5 | -- | 0 | Moshe Y. Vardi. Why ACM? |
7 | -- | 0 | . Operationalizing privacy by design |
8 | -- | 9 | Bertrand Meyer. Incremental research vs. paradigm-shift mania |
11 | -- | 13 | Gregory Goth. Atomic-level computing |
14 | -- | 16 | Gary Anthes. Chips go upscale |
17 | -- | 19 | Marina Krakovsky. Garbage in, info out |
20 | -- | 23 | Paul Hyman. In honor of Alan Turing |
26 | -- | 29 | Thomas Haigh. Seven lessons from bad history |
30 | -- | 32 | Peter J. Denning. Don't feel bad if you can't predict the future |
33 | -- | 35 | Tal Z. Zarsky. Automated prediction: perception, law, and policy |
36 | -- | 38 | Richard E. Ladner, Elizabeth Litzler. The need to balance innovation and implementation in broadening participation |
39 | -- | 41 | Esperanza Marcos, Juan Manuel Vara, Valeria de Castro. Author order: what science can learn from the arts |
42 | -- | 43 | Christos H. Papadimitriou. Alan and I |
44 | -- | 47 | David Chisnall. A new Objective-C runtime: from research to production |
48 | -- | 53 | Emery D. Berger. Software needs seatbelts and airbags |
54 | -- | 60 | Erik Meijer. All your database are belong to us |
62 | -- | 68 | Gary Garrison, Sang Hyun Kim, Robin L. Wakefield. Success factors for deploying cloud computing |
69 | -- | 77 | Radu Calinescu, Carlo Ghezzi, Marta Z. Kwiatkowska, Raffaela Mirandola. Self-adaptive software needs quantitative verification at runtime |
78 | -- | 88 | Doug A. Bowman, Ryan P. McMahan, Eric D. Ragan. Questioning naturalism in 3D user interfaces |
90 | -- | 0 | William Buxton. Innovative interaction: from concept to the wild: technical perspective |
91 | -- | 101 | Shumin Zhai, Per Ola Kristensson. The word-gesture keyboard: reimagining keyboard interaction |
102 | -- | 0 | Dan Suciu. SQL on an encrypted database: technical perspective |
103 | -- | 111 | Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan. CryptDB: processing queries on an encrypted database |
117 | -- | 0 | Peter Winkler. Puzzled |
120 | -- | 0 | Leah Hoffmann. Q&A |