5 | -- | 0 | Wendy Hall. ACM s place in the global picture |
7 | -- | 0 | Scott E. Delman. 50 Years young |
9 | -- | 0 | . Knuth s art of recovering from errors |
10 | -- | 0 | David Roman. Current features |
11 | -- | 13 | Kirk L. Kroeker. Finding diamonds in the rough |
14 | -- | 16 | Logan Kugler. Ubiquitous video |
17 | -- | 18 | Samuel Greengard. Privacy matters |
19 | -- | 0 | Leah Hoffmann. Wisdom from Randy Pausch |
22 | -- | 24 | Michael A. Cusumano. Technology strategy and management: The puzzle of Apple |
25 | -- | 26 | George Neville-Neil. Kode vicious: Pride and prejudice (the ::::Vasa::::) |
27 | -- | 29 | Cameron Wilson, Peter Harsha. IT policy: Science policy isn t always about science |
30 | -- | 32 | Richard G. Baraniuk, C. Sidney Burrus. Viewpoint: Global warming toward open educational resources |
34 | -- | 41 | Ian T. Foster, Savas Parastatidis, Paul Watson, Mark McKeown. How do I model state?: Let me count the ways |
34 | -- | 41 | Ian T. Foster, Savas Parastatidis, Paul Watson, Mark McKeown. How do I model state?: Let me count the ways |
42 | -- | 46 | Matthew Garrett. Powering down |
47 | -- | 52 | Mache Creeger. CTO storage roundtable, part two |
54 | -- | 59 | Mike Hinchey, Michael Jackson, Patrick Cousot, Byron Cook, Jonathan P. Bowen, Tiziana Margaria. Software engineering and formal methods |
60 | -- | 65 | Dmitri Roussinov, Weiguo Fan, Jose Antonio Robles-Flores. Beyond keywords: Automated question answering on the web |
66 | -- | 71 | Bertrand Meyer. Design and code reviews in the age of the internet |
72 | -- | 79 | Philip A. Bernstein, Laura M. Haas. Information integration in the enterprise |
83 | -- | 91 | Christopher J. Rossbach, Hany E. Ramadan, Owen S. Hofmann, Donald E. Porter, Bhandari Aditya, Emmett Witchel. TxLinux and MetaTM: transactional memory and the operating system |
93 | -- | 99 | Fabian Kuhn, Thomas Locher, Roger Wattenhofer. Distributed selection: a missing piece of data aggregation |
105 | -- | 109 | Robin S. Poston. Using and fixing biased rating schemes |
110 | -- | 114 | Kannan Mohan, Radhika Jain. Using traceability to mitigate cognitive biases in software development |
115 | -- | 118 | Alexander P. Pons, Peter Polak. Understanding user perspectives on biometric technology |
119 | -- | 122 | Lina Zhou, Dongsong Zhang. Following linguistic footprints: automatic deception detection in online communication |
123 | -- | 127 | Julia Kotlarsky, Ilan Oshri, Kuldeep Kumar, Jos van Hillegersberg. Towards agility in design in global component-based development |
128 | -- | 131 | Neset Hikmet, Eileen Z. Taylor, Christopher J. Davis. The student productivity paradox: technology mediated learning in schools |
132 | -- | 135 | Patrick Y. K. Chau, Fujun Lai, Dahui Li. What factors drive the assimilation of internet technologies in China? |