acm-header
Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: Editorial pointers

Editorial Pointers


DEPARTMENT: News track

News Track


DEPARTMENT: Forum

Forum


COLUMN: Digital village

The Discipline of Internet Forensics

A well-defined field of study and practice has evolved as a result of network hacker activity.
COLUMN: Practical programmer

A Mugwump's-Eye View of Web Work

Choosing a point of entry into a contemporary software development debate.
COLUMN: Viewpoint

Discovery Informatics


Voting and Technology: Who Gets to Count Your Vote?

Paperless voting machines threaten the integrity of democratic process by what they don't do.
SPECIAL ISSUE: Software techniques for program compaction

Introduction


Extracting Library-Based Java Applications

Reducing the size of Java applications by creating an application extractor.

Post-Pass Compaction Techniques

Seeking to resolve many of the problems related to code size in traditional program development environments.

Mixed-Width Instruction Sets

Encoding a program's computations to reduce memory and power consumption without sacrificing performance.

Cold Code Decompression at Runtime

Using a software-based technique to dynamically decompress selected code fragments during program execution.

Grammar-Based Compression of Interpreted Code

Automatically designing and implementing compact interpretable bytecodes.

Risks and Challenges of Component-Based Software Development

Component developers, application assemblers, and customers must all know CBSD advantages and disadvantages before developing components and component-based applications.

How Cios Manage Their Superiors' Expectations

Survival of the chief information officer isn't easy. It takes a keen sense of what the boss anticipates from IT projects as well as a diplomatic understanding of what the boss really does---and does not---know about IT.

-Understanding Email Interaction Increases Organizational Productivity

To minimize the effect of email interruption on employee productivity, limit the frequency of new-email alerts (silence them, too), make it easier to assess each message's importance, and remove the reply-to-all facility.

Relationship Quality: the Undervalued Dimension of Software Quality

Software service firms that want to win more business, generate referrals, and ensure timely payment of their bills manage the quality of their client relationships, not just of the systems they develop.

Enemy at the Gate: Threats to Information Security

A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.

How a Silver Bullet May Lose its Shine

One of the best ways to realize the potential of group support systems is to learn from its failed implementations.

Analyzing the Application Asp Concept: Technologies, Economies, and Strategies

The application service provider model can realize economies of scale in managing hardware, software, and personnel resources, but this new concept also introduces uncertainty as it redistributes responsibilities among organizations …

Software Reuse Strategies and Component Markets

Black-box reuse with component markets could be the silver bullet solution that makes software reuse a reality, and advances software development to a robust industrial process---but only if market makers address the growing …

Cmm in Uncertain Environments

Injecting ancient Chinese philosophy into modern science and technology provides a unique perspective on uncertainty and rapid change.
COLUMN: Technical opinion

Third Generation and Beyond Wireless Systems

Exploring the capabilities of increased data transmission rates.
COLUMN: Inside risks

Spam Wars