5 | -- | 8 | Diane Crawford. Editorial printers |
9 | -- | 10 | Robert Fox. News track |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 17 | Michael A. Cusumano. Finding your balance in the products and services debate |
19 | -- | 23 | Peter J. Denning, Robert Dunham. The missing customer |
27 | -- | 29 | Bob Besaha. Bounty hunting in the patent base |
30 | -- | 33 | Roel Vertegaal. Introduction |
34 | -- | 39 | Shumin Zhai. What s in the eyes for attentive input |
40 | -- | 46 | Jeffrey S. Shell, Ted Selker, Roel Vertegaal. Interacting with groups of computers |
47 | -- | 51 | Paul P. Maglio, Christopher S. Campbell. Attentive agents |
52 | -- | 59 | Eric Horvitz, Carl Myers Kadie, Tim Paek, David Hovel. Models of attention in computing and communication: from principles to applications |
60 | -- | 66 | Patrick Baudisch, Douglas DeCarlo, Andrew T. Duchowski, Wilson S. Geisler. Focusing on the essential: considering attention in display design |
67 | -- | 72 | D. Scott McCrickard, Christa M. Chewar. Attuning notification design to user goals and attention costs |
74 | -- | 80 | José del R. Millán. Adaptive brain interfaces |
81 | -- | 85 | Lawrence A. Gordon, Martin P. Loeb, Tashfeen Sohail. A framework for using insurance for cyber-risk management |
86 | -- | 90 | Gustavo da Rocha Barreto Pinto, Sergio P. J. Medeiros, Jano Moreira de Souza, Julia Celia M. Strauch, Carlete Rosana Ferreira Marques. Spatial data integration in a collaborative design framework |
91 | -- | 94 | Mark C. Anderson, Rajiv D. Banker, Sury Ravindran. The new productivity paradox |
95 | -- | 98 | Roger Evernden, Elaine Evernden. Third-generation information architecture |
99 | -- | 104 | David Chadwick. Deficiencies in LDAP when used to support PKI |
105 | -- | 108 | Gary F. Templeton. Object-oriented programming of integrated circuits |
120 | -- | 0 | Barbara Simons, Eugene H. Spafford. Risks of total surveillance |