8 | -- | 9 | Charles Severance. Ian Horrocks: Standardizing OWL |
10 | -- | 13 | Brian M. Gaff, David J. Levine, Raymond Gabriel. Understanding US Trade Controls |
14 | -- | 15 | W. Neville Holmes. 32 & 16 Years Ago |
16 | -- | 19 | Neal Leavitt. Today's Mobile Security Requires a New Approach |
20 | -- | 22 | Lee Garber. News Briefs |
23 | -- | 25 | Tiziana Margaria, Mike Hinchey. Simplicity in IT: The Power of Less |
26 | -- | 32 | Barry D. Floyd, Steve Boßelmann. ITSy-Simplicity Research in Information and Communication Technology |
34 | -- | 39 | Jan Bosch. Achieving Simplicity with the Three-Layer Product Model |
40 | -- | 47 | Cristina Cerschi Seceleanu, Ivica Crnkovic. Component Models for Reasoning |
48 | -- | 54 | Anna-Lena Lamprecht, Stefan Naujokat, Ina Schaefer. Variability Management beyond Feature Models |
56 | -- | 62 | Johannes Neubauer, Bernhard Steffen. Plug-and-Play Higher-Order Process Integration |
63 | -- | 66 | Chandra Prasad, Wolfram Schulte. Taking Control of Your Engineering Tools |
68 | -- | 71 | Tiberiu Seceleanu, Gaetana Sapienza. A Tool Integration Framework for Sustainable Embedded Systems Development |
72 | -- | 74 | Regina Herzlinger, Margo I. Seltzer, Mark Gaynor. Applying KISS to Healthcare Information Technology |
76 | -- | 83 | Arshdeep Bahga, Vijay Krishna Madisetti. Rapid Prototyping of Multitier Cloud-Based Services and Systems |
84 | -- | 86 | James Bret Michael, Phillip A. Laplante, Jeffery E. Payne, Paul E. Black, Jeffrey M. Voas. Does Security Trump Reliability? |
87 | -- | 90 | David S. L. Wei, San Murugesan, Sy-Yen Kuo, Kshirasagar Naik, Danny Krizanc. Enhancing Data Integrity and Privacy in the Cloud: An Agenda |
91 | -- | 94 | Joshua C. Klontz, Anil K. Jain. A Case Study of Automated Face Recognition: The Boston Marathon Bombings Suspects |
95 | -- | 98 | Brian David Johnson. Jimmy Takes Manhattan |
120 | -- | 0 | David Alan Grier. The Trappings of Power |