8 | -- | 10 | David Alan Grier. Finding What You Want |
13 | -- | 16 | David Geer. Whatever Happened to Network-Access-Control Technology? |
17 | -- | 20 | Linda Dailey Paulson. New Service Promises to Improve Online Search |
21 | -- | 30 | Nancy R. Mead, Joe Jarzombek. Advancing Software Assurance with Public-Private Collaboration |
31 | -- | 40 | Frederick T. Sheldon, Claire Vishik. Moving Toward Trustworthy Systems: R&D Essentials |
41 | -- | 46 | Samuel T. Redwine Jr.. Fitting Software Assurance into Higher Education |
47 | -- | 53 | Ann E. Kelley Sobel, Gary McGraw. Interview: Software Security in the Real World |
54 | -- | 61 | Wei Tan, Jia Zhang, Ian T. Foster. Network Analysis of Scientific Workflows: A Gateway to Reuse |
62 | -- | 67 | Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Peter F. Sweeney. The Effect of Omitted-Variable Bias on the Evaluation of Compiler Optimizations |
74 | -- | 76 | Bob Ward. Society Honors Five Top Computing Professionals |
77 | -- | 78 | Bob Ward. Call and Calendar |
79 | -- | 81 | George P. Schell. IT Value: From Moore's Law to a Flat World |
82 | -- | 85 | Ron Kohavi, Roger Longbotham, Toby Walker. Online Experiments: Practical Lessons |
86 | -- | 88 | Kirk W. Cameron. A Tale of Two Green Lists |
90 | -- | 92 | W. Neville Holmes. Seven Digital Steps to Avoid Utter Hell |