5 | -- | 0 | Moshe Y. Vardi. Computing for humans |
7 | -- | 0 | . To boost presentation quality, ask questions |
8 | -- | 9 | John Langford, Judy Robertson. Conferences and video lectures; scientific educational games |
10 | -- | 0 | . Nominees for elections and report of the ACM Nominating Committee |
11 | -- | 13 | Kirk L. Kroeker. The rise of molecular machines |
14 | -- | 16 | Gregory Goth. Brave NUI world |
17 | -- | 19 | Dennis McCafferty. Activism vs. slacktivism |
20 | -- | 0 | Samuel Greengard. CSEdWeek takes hold |
21 | -- | 0 | Paul Hyman. Dennis Ritchie, 1941-2011 |
22 | -- | 23 | Jaron Lanier. The most ancient marketing |
24 | -- | 25 | Genevieve Bell. Life, death, and the iPad: cultural symbols and Steve Jobs |
26 | -- | 28 | Michael A. Cusumano. The legacy of Steve Jobs |
29 | -- | 31 | Kentaro Toyama. On turbocharged, heat-seeking, robotic fishing poles |
32 | -- | 33 | George V. Neville-Neil. Debugging on live systems |
34 | -- | 37 | Valerie E. Taylor, Richard E. Ladner. Data trends on minorities and people with disabilities in computing |
38 | -- | 40 | Peter J. Denning. The grounding practice |
41 | -- | 43 | Andrew P. Bernat, Eric Grimson. Doctoral program rankings for U.S. computing programs: the national research council strikes out |
44 | -- | 51 | David Pacheco. Postmortem debugging in dynamic environments |
52 | -- | 56 | G. Bruce Berriman, Steven L. Groom. How will astronomy archives survive the data tsunami? |
57 | -- | 63 | Robert Green, Henry Ledgard. Coding guidelines: finding the art in the science |
64 | -- | 73 | Brian E. Moore, Saad Ali, Ramin Mehran, Mubarak Shah. Visual crowd surveillance through a hydrodynamics lens |
74 | -- | 81 | Manuel Sojer, Joachim Henkel. License risks from ad hoc reuse of code from the internet |
82 | -- | 91 | Ganesh Gopalakrishnan, Robert M. Kirby, Stephen F. Siegel, Rajeev Thakur, William Gropp, Ewing L. Lusk, Bronis R. de Supinski, Martin Schulz, Greg Bronevetsky. Formal analysis of MPI-based parallel programs |
92 | -- | 103 | Gerhard Brewka, Thomas Eiter, Miroslaw Truszczynski. Answer set programming at a glance |
122 | -- | 0 | Xavier Leroy. Safety first!: technical perspective |
123 | -- | 131 | Jean Yang, Chris Hawblitzel. Safe to the last instruction: automated verification of a type-safe operating system |
132 | -- | 0 | Vitaly Shmatikov. Anonymity is not privacy: technical perspective |
133 | -- | 141 | Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg. Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography |
142 | -- | 0 | Peter Winkler. Puzzled |
144 | -- | 0 | Leah Hoffmann. Q&A |