Sciweavers

CACM
2004
87views more  CACM 2004»
13 years 11 months ago
Questioning lawful access to traffic data
- After some successes and many mis-steps, the regulatory environment surrounding technology policy is transforming. Lessons taken from content, copyright, and cryptography policy ...
Alberto Escudero-Pascual, Ian Hosein
CACM
2004
50views more  CACM 2004»
13 years 11 months ago
Network laws
Peter J. Denning
CACM
2004
102views more  CACM 2004»
13 years 11 months ago
The field of programmers myth
s (theory, abstraction, and design) [2]. They put programming as a subpart of the design component of most of the nine areas, especially algorithms and software engineering. Their ...
Peter J. Denning
CACM
2004
45views more  CACM 2004»
13 years 11 months ago
The social life of innovation
Peter J. Denning
CACM
2004
109views more  CACM 2004»
13 years 11 months ago
A model for evaluating IT security investments
Huseyin Cavusoglu, Birendra Mishra, Srinivasan Rag...
CACM
2004
59views more  CACM 2004»
13 years 11 months ago
Unspoken rules of spoken interaction
Timothy W. Bickmore