| 14 | -- | 16 | William I. Gasarch. The book review column |
| 17 | -- | 20 | Rajesh Natarajan. Review of The Political Mapping of Cyberspace by Jeremy W. Crampton , The University of Chicago Press, 2003 |
| 20 | -- | 22 | Jonathan Katz. Review of Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal , Cambridge University Press, 2005 |
| 22 | -- | 27 | Yannis C. Stamatiou. Review of Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal , Cambridge University Press, 2005 |
| 27 | -- | 30 | Brian Borchers. Review of Computational Techniques of the Simplex Method by István Maros , Kluwer Academic Publishers, 2003 |
| 31 | -- | 33 | Dean Kelley. Technical report column |
| 39 | -- | 54 | Salil P. Vadhan. The unified theory of pseudorandomness: guest column |
| 55 | -- | 0 | Sergio Rajsbaum. Introduction |
| 56 | -- | 75 | Markus Jakobsson, Steven Myers. Delayed password disclosure |
| 76 | -- | 0 | Riccardo Pucella. Introduction |
| 77 | -- | 99 | Alessio Lomuscio, Wojciech Penczek. Symbolic model checking for temporal-epistemic logics |
| 100 | -- | 105 | Marek Chrobak. Competitiveness via primal-dual |
| 106 | -- | 0 | Samir Khuller. Introduction |
| 106 | -- | 129 | Chandra Chekuri. Routing and network design with robustness to changing or uncertain traffic demands |