5 | -- | 0 | Moshe Y. Vardi. Openism, IPism, fundamentalism, and pragmatism |
7 | -- | 0 | Vinton G. Cerf. ACM and the professional programmer |
8 | -- | 9 | Mark Guzdial. Why the U.S. is not ready for mandatory CS education |
11 | -- | 13 | Chris Edwards. Researchers probe security through obscurity |
14 | -- | 16 | Keith Kirkpatrick. Surgical robots deliver care more precisely |
17 | -- | 19 | Erica Klarreich. Hello, my name is.. |
20 | -- | 23 | Seda F. Gürses. Can you engineer privacy? |
24 | -- | 28 | Uri Wilensky, Corey E. Brady, Michael S. Horn. Fostering computational literacy in science classrooms |
29 | -- | 30 | Chris Coward. Private then shared? |
31 | -- | 32 | George V. Neville-Neil. Forked over |
33 | -- | 35 | Frank Levy, Richard J. Murnane. Researching the robot revolution |
36 | -- | 38 | Jaime Teevan, Kevyn Collins-Thompson, Ryen W. White, Susan T. Dumais. Slow search |
40 | -- | 48 | Mark Cavage, David Pacheco. Bringing arbitrary compute to authoritative data |
49 | -- | 51 | Poul-Henning Kamp. Quality software costs money - heartbleed was free |
52 | -- | 58 | Michael J. Lutz, J. Fernando Naveda, James R. Vallino. Undergraduate software engineering |
60 | -- | 69 | Francesca Spezzano, V. S. Subrahmanian, Aaron Mannes. Reshaping terrorist networks |
70 | -- | 80 | Sumit Gulwani. Example-based learning in computer-aided STEM education |
82 | -- | 89 | Andrew V. Goldberg, Robert Endre Tarjan. Efficient maximum flow algorithms |
92 | -- | 0 | Philip A. Bernstein. Getting consensus for data replication: technical perspective |
93 | -- | 102 | Peter Bailis, Shivaram Venkataraman, Michael J. Franklin, Joseph M. Hellerstein, Ion Stoica. Quantifying eventual consistency with PBS |
104 | -- | 0 | Peter Winkler. Puzzled: Paths and Matchings |