0 | -- | 0 | Jeannette M. Wing, Mark Guzdial. CS woes: deadline-driven research, academic inequality |
5 | -- | 0 | Chris Stephenson. It is a pivotal time for K--12 computer science |
8 | -- | 9 | Jeannette M. Wing, Mark Guzdial. CS woes: deadline-driven research, academic inequality |
12 | -- | 0 | David Roman. Crowdsourcing and the question of expertise |
13 | -- | 15 | Gary Anthes. Blueprints for self-assembly |
16 | -- | 17 | Alex Wright. Ready for a Web OS? |
18 | -- | 19 | Samuel Greengard. Making automation work |
20 | -- | 0 | Leah Hoffmann. Problem solvers |
22 | -- | 24 | Richard E. Ladner. Broadening participation - Opening remarks |
25 | -- | 27 | Orna Berry, Yigal Grayeff. Emerging markets - Israel s technology industry as an economic growth engine |
28 | -- | 30 | Peter J. Denning, Peter A. Freeman. The profession of IT - Computing s paradigm |
31 | -- | 32 | George V. Neville-Neil. Kode Vicious - Broken builds |
33 | -- | 37 | Savas Parastatidis, Evelyne Viegas, Tony Hey. Viewpoint - A smart cyberinfrastructure for research |
38 | -- | 42 | Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O Leary, Jim Waldo. A threat analysis of RFID passports |
43 | -- | 47 | Paul Vixie. What DNS is not |
48 | -- | 57 | Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto. Maximizing power efficiency with asymmetric multicore systems |
58 | -- | 65 | Josep Torrellas, Luis Ceze, James Tuck, Calin Cascaval, Pablo Montesinos, Wonsun Ahn, Milos Prvulovic. The Bulk Multicore architecture for improved programmability |
66 | -- | 72 | Michael Zyda. Computer science in the conceptual age |
74 | -- | 78 | Kelvin Sung. Computer games and traditional CS courses |
80 | -- | 0 | James A. Landay. Technical perspective - Design tools for the rest of us |
81 | -- | 88 | Yuki Igarashi, Takeo Igarashi. Designing plush toys with a computer |
89 | -- | 0 | Pat Hanrahan. Technical perspective - A graphical sense of touch |
90 | -- | 98 | Shahram Izadi, Steve Hodges, Alex Butler, Darren West, Alban Rrustemi, Mike Molloy, William Buxton. ThinSight: a thin form-factor interactive surface technology |
111 | -- | 0 | Peter Winkler. Puzzled - Solutions and sources |
113 | -- | 115 | Niki Panteli, Robert J. Tucker. Power and trust in global virtual teams |
116 | -- | 120 | Sun Sun Lim, Hichang Cho, Milagros Rivera Sanchez. Online privacy, government surveillance and national ID cards |
121 | -- | 125 | Ganesh Vaidyanathan, Steven Mautone. Security in dynamic web content management systems applications |
126 | -- | 129 | Lou Hafer, Arthur E. Kirkpatrick. Assessing open source software as a scholarly contribution |
130 | -- | 134 | Narciso Cerpa, June M. Verner. Why did your project fail? |
135 | -- | 140 | Karen Renaud, Antonella De Angeli. Visual passwords: cure-all or snake-oil? |
141 | -- | 144 | Nir Kshetri. Positive externality, increasing returns, and the rise in cybercrimes |
145 | -- | 147 | Mikko T. Siponen, M. Adam Mahmood, Seppo Pahnila. Technical opinion - Are employees putting your company at risk by not following information security policies? |