5 | -- | 0 | Moshe Y. Vardi. Conferences vs. journals in computing research |
7 | -- | 9 | . Logic of lemmings in compiler innovation |
10 | -- | 11 | . Recommendation algorithms, online privacy, and more |
12 | -- | 0 | David Roman. The print-web partnership turns the page |
13 | -- | 15 | Kirk L. Kroeker. Rethinking signal processing |
16 | -- | 17 | David Essex. Matchmaker, matchmaker |
18 | -- | 19 | Samuel Greengard. Learning goes global |
21 | -- | 0 | . Liskov wins Turing award |
22 | -- | 24 | Pierre Larouche. Law and technology - The network neutrality debate hits Europe |
28 | -- | 30 | Martin Campbell-Kelly. Historical reflections - The rise, fall, and resurrection of software as a service |
31 | -- | 33 | Mark Guzdial. Education - Teaching computing to everyone |
34 | -- | 37 | Ken Birman, Fred B. Schneider. Viewpoint - Program committee overload in systems |
40 | -- | 45 | Thomas Wadlow, Vlad Gorelik. Security in the browser |
46 | -- | 56 | Michi Henning. API design matters |
57 | -- | 60 | Eric Schrock. Debugging AJAX in production |
62 | -- | 69 | James R. Larus. Spending Moore s dividend |
70 | -- | 79 | Edward A. Lee. Computing needs time |
80 | -- | 88 | Corrado Priami. Algorithmic systems biology |
90 | -- | 0 | Ross Anderson. Technical perspective - A chilly sense of security |
91 | -- | 98 | J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten. Lest we remember: cold-boot attacks on encryption keys |
99 | -- | 0 | Maurice Herlihy. Technical perspective - Highly concurrent data structures |
100 | -- | 111 | William N. Scherer III, Doug Lea, Michael L. Scott. Scalable synchronous queues |
112 | -- | 0 | Peter Winkler. Puzzled - Understanding relationships among numbers |
113 | -- | 116 | J. Drew Procaccino, June M. Verner. Software developers views of end-users and project success |
117 | -- | 123 | Karlene Cousins, Upkar Varshney. Designing ubiquitous computing environments to support work life balance |
124 | -- | 127 | Stuart D. Galup, Ronald Dattero, Jim J. Quan, Sue Conger. An overview of IT service management |
128 | -- | 130 | Robert K. Plice, Nigel Melville, Oleg V. Pavlov. Toward an information-compatible anti-spam strategy |
131 | -- | 134 | James A. McCart, Varol O. Kayhan, Anol Bhattacherjee. Cross-bidding in simultaneous online auctions |
135 | -- | 139 | Carol Xiaojuan Ou, Choon-Ling Sia. To trust or to distrust, that is the question: investigating the trust-distrust paradox |
140 | -- | 144 | Gary W. Brock. Reflections today prevent failures tomorrow |
145 | -- | 146 | Michael Rebstock. Technical opinion - Semantic ambiguity: Babylon, Rosetta or beyond? |