5 | -- | 0 | Diane Crawford. Editorial pointers |
9 | -- | 10 | . News track |
11 | -- | 13 | Diane Crawford. Forum |
14 | -- | 0 | David A. Patterson. Why join ACM? |
15 | -- | 17 | Michael A. Cusumano. Google: what it is and what it is not |
19 | -- | 20 | Jon Crowcroft. On the nature of computing |
21 | -- | 22 | . SIGs announce candidates for election |
23 | -- | 24 | Diane Crawford. Top 10 downloads from ACM s digital library |
26 | -- | 29 | Dimitris N. Metaxas. Introduction |
31 | -- | 36 | Hervé Delingette, Nicholas Ayache. Hepatic surgery simulation |
37 | -- | 41 | Arie E. Kaufman, Sarang Lakare, Kevin Kreeger, Ingmar Bitter. Virtual colonoscopy |
43 | -- | 48 | Kyoungju Park, Albert Montillo, Dimitris N. Metaxas, Leon Axel. Volumetric heart modeling and analysis |
49 | -- | 54 | Celina Imielinska, Pat Molholt. Incorporating 3D virtual anatomy into the medical curriculum |
55 | -- | 59 | Terry S. Yoo, Michael J. Ackerman. Open source software for medical image processing and visualization |
66 | -- | 71 | J. Roberto Evaristo, Kevin C. Desouza, Kevin Hollister. Centralization momentum: the pendulum swings back again |
72 | -- | 77 | Al Farooq Salam, Lakshmi S. Iyer, Prashant Palvia, Rahul Singh. Trust in e-commerce |
78 | -- | 83 | Lawrence Bodin, Lawrence A. Gordon, Martin P. Loeb. Evaluating information security investments using the analytic hierarchy process |
85 | -- | 90 | Fiona Fui-Hoon Nah, Keng Siau, Hong Sheng. The value of mobile applications: a utility company study |
91 | -- | 94 | R. Kelly Rainer Jr., Mark D. Miller. Examining differences across journal rankings |
95 | -- | 98 | Yufei Yuan, Brian Detlor. Intelligent mobile crisis response systems |
99 | -- | 101 | Chenglie Hu. Dataless objects considered harmful |
102 | -- | 104 | Shirley Ann Becker. E-government usability for older adults |
128 | -- | 0 | Peter G. Neumann. Responsibilities of technologists |