DEPARTMENT: Editorial pointers
Diane Crawford
Page 5
DEPARTMENT: News track
ACM Staff
Pages 9-10
DEPARTMENT: Forum
Diane Crawford
Pages 11-13
COLUMN: Digital village
A well-defined field of study and practice has evolved as a result of network hacker activity.
Hal Berghel
Pages 15-20
COLUMN: Practical programmer
Choosing a point of entry into a contemporary software development debate.
Robert L. Glass
Pages 21-23
COLUMN: Viewpoint
William W. Agresti
Pages 25-28
Paperless voting machines threaten the integrity of democratic process by what they don't do.
David L. Dill, Bruce Schneier, Barbara Simons
Pages 29-31
SPECIAL ISSUE: Software techniques for program compaction
Bjorn De Sutter, Koen De Bosschere
Pages 32-34
Reducing the size of Java applications by creating an application extractor.
Frank Tip, Peter F. Sweeney, Chris Laffra
Pages 35-40
Seeking to resolve many of the problems related to code size in traditional program development environments.
Bruno De Bus, Daniel Kästner, Dominique Chanet, Ludo Van Put, Bjorn De Sutter
Pages 41-46
Encoding a program's computations to reduce memory and power consumption without sacrificing performance.
Arvind Krishnaswamy, Rajiv Gupta
Pages 47-52
Using a software-based technique to dynamically decompress selected code fragments during program execution.
Saumya Debray, William S. Evans
Pages 54-60
Automatically designing and implementing compact interpretable bytecodes.
William S. Evans, Christopher W. Fraser
Pages 61-66
Component developers, application assemblers, and customers must all know CBSD advantages and disadvantages before developing components and component-based applications.
Padmal Vitharana
Pages 67-72
Survival of the chief information officer isn't easy. It takes a keen sense of what the boss anticipates from IT projects as well as a diplomatic understanding of what the boss really does---and does not---know about IT.
Richard E. Potter
Pages 74-79
To minimize the effect of email interruption on employee productivity, limit the frequency of new-email alerts (silence them, too), make it easier to assess each message's importance, and remove the reply-to-all facility.
Thomas W. Jackson, Ray Dawson, Darren Wilson
Pages 80-84
Software service firms that want to win more business, generate referrals, and ensure timely payment of their bills manage the quality of their client relationships, not just of the systems they develop.
Bruce Russell, Sangit Chatterjee
Pages 85-89
A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.
Michael E. Whitman
Pages 91-95
One of the best ways to realize the potential of group support systems is to learn from its failed implementations.
Gert-Jan de Vreede, Robert M. Davison, Robert O. Briggs
Pages 96-101
The application service provider model can realize economies of scale in managing hardware, software, and personnel resources, but this new concept also introduces uncertainty as it redistributes responsibilities among organizations …
Kenneth R. Walsh
Pages 103-107
Black-box reuse with component markets could be the silver bullet solution that makes software reuse a reality, and advances software development to a robust industrial process---but only if market makers address the growing …
T. Ravichandran, Marcus A. Rothenberger
Pages 109-114
Injecting ancient Chinese philosophy into modern science and technology provides a unique perspective on uncertainty and rapid change.
Zhou Zhiying
Pages 115-119
COLUMN: Technical opinion
Exploring the capabilities of increased data transmission rates.
P. Nicopolitidis, G. I. Papadimitriou, M. S. Obaidat, A. S. Pomportsis
Pages 120-124
COLUMN: Inside risks
Lauren Weinstein
Page 136