DEPARTMENT: Editorial pointers
Diane Crawford
Page 5
DEPARTMENT: News track
CACM Staff
Pages 9-10
DEPARTMENT: Forum
Pages 11-13
COLUMN: The business of software
Seeking solid information on the behavior of modern projects.
Phillip G. Armour
Pages 15-17
COLUMN: Staying connected
Service providers are building their networks right to your door---that is, your den, your bedroom, and your kitchen.
Meg McGinity Shannon
Pages 19-21
DEPARTMENT: Hot links
Pages 23-24
COLUMN: Viewpoint
Give instructors the option of turning off wireless Web access to accommodate their students' learning styles, in some cases to save them from themselves.
Dennis Adams
Pages 25-27
SPECIAL ISSUE: Privacy and security in highly dynamic systems
GÜnter MÜller
Pages 28-31
Enabling novel ways to personalize the relationship with customers without sacrificing their privacy.
Stefan Sackmann, Jens StrÜker, Rafael Accorsi
Pages 32-38
Using a server-side architecture to connect specialized enforcement mechanisms with usage control requirements and policies.
Alexander Pretschner, Manuel Hilty, David Basin
Pages 39-44
Using hardware- and software-based techniques to realize a primitive for externally verifiable code execution.
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep Khosla
Pages 45-49
Cryptographic long-term security is needed, but difficult to achieve. Use flexible cryptographic tools, and have replacements ready.
Johannes Buchmann, Alexander May, Ulrich Vollmer
Pages 50-55
Using a process modeling-based approach to address privacy and related legal issues arising in an RFID-based augmented reality shopping situation.
Brian Subirana, Malcolm Bain
Pages 57-62
COLUMN: A Wiki for discussing and promoting best practices in research
Dealing with the demands of escalating paper submissions is a daunting challenge for conference organizers and program chairs. ACM and IEEE have joined forces to create a forum for sharing ideas on the best ways to handle it …
Mark D. Hill, Jean-Luc Gaudiot, Mary Hall, Joe Marks, Paolo Prinetto, Donna Baglio
Pages 63-64
By applying well-known principlesof intellectual property valuation,sales expectations, growth of maintained software, discounting to present value, and the like, a method is presented for valuingsoftware based on the income …
Gio Wiederhold
Pages 65-75
Sifting through vast collections of unstructured or semistructured data beyond the reach of data mining tools, text mining tracks information sources, links isolated concepts in distant documents, maps relationships between activities …
Weiguo Fan, Linda Wallace, Stephanie Rich, Zhongju Zhang
Pages 76-82
It limits the damage a virus can do by using the operating system's own security mechanisms to enforce the Principle of Least Authority on individual applications.
Marc Stiegler, Alan H. Karp, Ka-Ping Yee, Tyler Close, Mark S. Miller
Pages 83-88
Mobile content creators and service providers can leverage users' desire to be unique to expand revenue.
Se-Joon Hong, Kar Yan Tam, Jinwoo Kim
Pages 89-94
Three Asian economic heavyweights---China, Japan, and South Korea---join IT forces.
Bongsug (Kevin) Chae, Roger McHaney
Pages 95-99
COLUMN: Inside risks
Peter G. Neumann
Page 112