5 | -- | 0 | Diane Crawford. Editorial pointers |
9 | -- | 10 | . News track |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 16 | David A. Patterson. 20:::th::: century vs. 21:::st::: century C&C: the SPUR manifesto |
17 | -- | 20 | Phillip G. Armour. Project portfolios: organizational management of risk |
21 | -- | 22 | Diane Crawford. Top 10 downloads from ACM s digital library |
23 | -- | 24 | Gregory J. Conti. Why computer scientists should attend hacker conferences |
25 | -- | 26 | Robert L. Glass. The first business application: a significant milestone in software history |
27 | -- | 31 | Pamela Samuelson. Legislative challenges to the ::::Sony:::: safe harbor rule |
32 | -- | 35 | Norbert A. Streitz, Paddy Nixon. Introduction |
36 | -- | 41 | Gaetano Borriello, Matthew Chalmers, Anthony LaMarca, Paddy Nixon. Delivering real-world ubiquitous location systems |
42 | -- | 48 | Daniel M. Russell, Norbert A. Streitz, Terry Winograd. Building disappearing computers |
49 | -- | 53 | Joëlle Coutaz, James L. Crowley, Simon Dobson, David Garlan. Context is key |
54 | -- | 57 | Steve Benford, Carsten Magerkurth, Peter Ljungstrand. Bridging the physical and digital in pervasive gaming |
59 | -- | 60 | Saadi Lahlou, Marc Langheinrich, Carsten Röcker. Privacy and trust issues with invisible computers |
62 | -- | 65 | Liam J. Bannon, Steve Benford, John Bowers, Christian Heath. Hybrid design creates innovative museum experiences |
66 | -- | 0 | Hans Gellersen. Smart-Its: computers for artifacts in the physical world |
67 | -- | 68 | Spyros Lalis, Alexandros Karypidis, Anthony Savidis. Ad-hoc composition in wearable and mobile computing |
69 | -- | 0 | Achilles Kameas, Irene Mavrommati. Extrovert gadgets |
70 | -- | 0 | Joseph A. Paradiso. Sensate media |
71 | -- | 0 | Anatole Gershman, Andrew E. Fano. Examples of commercial applications of ubiquitous computing |
72 | -- | 78 | Jacques Cohen. Computer science and bioinformatics |
79 | -- | 84 | Arun Sen, Atish P. Sinha. A comparison of data warehousing methodologies |
85 | -- | 0 | . SIGs announce candidates for election |
86 | -- | 91 | Trevor T. Moores. Do consumers understand the role of privacy seals in e-commerce? |
93 | -- | 97 | Bonnie Rubenstein-Montano, Victoria Y. Yoon, Stuart Lowry, Teresa Merlau. A multiagent system for U.S. defense research contracting |
98 | -- | 104 | William L. Hibbard, Curtis Rueden, Steve Emmerson, Tom Rink, David Glowacki, Tom Whittaker, Don Murray, David Fulker, John Anderson. Java distributed components for numerical visualization in VisAD |
105 | -- | 109 | Ji-Ye Mao, Karel Vredenburg, Paul W. Smith, Tom Carey. The state of user-centered design practice |
111 | -- | 114 | Xiaoni Zhang, Victor R. Prybutok. How the mobile communication markets differ in China, the U.S., and Europe |
115 | -- | 117 | Marco Gori, Ian H. Witten. The bubble of web visibility |
128 | -- | 0 | Peter G. Neumann. Anticipating disasters |