8 | -- | 10 | Ted G. Lewis. The NC Phenomena: Scenes from Your Living Room |
10 | -- | 11 | John Sterlicchi, Thomas Kaneshige. Immigration Issue Divides US Computer Industry |
18 | -- | 28 | Cristiana Amza, Alan L. Cox, Sandhya Dwarkadas, Peter J. Keleher, Honghui Lu, Ramakrishnan Rajamony, Weimin Yu, Willy Zwaenepoel. ThreadMarks: Shared Memory Computing on Networks of Workstations |
29 | -- | 35 | Jakob Nielsen, Jan Maurits Faber. Improving System Usability Through Parallel Design |
38 | -- | 47 | Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman. Role-Based Access Control Models |
49 | -- | 56 | Michel Raynal, Mukesh Singhal. Logical Time: Capturing Causality in Distributed Systems |
57 | -- | 60 | David Lorge Parnas. Why Software Jewels Are Rare |
62 | -- | 66 | Philippe Desfray. Automated Object Design: The Client-Server Case |
74 | -- | 75 | Darrell D. E. Long, Abdelsalam Helal. TC On Operating Systems and Application Environments |
76 | -- | 78 | Bertrand Meyer. The Reusability Challenge |
78 | -- | 79 | Algirdas Pakstas, Sonata Pakstiene. NSK - A Norwegian Cryptochip for Supersafe Communications |
80 | -- | 82 | Capers Jones. Software Change Management |
94 | -- | 0 | Irah H. Donner. For Whom The Bomb Tolls |
120 | -- | 0 | Shankar Hemmady. The Consultant s Ten Commandments |