5 | -- | 0 | Moshe Y. Vardi. Moore's law and the sand-heap paradox |
7 | -- | 0 | Vinton G. Cerf. Sometimes it takes some time! |
8 | -- | 0 | . Know your steganographic enemy |
9 | -- | 17 | . ACM's 2014 general election: please take this opportunity to vote |
18 | -- | 19 | Judy Robertson. Rethinking how to teach programming to newcomers |
21 | -- | 23 | Samuel Greengard. How computers are changing biology |
24 | -- | 26 | Tom Geller. The forever disc |
27 | -- | 29 | Keith Kirkpatrick. Technology confounds the courts |
30 | -- | 32 | Marshall W. van Alstyne. Why Bitcoin has value |
33 | -- | 34 | Ben Depoorter. What happened to video game piracy? |
35 | -- | 38 | David Anderson. Tom Kilburn: a tale of five computers |
39 | -- | 41 | Steve Cooper, Shuchi Grover, Beth Simon. Building a virtual community of practice for K-12 CS teachers |
42 | -- | 43 | Ruzena Bajcsy. Robots are coming |
44 | -- | 51 | Bob Toxen. The NSA and Snowden: securing the all-seeing eye |
52 | -- | 60 | Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Selter, Andy Hopper. A primer on provenance |
61 | -- | 68 | Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen. Don't settle for eventual consistency |
70 | -- | 79 | Mihir Nanavati, Patrick Colp, Bill Aiello, Andrew Warfield. Cloud security: a gathering storm |
80 | -- | 87 | Shimeon Pass, Boaz Ronen. Reducing the software value gap |
88 | -- | 96 | Manlu Liu, Sean Hansen, Qiang Tu. The community source approach to software development and the Kuali experience |
98 | -- | 107 | Kevin Leyton-Brown, Holger H. Hoos, Frank Hutter, Lin Xu. NP-complete problems |
109 | -- | 0 | Ari Juels, Bonnie Wong. The interplay of neuroscience and cryptography: technical perspective |
110 | -- | 118 | Hristo Bojinov, Daniel Sanchez, Paul J. Reber, Dan Boneh, Patrick Lincoln. Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks |
120 | -- | 0 | Peter Winkler. Puzzled: A Sort, of Sorts |