7 | -- | 9 | David Alan Grier. The Value of a Good Name |
12 | -- | 16 | David Geer. Are Companies Actually Using Secure Development Life Cycles? |
18 | -- | 21 | Linda Dailey Paulson. Steganography Development Offers Promise |
22 | -- | 23 | Oliver Bimber. Capturing the World |
24 | -- | 31 | Franz Leberl, Horst Bischof, Thomas Pock, Arnold Irschara, Stefan Kluckner. Aerial Computer Vision for a 3D Virtual Habitat |
32 | -- | 38 | Dragomir Anguelov, Carole Dulong, Daniel Filip, Christian Frueh, Stéphane Lafon, Richard Lyon, Abhijit S. Ogale, Luc Vincent, Josh Weaver. Google Street View: Capturing the World at Street Level |
40 | -- | 47 | Sameer Agarwal, Yasutaka Furukawa, Noah Snavely, Brian Curless, Steven M. Seitz, Richard Szeliski. Reconstructing Rome |
48 | -- | 53 | Michael Goesele, Jens Ackermann, Simon Fuhrmann, Ronny Klowsky, Fabian Langguth, Patrick Mucke, Martin Ritz. Scene Reconstruction from Community Photo Collections |
54 | -- | 60 | Jaak Tepandi, Ilja Tsahhirov, Stanislav Vassiljev. Wireless PKI Security and Mobile Voting |
61 | -- | 67 | Anita Sarma, David F. Redmiles, André van der Hoek. Categorizing the Spectrum of Coordination Technology |
72 | -- | 73 | Bob Ward. Computer Society Announces Award Winners |
76 | -- | 78 | Cees G. M. Snoek, Arnold W. M. Smeulders. Visual-Concept Search Solved? |
79 | -- | 81 | D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil. Adding Attributes to Role-Based Access Control |
82 | -- | 85 | Lecia Jane Barker, Joanne McGrath Cohoon, Lucy Sanders. Strategy Trumps Money: Recruiting Undergraduate Women into Computing |
86 | -- | 89 | Chris Harrison. Appropriated Interaction Surfaces |
90 | -- | 92 | Tiziana Margaria, Bernhard Steffen. Simplicity as a Driver for Agile Innovation |
94 | -- | 96 | Anne-Françoise Rutkowski, Carol S. Saunders. Growing Pains with Information Overload |