12 | -- | 17 | George Lawton. Video Streams into the Mainstream |
18 | -- | 21 | Sixto Ortiz Jr.. Broadband Fixed Wireless Travels the Last Mile |
28 | -- | 35 | John L. Henning. SPEC CPU2000: Measuring CPU Performance in the New Millennium |
36 | -- | 41 | David J. Goodman. The Wireless Internet: Promises and Challenges |
42 | -- | 48 | Jan M. Rabaey, M. Josie Ammer, Julio Leao da Silva Jr., Danny Patel, Shad Roundy. PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking |
49 | -- | 55 | Andrew P. Snow, Upkar Varshney, Alisha D. Malloy. Reliability and Survivability of Wireless and Mobile Networks |
57 | -- | 65 | Thomas Ball, James R. Larus. Using Paths to Measure, Explain, and Enhance Program Behavior |
66 | -- | 71 | Václav Rajlich, Keith H. Bennett. A Staged Model for the Software Life Cycle |
73 | -- | 79 | Forrest Shull, Ioana Rus, Victor R. Basili. How Perspective-Based Reading Can Improve Requirements Inspections |
97 | -- | 98 | W. Neville Holmes. Fashioning a Foundation for the Computing Profession |
99 | -- | 102 | Barry W. Boehm. Requirements that Handle IKIWISI, COTS, and Rapid Change |
104 | -- | 107 | Veljko M. Milutinovic, Predrag Knezevic, Bozidar Radunovic, Steve Casselman, John Schewel. Obelix Searches Internet Using Customer Data |
108 | -- | 110 | John R. Michener, Tolga Acar. Managing System and Active-Content Integrity |
110 | -- | 112 | Ted G. Lewis. The Web Fosters a Rust-Belt Renaissance |