5 | -- | 0 | Diane Crawford. An issue of teamwork |
10 | -- | 11 | Valerie Barr. Connecting women and technology |
12 | -- | 0 | David Roman. Where the data is |
13 | -- | 15 | Kirk L. Kroeker. Alternate interface technologies emerge |
16 | -- | 17 | Alex Wright. Type theory comes of age |
18 | -- | 20 | Sarah Underwood. Improving disaster management |
22 | -- | 25 | M. Angela Sasse. Not seeing the crime for the cameras? |
26 | -- | 28 | Dennis P. Groth, Jeffrey K. MacKie-Mason. Why an informatics degree? |
29 | -- | 31 | W. Douglas Maughan. The need for a national cybersecurity research and development agenda |
32 | -- | 34 | Michel Beaudouin-Lafon. Open access to scientific publications |
35 | -- | 36 | George V. Neville-Neil. Taking your network s temperature |
37 | -- | 42 | Dennis Shasha. An interview with Michael Rabin |
44 | -- | 48 | Eric Saxe. Power-efficient software |
49 | -- | 57 | Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev. Managing contention for shared resources on multicore processors |
58 | -- | 64 | Steven P. Miller, Michael W. Whalen, Darren D. Cofer. Software model checking takes off |
66 | -- | 75 | Al Bessey, Ken Block, Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, Dawson R. Engler. A few billion lines of code later: using static analysis to find bugs in the real world |
76 | -- | 83 | Eric Benhamou, Jon Eisenberg, Randy H. Katz. Assessing the changing U.S. IT R&D ecosystem |
84 | -- | 93 | Dave Bacon, Wim van Dam. Recent progress in quantum algorithms |
96 | -- | 0 | Sanjoy Dasgupta. Strange effects in high dimension |
97 | -- | 104 | Nir Ailon, Bernard Chazelle. Faster dimension reduction |
105 | -- | 0 | Shekhar Y. Borkar. Want to be a bug buster? |
106 | -- | 113 | Sung-Boem Park, Subhasish Mitra. Post-silicon bug localization for processors using IFRA |
120 | -- | 0 | Peter Winkler. Breaking chocolate bars |
121 | -- | 126 | Dongmin Kim, Izak Benbasat. Designs for effective implementation of trust assurances in internet stores |
127 | -- | 133 | Irma Becerra-Fernandez, Joyce J. Elam, Susan Clemmons. Reversing the landslide in computer-related degree programs |
134 | -- | 138 | Tim Chenoweth, Robert P. Minch, Sharon Tabor. Wireless insecurity: examining user security behavior on public networks |
139 | -- | 143 | Farheen Altaf, David Schuff. Taking a flexible approach to ASPs |
144 | -- | 148 | John Minor Ross. Informatics creativity: a role for abductive reasoning? |
149 | -- | 154 | Damien Joseph, Soon Ang, Roger H. L. Chang, Sandra Slaughter. Practical intelligence in IT: assessing soft skills of IT professionals |
155 | -- | 159 | Vijay K. Gurbani, Anita Garvert, James D. Herbsleb. Managing a corporate open source software asset |
160 | -- | 164 | Nikhil Mehta, Anju Mehta. It takes two to tango: how relational investments improve IT outsourcing partnerships |