| 4 | -- | 6 | Hakan Erdogmus. So Many Languages, So Little Time |
| 8 | -- | 9 | Grady Booch. Morality and the Software Architect |
| 10 | -- | 12 | Konstantin Beznosov, Brian Chess. Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge |
| 13 | -- | 19 | Charlie Lai. Java Insecurity: Accounting for Subtleties That Can Compromise Code |
| 20 | -- | 27 | Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland. Security Requirements for the Rest of Us: A Survey |
| 28 | -- | 34 | Jeffrey A. Ingalsbe, Louis Kunimatsu, Tim Baeten, Nancy R. Mead. Threat Modeling: Diving into the Deep End |
| 35 | -- | 42 | Shari Lawrence Pfleeger, Rachel Rue. Cybersecurity Economic Issues: Clearing the Path to Good Practice |
| 43 | -- | 45 | David Callele, Eric Neufeld, Kevin Schneider. Emotional Requirements |
| 46 | -- | 49 | Axel Uhl. Model-Driven Development in the Enterprise |
| 50 | -- | 51 | Jeff Patton. Ambiguous Business Value Harms Software Products |
| 52 | -- | 53 | J. B. Rainsberger, Johanna Rothman. Are You Done Yet? |
| 54 | -- | 59 | Robert C. Martin, Grigori Melnik. Tests and Requirements, Requirements and Tests: A Möbius Strip |
| 60 | -- | 67 | Lan Cao, Balasubramaniam Ramesh. Agile Requirements Engineering Practices: An Empirical Study |
| 68 | -- | 75 | Rick Mugridge. Managing Agile Project Requirements with Storytest-Driven Development |
| 76 | -- | 77 | Rebecca Wirfs-Brock. Valuing Design Repair |
| 78 | -- | 79 | Diomidis Spinellis. Rational Metaprogramming |
| 80 | -- | 87 | Sangsoo Kim, Hoh Peter In, Jongmoon Baik, Rick Kazman, Kwangsin Han. VIRE: Sailing a Blue Ocean with Value-Innovative Requirements |
| 88 | -- | 90 | Forrest Shull, Carolyn B. Seaman. Inspecting the History of Inspections: An Example of Evidence-Based Technology Diffusion |
| 91 | -- | 94 | Steven Fraser, Dennis Mancl. No Silver Bullet: Software Engineering Reloaded |
| 96 | -- | 0 | Robert L. Glass. Intuition s Role in Decision Making |