Computer science and bioinformatics.
Why computer scientists should attend hacker conferences.
Anticipating disasters.
20
Java distributed components for numerical visualization in VisAD.
Delivering real-world ubiquitous location systems.
How the mobile communication markets differ in China, the U.S., and Europe.
Smart-Its: computers for artifacts in the physical world.
The first business application: a significant milestone in software history.
Editorial pointers.
SIGs announce candidates for election.
Legislative challenges to the
Project portfolios: organizational management of risk.
Forum.
Do consumers understand the role of privacy seals in e-commerce?
Hybrid design creates innovative museum experiences.
The state of user-centered design practice.
News track.
Ad-hoc composition in wearable and mobile computing.
ACM Fellows.
Context is key.
Extrovert gadgets.
A comparison of data warehousing methodologies.
Privacy and trust issues with invisible computers.
Examples of commercial applications of ubiquitous computing.
Sensate media.
Building disappearing computers.
A multiagent system for U.S. defense research contracting.
The bubble of web visibility.
Top 10 downloads from ACM's digital library.
Introduction.
Bridging the physical and digital in pervasive gaming.