5 | -- | 7 | Diane Crawford. Editorial pointers |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 16 | Diane Crawford. Top 10 downloads from ACM s digital library |
17 | -- | 20 | Phillip G. Armour. Counting boulders and measuring mountains |
29 | -- | 32 | Meg McGinity Shannon. The network of life |
33 | -- | 35 | David A. Patterson. New Directions for ::::CACM::::? |
37 | -- | 39 | Scott Campbell. How to think about security failures |
40 | -- | 43 | Jaime Teevan, William Jones, Benjamin B. Bederson. Introduction |
44 | -- | 50 | Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Pérez-Quiñones, Meredith M. Skeels, Tiziana Catarci. Digital memories in an era of ubiquitous computing and abundant storage |
51 | -- | 55 | Wanda Pratt, Kenton T. Unruh, Andrea Civan, Meredith M. Skeels. Personal health information management |
56 | -- | 57 | Clare-Marie Karat, Carolyn Brodie, John Karat. Usable privacy and security for personal information management |
58 | -- | 64 | Edward Cutrell, Susan T. Dumais, Jaime Teevan. Searching to eliminate personal information management |
66 | -- | 67 | Catherine C. Marshall, William Jones. Keeping encountered information |
68 | -- | 73 | Steve Whittaker, Victoria Bellotti, Jacek Gwizdka. Email in personal information management |
74 | -- | 75 | Thomas Erickson. From PIM to GIM: personal information management in group contexts |
77 | -- | 82 | David R. Karger, William Jones. Data unification in personal information management |
84 | -- | 86 | Diane Kelly. Evaluating personal information management behaviors and tools |
88 | -- | 95 | Jim Gemmell, Gordon Bell, Roger Lueder. MyLifeBits: a personal database for everything |
96 | -- | 100 | Kevin C. Desouza, Yukika Awazu, Amrit Tiwana. Four dynamics for bringing use back into software reuse |
101 | -- | 106 | George Pallis, Athena Vakali. Insight and perspectives for content delivery networks |
107 | -- | 113 | Grace J. Johnson, Paul J. Ambrose. Neo-tribes: the power and potential of online communities in health care |
114 | -- | 119 | Tim Chenoweth, Karen Corral, Haluk Demirkan. Seven key interventions for data warehouse success |
121 | -- | 125 | Lawrence A. Gordon, Martin P. Loeb. Budgeting process for information security expenditures |
126 | -- | 130 | Matti Tedre, Erkki Sutinen, Esko Kähkönen, Piet Kommers. Ethnocomputing: ICT in cultural and social context |
131 | -- | 134 | Christoph Meinel, Volker Klotz. The first 10 years of the ECCC digital library |
160 | -- | 0 | John C. Knight, Nancy G. Leveson. Software and higher education |