The Community for Technology Leaders
Green Image
Issue No. 04 - April (vol. 37)
ISSN: 0018-9162

Article Summaries (HTML)

pp. 4

Letters (HTML)

pp. 6-7
At Random
Computing Practices

Coping with Java Threads (Abstract)

Bo Sand? , Colorado Technical University
pp. 20-27
Cover Features

A Software Infrastructure for Authenticated Web Metering (Abstract)

Carlo Blundo , University of Salerno
Stelvio Cimato , University of Salerno
pp. 28-33

Adaptive Neural Network Clustering of Web Users (Abstract)

Santosh K. Rangarajan , Louisiana Tech University
Vir V. Phoha , Louisiana Tech University
Kiran S. Balagani , Louisiana Tech University
Rastko R.Selmic , Louisiana Tech University
S.S. Iyengar , Louisiana State University
pp. 34-40

XML-Based Specification for Web Services Document Security (Abstract)

Rafae Bhatti , Purdue University
Elisa Bertino , Purdue University
Arif Ghafoor , Purdue University
James B.D. Joshi , University of Pittsburgh
pp. 41-49
Research Features

Crime Data Mining: A General Framework and Some Examples (Abstract)

Hsinchun Chen , University of Arizona
Wingyan Chung , University of Arizona
Jennifer Jie Xu , University of Arizona
Gang Wang , University of Arizona
Yi Qin , University of Arizona
Michael Chau , University of Hong Kong
pp. 50-56

Outperforming LRU with an Adaptive Replacement Cache Algorithm (Abstract)

Nimrod Megiddo , IBM Almaden Research Center
Dharmendra S. Modha , IBM Almaden Research Center
pp. 58-65
Membership News

Call and Calendar (HTML)

pp. 71-72

Bookshelf (HTML)

pp. 73

Career Opportunities (PDF)

pp. 74-75

Products (HTML)

pp. 77

Extending the Reach of Business Processes (Abstract)

Dipanjan Chakraborty , University of Maryland, Baltimore County
Hui Lei , IBM T.J. Watson Research Center
pp. 78-80
Entertainment Computing

Teaching Computer Science through Game Design (Abstract)

Mark Overmars , Utrecht University
pp. 81-83
Invisible Computing

Enabling Ubiquitous Sensing with RFID (Abstract)

Roy Want , Intel Research
pp. 84-86

Hacking the Business Climate for Network Security (Abstract)

Bruce Schneier , Counterpane Internet Security
pp. 87-89
The Profession

Biometrics and the Threat to Civil Liberties (Abstract)

Margaret L. Johnson , Stanford University
pp. 92, 90-91
94 ms
(Ver 3.3 (11022016))