default search action
ACM Queue, Volume 2
Volume 2, Number 1, March 2004
- Richard F. Lyon:
From the Editors: DSP 4 You. 6 - Letters. 7
- News 2.0. 8
- Alexander Wolfe:
Toolkit: Get Your Graphics On: OpenGL Advances with the Times. 10-13 - Robert Broderson:
Interview: A Conversation with Teresa Meng. 14-21 - Book Reviews. 92
- Calendar. 94
- Stan Kelly-Bootle:
Curmudgeon: Damnéd Digits. 95-96
- Gene Frantz, Ray Simar:
Of Processors and Processing. 22-30 - Homayoun Shahri:
On Mapping Alogrithms to DSP Architectures. 32-41 - W. Patrick Hays:
DSPs: Back to the Future. 42-51 - William J. Dally, Ujval J. Kapasi, Brucek Khailany, Jung Ho Ahn, Abhishek Das:
Stream Processors: Progammability and Efficiency. 52-62 - Boris Murmann, Bernhard E. Boser:
Digitally Assisted Analog Integrated Circuits. 64-71
- Alex E. Bell:
Death by UML Fever. 72-80 - Laury Verner:
BPM: The Promise and the Challenge. 82-91
Volume 2, Number 2, April 2004
- Edward Grossman:
From the Editors: Search - An Enterprising Affair. 6 - Letters. 8
- News 2.0. 9
- Jef Raskin:
Opinion: Voting Machine Hell. 10-11 - Alexander Wolfe:
Toolkit: Intel's Heavy-Duty Dev Tools. 12-17 - Steve Kirsch:
Interview: A Conversation with Matt Wells. 18-24 - Book Reviews. 81
- Calendar. 82
- David J. Brown:
Curmudgeon: Search Hurts. 84-83
- William A. Woods:
Searching vs. Finding. 26-35 - Rajat Mukherjee, Jianchang Mao:
Enterprise Search: Tough Stuff. 36-46 - Anna Patterson:
Why Writing Your Own Search Engine Is Hard. 48-53 - Michael J. Cafarella, Douglas R. Cutting:
Building Nutch: Open Source Search. 54-61
- Nick Porcino:
Gaming Graphics: The Road to Revolution. 62-71 - John Stone, Sarah Merrion:
Instant Messaging or Instant Headache? 72-80
Volume 2, Number 3, May 2004
- Eric Allman, Marshall K. McKusick:
From the Editors: Open Source Revisited. 8-9 - Letters. 10
- News 2.0. 11
- Rodney Bates:
Opinion: Buffer Overrun Madness. 12-14 - James Russell:
Interview: Sam Leffler. 16-22 - Book Reviews. 74
- Calendar. 76
- Josh Coates:
Curmudgeon: A Bigot by Any Other Name... 80-78
- Jordan Hubbard:
Open Source to the Core. 24-31 - David Ascher:
Is OS Right for You? (A Fictional Case Study). 32-38 - Jay Michaelson:
There's No Such Thing as a Free (Software) Lunch. 40-47 - Bart Decrem:
Desktop Linux: Where Art Thou? 48-56
- Andy Currid:
TCP Offload to the Rescue. 58-65 - Ramana Rao:
From IR to Search, and Beyond. 66-73
Volume 2, Number 4, June 2004
- Edward Grossman:
From the Editors: The New Screen of Death. 8 - Letters. 10
- News 2.0. 12
- Phillip A. Laplante:
Opinion: First, Do No Harm: A Hippocratic Oath for Software Developers? 14-18 - Alexander Wolfe:
Toolkit: Grid Tools: Coming to a Cluster Near You. 20-23 - Stuart I. Feldman:
Interview: Brewster Kahle. 24-33 - Book Reviews. 76
- Calendar. 78
- Stan Kelly-Bootle:
Curmudgeon: From This Moment On. 80-79
- Jim Morrison:
Blaster Revisited. 34-43 - Marcus J. Ranum:
Security: The root of the Problem. 44-49 - Ben Laurie:
Network Forensics. 50-56 - Herbert H. Thompson, Richard Ford:
Perfect Storm: The Insider, Naivety, and Hostility. 58-65
- Kenneth N. Lodding:
The Hitchhiker's Guide to Biomorphic Software. 66-75
Volume 2, Number 5, July/August 2004
- Edward Grossman:
From the Editors: Virtually Yours. 8 - Letters. 10
- News 2.0. 12
- Jef Raskin:
Opinion: For Want of a Comma, the Meaning Was Lost. 14-16 - Alexander Wolfe:
Toolkit: Samba Does Windows-to-Linux Dance. 18-21 - What's on Your Hard Drive? 22
- Eric Allman:
Interview: James Gosling. 24-33 - Book Reviews. 76
- Calendar. 78
- Stan Kelly-Bootle:
Curmudgeon: Without a NULL That String Would Never End. 80-79
- Mendel Rosenblum:
The Reincarnation of Virtual Machines. 34-40 - Poul-Henning Kamp, Robert Watson:
Building Systems to Be Shared, Securely. 42-51 - Bob Supnik:
Simulators: Virtual Machines of the Past (and Future). 52-58
- John Viega, Matt Messier:
Security is Harder than You Think. 60-65 - Douglas C. Schmidt, Aniruddha S. Gokhale, Balachandran Natarajan:
Leveraging Application Frameworks. 66-75
Volume 2, Number 6, September 2004
- Edward Grossman:
From the Editors. 8 - Letters. 10
- News 2.0. 11
- Rodney Bates:
Opinion: Schizoid Classes. 12-15 - Alexander Wolfe:
Toolkit: Longhorn Ties Platform Apps to Core Operating System. 16-19 - What's on Your Hard Drive? 20
- Book Reviews. 76
- Calendar. 78
- Stan Kelly-Bootle:
Curmudgeon: Vote Early, Vote Often. 80-79
- Lucy Sanders:
Interview: Donald Peterson. 22-29 - Gordon Bell:
A Time and a Place for Standards. 66-74
- Phil Sherburne, Cary Fitzgerald:
You Don't Know Jack About VoIP. 30-38 - James E. Coffman:
Not Your Father's PBX? 40-47 - Sudhir R. Ahuja, J. Robert Ensor:
VoIP: What is it Good for? 48-55 - Douglas C. Sicker, Tom D. Lookabaugh:
VoIP Security: Not an Afterthought. 56-64
Volume 2, Number 7, October 2004
- Edward Grossman:
RFID isn't science fiction. 10
- Edward Grossman:
Letters. 12
- Edward Grossman:
News 2.0. 13
- Edward Grossman:
What's on your hard drive? 14
- George V. Neville-Neil:
Kode vicious. 16-18
- Barbara B. Simons:
Electronic voting systems: the good, the bad, and the stupid. 20-26
- Alexander Wolfe:
There's still some life left in Ada. 28-31
- George V. Neville-Neil:
A conversation with Mike Deliman. 32-39
- Roy Want:
The magic of RFID. 40-48 - Sanjay E. Sarma:
Integrating RFID. 50-57
- Marshall K. McKusick, George V. Neville-Neil:
Thread scheduling in FreeBSD 5.2. 58-64 - Kang Su Gatlin:
Trials and tribulations of debugging concurrency. 66-73
- Arun Ektare:
Review of "Dynamic Reconfiguration: Architectures and Algorithms by Ramachandran Vaidyanathan and Jerry L. Trahan". 74 - Alladin Ayesh:
Review of "Immunity-based systems by Yoshiteru Ishida". 74
- Edward Grossman:
Calendar. 76
- Phillip A. Laplante:
The burning bag of dung: and other environmental antipatterns. 80-
Volume 2, Number 8, November 2004
- Edward Grossman:
The guru code. 10
- Edward Grossman:
Letters. 12
- John Stanik:
News 2.0. 14
- Edward Grossman:
What's on your hard drive? 16
- George V. Neville-Neil:
Kode vicious strikes again. 18-21
- Stephen R. Bourne:
A conversation with Bruce Lindsay. 22-33
- Aaron B. Brown:
Oops! Coping with human error in IT systems. 34-41 - Brendan Murphy:
Automating software failure reporting. 42-48 - Paul P. Maglio, Eser Kandogan:
Error messages: what's the problem? 50-55
- Adam Kolawa:
Outsourcing: devising a game plan. 56-62 - Vijay Gill:
Lack of priority queuing considered harmful. 64-69
- Rita Puzmanova:
Review of "Wi-Foo: The Secrets of Wireless Hacking by Andrew Vladimirov, Konstantin V. Gravrilenko, and Andrei A. Mikhailovsky". 70 - Bayard Kohlhepp:
Review of "Network Distributed Computing: Fitscapes and Fallacies by Max K. Goff". 70
- Edward Grossman:
Calendar. 72
- Edward Grossman:
Careers. 74-77
- Rodney Bates:
Programming in Franglais. 80-
Volume 2, Number 9, December 2004/January 2005
- Edward Grossman:
The big programming languages issue. 10
- Edward Grossman:
Letters. 12
- John Stanik:
News 2.0. 13
- Edward Grossman:
What's on your hard drive? 14
- George V. Neville-Neil:
Kode vicious: the return. 16-18
- Stuart I. Feldman, Alan C. Kay:
A conversation with Alan Kay. 20-30
- John R. Mashey:
Languages, levels, libraries, and longevity. 32-38 - Roger Sessions:
Fuzzy boundaries: objects, components, and web services. 40-47 - Gregory V. Wilson:
Extensible programming for the 21st century. 48-57 - Donn Seeley:
How not to write Fortran in any language. 58-65
- Michael W. Shapiro:
Self-healing in modern operating systems. 66-75
- Mike S. Joy:
Review of "Eclipse by Steve Holzner". O'Reilly & Associates, 2004, Isbn 0-596-00641-1. 76 - Thomas Portele:
Review of "Spoken Dialogue Technology by Michael F. McTear". 76
- Edward Grossman:
Calendar. 77
- Stan Kelly-Bootle:
Linguae Francae. 80-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.