Diane Crawford
pág. 5
págs. 9-10
pág. 9
pág. 9
pág. 10
pág. 10
pág. 10
The Discipline of Internet Forensics
Hal Berghel
págs. 15-20
A Mugwump's-Eye View of Web Work
Robert L. Glass
págs. 21-23
William W. Agresti
págs. 25-28
Voting and Technology: Who Gets to Count Your Vote?
Bruce Schneier, Barbara Simons, David L. Dill
págs. 29-31
Software techniques for program compaction
Bjorn De Sutter, Koen De Bosschere
págs. 32-34
Extracting library-based Java applications
Chris Laffra, Peter F. Sweeney, Frank Tip
págs. 35-40
Post-pass compaction techniques
Ludo Van Put, Bjorn De Sutter, Dominique Chanet, Daniel Kästner, Bruno De Bus
págs. 41-46
Rajiv Gupta, Arvind Krishnaswamy
págs. 47-52
Cold code decompression at runtime
Saumya Debray, William S. Evans
págs. 54-60
Grammar-based compression of interpreted code
William S. Evans, Christopher W. Fraser
págs. 61-66
Risks and challenges of component-based software development
Padmal Vitharana
págs. 67-72
How CIOs manage their superiors' expectations
Richard E. Potter
págs. 74-79
Understanding email interaction increases organizational productivity
Thomas W. Jackson, Ray Dawson, Darren Wilson
págs. 80-84
Relationship quality: the undervalued dimension of software quality
Bruce Russell, Sangit Chatterjee
págs. 85-89
Enemy at the gate: threats to information security
Michael E. Whitman
págs. 91-95
How a silver bullet may lose its shine
Gert-Jan De Vreede, Robert M. Davison, Robert O. Briggs
págs. 96-101
págs. 103-107
Software reuse strategies and component markets
Marcus A. Rothenberger, T. Ravichandran
págs. 109-114
págs. 115-119
Third Generation and Beyond Wireless Systems
M.S. Obaidat, G.I. Papadimitriou, A.S. Pomportsis, P. Nicopolitidis
págs. 120-124
Lauren Weinstein
pág. 136
© 2001-2024 Fundación Dialnet · Todos los derechos reservados