0 | -- | 95 | W. Neville Holmes. The Rise and Rise of Digital Gluttony |
6 | -- | 8 | David Alan Grier. The Age of Accountability |
12 | -- | 15 | George Lawton. Fighting Intrusions into Wireless Networks |
16 | -- | 19 | Linda Dailey Paulson. Libraries Face the Challenge of Archiving Digital Material |
20 | -- | 26 | Yun Wan, Gang Peng. What s Next for Shopbots? |
28 | -- | 33 | Lorcan Coyle, Mike Hinchey, Bashar Nuseibeh, José Luiz Fiadeiro. Guest Editors Introduction: Evolving Critical Systems |
34 | -- | 40 | Gabor Karsai, Fabio Massacci, Leon J. Osterweil, Ina Schieferdecker. Evolving Embedded Systems |
42 | -- | 48 | Tom Mens, Jeff Magee, Bernhard Rumpe. Evolving Software Architecture Descriptions of Critical Systems |
49 | -- | 55 | Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen. Evolution in Relation to Risk and Trust Management |
56 | -- | 63 | Bernard Cohen, Philip Boxer. Why Critical Systems Need Help to Evolve |
64 | -- | 72 | William Robinson. A Roadmap for Comprehensive Requirements Modeling |
77 | -- | 79 | Bob Ward. Bertrand Meyer Recieves 2010 Mills Award |
82 | -- | 83 | Kirk W. Cameron. The Challenges of Energy-Proportional Computing |
84 | -- | 86 | Yoshiaki Kushiki. The Future of Embedded Software: Adapting to Drastic Change |
87 | -- | 89 | Vishnu Vinekar, Christopher L. Huntley. Agility versus Maturity: Is There Really a Trade-Off? |
90 | -- | 93 | David De Roure. e-Science and the Web |