11 | -- | 13 | Robert L. Glass. The Relationship Between Theory and Practice in Software Engineering |
15 | -- | 17 | Neil Munro. Sketching a National Information Warfare Defense Plan |
24 | -- | 26 | Usama M. Fayyad, Ramasamy Uthurusamy. Data Mining and Knowledge Discovery in Databases (Introduction to the Special Section) |
27 | -- | 34 | Usama M. Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth. The KDD Process for Extracting Useful Knowledge from Volumes of Data |
35 | -- | 41 | Clark Glymour, David Madigan, Daryl Pregibon, Padhraic Smyth. Statistical Inference and Data Mining |
42 | -- | 48 | Ronald J. Brachman, Tom Khabaza, Willi Klösgen, Gregory Piatetsky-Shapiro, Evangelos Simoudis. Mining Business Databases |
49 | -- | 50 | W. H. Inmon. The Data Warehouse and Data Mining |
51 | -- | 57 | Usama M. Fayyad, David Haussler, Paul E. Stolorz. Mining Scientific Data |
58 | -- | 64 | Tomasz Imielinski, Heikki Mannila. A Database Perspective on Knowledge Discovery |
65 | -- | 68 | Oren Etzioni. The World-Wide Web: Quagmire or Gold Mine? |
69 | -- | 77 | David Abramson, Ian T. Foster, John Michalakes, Rok Sosic. A New Methodology for Debugging Scientific Applications |
78 | -- | 85 | David E. Culler, Richard M. Karp, David A. Patterson, Abhijit Sahay, Eunice E. Santos, Klaus E. Schauser, Ramesh Subramonian, Thorsten von Eicken. LogP: A Practical Model of Parallel Computation |
86 | -- | 95 | Yair Wand, Richard Y. Wang. Anchoring Data Quality Dimensions in Ontological Foundations |
130 | -- | 0 | Peter G. Neumann. Distributed Systems have Distributed Risks |