5 | -- | 0 | Diane Crawford. Editorial pointers |
13 | -- | 18 | Peter J. Denning. Computing is a natural science |
19 | -- | 22 | Michael A. Cusumano. The changing labyrinth of software pricing |
23 | -- | 25 | Abbe Mowshowitz, Nanda Kumar. Public vs. private interest on the internet |
26 | -- | 29 | Michael Zyda. Introduction |
30 | -- | 35 | Merrilea J. Mayo. Games for science and engineering education |
36 | -- | 43 | Ralph E. Chatham. Games for training |
44 | -- | 49 | Henry Kelly, Kay Howell, Eitan Glinert, Loring Holding, Chris Swain, Adam Burrowbridge, Michelle Roper. How to build serious games |
50 | -- | 57 | Randy Pausch, Donald Marinelli. Carnegie Mellon s entertainment technology center: combining the left and right brain |
58 | -- | 64 | Caitlin Kelleher, Randy Pausch. Using storytelling to motivate programming |
66 | -- | 73 | Nikunj Raghuvanshi, Christian Lauterbach, Anish Chandak, Dinesh Manocha, Ming C. Lin. Real-time sound synthesis and propagation for games |
74 | -- | 80 | Robert P. Schumaker, Ying Liu, Mark Ginsburg, Hsinchun Chen. Evaluating the efficacy of a terrorism question/answer system |
81 | -- | 85 | In Lee. An architecture for a next-generation holistic e-recruiting system |
86 | -- | 91 | Harris Wu, Michael D. Gordon. Collaborative structuring: organizing document repositories effectively and efficiently |
92 | -- | 101 | Fred Niederman, Richard G. Mathieu, Roger Morley, Ik-Whan Kwon. Examining RFID applications in supply chain management |
103 | -- | 108 | Someswar Kesh, Pauline Ratnasingam. A knowledge architecture for IT security |
109 | -- | 116 | Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu. A roadmap for comprehensive online privacy policy management |
117 | -- | 122 | Waymond Rodgers, Solomon Negash. The effects of web-based technologies on knowledge transfer |
123 | -- | 126 | Sabah S. Al-Fedaghi. Conferences under scrutiny |
136 | -- | 0 | Charles Perrow. Disasters evermore? |