Journal: Communications of the ACM

Volume 55, Issue 9

5 -- 0Moshe Y. Vardi. Why ACM?
7 -- 0. Operationalizing privacy by design
8 -- 9Bertrand Meyer. Incremental research vs. paradigm-shift mania
11 -- 13Gregory Goth. Atomic-level computing
14 -- 16Gary Anthes. Chips go upscale
17 -- 19Marina Krakovsky. Garbage in, info out
20 -- 23Paul Hyman. In honor of Alan Turing
26 -- 29Thomas Haigh. Seven lessons from bad history
30 -- 32Peter J. Denning. Don't feel bad if you can't predict the future
33 -- 35Tal Z. Zarsky. Automated prediction: perception, law, and policy
36 -- 38Richard E. Ladner, Elizabeth Litzler. The need to balance innovation and implementation in broadening participation
39 -- 41Esperanza Marcos, Juan Manuel Vara, Valeria de Castro. Author order: what science can learn from the arts
42 -- 43Christos H. Papadimitriou. Alan and I
44 -- 47David Chisnall. A new Objective-C runtime: from research to production
48 -- 53Emery D. Berger. Software needs seatbelts and airbags
54 -- 60Erik Meijer. All your database are belong to us
62 -- 68Gary Garrison, Sang Hyun Kim, Robin L. Wakefield. Success factors for deploying cloud computing
69 -- 77Radu Calinescu, Carlo Ghezzi, Marta Z. Kwiatkowska, Raffaela Mirandola. Self-adaptive software needs quantitative verification at runtime
78 -- 88Doug A. Bowman, Ryan P. McMahan, Eric D. Ragan. Questioning naturalism in 3D user interfaces
90 -- 0William Buxton. Innovative interaction: from concept to the wild: technical perspective
91 -- 101Shumin Zhai, Per Ola Kristensson. The word-gesture keyboard: reimagining keyboard interaction
102 -- 0Dan Suciu. SQL on an encrypted database: technical perspective
103 -- 111Raluca A. Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan. CryptDB: processing queries on an encrypted database
117 -- 0Peter Winkler. Puzzled
120 -- 0Leah Hoffmann. Q&A

Volume 55, Issue 8

5 -- 0Bill Poucher. Giving students the competitive edge
7 -- 0. Composable trees for configurable behavior
10 -- 11John Langford, Ruben Ortega. Machine learning and algorithms; agile development
13 -- 15Jeff Kanipe. Cosmic simulations
16 -- 17Tom Geller. DARPA Shredder challenge solved
18 -- 20Samuel Greengard. Advertising gets personal
21 -- 0Karen A. Frenkel. Broader horizons
22 -- 25Paul Tjia. Inside the hermit kingdom: IT and outsourcing in North Korea
26 -- 28Fred G. Martin. Will massive open online courses change how we teach?
29 -- 31Danah Boyd. The politics of "real names"
32 -- 33George V. Neville-Neil. A system is not a product
34 -- 35Chris Forman, Avi Goldfarb, Shane Greenstein. The internet is everywhere, but the payoff is not
36 -- 38Kai A. Olsen, Hans Fredrik Nordhaug. Internet elections: unsafe in any home?
39 -- 41Neil McBride. The ethics of software engineering should be an ethics for the client
42 -- 47Thomas A. Limoncelli. OpenFlow: a radical new idea in networking
48 -- 52Rafael Vanoni Polanczyk. Extending the semantics of scheduling priorities
53 -- 59Manuel Serrano, Gérard Berry. Multitier programming in Hop
60 -- 68Stephen B. Wicker. The loss of location privacy in the cellular age
69 -- 75Bjorn De Sutter, Aäron Van Den Oord. To be or not to be cited in computer science
76 -- 83Wil M. P. van der Aalst. Process mining
84 -- 92Scott Aaronson, Edward Farhi, David Gosset, Avinatan Hassidim, Jonathan A. Kelner, Andrew Lutomirski. Quantum money
96 -- 0Martin C. Rinard. Example-driven program synthesis for end-user programming: technical perspective
97 -- 105Sumit Gulwani, William R. Harris, Rishabh Singh. Spreadsheet data manipulation using examples
106 -- 0Andreas Zeller. Proving programs continuous: technical perspective
107 -- 115Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerman. Continuity and robustness of programs
120 -- 0Peter Winkler. Puzzled

Volume 55, Issue 7

5 -- 0Moshe Y. Vardi. Predatory scholarly publishing
7 -- 8. An integral number and its consequences
10 -- 11Mark Guzdial, Judy Robertson. CS and popular culture; learning from console games
13 -- 15Gregory Goth. Degrees of separation
16 -- 17Gary Anthes. HTML5 leads a web revolution
18 -- 20Marina Krakovsky. Patently inadequate
21 -- 0Paul Hyman. Lost and found
22 -- 24Mari Sako. Business models for strategy and innovation
25 -- 27Pamela Samuelson. Can online piracy be stopped by laws?
28 -- 30Richard T. Watson, Jacqueline Corbett, Marie-Claude Boudreau, Jane Webster. An information strategy for environmental sustainability
31 -- 33Martin Campbell-Kelly. Alan Turing's other universal machine
34 -- 37Alfred Z. Spector, Peter Norvig, Slav Petrov. Google's hybrid approach to research
38 -- 40Sarah Spiekermann. The challenges of privacy by design
42 -- 50Kathleen M. Nichols, Van Jacobson. Controlling queue delay
51 -- 53Poul-Henning Kamp. My compiler does not understand me
54 -- 59Eric Bouwers, Joost Visser, Arie van Deursen. Getting what you measure
60 -- 70James Abello, Peter Broadwell, Timothy R. Tangherlini. Computational folkloristics
71 -- 77Ian Sommerville, Dave Cliff, Radu Calinescu, Justin Keen, Tim Kelly, Marta Z. Kwiatkowska, John A. McDermid, Richard F. Paige. Large-scale complex IT systems
78 -- 89Milo M. K. Martin, Mark D. Hill, Daniel J. Sorin. Why on-chip cache coherence is here to stay
90 -- 100David Harel, Assaf Marron, Gera Weiss. Behavioral programming
104 -- 0David Patterson. For better or worse, benchmarks shape a field: technical perspective
105 -- 114Hadi Esmaeilzadeh, Ting Cao, Xi Yang, Stephen M. Blackburn, Kathryn S. McKinley. Looking back and looking forward: power, performance, and upheaval
115 -- 0Amos Fiat. Why study the price of anarchy?: technical perspective
116 -- 123Tim Roughgarden. Intrinsic robustness of the price of anarchy
128 -- 0Ken MacLeod. Future Tense
129 -- 134Matthew Swinarski, Diane H. Parente, Rajiv Kishore. Do small IT firms benefit from higher process capability?

Volume 55, Issue 6

5 -- 0Eugene H. Spafford. USACM and U.S. legislation
6 -- 7. The halting problem in the clear light of probability
10 -- 11Jason Hong, Greg Linden. Protecting against data breaches; living with mistakes
12 -- 0Scott E. Delman. Don't throw the baby out with the bathwater
13 -- 15Gregory Goth. Analyzing medical data
16 -- 18Gary Anthes. Smarter photography
19 -- 21Leah Hoffmann. Data mining meets city hall
22 -- 23Neil Savage. Game changer
24 -- 0Paul Hyman. An influential theoretician
26 -- 28Phillip G. Armour. A measure of control
29 -- 32Simson L. Garfinkel. The cybersecurity risk
33 -- 34George V. Neville-Neil. Scale failure
35 -- 37Chris Hall. Security of the internet and the known unknowns
38 -- 40Peter J. Denning, Nicholas Dew. The myth of the elevator pitch
41 -- 43Herbert Lin. Why computer scientists should care about cyber conflict and U.S. national security policy
44 -- 51Dennis Abts, Bob Felderman. A guided tour of data-center networking
52 -- 60David J. Crandall, Noah Snavely. Modeling people and places with internet photo collections
61 -- 69Kari Pulli, Anatoly Baksheev, Kirill Kornyakov, Victor Eruhimov. Real-time computer vision with OpenCV
70 -- 75Benjamin Doerr, Mahmoud Fouz, Tobias Friedrich. Why rumors spread so quickly in social networks
76 -- 85Bryan Parno. Trust extension for commodity computers
86 -- 97Michael J. Carey, Nicola Onose, Michalis Petropoulos. Data services
98 -- 107Ketan Mulmuley. NP problem
110 -- 0Pablo A. Parrilo. Reconstructing the unknown, balancing structure and uncertainty: technical perspective
111 -- 119Emmanuel J. Candès, Benjamin Recht. Exact matrix completion via convex optimization
120 -- 0Peter Lee 0001. The fox and the hedgehog: technical perspective
121 -- 130Tiark Rompf, Martin Odersky. Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs
133 -- 0Peter Winkler. Puzzled
136 -- 0Leah Hoffmann. Q&A

Volume 55, Issue 5

5 -- 0Moshe Y. Vardi. Fair access
6 -- 7Judy Robertson. Likert-type scales, statistical methods, and effect sizes
9 -- 11Neil Savage. Automating scientific discovery
12 -- 13Alex Wright. Robots like us
14 -- 16Samuel Greengard. Digitally possessed
17 -- 0Paul Hyman. A workshop revival
19 -- 29Gerald Segal. ACM's 2012 general election
30 -- 32Peter S. Menell. Design for symbiosis
33 -- 34David Anderson. The future of the past
35 -- 37Joel Waldfogel. Digitization and copyright: some recent evidence from music
38 -- 40Alexander Repenning. Programming goes back to school
41 -- 43Abraham Bernstein, Mark Klein, Thomas W. Malone. Programming the global brain
44 -- 49Armando Fox, David A. Patterson. Crossing the software education chasm
50 -- 55Eric Allman. Managing technical debt
56 -- 65Pat Helland. Idempotence is not a medical condition
66 -- 73Erik Meijer. Your mouse is a database
74 -- 80Alok N. Choudhary, William Hendrix, Kathy Lee, Diana Palsetia, Wei-keng Liao. Social media evolution of the Egyptian revolution
81 -- 87Daniel S. Soper, Ofir Turel. Communications 2000-2010
88 -- 97Nir Atias, Roded Sharan. Comparative analysis of protein networks: hard problems, practical solutions
100 -- 0William Gropp. Best algorithms + best computers = powerful match
101 -- 109Ilya Lashuk, Aparna Chandramowlishwaran, Harper Langston, Tuan-Anh Nguyen, Rahul S. Sampath, Aashay Shringarpure, Richard W. Vuduc, Lexing Ying, Denis Zorin, George Biros. A massively parallel adaptive fast multipole method on heterogeneous architectures
110 -- 0Steven Hand. An experiment in determinism
111 -- 119Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford. Efficient system-enforced deterministic parallelism
120 -- 0Peter Winkler. Puzzled

Volume 55, Issue 4

5 -- 0Yunhao Liu, Vincent Shen. ACM China Council
6 -- 7. The beauty of simplicity
8 -- 9Daniel Reed, Mark Guzdial. The power of computing; design guidelines in CS education
11 -- 13Gregory Goth. Preserving digital data
14 -- 16Tom Geller. Talking to machines
17 -- 19Leah Hoffmann. Open for business
21 -- 23Michael A. Cusumano. Can services and platform thinking help the U.S. Postal Service?
24 -- 26Richard Heeks. Information technology and gross national happiness
27 -- 28George V. Neville-Neil. The network protocol battle
29 -- 31Jill Ross, Elizabeth Litzler, Joanne McGrath Cohoon, Lucy Sanders. Improving gender composition in computing
32 -- 34Selma Tekir. Reading CS classics
35 -- 37Daniel Soper. Is human mobility tracking a good idea?
38 -- 44Brian Beckman. Why LINQ matters: cloud composability guaranteed
45 -- 54Jeffrey Heer, Ben Shneiderman. Interactive dynamics for visual analysis
55 -- 63Andrew Danowitz, Kyle Kelley, James Mao, John P. Stevenson, Mark Horowitz. CPU DB: recording microprocessor history
64 -- 70Martin Schmettow. Sample size in usability studies
71 -- 76Laurie Williams. What agile teams think of agile principles
77 -- 84David M. Blei. Probabilistic topic models
86 -- 97Sarvapali D. Ramchurn, Perukrishnen Vytelingum, Alex Rogers, Nicholas R. Jennings. Putting the 'smarts' into the smart grid: a grand challenge for artificial intelligence
101 -- 0Dinesh Manocha. Building robust dynamical simulation systems: technical perspective
102 -- 109David Harmon, Etienne Vouga, Breannan Smith, Rasmus Tamstorf, Eitan Grinspun. Asynchronous contact mechanics
110 -- 0Ed H. Chi. Who knows?: searching for expertise on the social web: technical perspective
111 -- 118Damon Horowitz, Sepandar D. Kamvar. Searching the village: models and methods for social search
120 -- 0Brian Clegg. Future tense

Volume 55, Issue 3

5 -- 0Moshe Y. Vardi. What is an algorithm?
6 -- 7. From syntax to semantics for AI
10 -- 11Bertrand Meyer. Knowledgeable beginners
13 -- 15Neil Savage. Gaining wisdom from crowds
16 -- 18Gary Anthes. Computing with magnets
19 -- 21Samuel Greengard. Policing the future
22 -- 0Paul Hyman. Stanford schooling - gratis!
23 -- 0Jack Rosenberger. Computer science awards
24 -- 26Patrick Lin, Fritz Allhoff, Neil C. Rowe. War 2.0: cyberweapons and ethics
27 -- 29Pamela Samuelson. Do software copyrights protect what programs do?
30 -- 32Peter J. Denning. The idea idea
33 -- 35Vassilis Kostakos. Training users vs. training soldiers: experiences from the battlefield
36 -- 38Alessio Malizia, Andrea Bellucci. The artificiality of natural user interfaces
40 -- 44Patrice Godefroid, Michael Y. Levin, David A. Molnar. SAGE: whitebox fuzzing for security testing
45 -- 51Luigi Rizzo. Revisiting network I/O APIs: the netmap framework
52 -- 53Poul-Henning Kamp. The hyperdimensional tar pit
54 -- 65Youngki Lee, S. S. Iyengar, Chulhong Min, Younghyun Ju, Seungwoo Kang, Taiwoo Park, Jinwon Lee, Yunseok Rhee, Junehwa Song. MobiCon: a mobile context-monitoring platform
66 -- 73Seung-Hyun Kim, Qiu-Hong Wang, Johannes Ullrich. A comparative study of cyberattacks
74 -- 83S. Barry Cooper. Turing's Titanic machine?
84 -- 93J. Y. Huang, C. H. Tsai, S.-T. Huang. The next generation of GPS navigation systems
96 -- 0Steven D. Gribble. The benefits of capability-based protection: technical perspective
97 -- 104Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway. A taste of Capsicum: practical capabilities for UNIX
105 -- 0Michael L. Littman. A new way to search game trees: technical perspective
106 -- 113Sylvain Gelly, Levente Kocsis, Marc Schoenauer, Michèle Sebag, David Silver, Csaba Szepesvári, Olivier Teytaud. The grand challenge of computer Go: Monte Carlo tree search and extensions
118 -- 0Peter Winkler. Puzzled
120 -- 0Leah Hoffmann. Q&A

Volume 55, Issue 2

5 -- 0Fabrizio Gagliardi. Revisiting ACM Europe
6 -- 7. Credit non-anonymous reviewers with a name
10 -- 11Michael Stonebraker, Jason Hong. Researchers' big data crisis; understanding design and functionality
13 -- 15Gregory Goth. The science of better science
16 -- 18Samuel Greengard. The war against botnets
19 -- 21Alex Wright. The social life of robots
23 -- 0. ACM Fellows inducted
24 -- 26Gregory L. Rosston. Incentive auctions
27 -- 29Beth Simon, Quintin I. Cutts. Peer instruction: a teaching method to foster deep understanding
30 -- 32Donald A. Norman. Yet another technology cusp: confusion, vendor wars, and opportunities
33 -- 34George V. Neville-Neil. Wanton acts of debuggery
35 -- 37Rose McDermott. Emotion and security
38 -- 39Marvin V. Zelkowitz. What have we learned about software engineering?
40 -- 47. BufferBloat: what's wrong with the internet?
48 -- 54Hans-Juergen Boehm, Sarita V. Adve. You don't know jack about shared variables or memory models
55 -- 61Adam J. Oliner, Archana Ganapathi, Wei Xu. Advances and challenges in log analysis
62 -- 69Nicholas Evangelopoulos, Lucian Visinescu. Text-mining the voice of the people
70 -- 80Holger H. Hoos. Programming by optimization
81 -- 88Bryce Allen, John Bresnahan, Lisa Childers, Ian T. Foster, Gopi Kandaswamy, Rajkumar Kettimuthu, Jack Kordas, Mike Link, Stuart Martin, Karl Pickett, Steven Tuecke. Software as a service for data scientists
90 -- 100Miad Faezipour, Mehrdad Nourani, Adnan Saeed, Sateesh Addepalli. Progress and challenges in intelligent vehicle area networks
102 -- 0Rastislav Bodík. Compiling what to how: technical perspective
103 -- 111Viktor Kuncak, Mikaël Mayer, Ruzica Piskac, Philippe Suter. Software synthesis procedures
112 -- 0Santosh Vempala. Modeling high-dimensional data: technical perspective
113 -- 120Adam Tauman Kalai, Ankur Moitra, Gregory Valiant. Disentangling Gaussians
128 -- 0Peter Winkler. Puzzled

Volume 55, Issue 12

5 -- 0Mary Hall. Understanding ACM's past
7 -- 0Vinton G. Cerf. Computer science revisited
8 -- 9. Why open access?
12 -- 13Mark Guzdial, Judy Robertson. Levels of abstraction: pre-teens and career choices
15 -- 17Gregory Goth. Quantum quests
18 -- 19Gary Anthes. Zoom in, zoom out
20 -- 22Paul Hyman. In the year of disruptive education
24 -- 27Richard Heeks. IT innovation for the bottom of the pyramid
28 -- 30David Anderson. Saving private Gromit
31 -- 32George V. Neville-Neil. Can more code mean fewer bugs?
33 -- 35Peter J. Denning. Moods
36 -- 38Teresa A. Dahlberg. Why we need an ACM Special Interest Group for broadening participation
39 -- 40William Newman. Alan Turing remembered
42 -- 49Ivar Jacobson, Pan Wei Ng, Paul McMahon, Ian Spence, Svante Lidman. The essence of software engineering: the SEMAT kernel
50 -- 58Aiman Erbad, Charles Krasic. Sender-side buffers and the case for multimedia adaptation
59 -- 63Michael Cornwell. Anatomy of a solid-state drive
64 -- 73Bryce Thomas, Raja Jurdak, Ian Atkinson. SPDYing up the web
74 -- 77Robert M. French. Moving beyond the Turing test
78 -- 88David Doty. Theory of algorithmic self-assembly
90 -- 0Yannis Smaragdakis. High-level data structures: technical perspective
91 -- 99Peter Hawkins, Martin C. Rinard, Alex Aiken, Mooly Sagiv, Kathleen Fisher. An introduction to data representation synthesis
100 -- 0Ali Jadbabaie. Natural algorithms in a networked world: technical perspective
101 -- 110Bernard Chazelle. Natural algorithms and influence systems
126 -- 0Peter Winkler. Puzzled
128 -- 0Leah Hoffmann. Q&A

Volume 55, Issue 11

5 -- 0Moshe Y. Vardi. Will MOOCs destroy academia?
7 -- 0Vinton G. Cerf. Why is accessibility so hard?
8 -- 9. When predicting, start with humility
10 -- 11Michael Stonebraker. New opportunities for New SQL
12 -- 0Bernard Rous. Major update to ACM's Computing Classification System
13 -- 15Gregory Goth. Software on Mars
16 -- 18Tom Geller. Control without controllers
19 -- 21Samuel Greengard. On the digital trail
22 -- 24David A. Basin, Srdjan Capkun. The research value of publishing attacks
25 -- 27Pamela Samuelson. Oracle v. Google: are APIs copyrightable?
28 -- 30Kristina McElheran. Decentralization versus centralization in IT governance
31 -- 33Aman Yadav, John T. Korb. Learning to teach computer science: the need for a methods course
34 -- 36Timothy Kostyk, Joseph Herkert. Societal implications of the emerging smart grid
37 -- 39Richard A. DeMillo. Keeping technology promises
40 -- 47Jesse Robbins, Kripa Krishnan, John Allspaw, Tom Limoncelli. Resilience engineering: learning to embrace failure
48 -- 52Kripa Krishnan. Weathering the unexpected
53 -- 55Marshall K. McKusick. Disks from the perspective of a file system
56 -- 64Dan Boneh, Amit Sahai, Brent Waters. Functional encryption: a new vision for public-key cryptography
65 -- 75Jörg K. Wegner, Aaron Sterling, Rajarshi Guha, Andreas Bender, Jean-Loup Faulon, Janna Hastings, Noel M. O'Boyle, John P. Overington, Herman van Vlijmen, Egon L. Willighagen. Cheminformatics
76 -- 87Rolf Pfeifer, Max Lungarella, Fumiya Iida. The challenges ahead for bio-inspired 'soft' robotics
89 -- 0Richard Szeliski. Open platforms for computational photography: technical perspective
90 -- 98Andrew Adams, David E. Jacobs, Jennifer Dolson, Marius Tico, Kari Pulli, Eino-Ville Talvala, Boris Ajdin, Daniel A. Vaquero, Hendrik P. A. Lensch, Mark Horowitz, Sung-Hee Park, Natasha Gelfand, Jongmin Baek, Wojciech Matusik, Marc Levoy. The Frankencamera: an experimental platform for computational photography
99 -- 0Henning Schulzinne. The realities of home broadband: technical perspective
100 -- 109Srikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Sam Crawford, Antonio Pescapè. Measuring home broadband performance
120 -- 0Peter Winkler. Puzzled

Volume 55, Issue 10

5 -- 0Vinton G. Cerf. Where is the science in computer science?
6 -- 7. When harm to conference reputation is self-inflicted
8 -- 9Daniel Reed, Ed H. Chi. Online privacy; replicating research results
11 -- 13Neil Savage. Digging for drug facts
14 -- 16Gregory Mone. Redesigning the data center
17 -- 19Leah Hoffmann. Computer science and the three Rs
20 -- 23Michael A. Cusumano. Reflecting on the Facebook IPO
24 -- 25Phillip G. Armour. The Goldilocks estimate
26 -- 29Peter G. Neumann. The foresight saga, redux
30 -- 31George V. Neville-Neil. A nice piece of code
32 -- 34Jean-François Blanchette. Computing as if infrastructure mattered
35 -- 36Ivan Sutherland. The tyranny of the clock
38 -- 47Rick Ratzel, Rodney Greenstreet. Toward higher precision
48 -- 52John Allspaw. Fault injection in production
53 -- 55Poul-Henning Kamp. A generation lost in the bazaar
56 -- 67Michael Kearns. Experiments in social computation
68 -- 77Barbara Simons, Douglas W. Jones. Internet voting in the U.S
78 -- 87Pedro Domingos. A few useful things to know about machine learning
89 -- 0Rocco A. Servedio. A high-dimensional surprise: technical perspective
90 -- 97Guy Kindler, Anup Rao, Ryan O'Donnell, Avi Wigderson. Spherical cubes: optimal foams from computational hardness amplification
98 -- 0Bruce Hendrickson. Graph embeddings and linear equations: technical perspective
99 -- 107Ioannis Koutis, Gary L. Miller, Richard Peng. A fast solver for a class of linear systems
112 -- 0Geoffrey A. Landis. Future tense

Volume 55, Issue 1

5 -- 0Moshe Y. Vardi. Artificial intelligence: past and future
6 -- 7. is engineering
8 -- 0Alain Chesnais. ACM president's letter
9 -- 13Alain Chesnais. ACM's annual report
14 -- 15Mark Guzdial, Bertrand Meyer. Understanding CS1 students; defective software
16 -- 0Scott E. Delman. eBooks will abound in the ACM Digital Library
17 -- 19Neil Savage. Better medicine through machine learning
20 -- 22Gary Anthes. Revamping storage performance
23 -- 25Samuel Greengard. Law and disorder
26 -- 0Sarah Underwood. Celebration time
27 -- 0Alex Wright. Analyzing Apple products
28 -- 29Paul Hyman. John McCarthy, 1927-2011
30 -- 32Randal C. Picker. The yin and yang of copyright and technology
33 -- 34Phillip G. Armour. The difference engine
35 -- 37Thomas Haigh. The IBM PC: from beige box to industry standard
38 -- 40Kai A. Olsen, Alessio Malizia. Interfaces for the ordinary user: can we hide too much?
41 -- 46Philip L. Frana. An interview with Stephen A. Cook
48 -- 56Matthew Flatt. Creating languages in Racket
57 -- 65Jim Gettys, Kathleen M. Nichols. Bufferbloat: dark buffers in the internet
66 -- 73Carl A. Waldspurger, Mendel Rosenblum. I/O virtualization
74 -- 81Jason Hong. The state of phishing attacks
82 -- 90Geoff Coulson, Barry Porter, Ioannis Chatzigiannakis, Christos Koninis, Stefan Fischer, Dennis Pfisterer, Daniel Bimschas, Torsten Braun, Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Sándor P. Fekete, Alexander Kröller, Tobias Baumgartner. Flexible experimentation in wireless sensor networks
91 -- 95Chi-Sung Laih, Shang-Ming Jen, Chia-Yu Lu. Long-term confidentiality of PKI
96 -- 104Roberto Manduchi, James M. Coughlan. (Computer) vision without sight
106 -- 0Frédo Durand. Where do people draw lines?: technical perspective
107 -- 115Forrester Cole, Aleksey Golovinskiy, Alex Limpaecher, Heather Stoddart Barros, Adam Finkelstein, Thomas A. Funkhouser, Szymon Rusinkiewicz. Where do people draw lines?
116 -- 0Jim Kurose. Content-centric networking: technical perspective
117 -- 124Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nick Briggs, Rebecca Braynard. Networking named content
136 -- 0Daniel H. Wilson. Future tense