| 9 | -- | 11 | David Alan Grier. The Lay of the Land |
| 12 | -- | 13 | . 32 & 16 Years Ago |
| 14 | -- | 17 | David Geer. Behavior-Based Network Security Goes Mainstream |
| 18 | -- | 20 | Sixto Ortiz Jr.. Is Near-Field Communication Close to Success? |
| 21 | -- | 24 | Linda Dailey Paulson. News Briefs |
| 25 | -- | 30 | George Roussos. Enabling RFID in Retail |
| 31 | -- | 38 | Parthasarathy Ranganathan, Erik Geelhoed, Meera Manahan, Ken Nicholas. Energy-Aware User Interfaces and Energy-Adaptive Displays |
| 40 | -- | 45 | Luca Chittaro. Visualizing Information on Mobile Devices |
| 46 | -- | 52 | Niraj Tolia, David G. Andersen, Mahadev Satyanarayanan. Quantifying Interactive User Experience on Thin Clients |
| 53 | -- | 57 | Isabel Cristina Italiano, João Eduardo Ferreira. Synchronization Options for Data Warehouse Designs |
| 58 | -- | 66 | Mohamad Badra, Ibrahim Hajjeh. Key-Exchange Authentication Using Shared Secrets |
| 67 | -- | 70 | Bob Ward. Organizers Announce Field for CSIDC 2006 |
| 71 | -- | 73 | . Call and Calendar |
| 83 | -- | 86 | Juan E. Gilbert. Making a Case for BPC |
| 87 | -- | 89 | JoAnn M. Paul. What s in a Name |
| 93 | -- | 95 | Krzysztof Walczak, Wojciech Cellary, Martin White. Virtual Museum Exhibitions |
| 96 | -- | 98 | Erik Duval, Wayne Hodgins. Standardized Uniqueness: Oxymoron or Vision of the Future? |
| 99 | -- | 101 | Martin Bichler, Kwei-Jay Lin. Service-Oriented Computing |
| 102 | -- | 104 | Janusz S. Kowalik. The Applied Mathematics and Computer Science Schism |