0 | -- | 0 | Leah Hoffmann. Reinventing virtual machines |
5 | -- | 0 | Cherri M. Pancake. New ways to think about CS education |
7 | -- | 0 | Vinton G. Cerf. Multisensory adventures |
9 | -- | 0 | CACM Staff. Adding more color to patch picture |
10 | -- | 11 | Mark Guzdial. Teaching teachers to offer STEM to undergrads |
13 | -- | 15 | Gary Anthes. Dead languages come to life |
16 | -- | 17 | Gregory Mone. Machine learning, meet whiskey |
18 | -- | 20 | Esther Shein. How universities deploy student data |
22 | -- | 24 | Alan Rubel, Kyle M. L. Jones. The temptation of data-enabled surveillance |
25 | -- | 27 | Mari Sako. Artificial intelligence and the future of professional work |
28 | -- | 29 | George V. Neville-Neil. Master of tickets |
30 | -- | 34 | Gaurav Banga. Why is cybersecurity not a human-scale problem anymore? |
35 | -- | 38 | Audrey Girouard, Jon E. Froehlich, Regan L. Mandryk, Mark Hancock. Organizing family support services at ACM conferences |
39 | -- | 41 | Jerrold M. Grochow. A taxonomy of automated assistants |
44 | -- | 46 | Sue Moon, Ann Nicholson, Abhik Roychoudhury. Welcome |
48 | -- | 49 | Ken-ichi Kawarabayashi. The NII Shonan meeting in Japan |
50 | -- | 52 | Sally Jo Cunningham, Fariz Darari, Adila Krisnadhi, Annika Hinze. Capturing cultural heritage in East Asia and Oceania |
53 | -- | 54 | Carsten Rudolph, Sadie Creese, Sameer Sharma. Cybersecurity in Pacific Island nations |
55 | -- | 57 | Karen Teh, Vivy Suhendra, Soon Chia Lim, Abhik Roychoudhury. Singapore's cybersecurity ecosystem |
58 | -- | 59 | Thomas Ho Chee Tat, George Loh Chee Ping. Innovating services and digital economy in Singapore |
60 | -- | 63 | Sintia Teddy-Ang, Abigail Toh. AI Singapore: empowering a smart nation |
62 | -- | 0 | Lam Kwok Yan, Campbell Wilson. Developing AI for law enforcement in Singapore and Australia |
64 | -- | 67 | Chris Bain, Abraham Oshni Alvandi. Digital healthcare across Oceania |
68 | -- | 71 | Meeyoung Cha, Wei Gao, Cheng-Te Li. Detecting fake news in social media: an Asia-Pacific perspective |
72 | -- | 75 | Gernot Heiser, Gerwin Klein, June Andronick. seL4 in Australia: from research to real-world trustworthy systems |
76 | -- | 81 | Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo 0001, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong-Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu 0001, Jianying Zhou 0001. Advances in security research in the Asiacrypt region |
82 | -- | 85 | Dong Ku Kim, Hyeonwoo Lee, Seong-Choon Lee, SunWoo Lee. 5G commercialization and trials in Korea |
86 | -- | 88 | Sang Kil Cha, Zhenkai Liang. Asia's surging interest in binary analysis |
90 | -- | 96 | Laura M. D. Maguire. Managing the hidden costs of coordination |
97 | -- | 103 | Marisa R. Grayson. Cognitive work of hypothesis exploration during anomaly response |
104 | -- | 107 | Daniel W. Woods, Tyler Moore. Cyber warranties: market fix or marketing trick? |
108 | -- | 115 | Herbert E. Bruderer. The Antikythera mechanism |
118 | -- | 0 | Ariel D. Procaccia. An answer to fair division's most enigmatic question: technical perspective |
119 | -- | 126 | Haris Aziz 0001, Simon Mackenzie. A bounded and envy-free cake cutting algorithm |