- Lenwood S. Heath, Naren Ramakrishnan:
The Emerging Landscape of Bioinformatics Software Systems. Computer 35(7): 41-45 (2002) - Abdelsalam Heddaya:
An Economically Scalable Internet. Computer 35(9): 93-95 (2002) - W. Neville Holmes:
The Profession - To See Ourselves as Others See Us. Computer 35(1): 142-144 (2002) - W. Neville Holmes:
Representative Democracy and the Profession. Computer 35(2): 118-120 (2002) - W. Neville Holmes:
Computers, Programming, and People. Computer 35(3): 110-112 (2002) - W. Neville Holmes:
Side Effects of Digital Technology. Computer 35(4): 102-104 (2002) - W. Neville Holmes:
Would a Digital Brain Have a Mind? Computer 35(5): 110-112 (2002) - W. Neville Holmes:
Seven Great Blunders of the Computing World. Computer 35(7): 110-112 (2002) - W. Neville Holmes:
Jobs, Trades, Skills, and the Profession. Computer 35(9): 102-104 (2002) - W. Neville Holmes:
The Profession and the World. Computer 35(11): 114-116 (2002) - Andrew "bunnie" Huang:
The Trusted PC: Skin-Deep Security. Computer 35(10): 103-105 (2002) - Josef F. Huber:
Toward the Mobile Internet. Computer 35(10): 100-102 (2002) - Christopher J. Hughes, Vijay S. Pai, Parthasarathy Ranganathan, Sarita V. Adve:
RSIM: Simulating Shared-Memory Multiprocessors with ILP Processors. Computer 35(2): 40-49 (2002) - Toru Ishida:
Q: A Scenario Description Language for Interactive Agents. Computer 35(11): 42-47 (2002) - Laura E. Jackson, George N. Rouskas:
Deterministic Preemtive Scheduling of Real-Time Tasks. Computer 35(5): 72-79 (2002) - Ravi Kalakota, Pavan Gundepudi, Jonathan Wareham, Arun Rai, Richard J. Welke:
The Economics of DSL Regulation. Computer 35(10): 29-36 (2002) - Vinod Kathail, Shail Aditya, Robert Schreiber, B. Ramakrishna Rau, Darren C. Cronquist, Mukund Sivaraman:
PICO: Automatically Designing Custom Computers. Computer 35(9): 39-47 (2002) - Erin Kenneally:
Who's Liable for Insecure Networks? Computer 35(6): 93-95 (2002) - Junhyong Kim:
Computers Are from Mars, Organisms Are from Venus. Computer 35(7): 25-32 (2002) - Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong:
The Chamois Component-Based Knowledge Engineering Framework. Computer 35(5): 46-54 (2002) - Willis K. King:
Implementing Our Future Vision in 2002. Computer 35(1): 6-8 (2002) - Willis K. King:
President's Message: Year in Review. Computer 35(12): 10-11 (2002) - Adam Kolawa:
Software Certification Debate: Certification Will Do More Harm than Good. Computer 35(6): 34-35 (2002) - James Korris, Michael R. Macedonia:
The End of Celluloid: Digital Cinema Emerges. Computer 35(4): 96-98 (2002) - Kenneth L. Kraemer, Jason L. Dedrick:
Enter the Dragon: China's Computer Industry. Computer 35(2): 28-36 (2002) - William T. C. Kramer:
SCinet: Testbed for High-Performance Networked Applications. Computer 35(6): 47-55 (2002) - Ravi Kumar, Prabhakar Raghavan, Sridhar Rajagopalan, Andrew Tomkins:
The Web and Social Networks. Computer 35(11): 32-36 (2002) - Mary C. Lacity:
Lessons in Global Information Technology Sourcing. Computer 35(8): 26-33 (2002) - George Lawton:
Open Source Security: Opportunity or Oxymoron? Computer 35(3): 18-21 (2002) - George Lawton:
Moving Java into Mobile Phones. Computer 35(6): 17-20 (2002)