5 | -- | 0 | Eugene H. Spafford. USACM and U.S. legislation |
6 | -- | 7 | . The halting problem in the clear light of probability |
10 | -- | 11 | Jason Hong, Greg Linden. Protecting against data breaches; living with mistakes |
12 | -- | 0 | Scott E. Delman. Don't throw the baby out with the bathwater |
13 | -- | 15 | Gregory Goth. Analyzing medical data |
16 | -- | 18 | Gary Anthes. Smarter photography |
19 | -- | 21 | Leah Hoffmann. Data mining meets city hall |
22 | -- | 23 | Neil Savage. Game changer |
24 | -- | 0 | Paul Hyman. An influential theoretician |
26 | -- | 28 | Phillip G. Armour. A measure of control |
29 | -- | 32 | Simson L. Garfinkel. The cybersecurity risk |
33 | -- | 34 | George V. Neville-Neil. Scale failure |
35 | -- | 37 | Chris Hall. Security of the internet and the known unknowns |
38 | -- | 40 | Peter J. Denning, Nicholas Dew. The myth of the elevator pitch |
41 | -- | 43 | Herbert Lin. Why computer scientists should care about cyber conflict and U.S. national security policy |
44 | -- | 51 | Dennis Abts, Bob Felderman. A guided tour of data-center networking |
52 | -- | 60 | David J. Crandall, Noah Snavely. Modeling people and places with internet photo collections |
61 | -- | 69 | Kari Pulli, Anatoly Baksheev, Kirill Kornyakov, Victor Eruhimov. Real-time computer vision with OpenCV |
70 | -- | 75 | Benjamin Doerr, Mahmoud Fouz, Tobias Friedrich. Why rumors spread so quickly in social networks |
76 | -- | 85 | Bryan Parno. Trust extension for commodity computers |
86 | -- | 97 | Michael J. Carey, Nicola Onose, Michalis Petropoulos. Data services |
98 | -- | 107 | Ketan Mulmuley. NP problem |
110 | -- | 0 | Pablo A. Parrilo. Reconstructing the unknown, balancing structure and uncertainty: technical perspective |
111 | -- | 119 | Emmanuel J. Candès, Benjamin Recht. Exact matrix completion via convex optimization |
120 | -- | 0 | Peter Lee 0001. The fox and the hedgehog: technical perspective |
121 | -- | 130 | Tiark Rompf, Martin Odersky. Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs |
133 | -- | 0 | Peter Winkler. Puzzled |
136 | -- | 0 | Leah Hoffmann. Q&A |