5 | -- | 0 | Andrew D. McGettrick. Education, always |
7 | -- | 0 | Vinton G. Cerf. Cognitive implants |
9 | -- | 0 | . Contribute more than algorithmic speculation |
10 | -- | 11 | Philip Guo. Clarifying human-computer interaction |
13 | -- | 15 | Don Monroe. A new type of mathematics? |
16 | -- | 18 | Esther Shein. everybody learn to code? |
19 | -- | 21 | Samuel Greengard. Computational photography comes into focus |
22 | -- | 0 | . ACM fellows inducted |
24 | -- | 27 | Diana L. Burley, Jon Eisenberg, Seymour E. Goodman. Would cybersecurity professionalization help address the cybersecurity crisis? |
28 | -- | 30 | Tim Bell. Establishing a nationwide CS curriculum in New Zealand high schools |
31 | -- | 35 | William Young, Nancy G. Leveson. An integrated approach to safety and security based on systems theory |
36 | -- | 37 | George V. Neville-Neil. Bugs and bragging rights |
38 | -- | 39 | Marco Ceccagnoli, Chris Forman, Peng Huang, D. J. Wu. Digital platforms: when is participation valuable? |
40 | -- | 42 | Stephen J. Andriole. Ready technology |
44 | -- | 51 | Kiran Prasad, Kelly Norton, Terry Coatta. Node at LinkedIn: the pursuit of thinner, lighter, faster |
52 | -- | 54 | Poul-Henning Kamp. Center wheel for success |
55 | -- | 62 | Zachary Hensley, Jibonananda Sanyal, Joshua R. New. Provenance in sensor data management |
64 | -- | 73 | Gerard J. Holzmann. Mars code |
74 | -- | 84 | Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley. Automatic exploit generation |
85 | -- | 93 | Silvio Micali, Michael O. Rabin. Cryptography miracles, secure auctions, matching problem verification |
94 | -- | 103 | Reinhard Wilhelm, Daniel Grund. Computation takes time, but how much? |
106 | -- | 0 | Michael W. Mahoney. A new spin on an old algorithm: technical perspective |
107 | -- | 114 | Grey Ballard, James Demmel, Olga Holtz, Oded Schwartz. Communication costs of Strassen's matrix multiplication |
120 | -- | 0 | Peter Winkler. Puzzled: Lowest Number Wins |