5 | -- | 0 | Eugene H. Spafford. USACM s policy role |
10 | -- | 0 | David Roman. The dot-org difference |
11 | -- | 13 | Kirk L. Kroeker. Photography s bright future |
14 | -- | 15 | Alex Wright. Making sense of sensors |
16 | -- | 18 | Samuel Greengard. The first internet president |
19 | -- | 0 | Kirk L. Kroeker. SIGGRAPH debuts in Asia |
20 | -- | 22 | Ashish Arora, Matej Drev, Chris Forman. Economic and business dimensions - The extent of globalization of software innovation |
23 | -- | 25 | George H. L. Fletcher, James J. Lu. Education - Human computing skills: rethinking the K-12 experience |
26 | -- | 28 | Kristina Irion. Privacy and security - International communications surveillance |
29 | -- | 0 | Peter G. Neumann. Inside risks - U.S. election after-math |
31 | -- | 37 | Barbara van Schewick, David Farber. Point/Counterpoint - Network neutrality nuances |
38 | -- | 43 | Ulrich Drepper. Parallel programming with transactional memory |
44 | -- | 51 | Tom Leighton. Improving performance on the internet |
52 | -- | 59 | T. V. Raman. Toward 2:::::::W:::::::, beyond web 2.0 |
60 | -- | 67 | Mary Hall, David A. Padua, Keshav Pingali. Compiler research: the next 50 years |
68 | -- | 76 | Maria M. Klawe, Telle Whitney, Caroline Simard. Women in computing - take 2 |
78 | -- | 0 | Dan S. Wallach. Technical perspective - Tools for information to flow securely and Swift-ly |
79 | -- | 87 | Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng. Building secure web applications with automatic partitioning |
88 | -- | 0 | Ehud Kalai. Technical perspective - The complexity of computing Nash equilibrium |
89 | -- | 97 | Constantinos Daskalakis, Paul W. Goldberg, Christos H. Papadimitriou. The complexity of computing a Nash equilibrium |
104 | -- | 0 | Peter Winkler. Puzzled - Will my algorithm terminate? |
105 | -- | 109 | Pamela E. Carter, Gina Green. Networks of contextualized data: a framework for cyberinfrastructure data management |
110 | -- | 114 | Xiao-Bai Li, Luvai F. Motiwalla. For sale by owner online: who gets the saved commission? |
115 | -- | 118 | Ergin Elmacioglu, Dongwon Lee. Oracle, where shall I submit my papers? |
119 | -- | 123 | Shlomo Argamon, Moshe Koppel, James W. Pennebaker, Jonathan Schler. Automatically profiling the author of an anonymous text |
124 | -- | 129 | Sandy Behrens. Shadow systems: the good, the bad and the ugly |
130 | -- | 133 | Arik Ragowsky, David Gefen. Why IS management is in trouble and how to save it: lessons learned in the automotive industry |
134 | -- | 138 | M. Eric Johnson, Dan McGuire, Nicholas D. Willey. Why file sharing networks are dangerous? |
139 | -- | 141 | Raquel Benbunan-Fich, Gregory E. Truman. Technical opinion - Multitasking with laptops during meetings |