| 5 | -- | 7 | Warren Harrison. Eating Your Own Dog Food |
| 9 | -- | 11 | Grady Booch. The Accidental Architecture |
| 12 | -- | 15 | Jane Huffman Hayes, Nancy S. Eickelmann, Elizabeth Ashlee Holbrook. Security and Software Quality: An Interview with Frank Perry |
| 16 | -- | 18 | Joanne M. Atlee, Roel Wieringa. RE 05: Engineering Successful Products |
| 19 | -- | 25 | Christof Ebert. Understanding the product life cycle: four key requirements engineering techniques |
| 26 | -- | 33 | Jaap Gordijn, Eric Yu, Bas van der Raadt. E-service design using i* and e:::3:::value modeling |
| 34 | -- | 41 | Erik Simmons. The usage model: describing product usage during design and development |
| 42 | -- | 44 | Marina Jirotka, Paul Luff. Supporting requirements with video-based analysis |
| 45 | -- | 47 | Rebecca Wirfs-Brock. Refreshing patterns |
| 48 | -- | 54 | Todd Little. Schedule estimation and uncertainty surrounding the cone of uncertainty |
| 55 | -- | 61 | Hans van Vliet. Reflections on software engineering education |
| 62 | -- | 73 | Danil Shopyrin. Multimethods in C++ using recursive deferred dispatching |
| 74 | -- | 81 | Jørgen Bøegh. Certifying software component attributes |
| 82 | -- | 90 | Per Runeson, Carina Andersson, Thomas Thelin, Anneliese Amschler Andrews, Tomas Berling. What do we know about defect detection methods? [software testing] |
| 91 | -- | 93 | Laurianne McLaughlin. Automated programming the next wave of developer power tools |
| 94 | -- | 97 | Nicolás Serrano, Jose Maria Sarriegi. Open source software ERPs: a new alternative for an old need |
| 98 | -- | 99 | Diomidis Spinellis. Debuggers and logging frameworks |
| 104 | -- | 104 | Johann Rost. Are Best Practices Requirements Documents a Myth? |