Abraham, T., S. Ahlawat, and S. Ahlawat. 1998. The India option: Perceptions of Indian software solutions. International Journal of Technology Management 15 (6/7): 605–621.
Allen, M. W. 1971. History and applications of computers. In Information, computers, machines, and man, ed. A. E. Karbowiak and R. M. Huey. New York: Wiley.
Anderson, R. 2001. Security engineering: A guide to building dependable distributed systems. New York: Wiley.
Ang, P.-H., and B. Nadarajan. 1996. Censorship and the Internet: A Singapore perspective. Communications of the ACM 39 (6): 72–78.
Baker, A. L., and S. H. Zweben. 1979. The use of software science in evaluating modularity concepts. IEEE Transactions on Software Engineering TSE-5 (2): 110–120.
Balasubramanyam, V. N., and A. Balasubramanyam. 1997. International trade in services: The case of India's computer software. World Economy 20 (6): 829–843.
Baldwin, C. Y., and K. B. Clark. 1997. Managing in an age of modularity. Harvard Business Review 75 (5): 84–93.
Bass, L., P. Clements, and R. Kazman. 1998. Software architecture in practice. New York: Addison-Wesley.
Beck, K. 1999. Extreme programming explained: Embrace change. Reading, Mass.: Addison-Wesley.
Berztiss, A. 1996. Software methods for business reengineering. New York: Springer-Verlag.
Boehm, B.W. 1981. Software engineering economics. Englewood Cliffs, N.J.: Prentice-Hall.
Boehm, B.W. 1984. Software engineering economics. IEEE Transactions on Software Engineering TSE-10 (1): 4–21.
Boehm, B.W. 1988. A spiral model of software development and enhancement. IEEE Computer 21 (5): 61–72.
Boehm, B.W., and P. Bose. 1994. A collaborative spiral software process model based on theory W. In Proceedings, 3d International IEEE Conference on the Software Process, Reston, Va.
Boehm, B. W., A. Egyed, J. Kwan, D. Port, A. Shah, and R. Madachy. 1998. Using the WinWin spiral model: a case study. IEEE Computer 31 (7): 33–44.
Boehm, B. W., and K. Sullivan. 1999. Software economics: status and prospects. Information and Software Technology 41 (14): 937–946.
Boehm, B. W., and K. Sullivan. 2000. Software economics: A roadmap. In The future of software engineering, ed. A. Finkelstein. 22d International Conference on Software Engineering.
Bosch, J. 2000. Design and use of software architectures. Reading, Mass.: Addison-Wesley.
Brooks, F. Jr. 1975. The mythical man-month. Reading, Mass.: Addison-Wesley. Anniversary edition 1995.
Brown, W. J., R. C. Malveau, C. Raphael, W. H. Brown, W. H. McCormick, W. Hays III, and T. J. Mowbray. 1998. Antipatterns: Refactoring software, architectures, and projects in crisis. New York: Wiley.
Broy, M., A. Deimel, J. Henn, K. Koskimies, F. Plasil, G. Pomberger, W. Pree, M. Stal, C. Szyperski, and M. Broy. 1998. What characterizes a (software) component? Software Concepts and Tools 19 (no. 1): 49–59.
Bulkeley, W. M. 2000. Ozzie to unveil Napster-style networking. Wall Street Journal Online, October 24. <http://www.zdnet.com/zdnn/stories/news/0,4586,2644020,00.html>.
Cartwright, S. D. 2000. Napster: A business in search of a viable model. Journal of Business Strategy 21 (5): 28–32.
Chang, W.-T., and D. Messerschmitt. 1996. Dynamic deployment of peer-to-peer networked applications to existing World-Wide Web browsers. In Proceedings, Conference on Telecommunications Information Network Architecture (TINA), Heidelberg.
Chavez, A., C. Tornabene, and G. Wiederhold. 1998. Software component licensing: a primer. IEEE Software 15 (5): 47–53.
Church, J., and N. Gandal. 1992. Network effects, software provision, and standardization. Journal of Industrial Economics 40 (1): 85–103.
Ciarletta, L. P., and A. A. Dima. 2000. A conceptual model for pervasive computing. In Proceedings, 29th International Conference on Parallel Computing, Toronto.
Clark, J. R., and L. S. Levy. 1993. Software economics: An application of price theory to the development of expert systems. Journal of Applied Business Research 9 (2): 14–18.
Conway, M. E. 1968. How do committees invent? Datamation 14 (4): 28–31, cited in Brooks 1975, The mythical man-month, anniversary edition (1995), 111.
Coplien, J. O. 1995. A generative development-process pattern language. In Pattern Languages of Program Design, ed. J. Coplien and D. Schmidt. Reading, Mass.: Addison-Wesley.
Covisint establishes corporate entity: Automotive e-business exchange becomes LLC. 2000. <http://www.covisint.com/about/pressroom/pr/covisint_becomes.shtml>.
Cox, B. 1996. Superdistribution: Objects as property on the electronic frontier. <http://virtualschool.edu/mon/TTEF.html>.
Dam, K. W. 1994. The economic underpinnings of patent law. Journal of Legal Studies 23 (1, pt. 1): 247–271.
Dam, K. W. 1995. Some economic considerations in the intellectual property protection of software. Journal of Legal Studies 24 (2): 321–377.
Dam, K. W., and H. S. Lin. 1996. National cryptography policy for the information age. Issues in Science and Technology 12 (4): 33.
Dam, K. W., and H. S. Lin. 1997. Deciphering cryptography policy. Issues in Science and Technology 13 (4): 20.
David, P. A. 1990. The dynamo and the computer: An historical perspective on the modern productivity paradox. American Economic Review 80 (2): 355–361.
David, P. A., and S. Greenstein. 1990. The economics of compatibility standards: An introduction to recent research. Economics of Innovation and New Technology 1 (1/2): 3–41.
Denning, D. E. 1995. Key escrow encryption: the third paradigm. Computer Security Journal 11 (1): 43–52.
Denning, D. E., and D. K. Branstad. 1996. A taxonomy for key escrow encryption systems. Communications of the ACM 39 (3): 34–39.
Denning, D. E., and M. Smid. 1994. Key escrowing today. IEEE Communications Magazine 32 (9): 58–68.
Devanbu, P., P. Fong, and S. Stubblebine. 1998. Techniques for trusted software engineering. In Proceedings, 20th International Conference on Software Engineering, Kyoto. <http://seclab.cs.ucdavis.edu/~devanbu/icse98.ps>.
ECMA. 1999. ECMA-262: ECMAScript language specification. <http://www.ecma.ch/>.
ECMA. 2001a. ECMA-334: C# (C sharp) language specification. <http://www.ecma.ch/>.
ECMA. 2001b. ECMA-335: Common language infrastructure. <http://www.ecma.ch/>.
Economides, N. 1996. The economics of networks. International Journal of Industrial Organization 16 (4): 673–699. <http://www.stern.nyu.edu/networks/top.html>.
Ellram, L. M. 1994. A taxonomy of total cost of ownership models. Journal of Business Logistics 15 (1): 171–191.
Ellram, L. M., and S. P. Siferd. 1998. Total cost of ownership: A key concept in strategic cost management decisions. Journal of Business Logistics 19 (1): 55–84.
Emigh, J. 1999. Total cost of ownership. Computerworld 33 (51): 52.
Farrell, J., and C. Shapiro. 1988. Dynamic competition with switching costs. Rand Journal of Economics 19 (1): 123–137.
Farrell, J., and C. Shapiro. 2000. Scale economies and synergies in horizontal merger analysis. <http://www.haas.berkeley.edu/~shapiro/mergers.pdf>.
Ferguson, C. H., and C. R. Morris. 1994. Computer wars: The fall of IBM and the future of global technology. New York: Times Books.
Firesmith, D. G., and B. Henderson-Sellers. 2001. The OPEN process framework: An introduction. New York: Addison-Wesley. <http://www.donald-firesmith.com/>.
Fowler, M., and J. Highsmith. 2001. The agile manifesto. Software Development, August. <http://www.sdmagazine.com/documents/s=844/sdm0108a/0108.htm>.
Frakes, W. B., and P. B. Gandel. 1990. Representing reusable software. Information and Software Technology 32 (10): 653–664.
Frank, D. J., R. H. Dennard, E. Nowak, P. M. Solomon, Y. Taur, and H. P. Wong. 2001. Device scaling limits of Si MOSFETs and their application dependencies. Proceedings of the IEEE 89 (3): 259–288.
Frazier, T. P., and J. W. Bailey. 1996. The costs and benefits of domain-oriented software reuse: Evidence from the STARS demonstration projects. Paper P-3191. Institute for Defense Analysis.
Furse, M. 1998. United States vs. Microsoft: Ill-considered antitrust. International Review of Law, Computers, and Technology 12 (1): 99–120.
Furse, M. 1999. United States vs. Microsoft: High-tech antitrust. International Review of Law, Computers, and Technology 13 (2): 237–253.
Gaffney, J. E. Jr., and T. A. Durek. 1989. Software reuse—Key to enhanced productivity: Some quantitative models. Information and Software Technology 31 (5): 258–267.
Garcia, M. 1998. Institutional development in the software industry: Intellectual property protection. Ph.D. diss., University of Southern California, Los Angeles, CA 90089.
Gardner, T. 2001. An introduction to Web services. Ariadne, October 2 (no. 29). <http://www.ariadne.ac.uk/issue29/gardner/>.
Garone, S., and S. Cusack. 1999. Components, objects, and development environments: 1999 worldwide markets and trends. International Data Corporation.
Gaskins, D. 1971. Dynamic limit pricing: Optimal pricing under threat of entry. Journal of Economic Theory (2): 306–322.
Gerlach, J. H., and F.-Y. Kuo. 1991. Understanding human-computer interaction for information systems design. MIS Quarterly 15 (4): 526–549.
Goertzel, B., and P. Pritchard. 2002. The Internet economy as a complex system. <http://www.goertzel.org/papers/ecommerce.html>.
Gray, J., and P. Shenoy. 2000. Rules of thumb in data engineering. In Proceedings, 16th IEEE International Conference on Data Engineering, San Diego.
Great Books Online. 2002. <http://www.bartleby.com/>.
Griffith, D. 1998. Total cost of ownership: The hidden margin-eating monster. Computer Technology Review 18 (6): 54–56.
Gulledge, T. R., and W. P. Hutzler, eds. 1993. Analytical methods in software engineering economics. New York: Springer-Verlag.
Hartford, K. 2000. Cyberspace with Chinese characteristics. Current History, September, 255. <http://www.pollycyber.com/pubs/ch/home.htm>.
Heer, D. N., and D. P. Maher. 1995. The heart of the new information appliance. IEEE Transactions on Consumer Electronics 41 (3): 869–874.
Heineman, G. T., and W. T. Councill. 2001. Component-based software engineering: Putting the pieces together. New York: Addison-Wesley.
Hiles, A. 1993. Service-level agreements: Managing cost and quality in service relationships. London: Chapman and Hall.
Hopkins, J. 2000. Component primer. Communications of the ACM 43 (10): 27–30.
Howard, J. D. 1997. An analysis of security incidents on the Internet. Ph.D. diss., Carnegie Mellon University, Pittsburgh, PA 15213. <http://www.cert.org/research/JHThesis/Start.html>.
IBM Systems Journal. 1999. Vol. 38, no. 4. Special issue on pervasive computing. <http://www.research.ibm.com/journal/sj38--4.html>.
International technology roadmap for semiconductors. 2002. Technology Working Groups of International SEMATECH. <http://public.itrs.net/>.
Jacobson, I., M. Griss, and P. J nsson. 1997. Software reuse: Architecture, process and organization for business success. Reading, Mass.: Addison-Wesley.
Jung, H.-W., and B. Choi. 1999. Optimization models for quality and cost of modular software systems. European Journal of Operational Research 112 (3): 613–619.
Kang, K. C., and L. S. Levy. 1989. Software methodology in the harsh light of economics. Information and Software Technology 31 (5): 239–250.
Katz, M. L., and C. Shapiro. 1985. Network externalities, competition, and compatibility. American Economic Review 75 (3): 424–440.
Katz, M. L., and C. Shapiro. 1986a. How to license intangible property. Quarterly Journal of Economics 101 (3): 567–589.
Katz, M. L., and C. Shapiro. 1986b. Technology adoption in the presence of network externalities. Journal of Political Economy 94 (4): 822–841.
Katz, M. L., and C. Shapiro. 1999a. Antitrust in software markets. In Competition, innovation and the Microsoft monopoly: Antitrust in the digital marketplace, ed. J. A. Eisenach and T. M. Lenard, 29–81. Proceedings of a Conference of the Progress and Freedom Foundation, Washington, D.C. Boston: Kluwer. <http://www.haas.berkeley.edu/~shapiro/software.pdf>.
Katz, M. L., and C. Shapiro. 1999b. Competition policy in the information economy. <http://www.haas.berkeley.edu/~shapiro/software.pdf>.
Keliher, M. J. 1980. Computer security and privacy: A systems approach is needed. Vital Speeches 46 (21): 662–666.
Kemerer, C. F. 1998. Progress, obstacles, and opportunities in software engineering economics. Communications of the ACM 41 (8): 63–66.
Keyes, R. W. 2001. Fundamental limits of silicon technology. Proceedings of the IEEE 89 (3): 227–239.
Koch, C. 1998. Service level agreements: put IT in writing. CIO Magazine, November 15. <http://www.cio.com/archive/111598_sla.html>.
Kovacic, W., and C. Shapiro. 1999. Antitrust policy: A century of economic and legal thinking. <http://www.haas.berkeley.edu/~shapiro/century.pdf>.
Kruchten, P. 2000. The rational unified process: An introduction. 2d ed. New York: Addison-Wesley.
Langelaar, G. C., I. Setyawan, and R. L. Lagendijk. 2000. Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Processing Magazine 17 (5): 20–46.
Langlois, R. N. 1992. External economies and economic progress: The case of the micro-computer industry. Business History Review 66 (1): 1–50.
Langlois, R. N. 1999. Modularity in technology, organization, and society. University of Connecticut, Department of Economics, Working Paper 1999–05.
Langlois, R. N., and P. L. Robertson. 1992. Networks and innovation in a modular system: Lessons from the microcomputer and stereo component industries. Research Policy 21 (4): 297–313.
Laudon, K. C. and J. P. Laudon. 2001. Management Information Systems: Managing the Digital Firm. Englewood Cliffs, N.J.: Prentice Hall.
Lee, P., and M. Leone. 1996. Optimizing ML with run-time code generation. ACM SIGPLAN Notices 31 (5): 137–148.
Lehman, M. M., and J. F. Ramil. 2000. Software evolution in the age of component-based software engineering. IEE Proceedings Software 147 (6) 249–255.
Lehman, M. M., J. F. Ramil, P. D. Wernick, D. E. Perry, and W. M. Turski. 1997. Metrics and laws of software evolution: The nineties view. In Proceedings, Fourth International Software Metrics Conference, Los Alamitos, Calif., 20–32.
Levin, S. I. 1999. Who are we protecting? A critical evaluation of United States encryption technology export controls. Law and Policy in International Business 30 (3): 529–552.
Levy, D., and S. Welzer. 1985. System error: How the IBM antitrust suit raised computer prices. Regulation 9 (5): 27–30.
Levy, L. S. 1987. Taming the tiger: Software engineering and software economics. New York: Springer-Verlag.
Lewis, T. 1997. Friction-free economy: Strategies for success in a wired world. New York: Harper Business.
Liebowitz, S., and S. Margolis. 1999. Winners, losers and Microsoft: Competition and antitrust in high technology. Oakland, Calif.: Independent Institute.
Lixin, T. 2001. Shifting paradigms with the application service provider model. IEEE Computer 34 (10): 32–39.
Luecke, R. W., D. T. Meeting, and R. G. Klingshirn. 1999. New AICPA standards aid accounting for the costs of internal-use software. Healthcare Financial Management 53 (5): 40–46.
Lyman, P., and H. R. Varian. 2000. How much information? <http://www.sims.berkeley.edu/how-much-info>.
Macker, J. P., V. D. Park, and M. S. Corson. 2001. Mobile and wireless Internet services: putting the pieces together. IEEE Communications Magazine 39 (6): 148–155.
MacKie-Mason, J. K., and H. R. Varian. 1995. Pricing congestible network resources. IEEE Journal on Selected Areas in Communications 13 (7): 1141–1149.
Maes, M., T. Kalker, J.-P. Linnartz, J. Talstra, F. G. Depovere, and J. Haitsma. 2000. Digital watermarking for DVD video copy protection. IEEE Signal Processing Magazine 17 (5): 47–57.
Makulowich, J. 1999. Pervasive computing: "The next big thing." Washington Technology Online 14 (8). <http://www.wtonline.com/vol14_no8/cover/652--1.html>.
Markoff, J. 1999a. Growing compatibility issue: Computers and user privacy. New York Times, March 3.
Markoff, J. 1999b. When privacy is more perilous than the lack of it. New York Times, April 4.
Marsh, G. 1987. Impacts of the new computer crime law on computer security operations. CPA Journal 57 (8): 106–107.
Marshall, A. 1890. Principles of economics. Reprinted: Prometheus Books, 1997.
Messerschmitt, D. 1999a. Networked applications: A guide to the new computing infrastructure. San Francisco: Morgan Kaufmann.
Messerschmitt, D. 1999b. The prospects for computing-communications convergence. In Proceedings, M NCHNER KREIS, Conference VISION 21: Perspectives for Information and Communication Technology, Munich. <http://www.eecs.berkeley.edu/~messer/PAPERS/99/Munich.PDF>.
Messerschmitt, D. 1999c. Understanding networked applications: A first course. San Francisco: Morgan Kaufmann.
Messerschmitt, D., and C. Szyperski. 2001. Industrial and economic properties of software: Technology, processes, and value. University of California Berkeley Computer Science Division Technical Report UCB//CSD-01–1130 and Microsoft Corporation Technical Report MSR-TR-2001–11.
Meyers, J. 1993. A short history of the computer. <http://www.softlord.com/comp/>.
Microsoft Corporation. 2000. Universal plug and play device architecture. <http://www.upnp.org/download/UPnPDA10_20000613.htm>.
Moore, G. E. 1965. Cramming more components onto integrated circuits. Electronics 38 (8): 114–117.
Mowery, D. C., and R. N. Langlois. 1994. Spinning off and spinning on: The federal government role in the development of the U.S. computer software industry. Research Policy 25: 947–966.
Mowery, D. C., and R. R. Nelson, eds. 1999. Sources of industrial leadership: Studies of seven industries. New York: Cambridge University Press.
Munter, P. 1999. Accounting for software development costs. CPA Journal 69 (2): 42–45.
NRC (National Research Council). 1994. Rights and responsibilities of participants in networked communities. Washington, D.C.: National Academies Press.
NRC (National Research Council). 1995. Evolving the high performance computing and communications initiative to support the nation's information infrastructure. Washington, D.C.: National Academies Press.
NRC (National Research Council). 1996. Cryptography's role in securing the information society. Washington, D.C.: National Academies Press.
NRC (National Research Council). 1999a. Being fluent with information technology. Washington, D.C.: National Academies Press.
NRC (National Research Council). 1999b. Funding a revolution: Government support for computing research. Washington, D.C.: National Academies Press.
NRC (National Research Council). 2000a. The digital dilemma: Intellectual property rights in the digital age. Washington, D.C.: National Academies Press.
NRC (National Research Council). 2000b. Making IT better: Expanding information technology research to meet society's needs. Washington, D.C.: National Academies Press.
NRC (National Research Council). 2001. Building a workforce for the information rconomy. Washington, D.C.: National Academies Press.
NRC (National Research Council). 2002. Technically speaking: Why all Americans should know more about technology. National Academies Press.
NSF (National Science Foundation). 2001. White paper on an NSF ANIR middleware initiative. CISE Advisory Committee, Subcommittee on the Middleware Infrastructure. <http://www.cise.nsf.gov/anir/mwir_whiteppr.htm#1>.
Neumann, P. G. 1999. Robust open-source software. Communications of the ACM 42 (2): 128.
Nielsen, J. 1993. Noncommand user interfaces. Communications of the ACM 36 (4): 83–99. <http://www.useit.com/papers/noncommand.html>.
Nielsen, J. 2000. Designing Web usability: The practice of simplicity. Indianapolis: New Riders Publishing.
Oberndorf, P. A. 1997. Facilitating component-based software engineering: COTS and open systems. In Proceedings, Fifth International Symposium on Assessment of Software Tools and Technologies, Pittsburgh.
Open Source Initiative. <http://www.opensource.org/>.
O'Reilly, T. 1999. Lessons from open-source software development. Communications of the ACM 42 (4): 32–37.
Palm, Inc. 2002. The philosophy behind the Palm OS. <http://www.palmos.com/platform/philosophy.html>.
Parnas, D. L. 1972. On the criteria for decomposing systems into modules. Communications of the ACM 15 (12): 1053–1058.
Petreley, N. 1999. Total cost of ownership reduction may just be another impossible dream. InfoWorld 21 (40): 126.
Pettersson, M. 1996. Complexity and evolution. New York: Cambridge University Press.
Pfleeger, C. P. 1997. Security in computing. 2d ed. Englewood Cliffs, N.J.: Prentice-Hall.
Podilchuk, C. I., and E. J. Delp. 2001. Digital watermarking: algorithms and applications. IEEE Signal Processing Magazine 18 (4): 33–46.
Portero-S nchez, L. M. 1999. Competition in the software industry: The interface between antitrust and intellectual property law. Communications and Strategies 35 (3d quarter): 45–79.
Pour, G. 1998. Moving toward the component-based software development approach. In Proceedings, Conference on Technology of Object-Oriented Languages (TOOLS 27), Beijing.
Pressman, R. S. 2000. Software engineering: A practitioner's approach. 5th ed. New York: McGraw-Hill.
Raymond, E. 1996. The new hacker's dictionary. 3d ed. Cambridge, Mass.: MIT Press.
Resnick, P., and H. R. Varian. 1997. Recommender systems. Communications of the ACM 40 (3).
Roberts, L. G. 1969. Data processing technology forecast. Advanced Research Projects Agency Internal Memorandum. <http://www.ziplink.net/~lroberts/Forecast69.htm>.
Roberts, L. G. 2000. Beyond Moore's law: Internet growth trends. IEEE Computer 33 (1): 117–119.
Robertson, P. L., and R. N. Langlois. 1995. Innovation, networks, and vertical integration. Research Policy 24 (4): 543–562.
Romero, S. 2001. Location devices' use rises, prompting privacy concerns. New York Times, March 4.
Royce, W. W. 1970. Managing the development of large software systems. In Proceedings, IEEE WESCON.
Royce, W. W. 1990. TRW's Ada process model for incremental development of large software systems. In Proceedings, International Conference on Software Engineering, Nice, France.
Saltzer, J. H., D. P. Reed, and D. Clark. 1984. End-to-end arguments in system design. ACM Transactions on Computer Systems 2 (4): 277–288. An earlier version appeared in Proceedings, Second International Conference on Distributed Computing Systems (April 1981), 509–512.
Samuelson, P. 1999. Why the anticircumvention regulations need revision. Communications of the ACM 42 (9): 17–21.
S nchez, R., and J. T. Mahoney. 1996. Modularity, flexibility, and knowledge management in product and organization design. Strategic Management Journal (winter): 1763–1776.
Schaller, R. R. 1997. Moore's law: past, present and future. IEEE Spectrum 34 (6): 52–59.
Schattke, R. 1988. Accounting for computer software: The revenue side of the coin. Journal of Accountancy 165 (1): 58–70.
Shannon, C. E., and W. Weaver. 1949. The mathematical theory of communication. Urbana: University of Illinois Press.
Shapiro, C. 2000. Setting compatibility standards: Cooperation or collusion? <http://www.haas.berkeley.edu/~shapiro/standards.pdf>.
Shapiro, C. 2001a. Antitrust limits to patent settlements. <http://www.haas.berkeley.edu/~shapiro/settle.pdf>.
Shapiro, C. 2001b. Navigating the patent thicket: Cross licenses, patent pools, and standard setting. In Innovation policy and the economy, ed. A. Jaffe, J. Lerner, and S. Stern. <http://www.haas.berkeley.edu/~shapiro/thicket.pdf>.
Shapiro, C., and H. R. Varian. 1998. Versioning: The smart way to sell information. Harvard Business Review 76 (6): 106–114.
Shapiro, C., and H. R. Varian. 1999a. The art of standard wars. California Management Review 41 (2): 8–32.
Shapiro, C., and H. R. Varian. 1999b. Information rules: A strategic guide to the network economy. Boston: Harvard Business School Press.
Shy, O. 2001. The economics of network industries. New York: Cambridge University Press.
Shy, O., and J. Thisse. 1999. A strategic approach to software protection. Journal of Economics and Management Strategy 8 (2): 163–190.
Silvestre, J. 1987. Economies and Diseconomies of scale. In The new Palgrave: A dictionary of economics, ed. J. Eatwell, M. Milgate, and P. Newman, 80–83. London: Macmillan.
Slaughter, S. A., D. E. Harter, and M. S. Krishnan. 1998. Evaluating the cost of software quality. Communications of the ACM 41 (8): 67–73.
Smith, R., B. Meyer, C. Szyperski, and G. Pour. 2000. Component-based development? Refining the blueprint. In Proceedings, 34th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS 34), Santa Barbara, Calif.
Software in India: Bangalore bytes? 1996. Economist, March 23.
Software Productivity Consortium. 1994. Process Engineering with the Evolutionary Spiral Process Model SPC-93098-CMC, version 01.00.06. Herndon, Va.
Stawlings, W. 1999. Cryptography and network security: Principles and practice. 2d ed. New York: Prentice-Hall.
Stokes, D. E. 1997. Pasteur's quadrant: Basic science and technological innovation. Washington, D.C.: Brookings Institution Press.
Suganuma, T., T. Ogasawara, M. Takeuchi, T. Yasue, M. Kawahito, K. Ishizaki, H. Komatsu, and T. Nakatani. 2000. Overview of the IBM Java just-in-time compiler. IBM Systems Journal 39 (1): 175–193.
Sullivan, J. 1999. Napster: Music is for sharing. Wired News, November 1. <http://www.wired.com/news/print/0,1294,32151,00.html>.
Sun Microsystems. 1999a. The Java Hotspot performance engine architecture: A white book about Sun's second-generation performance technology. <http://java.sun.com/products/hotspot/whitebook.html>.
Sun Microsystems. 1999b. Jini technology architectural overview. <http://www.sun.com/jini/whitepapers/architecture.html>.
Szyperski, C. 1998. Emerging component software technologies: A strategic comparison. Software Concepts and Tools 19 (1): 2–10.
Szyperski, C. 2000. Rethinking our trade and science: From developing components to component-based development. Modular Programming Languages. Joint Modular Languages Conference, JMLC 2000, Zurich.
Szyperski, C. 2001. Components and Web services. Software Development 9 (8).
Szyperski, C. 2002a. Component software: Beyond object-oriented programming. 2d ed. New York: Addison-Wesley.
Szyperski, C. 2002b. Services rendered. Software Development 10 (1).
Thebaut, S. M., and V. Y. Shen. 1984. An analytic resource model for large-scale software development. Information Processing and Management 20 (1/2): 293–315.
Thompson, C., ed. 1998. Workshop Report. OMG DARPA Workshop on Compositional Software Architectures. <http://www.objs.com/workshops/ws9801/report.html>.
Torrisi, S. 1998. Industrial organization and innovation: An international study of the software industry. London: Edward Elgar Publishers.
Touretzky, D. S. 2001. Free speech rights for programmers. Communications of the ACM 44 (8): 23–25.
Touretzky, D. S. 2002. Gallery of CSS descramblers. <http://www.cs.cmu.edu/~dst/DeCSS/Gallery>.
Traw, C. B. S. 2001. Protecting digital content within the home. IEEE Computer 34 (10): 42–47.
Ueda, K. 2001. Synthesis and emergence: Research overview. Artificial Intelligence in Engineering 15 (4).
Upton, D. M. 1992. A flexible structure for computer-controlled manufacturing systems. Manufacturing Review 5 (1): 58–74. <http://www.people.hbs.edu/dupton/papers/organic/WorkingPaper.html>.
U.S. Department of Justice. 1998. The United States of America vs. Microsoft Corporation. Civil Action No. 98–1232. Complaint. May 18. <http://www.usdoj.gov/atr/cases/f1700/1763.htm>.
U.S. Department of Justice. 1999. The United States of America vs. Microsoft Corporation, Civil Action No. 98–1232. Findings of Fact. November 5. <http://www.usdoj.gov/atr/cases/f3800/msjudgex.htm>.
Usability Professionals Association. <http://www.upassoc.org/>.
Vacca, J. 1993. Tapping a gold mine of software assets. Software Magazine 13 (16): 57–67.
Varian, H. R. 1992. Microeconomic analysis. 3d ed. New York: W.W. Norton.
Varian, H. R. 1993. Economic incentives in software design. Computational Economics 6 (3/4): 201–217.
Varian, H. R. 2001. Versioning information goods. In Internet publishing and beyond: The economics of digital information and intellectual property, ed. B. Kahin and H. R. Varian. Cambridge, Mass.: MIT Press.
Veryard, R., ed. 1991. The economics of information systems and software. Boston: Butterworth-Heinemann.
Wallach, D. S. 2001. Copy protection technology is doomed. IEEE Computer 34 (10): 48–49.
Ward, E. 2000. Viral marketing involves serendipity, not planning. B to B 85 (10): 26.
Weiser, M. 1991. The computer for the 21st century. Scientific American 265 (3): 94–104.
White book: How DIGITAL FX!32 works. 2002. <http://www.support.compaq.com/amt/fx32/fx-white.html>.
World Wide Web Consortium. 2002. A little history of the World Wide Web. <http://www.w3.org/History.html>.