6 | -- | 8 | David Alan Grier. The Dictator and the Web Design |
11 | -- | 13 | Steven J. Vaughan-Nichols. Vendors Draw up a New Graphics-Hardware Approach |
14 | -- | 17 | George Lawton. The Changing Face of Open Source |
18 | -- | 21 | Linda Dailey Paulson. The Changing World of Outsourcing |
23 | -- | 29 | Nathanael Paul, Andrew S. Tanenbaum. Trustworthy Voting: From Machine to System |
30 | -- | 32 | Piotr Pacyna, Anthony M. Rutkowski, Amardeo Sarma, Kenji Takahashi. Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems |
33 | -- | 40 | David W. Chadwick, George Inman. Attribute Aggregation in Federated Identity Management |
42 | -- | 49 | Paul Madsen, Hiroki Itoh. Challenges to Supporting Federated Assurance |
50 | -- | 57 | Federica Paci, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino. An Interoperable Approach to Multifactor Identity Verification |
58 | -- | 65 | Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Joao Girão. A SWIFT Take on Identity Management |
66 | -- | 73 | Manuel Barranco, Julian Proenza, LuÃs Almeida. Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate |
79 | -- | 83 | Bob Ward. Computer Society Connection |
87 | -- | 89 | Kirk W. Cameron. The Road to Greener IT Pastures |
90 | -- | 94 | Ken Birman, Jared Cantwell, Daniel Freedman, Qi Huang, Petko Nikolov, Krzysztof Ostrowski. Edge Mashups for Service-Oriented Collaboration |
95 | -- | 97 | Ali El Kateeb. Hardware Reconfiguration Capability for Third-Generation Sensor Nodes |
98 | -- | 101 | Bernard J. Jansen, Theresa Flaherty, Ricardo A. Baeza-Yates, Lee Hunter, Brendan Kitts, Jamie Murphy. The Components and Impact of Sponsored Search |
102 | -- | 104 | W. Neville Holmes. The Design of Government |