Sciweavers

CACM
2004
87views more  CACM 2004»
13 years 7 months ago
Questioning lawful access to traffic data
- After some successes and many mis-steps, the regulatory environment surrounding technology policy is transforming. Lessons taken from content, copyright, and cryptography policy ...
Alberto Escudero-Pascual, Ian Hosein
CACM
2004
50views more  CACM 2004»
13 years 7 months ago
Network laws
Peter J. Denning
CACM
2004
102views more  CACM 2004»
13 years 7 months ago
The field of programmers myth
s (theory, abstraction, and design) [2]. They put programming as a subpart of the design component of most of the nine areas, especially algorithms and software engineering. Their ...
Peter J. Denning
CACM
2004
45views more  CACM 2004»
13 years 7 months ago
The social life of innovation
Peter J. Denning
CACM
2004
109views more  CACM 2004»
13 years 7 months ago
A model for evaluating IT security investments
Huseyin Cavusoglu, Birendra Mishra, Srinivasan Rag...
CACM
2004
59views more  CACM 2004»
13 years 7 months ago
Unspoken rules of spoken interaction
Timothy W. Bickmore