4 | -- | 0 | . Article Summaries |
5 | -- | 7 | Steve McConnell. Changing of the Guard |
8 | -- | 9 | . Not Another SPI Framework |
10 | -- | 12 | Dave Thomas, Andy Hunt. State Machines |
13 | -- | 17 | Martin Fowler. Using Metadata |
18 | -- | 20 | Ann Miller, Christof Ebert. Guest Editors Introduction: Software Engineering as a Business |
21 | -- | 27 | Steven Mair. A Balanced Scorecard for a Small Software Group |
28 | -- | 33 | Christina Wallin, Fredrik Ekdahl, Stig Larsson. Integrating Business and Software Development Models |
34 | -- | 42 | Brian A. Nejmeh, Ian Thomas. Business-Driven Product Planning Using Feature Vectors and Increments |
43 | -- | 49 | Ram Chillarege. The Marriage of Business Dynamics and Software Engineering |
50 | -- | 52 | Dorothy McKinney. Six Translations between Software-Speak and Management-Speak |
53 | -- | 55 | Scott L. Andresen. Don Winter: One CEO s Perspective |
56 | -- | 59 | Greg Hoglund, Gary McGraw. Point/Counterpoint: Security Band-Aids: More Cost-Effective than Secure Coding / Building Secure Software: Better than Protecting Bad Software |
61 | -- | 63 | Richard E. Fairley. Making Accurate Estimates |
64 | -- | 65 | Shari Lawrence Pfleeger. What Software Engineering Can Learn from Soccer |
66 | -- | 69 | Aase Tveito, Per Hasvold. Requirements in the Medical Domain: Experiences and Prescriptions |
70 | -- | 77 | Natalia Juristo Juzgado, Ana María Moreno, Andrés Silva. Is the European Industry Moving toward Solving Requirements Engineering Problems? |
78 | -- | 85 | Martín González Rodríguez. Automatic Data-Gathering Agents for Remote Navigability Testing |
87 | -- | 96 | Frank E. McGarry, Bill Decker. Attaining Level 5 in CMM Process Maturity |
97 | -- | 100 | . NIST Report Takes a Step toward Better Testing / National Strategy to Secure Cyberspace Proposed |
101 | -- | 104 | . Bookshelf |
111 | -- | 112 | Robert L. Glass. Predicting Future Maintenance Cost, and How We re Doing It Wrong |