5 | -- | 0 | Moshe Y. Vardi. Why doesn't ACM have a SIG for theoretical computer science? |
7 | -- | 0 | Vinton G. Cerf. Invention |
8 | -- | 9 | . Not so easy to forget |
10 | -- | 11 | Mark Guzdial. Plain talk on computing education |
13 | -- | 15 | Esther Shein. Teaching computers with illusions |
16 | -- | 18 | Logan Kugler. Touching the virtual |
19 | -- | 20 | Keith Kirkpatrick. The moral challenges of driverless cars |
21 | -- | 23 | David Kotz, Kevin Fu, Carl A. Gunter, Aviel D. Rubin. Security for mobile and cloud frontiers in healthcare |
24 | -- | 26 | Henry Chesbrough, Marshall Van Alstyne. Permissionless innovation |
27 | -- | 28 | George V. Neville-Neil. Hickory dickory doc |
29 | -- | 32 | Susanne E. Hambrusch, Ran Libeskind-Hadas, Eric Aaron. Understanding the U.S. domestic computer science Ph.D. pipeline |
33 | -- | 35 | Leen-Kiat Soh, Duane F. Shell, Elizabeth Ingraham, Stephen Ramsay, Brian Moore 0002. Learning through computational creativity |
36 | -- | 43 | Arie van Deursen. Testing web applications with state objects |
44 | -- | 51 | Daniel C. Wang. From the EDVAC to WEBVACs |
52 | -- | 61 | Benoît Valiron, Neil J. Ross, Peter Selinger, D. Scott Alexander, Jonathan M. Smith. Programming the quantum future |
62 | -- | 69 | Petra Saskia Bayerl, Babak Akhgar. Surveillance and falsification implications for open source intelligence investigations |
70 | -- | 75 | Rua-Huan Tsaih, David C. Yen, Yu-Chien Chang. Challenges deploying complex technologies in a traditional organization |
76 | -- | 82 | Thanassis Tiropanis, Wendy Hall, Jon Crowcroft, Noshir S. Contractor, Leandros Tassiulas. Network science, web science, and internet science |
84 | -- | 0 | Aniket Kittur. Corralling crowd power: technical perspective |
85 | -- | 94 | Michael S. Bernstein, Greg Little, Robert C. Miller, Björn Hartmann, Mark S. Ackerman, David R. Karger, David Crowell, Katrina Panovich. Soylent: a word processor with a crowd inside |
96 | -- | 0 | Dennis Shasha. Upstart puzzles |