In my first column (
Communications, Apr. 1990) I discussed computer security in the business world. I remarked that whereas the military had always attached great importance to security, business managers regarded it as yet another …
Maurice V. Wilkes
Pages 19-21
I have lived most of my life in a small Wyoming town, where there is little of the privacy which both insulates and isolates suburbanites. Anyone in Pinedale who is interested in me or my doings can get most of that information …
John Perry Barlow
Pages 23-25
This special section is the outgrowth of a workshop on real-time knowledge-based control systems, held during the 1990 national conference of the American Association for Artificial Intelligence (AAAI). The workshop was motivated …
Marcel Schoppers
Pages 26-30
B. Chandrasekaran, R. Bhatnager, D. D. Sharma
Pages 32-47
David W. Payton, Thomas E. Bihari
Pages 49-63
Wolf Kohn
Pages 64-79
C. J. Paul, Anurag Acharya, Bryan Black, Jay K. Strosnider
Pages 80-93
Database management systems are powerful tools for processing large volumes of structured, or normalized, data. Much of the data to be stored in computer systems, however, differs from normalized data in both its
logical uses …
Jeffrey Kottemann, Michael Gordon, Jack Stott
Pages 94-103
Alan M. Davis, Edward H. Bersoff
Pages 104-118
What is the appropriate role of computer professionals in determining how their work is used? Should they consider the societal implications of their work?
Ronni Rosenberg
Page 146