August 2003 - Vol. 46 No. 8
Features
The Discipline of Internet Forensics
A Mugwump’s-Eye View of Web Work
Voting and Technology: Who Gets to Count Your Vote?
Extracting Library-Based Java Applications
Post-Pass Compaction Techniques
Cold Code Decompression at Runtime
Grammar-Based Compression of Interpreted Code
Risks and Challenges of Component-Based Software Development
How Cios Manage Their Superiors’ Expectations
-Understanding Email Interaction Increases Organizational Productivity
Relationship Quality: the Undervalued Dimension of Software Quality
Enemy at the Gate: Threats to Information Security
How a Silver Bullet May Lose its Shine
Analyzing the Application Asp Concept: Technologies, Economies, and Strategies
Software Reuse Strategies and Component Markets
Third Generation and Beyond Wireless Systems