5 | -- | 0 | Diane Crawford. Editorial Pointers |
9 | -- | 10 | Robert Fox. News Track |
11 | -- | 14 | Diane Crawford. Forum |
17 | -- | 20 | Neil Munro. The Ongoing Tug-of-War for E-Commerce Control |
21 | -- | 24 | Larry Press. The Post-PC Era |
25 | -- | 0 | Barbara Simons. The Heroes Among Us |
26 | -- | 28 | Grady Booch. UML in Action - Guest Editor s Introduction |
29 | -- | 37 | Cris Kobryn. UML 2001: A Standardization Odyssey |
38 | -- | 45 | Grant Larsen. Designing Component-Based Frameworks Using Patterns in the UML |
46 | -- | 54 | Bran Selic. Turning Clockwise: Using UML in the Real-Time Domain |
55 | -- | 61 | Alex E. Bell, Ryan W. Schmidt. UMLoquent Expression of AWACS Software Design |
63 | -- | 70 | Jim Conallen. Modeling Web Application Architectures with UML |
72 | -- | 78 | Michael A. Cusumano, David B. Yoffie. What Netscape Learned from Cross-Platform Software Development |
80 | -- | 87 | Michael Mattsson, Jan Bosch, Mohamed Fayad. Framework Integration Problems, Causes, Solutions |
88 | -- | 94 | Tessa A. Lau, Oren Etzioni, Daniel S. Weld. Privacy Interfaces for Information Management |
95 | -- | 101 | HÃ¥kon Wium Lie, Janne Saarela. Multipurpose Web Publishing Using HTML, XML, and CSS |
102 | -- | 107 | Donald Gotterbarn, Keith W. Miller, Simon Rogerson. Software Engineering Code of Ethics is Approved |
109 | -- | 112 | Lutz Prechelt. Comparing Java vs. C/C++ Efficiency Differences to Interpersonal Differences |
144 | -- | 0 | Bruce Schneier. Risks of Relying on Cryptography |