5 | -- | 0 | Steve Bourne, Bryan Cantrill. ::::Communications:::: and the practitioner |
7 | -- | 0 | Scott E. Delman. Responding to the blogosphere |
12 | -- | 13 | Jeannette M. Wing, Daniel Reed, Mark Guzdial. An ICT research agenda, HPC and innovation, and why only the developed world lacks women in computing |
14 | -- | 0 | David Roman. The new searchers |
15 | -- | 17 | Don Monroe. Just for you |
18 | -- | 19 | Kirk L. Kroeker. Face recognition breakthrough |
20 | -- | 0 | Tom Geller. IT drives policy---and vice versa |
21 | -- | 22 | Leah Hoffmann. Learning through games |
23 | -- | 0 | Gregory Goth. U.S. unveils cybersecurity plan |
27 | -- | 29 | Wanda Dann, Stephen Cooper. Education - Alice 3: concrete to abstract |
30 | -- | 32 | Brian D. Snow, Clinton Brooks. Privacy and security - An ethics code for U.S. intelligence officers |
33 | -- | 35 | Lance Fortnow. Viewpoint - Time for computer science to grow up |
36 | -- | 44 | Adam Jacobs. The pathologies of big data |
45 | -- | 49 | Charles Reis, Adam Barth, Carlos Pizano. Browser security: lessons from Google Chrome |
50 | -- | 56 | Mache Creeger. CTO roundtable: cloud computing |
58 | -- | 66 | Kristen Shinohara, Josh D. Tenenberg. A blind person s interactions with technology |
67 | -- | 75 | Ralph Morelli, Allen B. Tucker, Norman Danner, Trishan R. de Lanerolle, Heidi J. C. Ellis, Ozgur Izmirli, Danny Krizanc, Gary Parker. Revitalizing computing education through free and open source software for humanity |
76 | -- | 82 | Sharad Malik, Lintao Zhang. Boolean satisfiability from theoretical hardness to practical success |
84 | -- | 0 | James D. Herbsleb. Technical perspective - Maintaining quality in the face of distributed development |
85 | -- | 93 | Christian Bird, Nachiappan Nagappan, Premkumar T. Devanbu, Harald Gall, Brendan Murphy. Does distributed development affect software quality?: an empirical case study of Windows Vista |
94 | -- | 0 | Sachin S. Sapatnekar. Technical perspective - Where the chips may fall |
95 | -- | 100 | Michael Orshansky, Wei-Shen Wang. Statistical analysis of circuit timing using majorization |
104 | -- | 0 | Peter Winkler. Puzzled - Probability and intuition |
105 | -- | 110 | Hoon S. Cha, David E. Pingry, Matt E. Thatcher. What determines IT spending priorities? |
111 | -- | 116 | Andrew Lim, Hong Ma, Qi Wen, Zhou Xu, Brenda Cheang. Distinguishing citation quality for journal impact assessment |
117 | -- | 121 | Thomas A. Gerace, Huseyin Cavusoglu. The critical elements of the patch management process |
122 | -- | 126 | Rajiv Kohli, Nigel Melville. Learning to build an IT innovation platform |
127 | -- | 131 | Eoin Ó Conchúir, Pär J. Ågerfalk, Helena Holmström Olsson, Brian Fitzgerald. Global software development: where are the benefits? |
132 | -- | 136 | Rohit Kaul, Yeogirl Yun, Seong-Gon Kim. Ranking billions of web pages using diodes |
137 | -- | 140 | Roli Varma. Attracting Native Americans to computing |
141 | -- | 143 | Indranil Bose, Alvin Chung Man Leung. Technical opinion - What drives the adoption of antiphishing measures by Hong Kong banks? |