5 | -- | 0 | Robert B. Schnabel. Educating computing s next generation |
10 | -- | 11 | Jason Hong. Matters of design, part II |
12 | -- | 0 | Scott E. Delman. ACM on the move |
13 | -- | 15 | Gary Anthes. The quest for randomness |
16 | -- | 18 | Kirk L. Kroeker. Engineering sensation in artificial limbs |
19 | -- | 22 | Samuel Greengard. Social games, virtual goods |
23 | -- | 0 | Sarah Underwood. British computer scientists reboot |
24 | -- | 27 | Fred Niederman, Felix B. Tan. Managing global IT teams: considering cultural dynamics |
28 | -- | 30 | Nathan L. Ensmenger. Building castles in the air |
31 | -- | 33 | Michael A. Cusumano. Platform wars come to social media |
34 | -- | 35 | George V. Neville-Neil. Coder s block |
36 | -- | 37 | José Luis Gómez Barroso, Claudio Feijóo. Asymmetries and shortages of the network neutrality principle |
38 | -- | 43 | Jonathan Parri, Daniel Shapiro, Miodrag Bolic, Voicu Groza. Returning control to the programmer: SIMD intrinsics for virtual machines |
44 | -- | 48 | Thomas A. Limoncelli, Vinton G. Cerf. Successful strategies for IPv6 rollouts.: Really |
49 | -- | 58 | Erik Meijer, Gavin M. Bierman. A co-relational model of data for large shared data banks |
60 | -- | 69 | Maneesh Agrawala, Wilmot Li, Floraine Berthouzoz. Design principles for visual communication |
70 | -- | 77 | Aleksandar Dragojevic, Pascal Felber, Vincent Gramoli, Rachid Guerraoui. Why STM can be more than a research toy |
78 | -- | 85 | John C. Tang, Manuel Cebrián, Nicklaus A. Giacobe, Hyun Woo Kim, Taemie Kim, Douglas Beaker Wickert. Reflecting on the DARPA Red Balloon Challenge |
86 | -- | 96 | AnHai Doan, Raghu Ramakrishnan, Alon Y. Halevy. Crowdsourcing systems on the World-Wide Web |
98 | -- | 0 | Daniel M. Berry. Liability issues in software engineering: technical perspective |
99 | -- | 106 | Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin. Liability issues in software engineering: the use of formal methods to reduce legal uncertainties |
107 | -- | 0 | Madhu Sudan. Patterns hidden from simple algorithms: technical perspective |
108 | -- | 115 | Mark Braverman. Poly-logarithmic independence fools bounded-depth boolean circuits |
120 | -- | 0 | Leah Hoffmann. Q&A |
121 | -- | 124 | Patricia Morreale, David A. Joiner. Reaching future computer scientists |
125 | -- | 132 | Ann Majchrzak, Philip H. B. More. Emergency! Web 2.0 to the rescue! |
133 | -- | 141 | Fred Grossman, Charles C. Tappert, Joe Bergin, Susan M. Merritt. A research doctorate for computing professionals |
142 | -- | 151 | Gerardo Canfora, Massimiliano Di Penta, Luigi Cerulo. Achievements and challenges in software reverse engineering |