0 | -- | 0 | Leah Hoffmann. Advancing the ability of robots to help |
5 | -- | 0 | Moshe Y. Vardi. Technology and democracy |
7 | -- | 0 | Kristian Sørensen. The making of an IT strategy consultant |
8 | -- | 9 | Subbarao Kambhampati. Changing the nature of AI research |
11 | -- | 13 | Chris Edwards. Competition makes big datasets the winners |
14 | -- | 16 | Keith Kirkpatrick. The road to 6G |
17 | -- | 18 | Logan Kugler. How AI is driving the esports boom |
20 | -- | 22 | Andres Guadamuz. These are not the apes you are looking for |
23 | -- | 25 | Andreas Kuehn. Security by labeling |
26 | -- | 29 | Peter Denning, Roland N. Ibbett. The Atlas milestone |
30 | -- | 32 | William J. Dally. On the model of computation: point |
32 | -- | 34 | Uzi Vishkin. On the model of computation: counterpoint |
35 | -- | 37 | Florence Maraninchi. Let us not put all our eggs in one basket |
38 | -- | 42 | Alexandros Gazis, Eleftheria Katsiri. Middleware 101 |
43 | -- | 47 | Archie L. Cobbs. Persistence programming |
48 | -- | 57 | Carmela Troncoso, Dan Bogdanov, Edouard Bugnion, Sylvain Chatel, Cas Cremers, Seda F. Gürses, Jean-Pierre Hubaux, Dennis Jackson, James R. Larus, Wouter Lueks, Rui Oliveira 0001, Mathias Payer, Bart Preneel, Apostolos Pyrgelis, Marcel Salathé, Theresa Stadler, Michael Veale. Deploying decentralized, privacy-preserving proximity tracing |
58 | -- | 66 | Leslie Lamport. Deconstructing the bakery to build a distributed state machine |
68 | -- | 78 | Majd Latah, Kübra Kalkan. When SDN and blockchain shake hands |
82 | -- | 0 | Falko Dressler. Physical layer resilience through deep learning in software radios: technical perspective |
83 | -- | 91 | Francesco Restuccia, Tommaso Melodia. Polymorphic wireless receivers |
92 | -- | 0 | Nicolas Christin. The effectiveness of security measures: technical perspective |
93 | -- | 102 | Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage. Measuring security practices |