| 6 | -- | 8 | David Alan Grier. Dirty Electricity |
| 12 | -- | 15 | Linda Dailey Paulson. Developers Shift to Dynamic Programming Languages |
| 16 | -- | 19 | George Lawton. Powering Down the Computing Infrastructure |
| 20 | -- | 22 | Linda Dailey Paulson. News Briefs |
| 24 | -- | 30 | André N. Klingsheim, Vebjørn Moen, Kjell Jørgen Hole. Challenges in Securing Networked J2ME Applications |
| 31 | -- | 36 | David Schuff, Ozgur Turetken, John D Arcy, David Croson. Managing E-Mail Overload: Solutions and Future Challenges |
| 38 | -- | 44 | Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar. Cryptography on a Speck of Dust |
| 45 | -- | 53 | Huaizhi Li, Mukesh Singhal. Trust Management in Distributed Systems |
| 54 | -- | 58 | Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Venkatesh Srinivasan, Lokesh Bhatia. Marking Technique to Isolate Boundary Router and Attacker |
| 59 | -- | 63 | Min Tian, Andreas Gramm, Hartmut Ritter, Jochen H. Schiller, Thiemo Voigt. Adaptive QoS for Mobile Web Services through Cross-Layer Communication |
| 64 | -- | 69 | Les Hatton. How Accurately Do Engineers Predict Software Maintenance Tasks? |
| 89 | -- | 92 | Katie A. Siek, Kay Connelly, Suzanne Menzel, Laura Hopkins. Propagating Diversity through Active Dissemination |
| 93 | -- | 95 | Daniel Peek, Jason Flinn. Consumer Electronics Meets Distributed Storage |
| 96 | -- | 100 | David P. Luebke, Greg Humphreys. How GPUs Work |
| 101 | -- | 103 | Michael R. Macedonia. The Future Arrives ... Finally |
| 104 | -- | 106 | Mahesh V. Tripunitara, Thomas S. Messerges. Resolving the Micropayment Problem |
| 107 | -- | 109 | Michael Grottke, Kishor S. Trivedi. Fighting Bugs: Remove, Retry, Replicate, and Rejuvenate |
| 110 | -- | 112 | Raghavendra Rao Loka. Software Development: What Is the Problem? |