5 | -- | 0 | Sorel Reisman, Alain Chesnais. From the presidents of the IEEE Computer Society and ACM |
10 | -- | 11 | Michael Stonebraker. Stonebraker on NoSQL and enterprises |
12 | -- | 0 | Scott E. Delman. Why you should be happy to sign in! |
13 | -- | 15 | Kirk L. Kroeker. A new benchmark for artificial intelligence |
16 | -- | 18 | Tom Geller. Supercomputing s exaflop target |
19 | -- | 21 | Samuel Greengard. Life, translated |
24 | -- | 26 | Jonathon N. Cummings. Geography is alive and well in virtual teams |
27 | -- | 29 | Betsy James DiSalvo, Amy Bruckman. From interests to values |
30 | -- | 33 | Steven M. Bellovin, S. O. Bradner, Whitfield Diffie, Susan Landau, Jennifer Rexford. As simple as possible - but not more so |
34 | -- | 35 | George V. Neville-Neil. Storage strife |
36 | -- | 38 | Joseph Y. Halpern, David C. Parkes. Journals for certification, conferences for rapid dissemination |
40 | -- | 45 | Eric Allman. The robustness principle reconsidered |
46 | -- | 54 | Satnam Singh. Computing without processors |
62 | -- | 71 | Dharmendra S. Modha, Rajagopal Ananthanarayanan, Steven K. Esser, Anthony Ndirango, Anthony Sherbondy, Raghavendra Singh. Cognitive computing |
72 | -- | 80 | J. McGrath Cohoon, Sergey Nigai, Joseph Kaye. Gender and computing conference papers |
81 | -- | 87 | Luca de Alfaro, Ashutosh Kulshreshtha, Ian Pye, B. Thomas Adler. Reputation systems for open collaboration |
88 | -- | 98 | Surajit Chaudhuri, Umeshwar Dayal, Vivek R. Narasayya. An overview of business intelligence technology |
100 | -- | 0 | Peter J. Haas. Sketches get sketchier |
101 | -- | 109 | Ping Li, Arnd Christian König. Theory and applications of ::::b::::-bit minwise hashing |
110 | -- | 0 | Scott R. Klemmer. Skintroducing the future |
111 | -- | 118 | Chris Harrison, Desney S. Tan, Dan Morris. Skinput: appropriating the skin as an interactive canvas |
120 | -- | 0 | Peter Winkler. Puzzled |
121 | -- | 131 | David Wright. Should privacy impact assessments be mandatory? |
132 | -- | 140 | Sanjay Goel. Cyberwarfare: connecting the dots in cyber intelligence |