5 | -- | 0 | Moshe Y. Vardi. The financial meltdown and computing |
12 | -- | 13 | Michael Stonebraker, Jason Hong. Saying good-bye to DBMSs, designing effective interfaces |
14 | -- | 0 | David Roman. What you read on your summer vacation |
15 | -- | 17 | Gregory Goth. Entering a parallel universe |
18 | -- | 19 | Kirk L. Kroeker. Medical nanobots |
20 | -- | 22 | Samuel Greengard. Facing an age-old problem |
23 | -- | 0 | Karen A. Frenkel. Computer Science meets environmental science |
24 | -- | 26 | Paul M. Schwartz. Law and technology - Keeping track of telecommunications surveillance |
27 | -- | 29 | Peter J. Denning, Paul S. Rosenbloom. The profession of IT - Computing: the fourth great domain of science |
33 | -- | 35 | Cameron Wilson, Peter Harsha. IT policy - The long road to Computer Science education reform |
36 | -- | 38 | Anwar M. Ghuloum. Viewpoint - Face the inevitable, embrace parallelism |
39 | -- | 42 | David P. Anderson. Interview - An interview with Maurice Wilkes |
44 | -- | 48 | Bruce Johnson. Reveling in constraints |
49 | -- | 55 | Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan. Monitoring and control of large systems with MonALISA |
56 | -- | 62 | Bryan O Sullivan. Making sense of revision-control systems |
64 | -- | 70 | Varun Bhagwan, Tyrone Grandison, Daniel Gruhl. Sound index: charts for the people, by the people |
71 | -- | 76 | James Boyle. What intellectual property law should learn from software |
78 | -- | 86 | Lance Fortnow. The status of the P versus NP problem |
88 | -- | 0 | Katherine A. Yelick. Technical perspective - Abstraction for parallelism |
89 | -- | 97 | Milind Kulkarni, Keshav Pingali, Bruce Walter, Ganesh Ramanarayanan, Kavita Bala, L. Paul Chew. Optimistic parallelism requires abstractions |
98 | -- | 0 | Marc Dacier. Technical perspective - They do click, don t they? |
99 | -- | 107 | Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage. Spamalytics: an empirical analysis of spam marketing conversion |
110 | -- | 0 | Peter Winkler. Puzzled - Solutions and sources |
112 | -- | 0 | Jaron Lanier. Future tense - Confusions of the hive mind |
113 | -- | 117 | Achita Muthitacharoen, Khawaja A. Saeed. Examining user involvement in continuous software development: (a case of error reporting system) |
118 | -- | 122 | Alexander A. Pasko, Valery Adzhiev. Constructive function-based modeling in multilevel education |
123 | -- | 128 | Hongwei Zhu 0002, Stuart E. Madnick. One size does not fit all: legal protection for non-copyrightable data |
128 | -- | 132 | Eleanor T. Loiacono, Nicholas C. Romano Jr., Scott McCoy. The state of corporate website accessibility |
133 | -- | 137 | Robert Willison, Mikko T. Siponen. Overcoming the insider: reducing employee computer crime through Situational Crime Prevention |
138 | -- | 142 | Mu Xia, Yun Huang, Wenjing Duan, Andrew B. Whinston. Ballot box communication in online communities |
143 | -- | 148 | Dinesh Batra. Modified agile practices for outsourced software projects |
149 | -- | 150 | James E. Katz, Ronald E. Rice. Technical opinion - Falling into the net: main street America playing games and making friends online |