5 | -- | 0 | Diane Crawford. Editorial pointers |
9 | -- | 10 | . News track |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 16 | Robert L. Glass. The Standish report: does it really describe a software crisis? |
17 | -- | 21 | Hal Berghel, David Hoelzer. Disk wiping by any other name |
23 | -- | 24 | Diane Crawford. Top 10 downloads from ACM s digital library |
25 | -- | 27 | Dan B. Goldman. Blockbusters and blackboards |
28 | -- | 31 | Bryan Pardo. Introduction |
32 | -- | 37 | Daniel P. W. Ellis. Extracting information from music audio |
38 | -- | 43 | Roger B. Dannenberg, Christopher Raphael. Music score alignment and computer accompaniment |
44 | -- | 48 | Avery Wang. The Shazam music recognition service |
49 | -- | 52 | William P. Birmingham, Roger B. Dannenberg, Bryan Pardo. Query by humming with the VocalSearch system |
53 | -- | 58 | Jon W. Dunn, Donald Byrd, Mark Notess, Jenn Riley, Ryan Scherle. Variations2: retrieving and using music in an academic setting |
60 | -- | 66 | Alexander P. Pons. Biometric marketing: targeting the online consumer |
67 | -- | 70 | Václav Rajlich. Changing the paradigm of software engineering |
72 | -- | 77 | G. Daryl Nord, Tipton F. McCubbins, Jeretta Horn Nord. E-monitoring in the workplace: privacy, legislation, and surveillance software |
79 | -- | 83 | J. Drew Procaccino, June M. Verner, Steven J. Lorenzet. Defining and contributing to software development success |
85 | -- | 89 | Eugenia Y. Huang. Tightening access policy: the hidden trade-off |
90 | -- | 95 | Charlie McDowell, Linda L. Werner, Heather E. Bullock, Julian Fernald. Pair programming improves student retention, confidence, and program quality |
97 | -- | 100 | Mikko T. Siponen. Information security standards focus on the existence of process, not its content |
112 | -- | 0 | Deirdre K. Mulligan, Ari Schwartz, Indrani Mondal. Risks of online storage |