4 | -- | 5 | Henry E. Schaffer. X as a Service, Cloud Computing, and the Need for Good Judgment |
6 | -- | 7 | Thomas C. Jepsen. Guest Editor s Introduction: Ontologies, OWL, and the Semantic Web |
8 | -- | 16 | Valentina Janev, Sanja Vranes. Semantic Web Technologies: Ready for Adoption? |
17 | -- | 21 | Dean Keith. Equal Format Databases and Semantic-Relational Encoding |
22 | -- | 27 | Thomas C. Jepsen. Just What Is an Ontology, Anyway? |
28 | -- | 33 | Liang-Jie Zhang, Jia Zhang. An Integrated Service Model Approach for Enabling SOA |
35 | -- | 40 | John Harauz, Jeffrey M. Voas, George F. Hurlburt. Trustworthiness in Software Environments |
42 | -- | 43 | Karen Evans, Robert J. Carey. Success in National Cyberdefense |
44 | -- | 47 | Wushow Chou. Self-Smart, Part II: Career Smart |
48 | -- | 50 | Keith W. Miller. Joining the Conversation about IT Ethics |
51 | -- | 53 | Simon Liu. Surviving Distributed Denial-of-Service Attacks |
54 | -- | 58 | Travis D. Breaux, Annie I. Antón, Kent Boucher, Merlin Dorfman. IT Compliance: Aligning Legal and Product Requirements |
60 | -- | 62 | Sorel Reisman. Changing the Publishing Model |
64 | -- | 63 | Tom Costello. Certification: Does the Emperor Have Any Clothes? |