6 | -- | 8 | David Alan Grier. Dirty Electricity |
12 | -- | 15 | Linda Dailey Paulson. Developers Shift to Dynamic Programming Languages |
16 | -- | 19 | George Lawton. Powering Down the Computing Infrastructure |
20 | -- | 22 | Linda Dailey Paulson. News Briefs |
24 | -- | 30 | André N. Klingsheim, Vebjørn Moen, Kjell Jørgen Hole. Challenges in Securing Networked J2ME Applications |
31 | -- | 36 | David Schuff, Ozgur Turetken, John D Arcy, David Croson. Managing E-Mail Overload: Solutions and Future Challenges |
38 | -- | 44 | Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar. Cryptography on a Speck of Dust |
45 | -- | 53 | Huaizhi Li, Mukesh Singhal. Trust Management in Distributed Systems |
54 | -- | 58 | Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Venkatesh Srinivasan, Lokesh Bhatia. Marking Technique to Isolate Boundary Router and Attacker |
59 | -- | 63 | Min Tian, Andreas Gramm, Hartmut Ritter, Jochen H. Schiller, Thiemo Voigt. Adaptive QoS for Mobile Web Services through Cross-Layer Communication |
64 | -- | 69 | Les Hatton. How Accurately Do Engineers Predict Software Maintenance Tasks? |
89 | -- | 92 | Katie A. Siek, Kay Connelly, Suzanne Menzel, Laura Hopkins. Propagating Diversity through Active Dissemination |
93 | -- | 95 | Daniel Peek, Jason Flinn. Consumer Electronics Meets Distributed Storage |
96 | -- | 100 | David P. Luebke, Greg Humphreys. How GPUs Work |
101 | -- | 103 | Michael R. Macedonia. The Future Arrives ... Finally |
104 | -- | 106 | Mahesh V. Tripunitara, Thomas S. Messerges. Resolving the Micropayment Problem |
107 | -- | 109 | Michael Grottke, Kishor S. Trivedi. Fighting Bugs: Remove, Retry, Replicate, and Rejuvenate |
110 | -- | 112 | Raghavendra Rao Loka. Software Development: What Is the Problem? |