Referencias Analíticas
*
Why Did Your Project Fail?
Cerpa, Narciso
; Verner, June M.
pp. 130-134
|
*
What DNS Is Not
Vixie, Paul
pp. 43-47
|
*
Visual Passwords: Cure-All or Snake-Oil?
Renaud, Karen
; De Angeli, Antonella
pp. 35-140
|
*
ThinSight: A Thin Form-Factor Interactive Surface Technology
Izadi, Shahram
; Buxton, William
; Hodges, Steve
; Butler, Alex
; West, Darren
; Rrustemi, Alban
; Molloy, Mike
pp. 90-98
|
*
The Bulk Multicore Architecture for Improved Programmability
Torrellas, Josep
; Montesinos, Pablo
; Ceze, Luis
; Tuck, James
; Cascaval, Calin
; Ahn, Wonsun
; Prvulovic, Milos
pp. 58-65
|
*
Security in Dynamic Web Content Management Systems Applications
Vaidyanathan, Ganesh
; Mautone, Steven
pp. 121-125
|
*
Ready for a Web OS?
Wright, Alex
pp. 18-19
|
*
Puzzled: Solutions and Sources
Winkler, Peter
p. 111
|
*
Problem Solvers
Hoffmann, Leah
p. 20
|
*
Power and Trust in Global Virtual Teams
Panteli, Niki
; Tucker, Robert
pp.
|
*
Power and Trust in Global Virtual Teams
Panteli, Niki
; Tucker, Robert
pp. 113-115
|
*
Positive Externality, Increasing Returns, and the Rise in Cybercrimes
Kshetri, Nir
pp. 141-144
|
*
Opening Remarks
Ladner, Richard E
pp. 22-24
|
*
Online Privacy, Government Surveillance and National ID Cards
Lim, Sun Sun
; Cho, Hichang
; Rivera Sanchez, Milagros
pp. 116-120
|
*
Mightier Than the Pen
Haldeman, Joe
pp. 112
|
*
Maximizing Power Efficiency with Asymmetric Multicore Systems
Fedorova, Alexandra
; Saez, Juan Carlos
; Shelepov, Daniel
; Prieto, Manuel
pp. 48-57
|
*
Making Automation Work
Greengard, Samuel
pp. 18-19
|
*
Making Automation Work
Greengard, Samuel
pp. 18-19
|
*
It is a Pivotal Time for K-12 Computer Science
Stephenson, Chris
p. 5
|
*
Israel's Technology Industry as an Economic Growth Engine
Berry, Orna
; Grayeff, Yigal
pp. 25-27
|
*
In the Virtual Extension
Communications of the ACM
p. 11
|
*
In CS Education, Educate the Educators First
Communications of the ACM
pp. 6-7
|
*
Designing Plush Toys With a Computer
Igarashi, Yuki
; Igarashi, Takeo
pp. 81-88
|
*
Design Tools for the Rest of Us
Landay, James A.
p. 80
|
*
CS Woes: Deadline-Driven Research, Academic Inequality
Wing, Jeannette M.
; Guzdial, Mark
pp. 8-9
|
*
Crowdsourcing and the Question of Expertise
Roman, David
p. 12
|
*
Computer Science in the Conceptual Age
Zyda, Michael
pp. 66-72
|
*
Computer Games and Traditional CS Courses
Sung, Kelvin
pp. 74-78
|
*
Broken Builds
Neville-Neil, George V.
; Freeman, Peter A.
pp. 31-32
|
*
Broken Builds
Neville-Neil, George V.
pp. 31-32
|
*
Blueprints for Self-Assembly
Anthes, Gary
pp. 13-15
|
*
Assessing Open Source Software as a Scholarly Contribution
Hafer, Lou
; Kirkpatrick, Arthur E.
pp. 126-129
|
*
Are Employees Putting Your Company At Risk By Not Following Information Security Policies?
Siponen, Mikko
; Mahmood,, M. Adam
; Pahnila, Seppo
pp. 145-147
|
*
A Threat Analysis of RFID Passports
Ramos, Alan
; Waldo, Jim
; Scott , William
; Lloyd, , Doug
; O'Leary, Katherine
pp. 38-42
|
*
A Graphical Sense of Touch
Hanrahan, Pat
pp. 89
|
*
A 'Smart' Cyberinfrastructure for Research
Parastatidis, Savas
; Viegas, Evelyne
; Hey, Tony
pp. 33-37
|
|