5 | -- | 0 | Moshe Y. Vardi. Is the image crisis over? |
10 | -- | 11 | Ramana Rao, Greg Linden. Computer science curriculum, deceptive advertising |
12 | -- | 0 | David Roman. Internet addiction: it s spreading, but is it real? |
13 | -- | 14 | Gary Anthes. Deep data dives discover natural laws |
15 | -- | 17 | Kirk L. Kroeker. Electronic paper s next chapter |
18 | -- | 20 | Leah Hoffmann. Implementing electronic medical records |
21 | -- | 23 | Gregory Goth. Exploring new frontiers |
25 | -- | 27 | Butler W. Lampson. Privacy and security - Usable security: how to get it |
28 | -- | 30 | Pamela Samuelson. Legally speaking - Are business methods patentable? |
31 | -- | 33 | Shane Greenstein. Economic and business dimensions - The broadband price is not right |
34 | -- | 35 | Jonathan M. Smith. Viewpoint - On public service and computer science |
42 | -- | 47 | Whitfield Diffie, Susan Landau. Communications surveillance: privacy and security at risk |
48 | -- | 53 | Katie Shilton. Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection |
54 | -- | 58 | Paul Stachour, David Collier-Brown. You don t know jack about software maintenance |
60 | -- | 67 | Mitchel Resnick, John Maloney, Andrés Monroy-Hernández, Natalie Rusk, Evelyn Eastmond, Karen Brennan, Amon Millner, Eric Rosenbaum, Jay S. Silver, Brian Silverman, Yasmin B. Kafai. Scratch: programming for all |
68 | -- | 73 | Tridib Bandyopadhyay, Vijay S. Mookerjee, Ram C. Rao. Why IT managers don t go for cyber-insurance products |
74 | -- | 84 | Edmund M. Clarke, E. Allen Emerson, Joseph Sifakis. Model checking: algorithmic verification and debugging |
86 | -- | 0 | Peter Druschel. Technical perspective - Narrowing the semantic gap in distributed programming |
87 | -- | 95 | Boon Thau Loo, Tyson Condie, Minos N. Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica. Declarative networking |
96 | -- | 0 | John Shawe-Taylor. Technical perspective - Machine learning for complex predictions |
97 | -- | 104 | Thorsten Joachims, Thomas Hofmann, Yisong Yue, Chun-Nam John Yu. Predicting structured objects with support vector machines |
112 | -- | 0 | Peter Winkler. Puzzled - Covering the plane |
113 | -- | 117 | Lara Khansa, Divakaran Liginlal. Quantifying the benefits of investing in information security |
118 | -- | 124 | Wei-Lun Chang, Soe-Tsyr Yuan, Eldon Y. Li. iCare home portal: an extended model of quality aging e-services |
125 | -- | 131 | Aakash Taneja, Anil Singh, M. K. Raja. Computing journals and their emerging roles in knowledge exchange |
132 | -- | 135 | Rudy Hirschheim. Offshoring and the new world order |
136 | -- | 140 | Cristiana Bolchini, Carlo Curino, Giorgio Orsi, Elisa Quintarelli, Rosalba Rossato, Fabio A. Schreiber, Letizia Tanca. And what can context do for data? |
141 | -- | 145 | Frank McCown, Catherine C. Marshall, Michael L. Nelson. Why web sites are lost (and how they re sometimes found) |
146 | -- | 149 | Ralph Westfall. If your pearls of wisdom fall in a forest.. |