . . . . . . . . . . . 59--60 Robert M. Hinden IP Next Generation Overview . . . . . . 61--71 Peng Hwa Ang and Berlinda Nadarajan Censorship and the Internet: A Singapore Perspective . . . . . . . . . . . . . . 72--78 Tim O'Reilly Publishing Models for Internet Commerce 79--86 Peter Kirstein and Goli Montasser-Kohsari The C-ODA Project: Online Access to Electronic Journals . . . . . . . . . . 87--99 Bruno Mannoni Bringing Museums Online . . . . . . . . 100--105 James E. Pitkow and Colleen M. Kehoe Emerging Trends in the WWW User Population . . . . . . . . . . . . . . . 106--108 Teresa F. Lunt Inside Risks: Securing the Information Infrastructure . . . . . . . . . . . . . 130--130
L. T. Greenberg and S. E. Goodman International Perspectives: Is Big Brother Hanging by His Bootstraps? . . . 11--16 Pamela Samuelson Legally Speaking: Regulation of Technologies to Protect Copyrighted Works . . . . . . . . . . . . . . . . . 17--24 Andrew Grosso Viewpoint: Why Won't the President Enforce the Constitution? . . . . . . . 25--26 H. Raghav Rao and Kichan Nam and A. Chaudhury Information systems outsourcing . . . . 27--28 Paul Nelson and William Richmond and Abraham Seidmann Two Dimensions of Software Acquisition 29--35 Kichan Nam and S. Rajagopalan and H. Raghav Rao and A. Chaudhury A Two-Level Investigation of Information Systems Outsourcing . . . . . . . . . . 36--44 Vijay Gurbaxani The New World of Information Technology Outsourcing . . . . . . . . . . . . . . 45--46 Sandra A. Slaughter and Soon Ang Employment Outsourcing in Information Systems . . . . . . . . . . . . . . . . 47--54 Gordon Bell and Jim Gemmell On-ramp prospects for the information superhighway dream: will the goal of a single, universally available network carrying a wide variety of data types ever be achieved? . . . . . . . . . . . 55--61 Lynn A. Streeter and Robert E. Kraut and Henry C. Lucas, Jr. and Laurence Caby How Open Data Networks Influence Business Performance and Market Structure . . . . . . . . . . . . . . . 62--73 Karen D. Loch and Sue Conger Evaluating Ethical Decision Making and Computer Use . . . . . . . . . . . . . . 74--83 Jack J. Dongarra and Steve W. Otto and Marc Snir and David Walker A message passing standard for MPP and workstations . . . . . . . . . . . . . . 84--90 Toshinori Munakata Thoughts on Deep Blue vs. Kasparov . . . 91--92 Peter G. Neumann Inside Risks: Using Formal Methods to Reduce Risks . . . . . . . . . . . . . . 114--114
Anonymous New Publishing Directions for ACM . . . 3--3 Anonymous New E-Guide CD-ROM Demo. Price Update 4--4 Anonymous SIGCHI Development Consortium Reaches Out . . . . . . . . . . . . . . . . . . 7--7 Anonymous Electronic Services Working Group . . . 8--8
Robert Fox News Track . . . . . . . . . . . . . . . 11--12 Jonah Sieger From Washington: Communications Decency Act is Defeated: Landmark Victory for Netizens . . . . . . . . . . . . . . . . 13--15
Anonymous ACM Group Insurance Program Offers Term Life Insurance at Special Rate . . . . . 14--15
James W. Moore and Roy Rada Sharing Standards: Organizational Badge Collecting . . . . . . . . . . . . . . . 17--21 Steve Mann Viewpoint: Smart Clothing: The Shift to Wearable Computing . . . . . . . . . . . 23--24 Ted Selker New paradigms for computing . . . . . . 28--30 John Seely Brown To Dream the Invisible Dream . . . . . . 30--30 Nolan Bushnell Relationships between Fun and the Computer Business . . . . . . . . . . . 31--37 Henry Lieberman Intelligent Graphics . . . . . . . . . . 38--48 Ken Kahn Drawings on Napkins, Video-Game Animation, and Other Ways to Program Computers . . . . . . . . . . . . . . . 49--59 Ted Selker New Paradigms for Using Computers . . . 60--69 Don Gentner and Jakob Nielson The Anti-Mac Interface . . . . . . . . . 70--82 Elliot Soloway and Amanda Pryor Introduction: Using computational media to facilitate learning . . . . . . . . . 83--83 Andee Rubin and Scott Bresnahan and Ted Ducas Cartwheeling Through CamMotion . . . . . 84--85 Jere Confrey and Alan Maloney Function Probe . . . . . . . . . . . . . 86--87 Wallace Feurzeig and John Richards Function Machines . . . . . . . . . . . 88--90 Marge Cappo and Kathy Darling Measurement in Motion . . . . . . . . . 91--93 Judah L. Schwartz Motion Toys for Eye and Mind . . . . . . 94--96 Jeremy Roschelle and James J. Kaput SimCalc MathWorlds for the mathematics of change . . . . . . . . . . . . . . . 97--99 Paul Horwitz and Eric Neumann and Joyce Schwartz Teaching Science at Multiple Space-Time Scales . . . . . . . . . . . . . . . . . 100--102 Pierre Dillenbourg and J. A. Self What if the Computer Doesn't Know the Answer? . . . . . . . . . . . . . . . . 103--105 Anonymous A Multimedia Literacy Series: The Cognition and Technology Group at Vanderbilt . . . . . . . . . . . . . . . 106--109 Herbert Lin Inside Risks: Cryptography's Role in Securing Information . . . . . . . . . . 131--131
Thomas Sterling The Scientific Workstation of the Future May Be a Pile of PCs . . . . . . . . . . 11--12 Brock N. Meeks Dragging a Kicking-and-Screaming Government into the 21st Century . . . . 13--15 Ellen A. Isaacs and John C. Tang Technology transfer: so much research, so few good products . . . . . . . . . . 22--25 Jean Scholtz Technology Transfer Through Prototypes 26--27 Allan Kuchinsky Transfer Means More Than Just Technology 28--29 Jim Foley Technology Transfer from University to Industry . . . . . . . . . . . . . . . . 30--31 Jeff Johnson R-D, not R&D . . . . . . . . . . . . . . 32--34 John L. Bennett Building Relationships for Technology Transfer . . . . . . . . . . . . . . . . 35--36 Nayeem Islam and Roy H. Campbell Latest developments in operating systems 38--40 Peter Druschel Operating system support for high-speed communication: techniques to eliminate processing bottlenecks in high-speed networking are presented . . . . . . . . 41--51 Mendel Rosenblum and John Chapin and Dan Teodosiu and Scott Devine and Tirthankar Lahiri and Anoop Gupta Implementing efficient fault containment for multiprocessors: confining faults in a shared-memory multiprocessor environment . . . . . . . . . . . . . . 52--61 John Rosenberg and Alan Dearle and David Hulse and Anders Lindström and Stephen Norris Operating System Support for Persistant and Recoverable Computations . . . . . . 62--69 Jochen Liedtke Toward Real Microkernels . . . . . . . . 70--77 Mark R. Cutkosky and Jay M. Tenenbaum and Jay Glicksman Madefast: Collaborative Engineering over the Internet . . . . . . . . . . . . . . 78--87 Uzi Vishkin Can Parallel Algorithms Enhance Serial Implementation? . . . . . . . . . . . . 88--91 Kenneth C. Laudon Markets and Privacy . . . . . . . . . . 92--104 Richard Baker The corporate politics of CMM ratings 105--106 Lauren Weinstein Inside Risks: Behind the State of the Art . . . . . . . . . . . . . . . . . . 130--130
Larry Press Seeding Networks: The Federal Role . . . 11--18 Hal Berghel Digital politics . . . . . . . . . . . . 19--25 Mark Luker Viewpoint: NSF's New Program for High-Performance Internet Connections 27--28 Roy Rada and Anne Mette Hass and Don Herbison-Evans and John Waterworth and Magnus Kempe ACM forum: Request for a virtual IT college . . . . . . . . . . . . . . . . 29--35 Douglas C. Schmidt and Mohamed Fayad and Ralph E. Johnson Software patterns: introductions . . . . 36--39 Alistair Cockburn The interaction of social issues and software architecture . . . . . . . . . 40--46 Marshall P. Cline The pros and cons of adopting and applying design patterns in the real world . . . . . . . . . . . . . . . . . 47--49 Amund Aarsten and Davide Brugali and Giuseppe Menga Designing concurrent and distributed control systems . . . . . . . . . . . . 50--58 Mohamed Fayad and Marshall P. Cline Aspects of Software Adaptability . . . . 58--59 Brandon Goldfedder and Linda Rising A training experience with patterns . . 60--64 Nayeem Islam and Murthy Devarakonda An essential design pattern for fault-tolerant distributed state sharing 65--74 Paul E. McKenney Selecting locking primitives and parallel programming . . . . . . . . . . 75--82 Anonymous Where to Look for Patterns . . . . . . . 82--82 Paul Resnick and James Miller PICS: Internet access controls without censorship . . . . . . . . . . . . . . . 87--93 Juhani Iivari Why are case tools not used? . . . . . . 94--103 Victor R. Basili and Lionel C. Briand and Walcélio L. Melo How reuse influences productivity in object-oriented systems . . . . . . . . 104--116 Peter G. Neumann Inside Risks: Disinformation Theory . . 138--138
Robert L. Glass Practical Programmer: The Relationship Between Theory and Practice in Software Engineering . . . . . . . . . . . . . . 11--13 Neil Munro From Washington: Sketching a National Information Warfare Defense Plan . . . . 15--17 Usama Fayyad and Ramasamy Uthurusamy Data Mining and Knowledge Discovery in Databases . . . . . . . . . . . . . . . 24--27 Usama Fayyad and Gregory Piatetsky-Shapiro and Padhraic Smyth The KDD Process for Extracting Useful Knowledge From Volumes of Data . . . . . 27--34 Clark Glymour and David Madigan and Daryl Pregibon and Padhraic Smyth Statistical Inference and Data Mining 35--41 Ronald J. Brachman and Tom Khabaza and Willi Kloesgen and Gregory Piatetsky-Shapiro and Evangelos Simoudis Mining Business Databases . . . . . . . 42--48 W. H. Inmon The Data Warehouse and Data Mining . . . 49--50 Usama Fayyad and David Haussler and Paul Stolorz Mining Scientific Data . . . . . . . . . 51--57 Tomasz Imielinski and Heikki Mannila A Database Perspective on Knowledge Discovery . . . . . . . . . . . . . . . 58--64 Oren Etzioni The World-Wide Web: Quagmire or Gold Mine? . . . . . . . . . . . . . . . . . 65--77 David Abramson and Ian Foster and John Michalakes and Rok Soci\vc Relative Debugging: a New Methodology for Debugging Scientific Applications 69--77 David E. Culler and Rachard M. Karp and David Patterson and Abhijit Sahay and Eunice E. Santos and Klaus Erik Schauser and Ramesh Subramonian and Thorsten von Eicken LogP: a Practical Model of Parallel Computation . . . . . . . . . . . . . . 78--85 Yair Wand and Rachard Y. Wang Anchoring Data Quality Dimensions in Ontological Foundations . . . . . . . . 86--95 Peter G. Neumann Inside Risks: Distributed Systems Have Distributed Risks . . . . . . . . . . . 130--130
S. E. Goodman International Perspectives: War, Information Technologies, and International Asymmetries . . . . . . . 11--15 Pamela Samuelson Legally Speaking: Legal Protection for Database Contents . . . . . . . . . . . 17--23 A. Michael Noll CyberNetwork Technology: Issues and Uncertainties . . . . . . . . . . . . . 27--31 Robert Kraut The Internet@Home . . . . . . . . . . . 32--35 Donna L. Hoffman and William D. Kalsbeek and Thomas P. Novak Internet and Web Use in the U.S. . . . . 36--46 Alladi Venkatesh Computers and Other Interactive Technologies for the Home . . . . . . . 47--54 Robert Kraut and William Scherlis and Tridas Mukhopadhyay and Jane Manning and Sara Kiesler The HomeNet Field Trial of Residential Internet Services . . . . . . . . . . . 55--63 Marita Franzke and Anne McClard Winona Gets Wired: Technical Difficulties in the Home . . . . . . . . 64--66 George T. Duncan Is My Research Ethical? . . . . . . . . 67--68 John M. Carroll and Mary Beth Rosson Developing the Blacksburg Electronic Village . . . . . . . . . . . . . . . . 69--74 C. Dianne Martin and Chuck Huff and Donald Gotterbarn and Keith Miller Implementing a Tenth Strand in the CS Curriculum . . . . . . . . . . . . . . . 75--84 Henry M. Walker and G. Michael Schneider A Revised Model Curriculum for a Liberal Arts Degree in Computer Science . . . . 85--95 Robert Geist and Madhu Chetuparambil and Stephen Hedetniemi and A. Joe Turner Computing Research Programs in the U.S. 96--99 Peter G. Neumann Inside Risks: Risks of Anonymity . . . . 162--162
C. David Kemp The Construction of Fast Portable Multiplicative Congruential Random Number Generators . . . . . . . . . . . 163--166 Alejandro Barrero Implementation of Abstract Data Types with Arrays of Unbounded Dimensions . . 167--174 Zbigniew Michalewicz and Cezary Z. Janikow GENOCOP: a Genetic Algorithm for Numerical Optimization Problems with Linear Constraints . . . . . . . . . . . 175--201 Barak A. Pearlmutter Garbage Collection with Pointers to Individual Cells . . . . . . . . . . . . 202--206 Raúl Rojas A Graph Labelling Proof of the Backpropagation Algorithm . . . . . . . 207--215 Wesley W. Chu and Kuorong Chiang and Chih-Cheng Hsu and Henrick Yau An Error-based Conceptual Clustering Method for Providing Approximate Query Answers . . . . . . . . . . . . . . . . 216--230 Randolph D. Nelson Including Queueing Effects in Amdahl's Law . . . . . . . . . . . . . . . . . . 231--238 Ronald E. Prather Harmonic Analysis from the Computer Representation of a Musical Score . . . 239--255 Mark G. Staskausas An Experience in the Formal Verification of Industrial Software . . . . . . . . . 256--272 Guy E. Blelloch and Charles E. Leiserson and Bruce M. Maggs and C. Greg Plaxton and Stephen J. Smith and Marco Zagha A Comparison of Sorting Algorithms for the Connection Machine CM-2 . . . . . . 273--297 Nathaniel Borenstein CMU's Andrew Project: a Retrospective 298--311 James H. Morris War Stories from Andrew . . . . . . . . 312--321
Neil Munro From Washington: If It Grows, Tax It . . 11--13 Robert L. Glass Practical Programmer: The Next Date Crisis and the Ones After That . . . . . 15--17 Robert Fox On Site: Tomorrow's Library Today . . . 20--21 Alex Peleg and Sam Wilkie and Uri Weiser Intel MMX for Multimedia PCs . . . . . . 24--38 Andrew S. Grimshaw and William A. Wulf The Legion vision of a worldwide virtual computer . . . . . . . . . . . . . . . . 39--45 Carey Nachenberg Computer Virus: Antivirus Coevolution 46--51 Daniel E. O'Leary and Daniel Kuokka and Robert Plant Artificial Intelligence and Virtual Organizations . . . . . . . . . . . . . 52--59 Deborah G. Johnson Ethics Online . . . . . . . . . . . . . 60--65 Sourav Bhattacharya and Akira Onoma and Farokh Bastani Guest Editor's Introduction: High-Assurance Systems . . . . . . . . . 67--67 Nuno Neves and W. Kent Fuchs Adaptive Recovery for Mobile Environments . . . . . . . . . . . . . . 68--74 K. H. Kim and Chittur Subbaraman Fault-Tolerant Real-Time Objects . . . . 75--82 Jeffrey J. P. Tsai and Bing Li and Eric Y. T. Juan Parallel Evaluation of Software Architecture Specifications . . . . . . 83--86 David B. Stewart and Pradeep K. Khosla Mechanisms for Detecting and Handling Timing Errors . . . . . . . . . . . . . 87--93 Sherman R. Alpert and Richard B. Lam The Ultimately Publishable Computer Science Paper for the Latter '90s: a Tip for Authors . . . . . . . . . . . . . . 94--94 Bruce Schneier Inside Risks: Cryptography, Security, and the Future . . . . . . . . . . . . . 138--138
Anonymous ACM plus five other leading computing societies met to discuss international cooperation . . . . . . . . . . . . . . 3 Anonymous Member value Plus keeps on growing . . . 5 Anonymous ACM Committee on the Status of Women in Computing moves ahead with new projects 8
Larry Press Personal Computing: Technology in Bloom: Implications for the Next 50 Years . . . 11--17
Anonymous New ACM Transactions on Information and System Security will begin publication 14
Hal Berghel Digital Village: Cyberspace 2000: Dealing with Information Overload . . . 19--24 Nathan Myhrvold ACM 97: speakers corner . . . . . . . . 27--28 Diane Crawford The next 50 years . . . . . . . . . . . 29--29 Gordon Bell The Human Connection: The Body Electric 30--32 Tim O'Reilly The Human Connection: Hardware, Software, and Infoware . . . . . . . . . 33--34 Esther Dyson The Human Connection: Education and Jobs in the Digital World . . . . . . . . . . 35--36 Danny Hillis The Human Connection: a Time of Transition . . . . . . . . . . . . . . . 37--39 Joel Birnbaum The Human Connection: Pervasive Information Systems . . . . . . . . . . 40--41 Marc Davis The Human Connection: Garage Cinema and the Future of Media Technology . . . . . 42--48 Dennis Tsichritzis The Human Connection: How to Surf the Technology Waves We Created . . . . . . 49--54 Jaron Lanier The Human Connection: The Frontier Between Us . . . . . . . . . . . . . . . 55--56 Tim Berners-Lee The Human Connection: World-Wide Computer . . . . . . . . . . . . . . . . 57--58 Ben Shneiderman The Human Connection: Between Hope and Fear . . . . . . . . . . . . . . . . . . 59--62 Andries van Dam The Human Connection: Post-WIMP User Interfaces . . . . . . . . . . . . . . . 63--67 John Perry Barlow Societal Dimensions: The Best of All Possible Worlds . . . . . . . . . . . . 68--74 Brock N. Meeks Societal Dimensions: Better Democracy Through Technology . . . . . . . . . . . 75--78 Bruce Sterling Societal Dimensions: The Digital Revolution in Retrospect . . . . . . . . 79--79 Steve Talbott Societal Dimensions: Asleep at the Keyboard . . . . . . . . . . . . . . . . 80--82 Jerry Berman and Daniel J. Weitzner Societal Dimensions: Directing Policy-Making Beyond the Net's Metaphor 83--84 Richard Stallman Societal Dimensions: The Right to Read 85--87 Ted Selker Societal Dimensions: What Will Happen in the Next 50 Years? . . . . . . . . . . . 88--89 Theodor Holm Nelson Societal Dimensions: Crush and Crash: Logic of a Terrible Tomorrow . . . . . . 90--91 Paul Saffo The Science of Future Technology: Sensors: The Next Wave of Innovation . . 92--97 Jef Raskin The Science of Future Technology: Looking for a Humane Interface: Will Computers Ever Become Easy to Use? . . . 98--101 Barry M. Leiner and Vinton G. Cerf and David D. Clark and Robert E. Kahn and Leonard Kleinrock and Daniel C. Lynch and Jon Postel and Lawrence G. Roberts and Stephen S. Wolff The Science of Future Technology: The Past and Future History of the Internet 102--108 Wm. A. Wulf The Science of Future Technology: Look in the Spaces for Tomorrow's Innovations 109--111 Gordon E. Moore The Science of Future Technology: The Microprocessor: Engine of the Technology Revolution . . . . . . . . . . . . . . . 112--114 Nabil Adam and Baruch Awerbuch and Jacob Slonim and Peter Wegner and Yelena Yesha The Science of Future Technology: Globalizing Business, Education, Culture Through the Internet . . . . . . . . . . 115--121 Charlie Rosen The Science of Future Technology: My Computer-Related Wish List for the Next 50 Years . . . . . . . . . . . . . . . . 122--124 Sachem Web Slingers The Science of Future Technology: Spinning Webs into the 21st Century . . 125--128 Nancy G. Leveson The Science of Future Technology: Software Engineering: Stretching the Limits of Complexity . . . . . . . . . . 129--131 Peter J. Denning The Science of Future Technology: a New Social Contract for Research . . . . . . 132--134 David J. Farber The Science of Future Technology: Communications Technology and its Impact by 2010 . . . . . . . . . . . . . . . . 135--138 Henry F. Korth and Abraham Silberschatz The Science of Future Technology: Database Research Faces the Information Explosion . . . . . . . . . . . . . . . 139--142 Peter G. Neumann Inside Risks: Hopes for Fewer Risks . . 170--170
Seán ÓRiain International Perspectives: The Birth of a Celtic Tiger . . . . . . . . . . . . . 11--16 Roy Rada and James Moore Sharing Standards: Standardizing Reuse 19--23 Carl Friedlander On Site: Speech Facilities for the Reading Disabled . . . . . . . . . . . . 24--25 David Sallach and Andrew Oram Forum: Digital politics . . . . . . . . 26--27 Michael G. Jones Forum: Inside the Beltway warfare plans 27--28 Steven Pemberton Forum: U.S. and them . . . . . . . . . . 28--28 Vir V. Phoha Forum: Theory and practice in software engineering . . . . . . . . . . . . . . 28--28 Anthony Fedanzo Forum: Distributed systems registry . . 29--29 Robert L. Glass Forum: Response . . . . . . . . . . . . 29--29 Randall D. Beer and Roger D. Quinn and Hillel J. Chiel and Roy E. Ritzmann Biologically inspired approaches to robotics: what can we learn from insects? . . . . . . . . . . . . . . . . 30--38 Milton Mueller Universal Service and the Telecommunications Act: Myth Made Law 39--47 Daniel G. Aliaga Virtual Objects in the Real World . . . 49--54 Paul Resnick and Hal R. Varian Recommender systems . . . . . . . . . . 56--58 Loren Terveen and Will Hill and Brian Amento and David McDonald and Josh Creter PHOAKS: a System for Sharing Recommendations . . . . . . . . . . . . 59--62 Henry Kautz and Bart Selman and Mehul Shah Referral Web: Combining Social Networks and Collaborative Filtering . . . . . . 63--65 Marko Balabanovíc and Yoav Shoham Fab: Content-Based, Collaborative Recommendation . . . . . . . . . . . . . 66--72 James Rucker and Marcos J. Polanco Siteseer: Personalized Navigation for the Web . . . . . . . . . . . . . . . . 73--76 Joseph A. Konstan and Bradley N. Miller and David Maltz and Jonathan L. Herlocker and Lee R. Gordon and John Riedl GroupLens: Applying Collaborative Filtering to Usenet News . . . . . . . . 77--87 Christopher Avery and Richard Zeckhauser Recommender Systems for Evaluating Computer Messages . . . . . . . . . . . 88--89 Adamantios Koumpis Situation room analysis in the information technologies market . . . . 90--92 Richard I. Cook Inside Risks: Observations on RISKS and Risks . . . . . . . . . . . . . . . . . 122--122
Hal Berghel Digital Village: Email: The Good, The Bad, and The Ugly . . . . . . . . . . . 11--15 Robert L. Glass Practical Programmer: The Ups and Downs of Programmer Stress . . . . . . . . . . 17--19 Jeff Johnson Forum: The Military Impact of Information Technology . . . . . . . . . 20--20 Ronald L. Davis and Roger W. Webster Forum: Questioning Proposed CS Knowledge Units . . . . . . . . . . . . . . . . . 20--21 Crispin Cowan Forum: Amazing Transformation . . . . . 21--21 Frank Exner Forum: The Subject of Indexing . . . . . 21--21 Mayur Patel Forum: Filling a Niche . . . . . . . . . 21--22 Barry Goldstein Forum: URL Corrections . . . . . . . . . 22--22 Michael Lingle Forum: What Price Books . . . . . . . . 22--22 Carey Nachenberg Forum: Response . . . . . . . . . . . . 22--22 James K. Yun Forum: Missing Step . . . . . . . . . . 22--22 Richard C. Hsu Viewpoint: Taking Stock for University Patents . . . . . . . . . . . . . . . . 23--25 Henry Lieberman Introduction . . . . . . . . . . . . . . 26--29 Marc Eisenstadt My Hairiest Bug War Stories . . . . . . 30--37 David Ungar and Henry Lieberman and Christopher Fry Debugging and the Experience of Immediacy . . . . . . . . . . . . . . . 38--43 Ron Baecker and Chris DiGiano and Aaron Marcus Software Visualization for Debugging . . 44--54 Christopher Fry Programming on an Already Full Brain . . 55--64 John Domingue and Paul Mulholland Fostering Debugging Communities on the Web . . . . . . . . . . . . . . . . . . 65--71 Randall B. Smith and Mario Wolczko and David Ungar From Kansas to Oz: Collaborative Debugging When a Shared World Breaks . . 72--78 D. James Gemmell and C. Gordon Bell Noncollaborative Telepresentations Come of Age . . . . . . . . . . . . . . . . . 79--89 Don Hardaway and Richard P. Will Digital Multimedia Offers Key To Educational Reform . . . . . . . . . . . 90--96 James Katz and Philip Aspden Motives, Hurdles, and Dropouts . . . . . 97--102 Shashi Shekhar and Mark Coyle and Brajesh Goyal and Duen-Ren Liu and Shyamsundar Sarkar Data Models in Geographic Information Systems . . . . . . . . . . . . . . . . 103--111 Dave West Technical Opinion: Hermeneutic Computer Science . . . . . . . . . . . . . . . . 115--116 Edward W. Felten Inside Risks: Webware Security . . . . . 130--130
Anonymous Beyond Calculation: The Next 50 years of Computing is published . . . . . . . . . 2 Anonymous Award winners are honored at 1997 ACM Awards ceremony . . . . . . . . . . . . 4
Elliot Soloway and Raven Wallace Log on Education: Does the Internet Support Student Inquiry? Don't Ask . . . 11--16
Anonymous ACM Executive Committee will meet in Stockholm . . . . . . . . . . . . . . . 13 Anonymous Two new books are published by ACM Press 15 Anonymous ACM states policy on refereed electronic publications . . . . . . . . . . . . . . 16
Pamela Samuelson Legally Speaking: The Never-Ending Struggle for Balance . . . . . . . . . . 17--21 Abbe Mowshowitz Viewpoint: Lessons From a Cautionary Tale . . . . . . . . . . . . . . . . . . 23--25 Charles H. House ACM 97: an event to remember . . . . . . 31--34 Robert Laddaga and James Veitch Dynamic object technology . . . . . . . 36--38 Paul Robertson Integrating Legacy Systems with Modern Corporate Applications . . . . . . . . . 39--46 Daniel D. Corkill Countdown to success: dynamic objects, GBB, and RADARSAT-1 . . . . . . . . . . 48--58 Robert E. Phillips Dynamic Objects for Engineering Automation . . . . . . . . . . . . . . . 59--65 Byron Davies and Victoria Bryan Davies Patching onto the Web: Common Lisp Hypermedia for the Intranet . . . . . . 66--69 Amarnath Gupta and Ramesh Jain Visual Information Retrieval . . . . . . 70--79 Peter Wegner Why Interaction Is More Powerful Than Algorithms . . . . . . . . . . . . . . . 80--91 Rolf Oppliger Internet Security: Firewalls and Beyond 92--102 Diane M. Strong and Yang W. Lee and Richard Y. Wang Data Quality in Context . . . . . . . . 103--110 Dick Lefkon Technical Opinion(s): Seven Work Plans for Year-2000 Upgrade Projects . . . . . 111--113 Georges Brigham The Year 2000 . . . . . . . . . . . . . 113--115 Robert A. Wagner Solving the Date Crisis . . . . . . . . 115--117 Peter G. Neumann Inside Risks: The Big Picture . . . . . 136--136
Robert L. Glass Revisiting the industry/academe communication chasm . . . . . . . . . . 11--13 Neil Munro The magnetic poles of data collection 17--19 Jeff Kraus Counting furtive beasts by computer: where have all the rhinos gone? . . . . 20--23 Christopher Fox and William Frakes The quality approach: is it delivering? 24--29 James Herbsleb and David Zubrow and Dennis Goldenson and Will Hayes and Mark Paulk Software quality and the Capability Maturity Model . . . . . . . . . . . . . 30--40 Craig Hollenbach and Ralph Young and Al Pflugrad and Doug Smith Combining quality and software improvement . . . . . . . . . . . . . . 41--45 Lowell Jay Arthur Quantum improvements in software system quality . . . . . . . . . . . . . . . . 46--52 Michael A. Cusumano and Richard W. Selby How Microsoft builds software . . . . . 53--61 Jeffrey Parsons and Yair Wand Choosing classes in conceptual modeling 63--69 Soumitra Dutta and Berend Wierenga and Arco Dalebout Designing management support systems using an integrative perspective . . . . 70--79 Bo Dahlbom and Lars Mathiassen The future of our profession . . . . . . 80--89 David H. Bailey Technical Opinion: Onward to Petaflops Computing . . . . . . . . . . . . . . . 90--92
Hal Berghel Digital Village: Informal Logic on Both Sides of the CDA Debate . . . . . . . . 11--15 Larry Press Personal Computing: Toward an Access Rights Policy . . . . . . . . . . . . . 17--21 Talin Viewpoint: The Power of Negative Thinking . . . . . . . . . . . . . . . . 25--27 Peter J. Denning The ACM digital library goes live . . . 28--29 Olivier Fischer and Richard Horn Electronic performance support systems 31--32 John Karat Evolving the Scope of User-Centered Design . . . . . . . . . . . . . . . . . 33--38 Michel C. Desmarais and Richard Leclair and Jean-Yves Fiset and Hichem Talbi Cost-Justifying Electronic Performance Support Systems . . . . . . . . . . . . 39--48 Kevin Cole and Olivier Fischer and Phyllis Saltzman Just-in-Time Knowledge Delivery . . . . 49--53 Gloria Gery Granting Three Wishes through Performance-Centered Design . . . . . . 54--59 Shelia Benko and Shelley Webster Preparing for EPSS Projects . . . . . . 60--63 Samir Chatterjee Requirements for Success in Gigabit Networking . . . . . . . . . . . . . . . 64--73 Andrew S. Patrick Media Lessons from the National Capital FreeNet . . . . . . . . . . . . . . . . 74--80 Jesper Simonsen and Finn Kensing Using Ethnography in Contextual Design 82--88 Arun Rai and Ravi Patnayakuni and Nainika Patnayakuni Technology Investment and Business Performance . . . . . . . . . . . . . . 89--97 Domenico Talia Technical Opinion: Parallel Computation Still Not Ready for the Mainstream . . . 98--99 Peter G. Neumann Inside Risks: Identity-Related Misuse 112--112
Brock N. Meeks From Washington: Privacy Lost, Anytime, Anywhere . . . . . . . . . . . . . . . . 11--13 Will A. Foster and Anthony M. Rutkowski and Seymour E. Goodman International Perspectives: Who Governs the Internet? . . . . . . . . . . . . . 15--20 Yasser Seirawan Viewpoint: Kasparov vs. Deep Blue: The Aftermath Still No Match for the Human Brain . . . . . . . . . . . . . . . . . 21--22 Herbert A. Simon and Toshinori Munakata Viewpoint: Kasparov vs. Deep Blue: AI Lessons . . . . . . . . . . . . . . . . 21, 23--25 Robert Fox On Site: Socializing Around Arcade Technology . . . . . . . . . . . . . . . 26--28 Dorothy Strickland VR and health care . . . . . . . . . . . 32--32 Dorothy Strickland and Larry Hodges and Max North and Suzanne Weghorst Overcoming Phobias by Virtual Exposure 34--39 Erik Viire Health and safety issues for VR . . . . 40--41 Walter J. Greenleaf Applying VR to Physical Medicine and Rehabilitation . . . . . . . . . . . . . 42--46 Suzanne Weghorst Augmented Reality and Parkinson's Disease . . . . . . . . . . . . . . . . 47--48 John P. Wann and Simon K. Rushton and Martin Smyth and David Jones Rehabilitative Environments for Attention and Movement Disorders . . . . 49--52 Dean P. Inman and Ken Loge and John Leavens VR Education and Rehabilitation . . . . 53--58 Tim Bowman VR Meets Physical Therapy . . . . . . . 59--60 David Zeltzer and Rita K. Addison Responsive Virtual Environments . . . . 61--64 Kay M. Stanney and Robert S. Kennedy The Psychometrics of Cybersickness . . . 66--68 Giuseppe Riva and Luca Melis and Mirco Bolzoni Treating Body-Image Disturbances . . . . 69--71 David J. Brown and Steven Kerr and John R. Wilson Virtual Environments in Special-Needs Education . . . . . . . . . . . . . . . 72--75 Nigel Foreman and Paul Wilson and Danae Stanton VR and Spatial Awareness in Disabled Children . . . . . . . . . . . . . . . . 76--77 W. Raghupathi Health care information systems . . . . 80--82 James G. Anderson Clearing the Way for Physicians' Use of Clinical Information Systems . . . . . . 83--90 Thomas C. Rindfleisch Privacy, Information Technology, and Health Care . . . . . . . . . . . . . . 93--100 William M. Detmer and Edward H. Shortliffe Using the Internet to Improve Knowledge Diffusion in Medicine . . . . . . . . . 101--108 David G. Kilman and David W. Forslund An International Collaboratory Based on Virtual Patient Records . . . . . . . . 110--117 A. Michael Noll Technical Opinion: Internet Pricing vs. Reality . . . . . . . . . . . . . . . . 118--121 Peter G. Neumann Inside Risks: Crypto Key Management . . 136--136
Anonymous ACM Executive Committee meets in Stockholm . . . . . . . . . . . . . . . 3 Anonymous Visit ACM's Digital Library Open House 5 Anonymous The Grace Murray Hopper Celebration will be held in September . . . . . . . . . . 6 Anonymous ACM will provide professional liability insurance . . . . . . . . . . . . . . . 7 Robert Fox News track . . . . . . . . . . . . . . . 9--10 Robert L. Glass Practical Programmer: Cobol: a Contradiction and an Enigma . . . . . . 11--13 Roy Rada and James R. Schoening Sharing Standards: Educational Technology Standards . . . . . . . . . . 15--18 Anonymous Joe Halpern is the new Editor-in-Chief of Journal of the ACM . . . . . . . . . 15 Diane Crawford Forum: The power of interactive computing . . . . . . . . . . . . . . . 20--23 Neil Munro and Brock N. Meeks Viewpoint: Debating (What Once Was) the CDA. For: Neil Munro; Against: Brock N. Meeks . . . . . . . . . . . . . . . . . 25--28 Abbe Mowshowitz Virtual organization: a virtually organized company dynamically links its business goals with the procedures needed to achieve them . . . . . . . . . 30--37 Murray Turoff Virtuality: Allowing users to negotiate an agreed-upon reality, virtuality requires system designers to anticipate how their technology alters the social order of the real world . . . . . . . . 38--43 Starr Roxanne Hiltz and Barry Wellman Asynchronous Learning Networks as a Virtual Classroom . . . . . . . . . . . 44--49 Claude Faucheux How Virtual Organizing Is Transforming Management Science . . . . . . . . . . . 50--55 Ramnath Chellappa and Anitesh Barua and Andrew B. Whinston An Electronic Infrastructure for a Virtual University . . . . . . . . . . . 56--58 Martin Hardwick and Richard Bolton The Industrial Virtual Enterprise . . . 59--60 Bruno Mannoni A Virtual Museum . . . . . . . . . . . . 61--62 Russ Zajtchuk and Richard M. Satava Medical Applications of Virtual Reality 63--64 Jeremy R. Cooperstock and Sidney S. Fels and William Buxton and Kenneth C. Smith Reactive Environments . . . . . . . . . 65--73 Kweku Ewusi-Mensah Critical Issues in Abandoned Information Systems Development Projects . . . . . . 74--80 Gail L. Rein and Daniel L. McCue and Judith A. Slein A Case for Document Management Functions on the Web . . . . . . . . . . . . . . . 81--89 Herbert Maisel and Catherine Gaddy Employment and Salaries of Recent Doctorates in Computer Science . . . . . 90--93 J. Michael Pearson and Leon Crosby and J. P. Shim Measuring the Importance of Ethical Behavior Criteria . . . . . . . . . . . 94--100 Mohamed E. Fayad Thinking Objectively: Software Development Process: A Necessary Evil 101--103 David Lorge Parnas Inside Risks: Software Engineering: An Unconsummated Marriage . . . . . . . . . 128--128
Pamela Samuelson Embedding technical self-help in licensed software . . . . . . . . . . . 13--17 Tung Lai Lai and Efraim Turban One organization's use of Lotus Notes 19--21 David R. R. Webber Forum: More on debugging . . . . . . . . 23--24 Richard C. Hsu and William E. Mitchell After 400 years, print is still superior 27--28 Mohamed Fayad and Douglas C. Schmidt Object-oriented application frameworks 32--38 Ralph E. Johnson Frameworks = (components + patterns) . . 39--42 Edward J. Posnak and R. Greg Lavender and Harrick M. Vin An adaptive framework for developing multeda software componets . . . . . . . 43--47 Han Albrecht Schmid Systematic framework design . . . . . . 48--51 Dirk Bäumer and Guido Gryczan and Rolf Knoll and Carola Linienthal and Dirk Riehle and Heinz Züllighoven Framwork development for large systems 53--59 Serge Demeyer and Theo Dirk Meijlar and Oscar Nierstrasz Design guidelines for ``tailorable'' frameworks . . . . . . . . . . . . . . . 60--64 Davide Brugali and Giusee Menga and Amund Aarsten The framework life span . . . . . . . . 65--68 Wim Codenie and Koen De Hondt and Patrick Steyaert and Arlette Vercammen From custom applications to domain-specific framworks . . . . . . . 71--77 Adele Goldberg and Steven T. Abell and David Leibs The LearningWorks development and delivery frameworks . . . . . . . . . . 78--81 David Doscher and Robert Hodges SEMATECH's experiences with the CIM framework . . . . . . . . . . . . . . . 82--84 Mohamed E. Fayad and Douglas C. Schmidt Lessons learned building reusable OO frameworks for distributed software . . 85--87 Stephane Forrest and Steven A. Hofmeyr and Anil Somayaji Computer immunology . . . . . . . . . . 88--96 Annette Weintraub Art on the Web, the Web as art . . . . . 97--102 Tracy Camp The incredible shrinking pipeline . . . 103--110 D. Scott Brandt Constructivism: teaching for understanding of the Internet . . . . . 112--117 Ivan Ryant Why inheritance means extra trouble . . 118--119 Peter G. Neumann Inside Risks: Integrity in software development . . . . . . . . . . . . . . 144--144
Anonymous Carver Mead receives the ACM Allen Newell Award . . . . . . . . . . . . . . 2 Anonymous ACM outreaches to Mexico . . . . . . . . 4 Anonymous USACM participates in protest against restrictions on cryptography research and development . . . . . . . . . . . . 5 Anonymous David Nicol is the new Editor-in-Chief of TOMACS . . . . . . . . . . . . . . . 7
Robert Fox News track . . . . . . . . . . . . . . . 9--10 Larry Press Personal Computing: Tracking the Global Diffusion of the Internet . . . . . . . 11--17
Anonymous ACM Member Value Plus program adds the Gartner Group . . . . . . . . . . . . . 16
Hal Berghel Digital Village --- Watermarking Cyberspace . . . . . . . . . . . . . . . 19--24 Diane Crawford The mainstreaming of parallel computation . . . . . . . . . . . . . . 25--26 Larry Smarr Toward the 21st century . . . . . . . . 28--32 Philip M. Smith The NSF partnerships and the tradition of U.S. science and engineering . . . . 34--37 Daniel A. Reed and Roscoe C. Giles and Charles E. Catlett Distributed Data and Immersive Collaboration . . . . . . . . . . . . . 38--48 Rick Stevens and Paul Woodward and Tom DeFanti and Charlie Catlett From the I-WAY to the National Technology Grid . . . . . . . . . . . . 50--60 Ken Kennedy and Charles F. Bender and John W. D. Connolly and John L. Hennessy and Mary K. Vernon and Larry Smarr A Nationwide Parallel Computing Environment . . . . . . . . . . . . . . 62--72 Gregory J. McRae How Application Domains Define Requirements for the Grid . . . . . . . 74--83 Jeremiah P. Ostriker and Michael L. Norman Cosmology of the Early Universe Viewed Through the New Infrastructure . . . . . 84--94 Celia T. Romm and Nava Pliskin Toward a Virtual Politicking Model . . . 95--100 Gezinus J. Hidding Reinventing Methodology: Who Reads It and Why? . . . . . . . . . . . . . . . . 102--109 Don Gotterbarn and Keith Miller and Simon Rogerson Software Engineering Code of Ethics . . 110--118 Bill C. Hardgrave and Kent A. Walstrom Forums for MIS Scholars . . . . . . . . 119--124 Mohamed E. Fayad and Mauri Laitinen Thinking Objectively --- Process Assessment Considered Wasteful . . . . . 125--128 Peter B. Ladkin Inside Risks --- Risks of Technological Remedy . . . . . . . . . . . . . . . . . 160--160
Robert Fox News track . . . . . . . . . . . . . . . 9--10 Zixiang Alex Tan and Milton Mueller and Will Foster China's new Internet regulations: two steps forward, one step back . . . . . . 11--16 Robert L. Glass How best to provide the services IS programmers need . . . . . . . . . . . . 17--19 Neil A. M. Maiden and Cornelious Ncube and Andrew Moore Lessons learned during requirements acquisition for COTS systems . . . . . . 21--25 Diane Crawford Forum: Cobol in question . . . . . . . . 27--29 Ramesh Jain Visual information management . . . . . 30--32 Amarnath Gupta and Simone Santini and Ramesh Jain In search of information in visual media 34--42 Boon-Lock Yeo and Minerva M. Yeung Retrieving and visualizing video . . . . 43--52 Rainer Lienhart and Silvia Pfeiffer and Wolfgang Effelsberg Video abstracting . . . . . . . . . . . 54--62 Shih-Fu Chang and John R. Smith and Mandis Beigi and Ana Benitez Visual information retrieval from large distributed online repositories . . . . 63--71 William I. Grosky Managing multimedia information in database systems . . . . . . . . . . . . 72--80 James E. Katz and Philip Aspden A nation of strangers? . . . . . . . . . 81--86 Michael Franz and Thomas Kistler Slim binaries . . . . . . . . . . . . . 87--94 Martin D. Fraser and Vijay K. Vaishnavi A formal specifications maturity model 95--103 Jeffrey Parsons and Yair Wand Using objects for systems analysis . . . 104--110 Neal Coulter ACM's computing classification system reflects changing times . . . . . . . . 111--112 Nigel Ward Programming as a discipline? . . . . . . 113--114 Peter G. Neumann Inside Risks: System Development Woes 160--160
Robert Fox News track . . . . . . . . . . . . . . . 9--10 Roy Rada Sharing standards: Corporate shortcut to standardization . . . . . . . . . . . . 11--15 Neil Munro From Washington: Access charges under scrutiny . . . . . . . . . . . . . . . . 17--19 Nora H. Sabelli Viewpoint: We are no longer a priesthood 20--21 Jennifer J. Burg and Stan J. Thomas Computers across campus . . . . . . . . 22--25 David G. Brown and Jennifer J. Burg and Jay L. Dominick A strategic plan for ubiquitous laptop computing . . . . . . . . . . . . . . . 26--35 Glenn MacDougall Acadia University's ``Sandbox'' . . . . 32--33 Alan Candiotti and Neil Clarke Combining universal access with faculty development and academic facilities . . 36--41 Mark Weiser The future of ubiquitous computing on campus . . . . . . . . . . . . . . . . . 41--42 Janice Biros Changes in computer purchase, distribution, and maintenance . . . . . 43--44 Lynn Kiaer and David Mutchler and Jeffrey Froyd Laptop computers in an integrated first-year curriculum . . . . . . . . . 45--49 Carolyn Watters and Marshall Conley and Cynthia Alexander The digital agora: using technology for learning in the social sciences . . . . 50--57 Ann Deden Computers and systemic change in higher education . . . . . . . . . . . . . . . 58--63 Richard J. LeBlanc, Jr. and Steven L. Teal Hardware and software choices for student computer initiatives . . . . . . 64--69 Samuel L. Grier and Larry W. Bryant The case for desktops . . . . . . . . . 70--71 Ho Guen Lee Do electronic marketplaces lower the price of goods? . . . . . . . . . . . . 73--80 Sonya Freeman Cohen Quest for Java . . . . . . . . . . . . . 81--83 Peter G. Neumann Protecting the infrastructures . . . . . 128--128
Robert Fox News Track . . . . . . . . . . . . . . . 9--11 Elliot Soloway Long on Education: no one is making money in education software . . . . . . 11--16 Brock N. Meeks Electronic frontier: no justice, no peace . . . . . . . . . . . . . . . . . 17--20 Jan Guynes Clark and Vincent S. Lai On site: Internet comes to Morocco . . . 21--26 Diane Crawford and Larry Brunelle and Morton Grosser and Danielle Bernstein and George Mallard and Louis A. Russ and Magnus Kempe Forum: Questioning Technical Self-Helf; Women and Computer Science; Title by License; Citizens of the Republic Speak 24--26 Brian C. Behrens and Reuven R. Levary Practical legal aspects of software reverse engineering . . . . . . . . . . 27--29 Leon A. Kappelman and Darla Fent and Kellie B. Keeling and Victor Prybutok Calculating the cost of Year-2000 compliance . . . . . . . . . . . . . . . 30--39 Varun Grover and James T. C. Teng and Kirk D. Fiedler IS investment priorities in contemporary organizations . . . . . . . . . . . . . 40--48 Philip M. Johnson Reengineering inspection . . . . . . . . 49--53 Giri Kumar Tayi and Donald P. Ballou Special section: examining data quality 54--57 Richard Y. Wang A product perspective on total data quality management . . . . . . . . . . . 58--65 Ken Orr Data Quality and systems theory . . . . 66--71 David Kaplan and Ramayya Krishnan Assessing data quality in accounting information systems . . . . . . . . . . 72--78 Thomas C. Redman The impact of poor data quality on the typical enterprise . . . . . . . . . . . 79--82 Mauri Laitinen and Mohamed E. Fayad Thinking objectively: surviving a process performance crash . . . . . . . 83--86 Peter G. Neumann Inside risks: Internet gambling . . . . 112--112
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--11 Hal Berghel Digital village: the Year-2000 problem and the new riddle of induction . . . . 13--17 Diane Crawford ACM fellows . . . . . . . . . . . . . . 18--18 Grey E. Burkhart and Seymour E. Goodman International perspectives: the Internet gains acceptance in the Persian Gulf . . 19--25 Diane Crawford and Jimmy A. Castro and Raman Kannan and Mark C. Kilby and Mohamed Fayad and Earl F. Glynn and Tracy Camp and Mike Yaphe and Abbe Mowshowitz and Domenico Talla Forum: Praises come with a hitch; OO Frameworks; Response; More Studies Needed; Response; Metamanagement Definition; Response; Parallel Computers Revisited . . . . . . . . . . . . . . . 26--29 Charles H. House It's time for a change . . . . . . . . . 31--31 H. Raghav Rao and A. F. Salam and Brian DosSantos Marketing and the Internet . . . . . . . 32--34 P. K. Kannan and Ai-Mei Chang and Andrew B. Whinston Marketing information on the I-Way data junkyard or information gold mine? . . . 35--43 Jonathan W. Palmer and David A. Griffith An emerging model of Web site design for marketing . . . . . . . . . . . . . . . 44--51 Lauren B. Eder and Marvin E. Darter Physicians in cyberspace . . . . . . . . 52--54 Greg Elofson and William N. Robinson Creating a custom mass-production channel on the Internet . . . . . . . . 56--62 Huaiqing Wang and Matthew K. O. Lee and Chen Wang Consumer privacy concerns about Internet marketing . . . . . . . . . . . . . . . 63--70 Robert M. O'Keefe and Tim McEachern Web-based customer decision support systems . . . . . . . . . . . . . . . . 71--76 A. F. Salam and H. R. Rao and C. C. Pegels Content of corporate Web pages as advertising media . . . . . . . . . . . 76--77 Mark Bohr Silicon trends and limits for advanced microprocessors . . . . . . . . . . . . 80--87 Robert J. Hall How to avoid unwanted email . . . . . . 88--95 Bonnie A. Nardi and James R. Miller and David J. Wright Collaborative, programmable intelligent agents . . . . . . . . . . . . . . . . . 96--104 John T. Nosek Technical opinion: the case for collaborative programming . . . . . . . 105--108 Peter G. Neumann Inside risks: Are computer addictive? 128--128
Robert Fox News track . . . . . . . . . . . . . . . 11--12 Pamela Samuelson Encoding the law into digital libraries 13--18 Nathaniel S. Borenstein Whose net is it anyway? . . . . . . . . 19--20 Diane Crawford Forum: Readers ``Thinking Objectively'' 22--27 Edward A. Fox and Gary Marchionini Toward a worldwide digital library: introduction . . . . . . . . . . . . . . 28--32 Andreas Paepcke and Chen-Chuan K. Chang and Terry Winograd and Héctor García-Molina Interoperability for digital libraries worldwide . . . . . . . . . . . . . . . 33--42 William E. Moen Accessing distributed cultural heritage information . . . . . . . . . . . . . . 44--48 Henry M. Gladney and Fred Mintzer and Fabio Schiattarella and Julián Bescós and Martin Treu Digital access to antiquities . . . . . 49--57 Cathryn S. Dippo FedStats promotes statistical literacy 58--60 D. D. Cowan and C. I. Mayfield and F. W. Tompa and W. Gasparini New role for community networks . . . . 61--63 Akira Maeda and Myriam Dartois and Takehisa Fujita and Tetsuo Sakaguchi and Shigeo Sugimoto and Koichi Tabata Viewing multilingual documents on your local Web browser . . . . . . . . . . . 64--65 M. K. Leong and L. Cao and Y. Lu Distributed Chinese bibliographic searching . . . . . . . . . . . . . . . 66--68 Judith L. Klavans and Peter Scha\``uble NSF-EU multilingual information access 69--70 Ian H. Witten and Craig Nevill-Manning and Rodger McNab and Sally Jo Cunningham A public library based on full-text retrieval . . . . . . . . . . . . . . . 71--75 Albert Endres and Norbert Fuhr Students access books and journals through MeDoc . . . . . . . . . . . . . 76--77 László Kovács Discovery of resources within a distributed library system . . . . . . . 78--79 Marcos André Gonçalves and Claudia Bauzer Medieros Initiatives that center on scientific dissemination . . . . . . . . . . . . . 80--81 Sung Hyon Myaeng R&D for a nationwide general-purpose system . . . . . . . . . . . . . . . . . 82--85 Cliff McKnight Many projects that depend on collaboration . . . . . . . . . . . . . 86--87 Andrew E. Treloar Libraries' new role in electronic scholarly publishing . . . . . . . . . . 88--89 Annelise Mark Pejtersen Semantic information retrieval . . . . . 90--92 Sanna Talja and Rami Heinisuo and Eija-Liisa Kasesniemi and Harri Kemainen and Sinikka Luukkainen and Kirsi Pispa and Kalervo Järvelin Discourse analysis of user requests . . 93--94 Ben Shneiderman and Donald Byrd and W. Burce Croft Sorting out searching: a user-interface framework for text searches . . . . . . 95--98 Iris Vessey and Robert Glass Strong vs. weak approaches to systems development . . . . . . . . . . . . . . 99--102 A. C. Sodan Yin and Yang in computer science . . . . 103--114 Fred B. Schneider On concurrent programming . . . . . . . 128--128
Robert Fox News track . . . . . . . . . . . . . . . 9--11 Brock N. Meeks Don't shoot me, I'm famous . . . . . . . 13--15 Robert Glass Everything old is new again . . . . . . 17--20 Diane Crawford Flogging the wrong house? . . . . . . . 22--27 Diane Crawford Virtual extension . . . . . . . . . . . 28--28 Bruce H. Barnes Assessing computer technology in Europe 29--32 James Veitch and Robert Laddaga Distributed dynamic systems . . . . . . 34--36 Narinder Singh Unifying heterogeneous information models: semantic tags support knowledge webs . . . . . . . . . . . . . . . . . . 37--44 Jeffrey Morrill Distributed recognition of patterns in time series data: from sensors to informed decisions . . . . . . . . . . . 45--51 Jim Veitch A conversation with Paul Graham . . . . 52--54 David N. Gray and John Hotchkiss and Seth LaForge and Andrew Shalit and Toby Weinberg Modern languages and Microsoft's component object model: programming COM made simple . . . . . . . . . . . . . . 55--65 Janos Sztipanovits and Gabor Karsai and Ted Bapty Self-adaptive software for signal processing: evolving systems in changing environments without growing pains . . . 66--73 Vicky Hardman and Martina Angela Sasse and Isidor Kouvelas Successful multiparty audio communication over the Internet . . . . 74--80 Akira K. Onoma and Wei-Tek Tsai and Mustafa Poonawala and Hiroshi Suganuma Regressing testing in an industrial environment: progress is attained by looking backward . . . . . . . . . . . . 81--86 Deter Duchessi and InduShobha Chengalur-Smith Client/server benefits, problems, best practices: the goal: not just better technology but better business processes that make a company more competitive . . 87--94 William N. Robinson and Vecheslav Volkov Supporting the negotiation life cycle 95--102 Mohamed E. Fayad The art of managing multiple processes 103--105 Rebecca Mercuri In search of academic integrity . . . . 136--136
David Alan Grier Politics, control, and computer networks: the Chinese Student Lobby of 1989 . . . . . . . . . . . . . . . . . . 137--145 Michel Keable and Maurice Landry and Claude Banville The legitimacy gap between IS professionals and users . . . . . . . . 146--156 Albert A. Angehrn and Soumitra Dutta Case-based decision support . . . . . . 157--165 Christine Parent and Stefano Spaccapietra Issues and approaches of database integration . . . . . . . . . . . . . . 166--178 Uma G. Gupta Automatic tools for testing expert systems . . . . . . . . . . . . . . . . 179--184 J. K. Joiner and W. T. Tsai Re-engineering legacy Cobol programs . . 185--197 Takashi Nishiyama and Junji Nomura and Ryoji Nakajima and Tetsuji Miyanoh A semi-autonomous security robot employing telepresence . . . . . . . . . 198--205 Arun Sen From DSS to DSP: a taxonomic retrospective . . . . . . . . . . . . . 206--216
Robert Fox News Track . . . . . . . . . . . . . . . 9--10 Stephen J. Lukasik and Lawrence T. Greenberg and Seymour E. Goodman Protecting an invaluable and ever-widening infrastructure . . . . . . 11--16 Larry Press Low-cost estimation of travel trade-offs 17--20 Paul Carlisle and Mike Anderson and Ray Brown and James Mitchell and Anthony Ralston and Herb Grosch and Stewart A. Denenberg and Rainer Schoenrank Who needs educational software? . . . . 22--26 Wayne Madsen Internet malcontents of the world --- unite! . . . . . . . . . . . . . . . . . 27--28 Christopher Morgan Building an informational bridge to China . . . . . . . . . . . . . . . . . 29--30 Diane Crawford and Thomas Lambert and Robert Fox and Andrew Rosenbloom Information for authors . . . . . . . . 31--33 Sandeep Singhal and Binh Nguyen The Java factor: Introduction . . . . . 34--37 Paul Tyma Why are we using Java again? . . . . . . 38--42 Kathy Bohrer and Verlyn Johnson and Anders Nilsson and Bradley Rubin Business process components for distributed object applications . . . . 43--48 Kelvin Nilsen Adding real-time capabilities to Java 49--56 Don Brutzman The Virtual Reality Modeling Language and Java . . . . . . . . . . . . . . . . 57--64 James W. Cooper Using design patterns . . . . . . . . . 65--68 Annie Chabert and Ed Grossman and Larry S. Jackson and Stephen R. Pietrowiz and Chris Seguin Java object-sharing in Habanero . . . . 69--76 Soumitra Dutta and Luk N. Van Wassenhove and Selvan Kulandaiswamy Benchmarking European software management practices . . . . . . . . . . 77--86 Larry Wos Programs that offer fast, flowless, logical reasoning . . . . . . . . . . . 87--95 James T. C. Teng and Seung Ryul Jeong and Varun Grover Profiling successful reengineering projects . . . . . . . . . . . . . . . . 96--102 Harold W. Lawson Infrastructure risk reduction . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--11 Robert L. Glass Practical programmer: Short-term and long-term remedies for runaway projects 13--15 Roy Rada and Carl Cargill and John Klensin Sharing standards: Consensus and the Web 17--22 Roger C. Schank Viewpoint: Horses for courses . . . . . 23--25 Diane Crawford Forum: Hindsight is not always 20/20 . . 26--28 Minerva M. Yeung Digital watermarking . . . . . . . . . . 30--33 Nasir Memon and Ping Wah Wong Protecting digital media content . . . . 35--43 Scott Craver and Boon-Lock Yeo and Minerva Yeung Technical trials and legal tribulations 45--54 Fred Mintzer and Gordon W. Braudaway and Alan E. Bell Opportunities for watermarking standards 57--64 Jian Zhao and Eckhard Koch and Chenghui Luo In Business Today and Tomorrow . . . . . 66--72 John M. Acken How watermarking adds value to digital content . . . . . . . . . . . . . . . . 75--77 Tomás Isakowitz and Michael Bieber and Fabio Vitali Web information systems . . . . . . . . 78--80 Gerald L. Lohse and Peter Spiller Electronic shopping . . . . . . . . . . 81--87 Jay M. Tenenbaum WISs and electronic commerce . . . . . . 89--90 Ajit Kambil and Mark Ginsberg Public access Web information systems: Lessons from the Internet EDGAR project 91--97 Albert L. Lederer and Dinesh A. Mirchandani and Kenneth Sims Using WISs to enhance Competitiveness 94--95 Harri Oinas-Kukkonen What is inside a link? . . . . . . . . . 98--98 Eric van Heck and Peter Vervest How should CIOs deal with Web-based auctions? . . . . . . . . . . . . . . . 99--100 Gustavo Arocena and Alberto Mendelzon Viewing WISs as database applications 101--102 Kenji Takahashi Metalevel links: More power to your links . . . . . . . . . . . . . . . . . 103--105 V. Balasubramanian and Alf Bashian Document management and Web technologies 107--115 Alan R. Dennis Lessons from Three Years of Web Development . . . . . . . . . . . . . . 112--113 Hermann A. Maurer Modern WISs . . . . . . . . . . . . . . 114--115 Murray Turoff and Starr Roxanne Hiltz Superconnectivity . . . . . . . . . . . 116--116 James A. Senn WISs at Federal Express . . . . . . . . 117--118 Peter G. Neumann Inside risks: Laptops in Congress? . . . 128--128
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--10 Elliot Soloway and Cathie Norris Log on education: using technology to address old problems in new ways . . . . 11--18 Diane Crawford From Washington: shaping public policy in the information age . . . . . . . . . 21--24 Roger A. Coldwell Viewpoint: did Chuck Babbage predict software piracy? . . . . . . . . . . . . 25--27 Diane Crawford Only the names have changed . . . . . . 28--31 Robert J. Kauffman and Frederick J. Riggins Information systems and economics . . . 32--34 Yannis Bakos The emerging role of electronic marketplaces on the Internet . . . . . . 35--42 Rajiv M. Dewan and Marshall L. Freimer and Abraham Seidmann Internet service providers, proprietary content, and the battle for users' dollars . . . . . . . . . . . . . . . . 43--48 Erik Brynjolfsson and Lorin Hitt Beyond the productivity paradox . . . . 49--55 Sanjeev Dewan and Kenneth L. Kraemer International dimensions of the productivity paradox . . . . . . . . . . 56--62 Chris F. Kemerer Progress, obstacles, and opportunities in software engineering economics . . . 63--66 Sandra A. Slaughter and Donald E. Harter and Mayuram S. Krishnan Evaluating the cost of software quality 67--73 Lorre Faith Cranor and Brian A. LaMacchia Spam! . . . . . . . . . . . . . . . . . 74--83 Roy T. Fielding and E. James Whitehead, Jr. and Kenneth M. Anderson and Gregory A. Bolcer and Peyman Oreizy and Richard N. Taylor Web-based development of complex information products . . . . . . . . . . 84--92 Stan Jarzabek and Riri Huang The case for user-centered CASE tools 93--99 Sandeep Purao and Hemant Jain and Derek Narareth Effective distribution of object-oriented applications . . . . . . 100--108 David S. Hamu and Mohamed E. Fayad Thinking objectively: achieving bottom-line improvements with enterprise frameworks . . . . . . . . . . . . . . . 110--113 Peter J. Denning Inside Risks: Computer science and software engineering: filing for divorce? . . . . . . . . . . . . . . . . 128--128
Robert Fox News track . . . . . . . . . . . . . . . 9--10 Brock N. Meeks Electronic frontier: mainstream media heartburn . . . . . . . . . . . . . . . 11--13 Pamela Samuelson Legally speaking: does information really have to be licensed? . . . . . . 15--20 Don Smith Viewpoint: computerizing computer science . . . . . . . . . . . . . . . . 21--23 Diane Crawford Forum: peeling the Y2K onion . . . . . . 24--27 Arun Sen and Varghese S. Jacob Industrial-strength data warehousing . . 28--31 Hugh J. Watson and Barbara J. Haley Managerial considerations . . . . . . . 32--37 Charles Bontempo and George Zagelow The IBM data warehouse architecture . . 38--48 Michael Sigal A Common Sense Development Strategy . . 42--43 James R. Sutter Project-based warehouses . . . . . . . . 49--51 Stephen R. Gardner Building the data warehouse . . . . . . 52--60 Cecilia Claudio Health care management . . . . . . . . . 58--59 Katherine Glassey Seducing the end user . . . . . . . . . 62--69 Jim Scott Warehousing over the Web . . . . . . . . 64--65 Linda Huber Users drive move from mainframe . . . . 66--67 Jennifer Kreie and Timothy Paul Cronan How men and women view ethics . . . . . 70--76 Judith Gal-Ezer and David Harel What (else) should CS educators know? 77--84 Rudolf K. Keller and Jean Tessier and Gregor von Bochmann A pattern system for network management interfaces . . . . . . . . . . . . . . . 86--93 Asuman Dogac and Cevdet Dengi and M. Tamer Öszu Distributed object computing platforms 95--103 Peter G. Neumann Inside risks: Y2K update . . . . . . . . 128--128
Robert Fox News track . . . . . . . . . . . . . . . 9--11 Hal Berghel Who won the Mosaic War? . . . . . . . . 13--16 Barbara Simons Outlawing technology . . . . . . . . . . 17--18 Larry Press and Grey Burkhart and Will Foster and Sy Goodman and Peter Wolcott and Jon Woodard An Internet diffusion framework . . . . 21--26 Richard C. Hsu Viewpoint: Maintaining high living standards through innovation, strong patents . . . . . . . . . . . . . . . . 27--28 Diane Crawford Forum: The dirty secrets of runaway projects . . . . . . . . . . . . . . . . 29--33 Krishnan Seetharaman The CORBA connection . . . . . . . . . . 34--36 Jon Siegel OMG overview: CORBA and the OMA in enterprise computing . . . . . . . . . . 37--43 Steve Vinoski New features for CORBA 3.0 . . . . . . . 44--52 Douglas C. Schmidt Evaluating architectures for multithreaded object request brokers . . 54--60 Michi Henning Binding, migration, and scalability in CORBA . . . . . . . . . . . . . . . . . 62--71 Paul Haggerty and Krishnan Seetharaman The benefits of CORBA-based network management . . . . . . . . . . . . . . . 73--79 Arie Segev and Jaana Porra and Malu Roldan Internet security and the case of Bank of America . . . . . . . . . . . . . . . 81--87 Frederick J. Riggins and Hyeun-Suk (Sue) Rhee Toward a unified view of electronic commerce . . . . . . . . . . . . . . . . 88--95 Arun Rai and T. Ravichandran and Subhashish Samaddar How to anticipate the Internet's global diffusion . . . . . . . . . . . . . . . 97--106 Richard Gisselquist Engineering in software . . . . . . . . 107--108 Peter G. Neumann Inside Risks: Risks of E-education . . . 136--136
Robert Fox News track . . . . . . . . . . . . . . . 9--10 Diane Crawford Forum: Stop, in the Name of Spam . . . . 11--14 Herbert Schorr and Salvatore J. Stolfo From Washington: digital government for the 21st century . . . . . . . . . . . . 15--19 Grey E. Burkhart and Seymour E. Goodman and Arun Mehta and Larry Press International perspectives: the Internet in India: better times ahead? . . . . . 21--26 Peter Wolcott and Patrick Homer and Seymour Goodman Viewpoint: HPC export controls: navigating choppy waters . . . . . . . . 27--30 Sidney Karin and Susan Graham The high-performance computing continuum 32--35 Paul Messina and David Culler and Wayne Pfeiffer and Wiliam Martin and J. Tinsley Oden and Gary Smith Architecture . . . . . . . . . . . . . . 36--44 Andrew Grimshaw and Adam Ferrari and Greg Lindahl and Katherine Holcomb Metasystems . . . . . . . . . . . . . . 46--55 Reagan Moore and Thomas A. Prince and Mark Ellisman Data-intensive computing and digital libraries . . . . . . . . . . . . . . . 56--62 Joel H. Saltz and Alan Sussman and Susan Graham and James Demmel and Scott Baden and Jack Dongarra Programming tools and environments . . . 64--73 Amy Finley and Ann Redelfs and Greg Moses Education, outreach, and training . . . 74--75 Mark Keil and Paul Cule and Kalle Lyytinen and Roy Schmidt A framework for identifying software projects risks . . . . . . . . . . . . . 76--83 John C. Kunz and Tore R. Christiansen and Geoff P. Cohen and Yan Jin and Raymond E. Levitt The virtual design team . . . . . . . . 84--91 Geng-Sheng Kuo and Jing-Pei Lin New design concepts for an intelligent Internet . . . . . . . . . . . . . . . . 93--98 Herbert Maisel and Catherine Gaddy Employment and salaries of recent CS doctorates . . . . . . . . . . . . . . . 99--101 Waldemar W. Koczkodaj and Marian Orlowski and Victor W. Marek Technical opinion: myths about rough set theory . . . . . . . . . . . . . . . . . 102--103 Fred B. Schneider Inside Risks: toward trustworthy networked information systems . . . . . 144--144
Diane Crawford Editorial Pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--10 Robert L. Glass Practical programmer: how not to prepare for a consulting assignment, and other ugly consultancy truths . . . . . . . . 11--13 Robert J. Aalberts and Anthony M. Townsend and Michael E. Whitman Legally speaking: the threat of long-arm jurisdiction to electronic commerce . . 15--20 Robert Kraut and Sara Kiesler and Tridas Mukhopadhyay and William Scherlies and Michael Patterson On site: social impact of the Internet: what does it mean? . . . . . . . . . . . 21--22 Diane Crawford Forum: Computers in Education: Observations and Redress . . . . . . . . 23--26 Vinton G. Cerf Tribute: I remember IANA . . . . . . . . 27--28 Clare-Marie Karat Viewpoint: guaranteeing rights for the user . . . . . . . . . . . . . . . . . . 29--31 Matthias Jarke Requirements tracing . . . . . . . . . . 32--36 Balasubramaniam Ramesh Factors influencing requirements traceability practice . . . . . . . . . 37--44 Thomas Rose Visual assessment of engineering processes in virtual enterprises . . . . 45--52 Ralf Dömges and Klaus Pohl Adapting traceability environments to project-specific needs . . . . . . . . . 55--62 Giorgio De Michelis and Eric Dubois and Matthias Jarke and Florian Matthes and John Mylopoulos and Joachim W. Schmidt and Eric Yu and Carson Woo A three-faceted view of informations systems . . . . . . . . . . . . . . . . 64--70 Loe Feijs and Roel De Jong 3D visualization of software architectures . . . . . . . . . . . . . 73--78 W. B. Noffsinger and Robert Niedbalski and Michael Blanks and Niall Emmart Legacy object modeling speeds software integration . . . . . . . . . . . . . . 80--89 Prabuddha De and Thomas W. Ferratt An information system involving competing organizations . . . . . . . . 90--98 C. J. Date and Hugh Darwen Technical opinion: toward a model of type inheritance . . . . . . . . . . . . 99--101 Peter Ladkin Inside risks: the risks of Hubris . . . 160--160
Robert Fox News track . . . . . . . . . . . . . . . 9--10 Diane Crawford and Timothy D. Prime and Justus Pendleton and Greg Kirsch and Lyle P. Bickley and Markku Sakkinen and Jakob Engblom and Howard L. Funk and John Rieman and Joy Davis and David Balok Forum: Correlating patents and living standards . . . . . . . . . . . . . . . 11--13 Michael W. Whitman and Anthony M. Townsend and Robert J. Aalberts Legally speaking: The Communications Decency Act Is not as Dead as You Think 15--17 Hal Berghel Digital village: Value-added publishing 19--23 Max Hailperin Viewpoint: The COPA battle and the future of free speech . . . . . . . . . 24--25 Barbara Simons From the President: Starr wars . . . . . 26--27 Hermann Kaindl and John M. Carroll Symbolic Modeling in Practice . . . . . 28--30 John Mylopoulos and Lawrence Chung and Eric Yu From Object-Oriented to Goal-Oriented Requirements Analysis . . . . . . . . . 31--37 Keith A. Butler and Chris Esposito and Ron Hebron Connecting the Design of Software to the Design of Work . . . . . . . . . . . . . 38--46 Matthias Jarke Scenarios for Modeling . . . . . . . . . 47--48 Mary Beth Rosson Integrating Development of Task and Object Models . . . . . . . . . . . . . 49--56 Brian R. Gaines and Mildred L. G. Shaw Embedding Formal Knowledge Models in Active Documents . . . . . . . . . . . . 57--63 Jakob Nielsen User interface directions for the Web 65--72 Donald P. Ballou and Giri Kumar Tayi Enhancing data quality in data warehouse environments . . . . . . . . . . . . . . 73--78 John R. Nicol and Yechezkal S. Gutfreund and Jim Paschetto and Kimberly S. Rush and Christopher Martin How the Internet helps build collaborative multimedia applications 79--85 Pierre N. Robillard The role of knowledge in software development . . . . . . . . . . . . . . 87--92 David E. Avison and Francis Lau and Michael D. Myers and Peter Axel Nielsen Action research . . . . . . . . . . . . 94--97 Satish Nambisan and Yu-Ming Wang Technical opinion: Roadblocks to Web technology adoption? . . . . . . . . . . 98--101 Fred B. Schneider and Steven M. Bellovin Inside risks: Evolving telephone networks . . . . . . . . . . . . . . . . 160--160
Robert Fox News track . . . . . . . . . . . . . . . 9--11 Larry Press Personal Computing: The next generation of business data processing . . . . . . 13--16 Brock N. Meeks Electronic Frontier: The privacy hoax 17--19 Diane Crawford Forum: More ugly truths about consulting assignments . . . . . . . . . . . . . . 21--24 Ghinwa Jalloul On site: Computing in Lebanon . . . . . 25--26 Lorrie Faith Cranor Internet privacy . . . . . . . . . . . . 28--38 Michael K. Reiter and Aviel D. Rubin Anonymous Web transactions with crowds 32--48 David Goldschlag and Michael Reed and Paul Syverson Onion routing . . . . . . . . . . . . . 39--41 Eran Gabber and Phillip B. Gibbons and David M. Kristol and Yossi Matias and Alain Mayer Consistent, yet anonymous, Web access with LPWA . . . . . . . . . . . . . . . 42--47 Joseph Reagle and Lorrie Faith Cranor The platform for privacy preferences . . 48--55 Paola Benassi TRUSTe: An online privacy seal program 56--59 Roger Clarke Internet privacy concerns confirm the case for intervention . . . . . . . . . 60--67 J. Arthur Gowan and Chris Jesse and Richard G. Mathieu Y2K compliance and the distributed enterprise . . . . . . . . . . . . . . . 68--73 Robert L. Glass The realities of software technology payoffs . . . . . . . . . . . . . . . . 74--79 Rajiv Sabherwal The role of trust in outsourced is development projects . . . . . . . . . . 80--86 Wilhelm Hasselbring Technical opinion: On defining computer science terminology . . . . . . . . . . 88--91 Peter G. Neumann Inside risks: Robust open-source software . . . . . . . . . . . . . . . . 128--128
Robert Fox News track . . . . . . . . . . . . . . . 11--12 Kalle Lyytinen and Seymour Goodman Finland: the unknown soldier on the IT front . . . . . . . . . . . . . . . . . 13--17 Pamela Samuelson Good news and bad news on the intellectual property front . . . . . . 19--24 Diane Crawford and Clay Shirky and David Webber and Jakob Nielson and Joseph M. Newcomer and The HomeNet Group and W. M. Jaworski and Waldemar W. Koczkodaj and Marian Orlowski and Victor W. Marek Forum: Usability vs. the Web . . . . . . 27--32 Donald E. Rickert and Thomas Nagy Viewpoint: focus groups, theory or the kid in the garage? . . . . . . . . . . . 34--36 Anupam Joshi and Munindar P. Singh Multiagent systems on the net . . . . . 38--40 Rune Gustavsson Agents with power . . . . . . . . . . . 41--47 Tzvetan Drashansky and Elias N. Houstis and Naren Ramakrishnan and John R. Rice Networked agents for scientific computing . . . . . . . . . . . . . . . 48--52, 54 Douglas E. Dyer Multiagent systems and DARPA . . . . . . 53--53 Fumio Hattori and Takeshi Ohguro and Makoto Yokoo and Shigeo Matsubara and Sen Yoshida Socialware: multiagent systems for supporting network communities . . . . . 55--61 Alok R. Chaturvedi and Shailendra R. Mehta Simulations in economics and management 60--61 Anuj K. Jain and Manuel Aparico IV and Munindar P. Singh Agents for process coherence in virtual enterprises . . . . . . . . . . . . . . 62--69 Richard Green and Sangam Pant Multiagent data collection in Lycos . . 70--70 Aaron Sloman and Brian Logan Building cognitively rich agents using the SIM\_Agent toolkit . . . . . . . . . 71--73, 75 Jeremy Baxter and Richard Helewhite Agents in tank battle simulations . . . 74--75 Moses Ma Agents in E-commerce . . . . . . . . . . 78--80 Pattie Maes and Robert H. Guttman and Alexandros G. Moukas Agents that buy and sell . . . . . . . . 81--87, 90--91 Tuomas Sandholm Automated negotiation . . . . . . . . . 84--85 Danny B. Lange and Mitsuru Oshima Seven good reasons for mobile agents . . 88--89 David Wong and Noemi Paciorek and Dana Moore Java-based mobile agents . . . . . . . . 92--95, 97--102 Reuven Koblick Concordia . . . . . . . . . . . . . . . 96--97 Hideki Tai and Kazuya Kosaka The Aglets project . . . . . . . . . . . 100--101 Barbara Hayes-Roth and Vaughan Johnson and Robert van Gent and Keith Wescourt Staffing the Web with interactive characters . . . . . . . . . . . . . . . 103--105 Robert J. Glushko and Jay M. Tenenbaum and Bart Meltzer An XML framework for agent-based E-commerce . . . . . . . . . . . . . . . 106--109, 111--114 Howard Smith and Kevin Poulter Share the ontology in XML-based trading architectures . . . . . . . . . . . . . 110--111 Albert Alderson and Hanifa Shah Technical Opinion: Viewpoints on legacy systems . . . . . . . . . . . . . . . . 115--116 Lauren Weinstein Inside Risks: Bit-rot roulette . . . . . 144--144 J. Yeandel and D. Thulborn and S. Jones The design and implementation of an on-line testable UART . . . . . . . . . 187--198 M. F. Abdulla and C. P. Ravikumar and Anshul Kumar Optimization of mutual and signature testing schemes for highly concurrent systems . . . . . . . . . . . . . . . . 199--216 Zohair Sahraoui and Francky Catthoor and Paul Six and Hugo de Man Techniques for reducing the number of decisions and backtracks in combinational test generation . . . . . 217--238 Lakshminarayana Pappu and Michael L. Bushnell and Vishwani D. Agrawal and Srinivas Mandyam-Komar Statistical delay fault coverage estimation for synchronous sequential circuits . . . . . . . . . . . . . . . . 239--254 De-Qiang Wang and Lian-Chang Zhao Combinatorial analysis of check set construction for algorithm-based fault tolerance systems . . . . . . . . . . . 255--260
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 11--12 Diane Crawford and John Ehrt and Joe Saltiel and Robert Glass and John Wubbel and John Willmore and Tom Moran Forum: a Righteous Balance of Internet Freedom; Don't Compare Business Majors to Hackers; ``Popular'' Press; Empirical Studies vs. Armchair Argument . . . . . 13--16 Robert L. Glass Practical programmer: inspections---some surprising findings . . . . . . . . . . 17--19 Roy Rada Sharing Standards: IT skills standards 21--26 Donald J. Bagert Viewpoint: taking the lead in licensing software engineers . . . . . . . . . . . 27--29 John White ACM Digital Library Enhancements . . . . 30--31 Tim O'Reilly Lessons from open-source software development . . . . . . . . . . . . . . 32--37 Linus Torvalds The Linux edge . . . . . . . . . . . . . 38--39 Larry Wall The origin of the camel lot in the breakdown of the bilingual Unix . . . . 40--41 Roy T. Fielding Shared leadership in the Apache project 42--43 John Ousterhout Free software needs profit . . . . . . . 44--45 Xin Yao Following the path of evolvable hardware 46--49 Moshe Sipper and Daniel Mange and Eduardo Sanchez Quo Vadis evolvable hardware? . . . . . 50--56 Pierre Marchal Field-programmable gate arrays . . . . . 57--59 Tetsuya Higuchi and Nobuki Kajihara Evolvable hardware chips for industrial applications . . . . . . . . . . . . . . 60--66 Tomofumi Hikage and Hitoshi Hemmi and Katsunori Shimohara Hardware Evolution System AdAM . . . . . 64--65 Jason D. Lohn Experiments on Evolving Software Models of Analog Circuits . . . . . . . . . . . 67--69 Adrian Thompson and Paul Layzell Analysis of unconventional evolved electronics . . . . . . . . . . . . . . 71--79 Donna L. Hoffman and Thomas P. Novak and Marcos Peralta Building consumer trust online . . . . . 80--85 Tomasz Imielinski and Julio C. Navas GPS-based geographic addressing, routing, and resource discovery . . . . 86--92 Niv Ahituv and Moshe Zviran and Chanan Glezer Top management toolbox for managing Corporate IT . . . . . . . . . . . . . . 93--99 Rachid Guerraoui and Mohamed E. Fayed Thinking objectively: OO distributed programming is not distributed OO programming . . . . . . . . . . . . . . 101--104 Lauren Weinstein Inside risks: just a matter of bandwidth 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--10 Hal Berghel Digital village: how Xday figures in the Y2K countdown . . . . . . . . . . . . . 11--15 Gerald V. Post Personal computing: how often should a firm buy new PCs? . . . . . . . . . . . 17--21 Leon A. Kappelman Viewpoint: saving our sacred honor . . . 23--25 B. J. Fogg Persuasive technologies . . . . . . . . 26--29 Phillip King and Jason Tester The landscape of persuasive technologies 31--38 Shawn Tseng and B. J. Fogg Credibility and computing technology . . 39--44 Julie Khaslavsky and Nathan Shedroff Understanding the seductive experience 45--49 Daniel Berdichevsky and Erik Neunschwander Toward an ethics of persuasive technology . . . . . . . . . . . . . . . 51--58 Kim Halskov Madsen The diversity of usability practices . . 60--62 Jacob Buur and Kirsten Bagger Replacing usability testing with user dialogue . . . . . . . . . . . . . . . . 63--66 Karel Vredenburg Increasing ease of use . . . . . . . . . 67--71 Klaus B. Bærentsen and Henning Slavensky A contribution to the design process . . 72--77 Julia Gardner Strengthening the focus on users' working practices . . . . . . . . . . . 79--82 pWilliam Dolan and Joseph Dumas A flexible approach to third-party usability . . . . . . . . . . . . . . . 83--85 Michael Muller and Mary P. Czerwinski Organizing usability work to fit the full product range . . . . . . . . . . . 87--90 Thea Borgholm and Kim Halskov Madsen Cooperative usability practices . . . . 91--97 Jeffrey S. Poulin Technical opinion: reuse: been there, done that . . . . . . . . . . . . . . . 98--100 David Lorge Parnas Inside risks: ten myths about Y2K inspections . . . . . . . . . . . . . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--10 Robert L. Glass Practical programmer: is criticism of computing academe inevitably divisive? 11--13 Richard B. Heeks International perspectives: software strategies in developing countries . . . 15--20 Diane Crawford and Jason Steffler and Jane D. Bernstein and John Chapin and David M. Rockwell and Kenneth Bell Forum: Don't Forget the Intangibles in Improving Software Inspections; OO Programming; Licensing a Unique Field 21--22 Wei-Lung Wang Viewpoint: Information in the Information Age . . . . . . . . . . . . 23--24 Barbara Simons From the President: Melissa's Message 25--26 Milton Mueller Emerging Internet infrastructures worldwide . . . . . . . . . . . . . . . 28--30 Ben Petrazzini and Mugo Kibati The Internet in developing countries . . 31--36 Robert B. Cohen Moving toward a non-U.S.-centric international Internet . . . . . . . . . 37--40 Milton Mueller Commentary: ICANN and Internet regulation . . . . . . . . . . . . . . . 41--43 Zixiang (Alex) Tan and William Foster and Seymour Goodman China's state-coordinated Internet infrastructure . . . . . . . . . . . . . 44--52 P. K. Agarwal Building India's national Internet backbone . . . . . . . . . . . . . . . . 53--58 Mugo Kibati and Donyaprueth Krairit The wireless local loop in developing regions . . . . . . . . . . . . . . . . 60--66 Jon A. Peha Lessons from Haiti's Internet development . . . . . . . . . . . . . . 67--72 Samir Chatterjee and Suzanne Pawlowski All-optical networks . . . . . . . . . . 74--83 Randall D. Beer and Hillel J. Chiel and Richard F. Drushel Using Autonomous Robotics to teach science and engineering . . . . . . . . 85--92 Dennis Tsichritzis Reengineering the University . . . . . . 93--100 Michael E. Whitman and Anthony M. Townsend and Robert J. Aalberts Considerations for an effective telecommunications-use policy . . . . . 101--108 Vicki L. Sauter Intuitive decision-making . . . . . . . 109--115 David S. Wise Changes in ACM's revised copyright policy . . . . . . . . . . . . . . . . . 116--119 A. Michael Noll Technical opinion: does data traffic exceed voice traffic? . . . . . . . . . 121--124 Peter G. Neumann and Declan McCullagh Inside risks: risks of Y2K . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--10 Diane Crawford and Tom DeMarco and Don Bagert and Joel C. Ewing and Hal Berghel and Ken Kashmarek and Hank Walker and Don Unger Forum: Certification or Decertification?; Rule as Myth; Earning Trust; Misleading Numbers; Correction 11--13 Meg McGinity Staying connected: Telecom Act, scene one . . . . . . . . . . . . . . . . . . 15--18 Neil Munro From Washington: Infowar: AK-47s, lies, and videotape . . . . . . . . . . . . . 19--22 Scott Tilley On site: the need for speed . . . . . . 23--26 John Gallaugher Viewpoint: challenging the new conventional wisdom of net commerce strategies . . . . . . . . . . . . . . . 27--29 Brajendra Panda and Joseph Giordano Defensive information warfare . . . . . 30--32 Shiu-Kai Chin High-confidence design for security: don't trust --- verify . . . . . . . . . 33--37 Anup K. Ghosh and Jeffrey M. Voas Inoculating software for survivability 38--44 Terrance Goan A cop on the beat: collecting and appraising intrusion evidence . . . . . 46--52 Robert Durst and Terrence Champion and Brian Witten and Eric Miller and Luigi Spagnuolo Testing and evaluating computer intrusion detection systems . . . . . . 53--61 Matthew Stillerman and Carla Marceau and Maureen Stillman Intrusion detection for distributed applications . . . . . . . . . . . . . . 62--69 Sushil Jajodia and Catherine D. McCollum and Paul Ammann Trusted recovery . . . . . . . . . . . . 71--75 Jim Waldo The Jini architecture for network-centric computing . . . . . . . 76--82 David Plummer and Larry J. Dalton and Frank Peter The recodable locking device . . . . . . 83--87 Janice C. Sipior and Burke T. Ward The dark side of employee email . . . . 88--95 Ned Kock A case of academic plagiarism . . . . . 96--104 Peter G. Neumann Inside risks: information is a double-edged sword . . . . . . . . . . . 120--120
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--10 Diane Crawford and Leon Kappelman and Ken Mandefrot and Chuck Crawford and Dennis E. Hamilton and Orville E. Wheeler and Albert L. LeDuc and Max Hailperin and Michael E. Whitman and Anthony M. Townsend and Robert J. Aalberts and Charles Hixson and Daniel Berdichevsky and Erik Neunschwander and Bength Klenbergs and Linux Torvalds Forum: The Folly of Laws Limiting Y2K Liability; Regarding Glass; Duly Noted; Persuasive Technologies; Linux Goal . . 11--15 Diane Crawford Correction: Richard Heeks' Column . . . 15--15 Robert L. Glass Practical programmer: buzzwordism and the epic \$150 million software debacle 17--19 Elliot Soloway and Wayne Grant and Robert Tinger and Jeremy Roschelle and Mike Mills and Mitchell Resnick and Robbie Berg and Mike Eisenberg Log on education: science in the palms of their hands . . . . . . . . . . . . . 21--26 Andrew Rosenbloom Toward an image indistinguishable from reality . . . . . . . . . . . . . . . . 28--30 Demetri Terzopoulos Artificial life for computer graphics 32--42 Donald P. Greenberg A framework for realistic image synthesis . . . . . . . . . . . . . . . 44--53 George W. Fitzmaurice and Ravin Balakrisnan and Gordon Kurtenbach Sampling, synthesis, and input devices 54--63 Norman I. Badler and Martha S. Palmer and Rama Bindiganavale Animation control for real-time virtual humans . . . . . . . . . . . . . . . . . 64--73 J. Kenneth Salisbury, Jr. Making graphics physically tangible . . 74--81 Steve Bryson and David Kenwright and Michael Cox and David Ellsworth and Robert Haimes Visually exploring gigabyte data sets in real time . . . . . . . . . . . . . . . 82--90 Surendra N. Singh and Nikunj P. Dalal Web home pages as advertisements . . . . 91--98 David Ebert and Edward Bedwell and Stephen Maher and Laura Smoliar and Elizabeth Downing Realizing $3$D visualization using grossed-beam volumetric displays . . . . 100--107 Richard G. Vedder and Michael T. Vanecek and C. Stephen Guynes and James J. Cappel CEO and CIO perspectives on competitive intelligence . . . . . . . . . . . . . . 108--116 Duane P. Truex and Richard Baskerville and Heinz Klein Growing systems in emergent organizations . . . . . . . . . . . . . 117--123 Rachid Guerraoui and Mohamed E. Fayad Thinking objectively: object-oriented abstractions for distributed programming 125--127 Bruce Schneier Inside risks: the uses and abuses of biometrics . . . . . . . . . . . . . . . 136--136
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--10 Diane Crawford and Bob Quinn and Daniel Dulitz and Andrew Odlyzko and Kerry Coffman and Michael Noll and James E. Harvey and Misha Vaughan Forum: Voice and Data Traffic Jam; Buying New PCs; ACM's Copyright Policy 11--15 Robert Durst and Terrence Champion and Eric Miller and Luigi Spagnuolo and Brian Witten Forum: Addendum to ``Testing and evaluating computer intrusion detection systems'' . . . . . . . . . . . . . . . 15--15 Pamela Samuelson Legally speaking: why the anticircumvention regulations need revision . . . . . . . . . . . . . . . . 17--21 William K. McHenry International perspectives: Y2K international status and opportunities 23--27 Vir V. Phoha Viewpoint: Can a Course Be Taught Entirely Via Email? . . . . . . . . . . 29--30 Jonathan W. Palmer and Lars Bo Eriksen Digital newspapers explore marketing on the Internet . . . . . . . . . . . . . . 32--40 Stewart Robertson and Philip Powell Exploiting the benefits of Y2K preparation . . . . . . . . . . . . . . 42--48 Rachna Dhamija and Rachelle Heller and Lance J. Hoffman Teaching e-commerce to a multidisciplinary class . . . . . . . . 50--55 Alok Gupta and Dale O. Stahl and Andrew B. Whinston The economics of network management . . 57--63 R. Ramesh and Dee H. Andrews Distributed mission training: teams, virtual reality, and real-time networking . . . . . . . . . . . . . . . 64--67 Lynn A. Carroll Multimodal integrated team training . . 68--71 Herbert H. Bell The effectiveness of distributed mission training . . . . . . . . . . . . . . . . 72--78 Judith S. Dahmann and James O. Calvin and Richard M. Weatherly A reusable architecture for simulations 79--84 Philipp W. Peppler and Steve Stephens Image generation systems in virtual training platforms . . . . . . . . . . . 85--88 Peter Crane Implementing distributed mission training . . . . . . . . . . . . . . . . 90--94 Eric W. Tatham Technical opinion: getting the best of both real and virtual worlds . . . . . . 96--98 Bruce Schneier Inside risks: the Trojan horse race . . 128--128
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--10 Diane Crawford and Saul I. Gass and Rommert J. Casimir and Adrian Bowyer and Anonymous and Glen Henshaw and Scott M. Brown and William Adams Forum: Solving the Plagiarism Problem; The Limits of LEGOs; What About Information Dominance Warfare?; The Licensing Issue . . . . . . . . . . . . 11--14 Neil Munro From Washington: the ongoing tug-of-war for e-commerce control . . . . . . . . . 17--20 Larry Press Personal computing: the post-PC era . . 21--24 Barbara Simons From the President: The Heroes Among Us 25, 112 Grady Booch UML in action . . . . . . . . . . . . . 26--28 Cris Kobryn UML 2001: a standardization odyssey . . 29--37 Grant Larsen Designing component-based frameworks using patterns in the UML . . . . . . . 38--45 Bran Selic Turning clockwise: using UML in the real-time domain . . . . . . . . . . . . 46--54 Alex E. Bell and Ryan W. Schmidt UMLoquent expression of AWACS software design . . . . . . . . . . . . . . . . . 55--61 Jim Conallen Modeling Web application architectures with UML . . . . . . . . . . . . . . . . 63--70 Micheal A. Cusumano and David B. Yoffie What Netscape learned from cross-platform software development . . 72--78 Michael Mattsson and Jan Bosch and Mohamed E. Fayad Framework integration problems, causes, solutions . . . . . . . . . . . . . . . 80--87 Tessa Lau and Oren Etzioni and Daniel S. Weld Privacy interfaces for information management . . . . . . . . . . . . . . . 88--94 Håkon Wium Lie and Janne Saarela Multipurpose Web publishing using HTML, XML, and CSS . . . . . . . . . . . . . . 95--101 Don Gotterbarn and Keith Miller and Simon Rogerson Software engineering code of ethics is approved . . . . . . . . . . . . . . . . 102--107 Lutz Prechelt Technical opinion: comparing Java vs. C/C++ efficiency differences to interpersonal differences . . . . . . . 109--112 Bruce Schneier Inside risks: Risks of relying on cryptography . . . . . . . . . . . . . . 144--144
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News Track . . . . . . . . . . . . . . . 9--10 Hal Berghel Digital village: the cost of having analog executives in a digital world . . 11--15 Robert L. Glass Evolving a new theory of project success 17--19 Diane Crawford and Dino Mandrioli and Paul Zeiger and Dan Chisham and Mark Wallace and Ralph E. Johnson and Robert Glass and Robert A. Ellis and Myles Losch and Scott Tilley Forum: Software Project Failure Lessons Learned; More Powerful Internet Connections . . . . . . . . . . . . . . 21--24 Toshinori Munakata Knowledge discovery . . . . . . . . . . 26--29 Tom M. Mitchell Machine learning and data mining . . . . 30--36 Raúl E. Valdés-Pérez Discovery tools for science apps . . . . 37--41 Stephen Muggleton Scientific knowledge discovery using inductive logic programming . . . . . . 42--46 LiMin Fu Knowledge discovery based on neural networks . . . . . . . . . . . . . . . . 47--50 Kenneth A. De Jong Evolutionary computation for discovery 51--53 Wojciech Ziarko Discovery through rough set theory . . . 54--57 Kevin Knight Mining online text . . . . . . . . . . . 58--61 Steffen Schulze-Kremer Discovery in the human genome project 62--64 Murray Campbell Knowledge discovery in deep blue . . . . 65--67 Ravi Ganesan The messyware advantage: the precipitous rise of the middleman . . . . . . . . . 68--73 Sharon Oviatt Ten myths of multimodal interaction . . 74--81 George S. Nezlek and Hemant K. Jain and Derek L. Nazareth An integrated approach to enterprise computing architectures . . . . . . . . 82--90 Dawn G. Gregg and Michael Goul A proposal for an open DSS protocol . . 91--96 Pascal Felber and Rachid Guerraoui and Mohamed E. Fayad Putting OO distributed programming to work . . . . . . . . . . . . . . . . . . 97--101 Peter G. Neumann and Lauren Weinstein Inside risks: risks of content filtering 152--152
Diane Crawford Editorial pointers . . . . . . . . . . . 5--5 Robert Fox News track . . . . . . . . . . . . . . . 9--10 Diane Crawford and Peter Revesz and Philip Gilbert and S. W. Ng Forum: Reengineering the University . . 11--13 Mike Godwin From Washington: net to worry . . . . . 15--17 Meg McGinity Staying connected: flying wireless, with a net . . . . . . . . . . . . . . . . . 19--21 Patrick Walsh and Adamantios Koumpis On site: the Esprit ATLAS project . . . 23--26 Amr El-Kadi Viewpoint: stop that divorce! . . . . . 27--28 Dennis J. Frailey Licensing software engineers . . . . . . 29--30 Steven Bellman and Gerald L. Lohse and Eric J. Johnson Predictors of online buying behavior . . 32--38 Anne Adams and Martina Angela Sasse Users are not the enemy . . . . . . . . 40--46 William H. Dutton and Anita Elberse and Matthew Hale A case study of a Netizen's guide to elections . . . . . . . . . . . . . . . 48--54 Kai R. T. Larsen Voting technology implementation . . . . 55--57 Richard T. Watson and Sigmund Akselsen and Benete Evjemo and Nils Aarsæther Teledemocracy in local government . . . 58--63 Magid Igbaria The driving forces in the virtual society . . . . . . . . . . . . . . . . 64--70 Hilda Tellio\uglu and Ina Wagner Software cultures . . . . . . . . . . . 71--77 Pearl Brereton and David Budgen and Keith Bennnett and Malcolm Munro and Paul Layzell and Linda MaCaulay and David Griffiths and Charles Stannett The future of software . . . . . . . . . 78--84 Fay Cobb Payton and Patricia Flatley Brennan How a community health information network is really used . . . . . . . . . 85--89 Frank Cuccias Are we ready?: the FAA's Y2K preparedness . . . . . . . . . . . . . . 91--92 Leon A. Kappelman Are we ready?: risk, reality, and readiness . . . . . . . . . . . . . . . 93--94 Peter G. Neumann Inside risks: risks of insiders . . . . 160--160
James F. Blinn Jim Blinn's Corner: Fugue for MMX . . . 88--93
Donald E. Knuth and J. H. Morris and V. R. Pratt Fast pattern matching in strings . . . . 323--350