5 | -- | 0 | Ronald F. Boisvert. Incentivizing reproducibility |
7 | -- | 0 | Vinton G. Cerf. 'We're going backward!' |
8 | -- | 9 | Perry R. Cook. Adding art to STEM |
10 | -- | 12 | Don Monroe. Optical fibers getting full |
13 | -- | 15 | Marina Krakovsky. Bringing holography to light |
16 | -- | 17 | Keith Kirkpatrick. Battling algorithmic bias: how do we ensure algorithms treat us fairly? |
18 | -- | 20 | Michael A. Cusumano. The puzzle of Japanese innovation and entrepreneurship |
21 | -- | 23 | Michael L. Best. Mobile computing and political transformation |
24 | -- | 25 | George V. Neville-Neil. Cloud calipers |
26 | -- | 30 | Peter G. Neumann. Risks of automation: a cautionary total-system perspective of our cyberfuture |
31 | -- | 33 | Reinhard Pichler, Hannes Werthner. Universities and computer science in the European crisis of refugees |
34 | -- | 39 | Ulan Degenbaev, Jochen Eisinger, Manfred Ernst, Ross McIlroy, Hannes Payer. Idle-time garbage-collection scheduling |
40 | -- | 41 | Kate Matsudaira. Fresh starts |
42 | -- | 46 | André Medeiros. Dynamics of change: why reactivity matters |
48 | -- | 57 | Robert Lychev, Michael Schapira, Sharon Goldberg. Rethinking security for internet routing |
58 | -- | 64 | Craig Partridge, Mark Allman. Ethical considerations in network measurement papers |
66 | -- | 72 | A. J. Burns, M. Eric Johnson, Peter Honeyman. A brief chronology of medical device security |
74 | -- | 0 | Johannes Gehrke. Technical Perspective: Naiad |
75 | -- | 83 | Derek Gordon Murray, Frank McSherry, Michael Isard, Rebecca Isaacs, Paul Barham, Martín Abadi. Incremental, iterative data processing with timely dataflow |
84 | -- | 0 | James R. Larus. Technical Perspective: The power of parallelizing computations |
85 | -- | 92 | Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz. Efficient parallelization using rank convergence in dynamic programming algorithms |
96 | -- | 0 | Dennis E. Shasha. Find me quickly |