jo.\*:("Communications of the ACM")
Results 1 to 25 of 2158
Selection :
Cloud Security: A Gathering StormNANAVATI, Mihir; COLP, Patrick; AIELLO, Bill et al.Communications of the ACM. 2014, Vol 57, Num 5, pp 70-79, issn 0001-0782, 10 p.Article
Cryptography Miracles, Secure Auctions, Matching Problem VerificationMICALI, Silvio; RABIN, Michael O.Communications of the ACM. 2014, Vol 57, Num 2, pp 85-93, issn 0001-0782, 9 p.Article
Cyber-Physical TestbedsSIATERLIS, Christos; GENGE, Béla.Communications of the ACM. 2014, Vol 57, Num 6, pp 64-73, issn 0001-0782, 10 p.Article
Domain-Specific Languages and Code Synthesis Using HaskellGILL, Andy.Communications of the ACM. 2014, Vol 57, Num 6, pp 42-49, issn 0001-0782, 8 p.Article
Legally Speaking Watching TV on Internet-Connected DevicesSAMUELSON, Pamela.Communications of the ACM. 2014, Vol 57, Num 7, pp 22-24, issn 0001-0782, 3 p.Article
Mars CodeHOLZMANN, Gerard J.Communications of the ACM. 2014, Vol 57, Num 2, pp 64-73, issn 0001-0782, 10 p.Article
Reducing the Software Value GapPASS, Shimeon; RONEN, Boaz.Communications of the ACM. 2014, Vol 57, Num 5, pp 80-87, issn 0001-0782, 8 p.Article
Scaling Existing Lock-based Applications with Lock ElisionKLEEN, Andi.Communications of the ACM. 2014, Vol 57, Num 3, pp 52-56, issn 0001-0782, 5 p.Article
Speech-To-Speech Translations Stutter, But Researchers See Mellifluous FutureHYMAN, Paul.Communications of the ACM. 2014, Vol 57, Num 4, pp 16-19, issn 0001-0782, 4 p.Article
The Software InfernoBELL, Alex E.Communications of the ACM. 2014, Vol 57, Num 1, pp 48-53, issn 0001-0782, 6 p.Article
Unikernels: The Rise of the Virtual Library Operating SystemMADHAVAPEDDY, Anil; SCOTT, David J.Communications of the ACM. 2014, Vol 57, Num 1, pp 61-69, issn 0001-0782, 9 p.Article
Viewpoint Slow SearchTEEVAN, Jaime; COLLINS-THOMPSON, Kevyn; WHITE, Ryen W et al.Communications of the ACM. 2014, Vol 57, Num 8, pp 36-38, issn 0001-0782, 3 p.Article
Collaboration with a Robotic Scrub NurseGEORGE JACOB, Mithun; LI, Yu-Ting; AKINGBA, George A et al.Communications of the ACM. 2013, Vol 56, Num 5, pp 68-75, issn 0001-0782, 8 p.Article
GPU Ray TracingPARKER, Steven G; FRIEDRICH, Heiko; MCGUIRE, Morgan et al.Communications of the ACM. 2013, Vol 56, Num 5, pp 93-101, issn 0001-0782, 9 p.Article
How Fast is Your Website?MEENAN, Patrick.Communications of the ACM. 2013, Vol 56, Num 4, pp 49-55, issn 0001-0782, 7 p.Article
Kode Vicious Swamped by AutomationNEVILLE-NEIL, George V.Communications of the ACM. 2013, Vol 56, Num 6, pp 33-34, issn 0001-0782, 2 p.Article
Legally Speaking Statutory Damages As a Threat to InnovationSAMUELSON, Pamela.Communications of the ACM. 2013, Vol 56, Num 7, pp 24-26, issn 0001-0782, 3 p.Article
Resolved: The Internet Is No Place for Critical InfrastructureGEER, Dan.Communications of the ACM. 2013, Vol 56, Num 6, pp 48-53, issn 0001-0782, 6 p.Article
Privacy and Security Cybercrime, Cyberweapons, Cyber Wars: Is There Too Much of It in the Air?FILSHTINSKIY, Stas.Communications of the ACM. 2013, Vol 56, Num 6, pp 28-30, issn 0001-0782, 3 p.Article
Strategies for Tomorrow's 'Winners-Take-Some' Digital Goods MarketsKEMERER, Chris F; ZHECHAO LIU, Charles; SMITH, Michael D et al.Communications of the ACM. 2013, Vol 56, Num 5, pp 76-82, issn 0001-0782, 7 p.Article
Technology Strategy and Management The Apple-Samsung LawsuitsCUSUMANO, Michael A.Communications of the ACM. 2013, Vol 56, Num 1, pp 28-31, issn 0001-0782, 4 p.Article
The Business of Software How We Build ThingsARMOUR, Phillip G.Communications of the ACM. 2013, Vol 56, Num 1, pp 32-33, issn 0001-0782, 2 p.Article
The Profession of IT Thumb NumbersDENNING, Peter J.Communications of the ACM. 2013, Vol 56, Num 6, pp 35-37, issn 0001-0782, 3 p.Article
Viewpoint Funding Successful ResearchTHORUP, Mikkel.Communications of the ACM. 2013, Vol 56, Num 3, pp 38-39, issn 0001-0782, 2 p.Article
A Survey of Mobility in Information-Centric NetworksTYSON, Gareth; SASTRY, Nishanth; CUEVAS, Ruben et al.Communications of the ACM. 2013, Vol 56, Num 12, pp 90-98, issn 0001-0782, 9 p.Article