5 | -- | 0 | Ronald F. Boisvert, Holly E. Rushmeier. ACM publications: access and sustainability |
7 | -- | 0 | Scott E. Delman. Looking back and forward |
8 | -- | 0 | . Apple builds great platforms, too, not just products |
10 | -- | 0 | David Roman. Previewing the new CACM web site |
11 | -- | 13 | Kirk L. Kroeker. Living machines |
14 | -- | 16 | Ted Selker. Touching the future |
17 | -- | 19 | Samuel Greengard. Upwardly mobile |
20 | -- | 0 | Leah Hoffmann. Making a difference |
21 | -- | 23 | Alok Aggarwal. Emerging markets - Labor supply in the Indian IT industry |
24 | -- | 26 | Cameron Wilson, Peter Harsha. IT policy - Advising policymakers is more than just providing advice |
27 | -- | 28 | George Neville-Neil. Kode vicious - Permanence and change |
29 | -- | 31 | Peter J. Denning, Chris Gunderson, Frederick Hayes-Roth. The profession of IT - Evolutionary system development |
32 | -- | 35 | James R. Hamilton. Interview - Database dialogue with Pat Selinger |
43 | -- | 49 | Mache Creeger. CTO virtualization roundtable, part II |
50 | -- | 56 | Francine Berman. Got data?: a guide to data preservation in the information age |
58 | -- | 67 | Ian Horrocks. Ontologies and the semantic web |
68 | -- | 74 | Oren Etzioni, Michele Banko, Stephen Soderland, Daniel S. Weld. Open information extraction from the web |
76 | -- | 0 | Michael Stonebraker. Technical perspective - One size fits all: an idea whose time has come and gone |
77 | -- | 85 | Peter A. Boncz, Martin L. Kersten, Stefan Manegold. Breaking the memory wall in MonetDB |
86 | -- | 0 | Martin C. Rinard. Technical perspective - Patching program errors |
87 | -- | 95 | Gene Novark, Emery D. Berger, Benjamin G. Zorn. Exterminator: Automatically correcting memory errors with high probability |
118 | -- | 0 | Peter Winkler. Puzzled - Solutions and sources |
120 | -- | 0 | Cory Doctorow. Future tense - Pester power |
121 | -- | 127 | Peter Duchessi, InduShobha N. Chengalur-Smith. Enhancing business performance via vendor managed inventory applications |
128 | -- | 132 | Chee Wei Phang, Atreyi Kankanhalli. A framework of ICT exploitation for e-participation initiatives |
133 | -- | 137 | Michael J. Davern, Carla Wilkin. Evolving innovations through design and use |
138 | -- | 142 | Michael Näf, David A. Basin. Two approaches to an information security laboratory |
143 | -- | 146 | Patrick Stacey, Joe Nandhakumar. Opening up to agile games development |
147 | -- | 150 | Ross A. Malaga. Worst practices in search engine optimization |
151 | -- | 154 | Pierre R. Berthon, Leyland F. Pitt, Richard T. Watson. From Genesis to Revelations: the technology diaspora |
155 | -- | 157 | Vivien K. G. Lim, Thompson S. H. Teo, Jen Yuin Chin. Technical opinion - Bosses and their e-manners |