6 | -- | 8 | David Alan Grier. The Camino Real |
12 | -- | 14 | Sixto Ortiz Jr.. Searching the Visual Web |
15 | -- | 18 | Linda Dailey Paulson, George Lawton. News Briefs |
19 | -- | 26 | Feisal Keblawi, Dick Sullivan. The Case for Flexible NIST Security Standards |
27 | -- | 35 | Jane Cleland-Huang, Brian Berenbach, Stephen Clark, Raffaella Settimi, Eli Romanova. Best Practices for Automated Traceability |
37 | -- | 47 | Michael Gschwind, David Erb, Sid Manning, Mark Nutter. An Open Source Environment for Cell Broadband Engine System Software |
49 | -- | 59 | Nidhi Aggarwal, Parthasarathy Ranganathan, Norman P. Jouppi, James E. Smith. Isolation in Commodity Multicore Processors |
60 | -- | 66 | Yu-Chee Tseng, You-Chiun Wang, Kai-Yang Cheng, Yao-Yu Hsieh. iMouse: An Integrated Mobile Surveillance and Wireless Sensor System |
68 | -- | 74 | Saikat Chakrabarti 0002, Mukesh Singhal. Password-Based Authentication: Preventing Dictionary Attacks |
84 | -- | 85 | Bob Ward. Computer Society Connection |
90 | -- | 93 | W. Neville Holmes. Binary Arithmetic |
94 | -- | 95 | Michael R. Macedonia. iPhones Target the Tech Elite |
96 | -- | 98 | Tessa A. Lau. Social Scripting for the Web |
100 | -- | 102 | Shawn A. Bohner. An Era of Change-Tolerant Systems |
103 | -- | 105 | Laszlo Hars. Discryption: Internal Hard-Disk Encryption for Secure Storage |
106 | -- | 108 | Sean M. Price. Supporting Resource-Constrained Collaboration Environments |