5 | -- | 0 | Diane Crawford. Editorial pointers |
9 | -- | 10 | . News track |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 20 | Hal Berghel. The two sides of ROI: return on investment vs. risk of incarceration |
21 | -- | 25 | David A. Patterson. The state of funding for new initiatives in computer science and engineering |
27 | -- | 31 | Peter J. Denning. Is computer science science? |
33 | -- | 34 | Diane Crawford. Top 10 downloads from ACM s digital library |
35 | -- | 37 | Richard P. Suttmeier. A new technonationalism?: China and the development of technical standards |
39 | -- | 43 | Vinton G. Cerf. Spam, spim, and spit |
44 | -- | 48 | Maris G. Martinsons. Introduction |
49 | -- | 53 | Jonathan J. H. Zhu, Enhai Wang. Diffusion, use, and effect of the internet in China |
54 | -- | 58 | Xunhua Guo, Guoqing Chen. Internet diffusion in Chinese companies |
59 | -- | 60 | Maris G. Martinsons. The internet enlightens and empowers Chinese society |
62 | -- | 67 | Robert M. Davison, Douglas R. Vogel, Roger W. Harris. The e-transformation of western China |
69 | -- | 72 | Jing Quan, Qing Hu, Xinan Wang. IT is not for everyone in China |
73 | -- | 76 | Glen R. Burrows, Damon L. Drummond, Maris G. Martinsons. Knowledge management in China |
77 | -- | 81 | Qiang Tu, Kanliang Wang, Qin Shu. Computer-related technostress in China |
83 | -- | 86 | Charalambos L. Iacovou, Albert S. Dexter. Surviving IT project cancellations |
88 | -- | 94 | Christian S. Collberg, Stephen G. Kobourov. Self-plagiarism in computer science |
95 | -- | 100 | Ellen Christiaanse. Performance benefits through integration hubs |
101 | -- | 106 | Bettina Berendt, Oliver Günther, Sarah Spiekermann. Privacy in e-commerce: stated preferences vs. actual behavior |
107 | -- | 112 | Dursun Delen, Nikunj P. Dalal, Perakath C. Benjamin. Integrated modeling: the key to holistic understanding of the enterprise |
113 | -- | 116 | Kay Chen Tan, M. L. Wang, W. Peng. A P2P genetic algorithm environment for the internet |
117 | -- | 119 | Hai Zhuge. Semantic grid: scientific issues, infrastructure, and methodology |
136 | -- | 0 | Bruce Schneier. Two-factor authentication: too little, too late |