March 2005 - Vol. 48 No. 3
Features
20th Century vs. 21st Century C&c: the Spur Manifesto
Project Portfolios: Organizational Management of Risk
Top 10 Downloads from Acm’s Digital Library
Why Computer Scientists Should Attend Hacker Conferences
The First Business Application: a Significant Milestone in Software History
Legislative Challenges to the sony Safe Harbor Rule
Delivering Real-World -biquitous Location Systems
Building Disappearing Computers
Bridging the Physical and Digital in Pervasive Gaming
Privacy and Trust Issues with Invisible Computers
Hybrid Design Creates Innovative Museum Experiences
Smart-Its: Computers For Artifacts in the Physical World
Ad-Hoc Composition in Wearable and Mobile Computing
Examples of Commercial Applications of -biquitous Computing
Computer Science and Bioinformatics
A Comparison of Data Warehousing Methodologies
Sigs Announce Candidates For Election
Do Consumers -nderstand the Role of Privacy Seals in E-Commerce?
A Multiagent System For U.S. Defense Research Contracting
Java Distributed Components For Numerical Visualization in Visad
The State of -ser-Centered Design Practice
How the Mobile Communication Markets Differ in China, the -U.S., and Europe