Page 5
Robert Fox
Pages 9-10
Pages 11-15
Privacy is lost in the proliferation of technology's omnipresent accessibility.
Hal Berghel
Pages 17-21
The information age has generated its fair share of new statutes, some of which may be considered criminal.
Andrew Grosso
Pages 23-26
Are we dealing with an autonomous virtual realm or merely with an aspect of the mental realm?
F. Castel
Pages 27-28
Why the ACM Council does not support the licensing of software engineers at this time.
Fran Allen, Paula Hawthorn, Barbara Simons
Page 29
Imagine waking in the morning, turning on your interactive TV, and being greeted by your intelligent news agent. Your agent has spent the night digitizing, segmenting, indexing, extracting, translating, and summarizing the world's …
Mark Maybury
Pages 32-34
Deconstructing broadcast news using all sources of input from the multimedia stream.
Stanley Boykin, Andrew Merlino
Pages 35-41
Increasing the usefulness of extracted information.
Howard D. Wactlar, Alexander G. Hauptmann, Michael G. Christel, Ricky A. Houghton, Andreas M. Olligschlaeger
Pages 42-47
Transcribing speech and making it ready for browsing.
Francis Kubala, Sean Colbath, Daben Liu, Amit Srivastava, John Makhoul
Pages 48-56
Combining technologies to achieve performance exceeding the sum of the parts.
CORPORATE The SRI MAESTRO Team
Pages 57-63
Automatically keeping up-to-date with rapidly changing news broadcasts.
Jean-Luc Gauvain, Lori Lamel, Gilles Adda
Pages 64-70
Developing a system for close-captioning and automatic information extraction for Japanese broadcast news speech.
Sadaoki Furui, Katsutoshi Ohtsuki, Zhi-Peng Zhang
Pages 71-73
How the National Institute of Standards and Technology provides a basis for evaluating these novel systems.
David S. Pallett, John S. Garofolo, Jonathan G. Fiscus
Pages 75-79
Strategic motivations range from adding local access to long-distance services, to sewing up millions of new customers, to claiming a piece of a potentially hot new technology.
Varun Grover, Pradeep Vaswani
Pages 80-89
When it comes to working biometric identification technologies, it's not only our fingerprints that do the talking. Now, our eyes, hands, signature, speech, and even facial temperature can ID us.
Anil Jain, Lin Hong, Sharath Pankanti
Pages 90-98
IT managers commiserate over the challenges of convincing senior executives that, contrary to popular belief, outsourcing isn't always a money-saving option.
Rudy Hirschheim, Mary Lacity
Pages 99-107
Need to decide whether developing a Web site or service is worth the financial investment and the trouble? Use this model to calculate the payoff. And get in (at the right level) while you can.
Kai R. T. Larsen, Peter A. Bloniarz
Pages 109-116
David Gillibrand
Pages 117-119
Carl Ellison, Bruce Schneier
Pages 152-R