| 12 | -- | 14 | Don Kiely. Wanted: Programmers for Handheld Devices |
| 16 | -- | 18 | John Edwards. Next-Generation Viruses Present New Challenges |
| 24 | -- | 27 | Atsushi Kara. Protecting Privacy in Remote-Patient Monitoring |
| 28 | -- | 35 | Bertrand Meyer. Software Engineering in the Academy |
| 36 | -- | 0 | Michael J. Lutz. Guest Editor s Introduction: Software Engineering on Internet Time |
| 37 | -- | 43 | Martin L. Griss, Gilda Pour. Accelerating Development with Agent Components |
| 44 | -- | 50 | Sahra Sedigh-Ali, Arif Ghafoor, Raymond A. Paul. Software Engineering Metrics for COTS-Based Systems |
| 51 | -- | 57 | Richard Baskerville, Linda Levine, Jan Pries-Heje, Balasubramaniam Ramesh, Sandra Slaughter. How Internet Software Companies Negotiate Quality |
| 58 | -- | 63 | Patricia K. Lawlis, Kathryn E. Mark, Deborah A. Thomas, Terry Courtheyn. A Formal Process for Evaluating COTS Software Products |
| 64 | -- | 70 | William E. Wright. An Efficient Video-on-Demand Model |
| 87 | -- | 88 | David Sobel. Will Carnivore Devour Online Privacy? |
| 89 | -- | 90 | Stanislaw Deniziak, Krzysztof Sapiecha. Developing a High-Level Fault Simulation Standard |
| 91 | -- | 93 | Victor R. Basili, Barry W. Boehm. COTS-Based Systems Top 10 List |
| 94 | -- | 96 | W. Neville Holmes. The Great Term Robbery |