5 | -- | 0 | Moshe Y. Vardi. Open, closed, or clopen access? |
6 | -- | 7 | Scott E. Delman. ::::Communications :::: annual report card |
10 | -- | 11 | Mark Guzdial, Greg Linden, Tessa Lau. Sharing ideas, writing apps, and creating a professional web presence |
12 | -- | 0 | David Roman. Moving forward and backward |
13 | -- | 15 | Alex Wright. Contemporary approaches to fault tolerance |
16 | -- | 17 | Kirk L. Kroeker. Toward native web execution |
18 | -- | 19 | Samuel Greengard. Are we losing our ability to think critically? |
20 | -- | 22 | Karen A. Frenkel. Liskov s creative joy |
23 | -- | 0 | Alan Joch. Master of connections |
25 | -- | 0 | . ACM award winners |
28 | -- | 30 | Pamela Samuelson. Legally speaking - The dead souls of the Google book search settlement |
31 | -- | 33 | Mari Sako. Technology strategy and management - Globalization of knowledge-intensive professional services |
34 | -- | 36 | Phillip G. Armour. The business of software - The cliché defense |
37 | -- | 40 | Matthias Felleisen, Shriram Krishnamurthi. Viewpoint - Why computer science doesn t matter |
41 | -- | 45 | Robert Dewar, Owen L. Astrachan. Point/counterpoint - CS education in the U.S.: heading in the wrong direction? |
48 | -- | 59 | Goetz Graefe. The five-minute rule 20 years later (and how flash memory changes the rules) |
60 | -- | 65 | Jonathan M. Smith. Fighting physics: a tough battle |
66 | -- | 75 | Erol Gelenbe. Steps toward self-aware networks |
76 | -- | 84 | Rick Kazman, Hong-Mei Chen. The metropolis model a new logic for development of crowdsourced systems |
86 | -- | 94 | Nilesh N. Dalvi, Christopher Ré, Dan Suciu. Probabilistic databases: diamonds in the dirt |
96 | -- | 0 | Stuart Russell, Lawrence K. Saul. Technical perspective - The ultimate pilot program |
97 | -- | 105 | Adam Coates, Pieter Abbeel, Andrew Y. Ng. Apprenticeship learning for helicopter control |
106 | -- | 0 | Greg Morrisett. Technical perspective - A compiler s story |
107 | -- | 115 | Xavier Leroy. Formal verification of a realistic compiler |
120 | -- | 0 | Leah Hoffmann. Q&A - Liskov on Liskov |
121 | -- | 125 | Benjamin Fabian, Oliver Günther. Security challenges of the EPCglobal network |
126 | -- | 129 | James L. Parrish Jr., James F. Courtney Jr.. Churchman s inquirers as design templates for knowledge management systems |
130 | -- | 134 | Arvind Malhotra, Claudia Kubowicz Malhotra. A relevancy-based services view for driving adoption of wireless web services in the U.S |
135 | -- | 138 | Johann Rost, Robert L. Glass. The impact of subversive stakeholders on software projects |
139 | -- | 142 | Sandip C. Patel, Ganesh D. Bhatt, James H. Graham. Improving the cyber security of SCADA communication networks |
143 | -- | 146 | Anat Hovav, Ciprian P. Popoviciu. Adoption leadership and early planners: Comcast s IP upgrade strategy |
147 | -- | 152 | Richard W. Woolridge, David P. Hale, Joanne E. Hale, Shane Sharpe. Software project scope alignment: an outcome-based approach |
153 | -- | 155 | Robert M. Davison, Maris G. Martinsons, Henry W. H. Lo, Yuan Li. Technical opinion - The ethics of IT professionals in China |