4 | -- | 6 | Fred Douglis. On Social Networking and Communication Paradigms |
7 | -- | 9 | Greg Goth. The Net s Going Green: Multipronged Approach Might Save Costs, Energy - and the Climate |
10 | -- | 13 | Dejan S. Milojicic. Interview with Rich Friedrich, Dave Cohen, Alex Dreiling |
14 | -- | 17 | Sharad Mehrotra, Taieb Znati, Craig W. Thompson. Crisis Management |
18 | -- | 25 | Marius Portmann, Asad Amir Pirzada. Wireless Mesh Networks for Public Safety and Crisis Management Applications |
26 | -- | 37 | Tiziana Catarci, Massimiliano de Leoni, Andrea Marrella, Massimo Mecella, Berardino Salvatore, Guido Vetere, Schahram Dustdar, Lukasz Juszczyk, Atif Manzoor, Hong Linh Truong. Pervasive Software Environments for Supporting Disaster Responses |
38 | -- | 44 | Pavan Kumar Chitumalla, Douglas Harris, Bhavani M. Thuraisingham, Latifur Khan. Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing |
45 | -- | 47 | Joseph B. Kopena, Evan Sultanik, Robert N. Lass, Duc N. Nguyen, Christopher Dugan, Pragnesh Jay Modi, William C. Regli. Distributed Coordination of First Responders |
48 | -- | 50 | Fernando Maymi, Manuel Rodríguez-Martínez, Yi Qian, Paul C. Manz. Ancile: Pervasively Shared Situational Awareness |
51 | -- | 54 | Arjmand Samuel, Arif Ghafoor, Elisa Bertino. Context-Aware Adaptation of Access-Control Policies |
55 | -- | 59 | M. Brian Blake, Michael N. Huhns. Web-Scale Workflow: Integrating Distributed Services |
60 | -- | 65 | Kwei-Jay Lin. E-Commerce Technology: Back to a Prominent Future |
66 | -- | 70 | Michael R. Kelley. The Spectrum Auction: Big Money and Lots of Unanswered Questions |
71 | -- | 74 | Barry Leiba. An Introduction to Internet Standards |
75 | -- | 79 | Christoph Bussler. Is Semantic Web Technology Taking the Wrong Turn? |
80 | -- | 83 | Danny Ayers. Graph Farming |
84 | -- | 87 | Steve Vinoski. Serendipitous Reuse |
88 | -- | 92 | Adel Hendaoui, Moez Limayem, Craig W. Thompson. 3D Social Virtual Worlds: Research Issues and Challenges |
93 | -- | 96 | Stephen Farrell. Security Boundaries |