DEPARTMENT: Editorial pointers
Diane Crawford
Page 5
DEPARTMENT: News track
CACM staff
Pages 9-10
DEPARTMENT: Forum
Diane Crawford
Pages 11-13
COLUMN: The business of software
Challenges in estimating software scope by effort.
Phillip G. Armour
Pages 15-18
COLUMN: Legally speaking
Considering three important reforms to improve the current system.
Pamela Samuelson
Pages 19-23
COLUMN: Viewpoint
Practically every computer linked to the Internet is constantly being scanned for security vulnerabilities and targeted for attack by viruses, worms, and worse.
Stephen Lau
Pages 25-26
COLUMN: On Site
A leading pharmaceutical company discovers how programming issues are resolved more effectively when a team approach is employed.
Allan Glaser, Snow Fu, Mark Tumelty
Pages 27-29
SPECIAL ISSUE: Wireless sensor networks
Thousands of tiny low-power devices spread over large physical spaces collaboratively monitor the environment, guide vehicles, and predict potential faults in buildings, bridges, roads, and rails.
David E. Culler, Wei Hong
Pages 30-33
These networks deliver to ecologists data on localized environmental conditions at the scale of individual organisms to help settle large-scale land-use issues affecting animals, plants, and people.
Robert Szewczyk, Eric Osterweil, Joseph Polastre, Michael Hamilton, Alan Mainwaring, Deborah Estrin
Pages 34-40
All emphasize low-cost components operating on shoestring power budgets for years at a time in potentially hostile environments without hope of human intervention.
Jason Hill, Mike Horton, Ralph Kling, Lakshman Krishnamurthy
Pages 41-46
Networking and query processing must be co-designed to allow data self-organization for flexible but efficient in-network storage, access, and processing.
Alec Woo, Sam Madden, Ramesh Govindan
Pages 47-52
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
Adrian Perrig, John Stankovic, David Wagner
Pages 53-57
Email marketing is an excellent, low-cost way to reach consumers, but spammers are currently looting much of its potential. The challenge is to develop an email marketing process that is consensual, efficient, and constitutional …
Janice C. Sipior, Burke T. Ward, P. Gregory Bonner
Pages 59-63
When there's a worldwide marketplace available at your customers' fingertips, maintaining a dedicated following is a tremendous challenge. A recent study of a leading bank's online services illustrates what it takes to keep novice …
Banphot Vatanasombut, Antonis C. Stylianou, Magid Igbaria
Pages 64-70
Business models designed specifically for the mobile arena are reshaping the industry. But each model has unique advantages and disadvantages---potential adopters should take care in choosing among them.
Clayton A. Looney, Leonard M. Jessup, Joseph S. Valacich
Pages 71-77
Personality type analysis can help take the guesswork out of putting together a high-performance software project team.
Narasimhaiah Gorla, Yan Wah Lam
Pages 79-82
Examining the changing organizational alignment in colleges of computer and information technology.
Hal Berghel, David L. Sallach
Pages 83-88
Comparing the topics and methods of the three major subdivisions of the computing realm.
Robert L. Glass, V. Ramesh, Iris Vessey
Pages 89-94
How did Singapore manage to get most of its public services deliverable online?
Weiling Ke, Kwok Kee Wei
Pages 95-99
COLUMN: Technical opinion
An appeal for more extensive expression and understanding.
Hartmut Wedekind, Erich Ortner
Pages 101-104
COLUMN: Inside risks
Peter G. Neumann
Page 112