5 | -- | 0 | Valerie Barr. Gender diversity in computing: are we making any progress? |
7 | -- | 0 | Vinton G. Cerf. A genetic theory of the Silicon Valley phenomenon |
8 | -- | 9 | . Consider indirect threats of AI, too |
10 | -- | 11 | John Arquilla, Mark Guzdial. Crafting a national cyberdefense, and preparing to support computational literacy |
12 | -- | 14 | Gregory Mone. Sensors on the brain |
15 | -- | 16 | Chris Edwards. Digitizing the world |
17 | -- | 19 | Esther Shein. Computing the arts |
20 | -- | 21 | . Cybersecurity |
22 | -- | 23 | Ineke Buskens. Online social networks and global women's empowerment |
24 | -- | 25 | George V. Neville-Neil. The chess player who couldn't pass the salt |
26 | -- | 28 | William Regli. Wanted: toolsmiths |
29 | -- | 31 | Yancey Strickler. What it means to be an entrepreneur today |
32 | -- | 39 | Meng-Day (Mandel) Yu, Srinivas Devadas. Pervasive, dynamic authentication of physical items |
40 | -- | 44 | Robert C. Seacord. Uninitialized reads |
45 | -- | 46 | Kate Matsudaira. Does anybody listen to you? |
48 | -- | 54 | Luiz André Barroso, Mike Marty, David Patterson, Parthasarathy Ranganathan. Attack of the killer microseconds |
55 | -- | 62 | Aman Yadav, Chris Stephenson, Hai Hong. Computational thinking for teacher education |
64 | -- | 72 | Athman Bouguettaya, Munindar P. Singh, Michael N. Huhns, Quan Z. Sheng, Hai Dong, Qi Yu, Azadeh Ghari Neiat, Sajib Mistry, Boualem Benatallah, Brahim Medjahed, Mourad Ouzzani, Fabio Casati, Xumin Liu, Hongbing Wang, Dimitrios Georgakopoulos, Liang Chen, Surya Nepal, Zaki Malik, Abdelkarim Erradi, Yan Wang, M. Brian Blake, Schahram Dustdar, Frank Leymann, Michael P. Papazoglou. A service computing manifesto: the next 10 years |
74 | -- | 0 | Gernot Heiser. Technical Perspective: Proving file systems meet expectations |
75 | -- | 84 | Tej Chajed, Haogang Chen, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich, Daniel Ziegler. Certifying a file system using crash hoare logic: correctness in the presence of crashes |
85 | -- | 0 | Jonathan Ullman. Technical Perspective: Building a safety net for data reuse |
86 | -- | 93 | Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toniann Pitassi, Omer Reingold, Aaron Roth. Guilt-free data reuse |
96 | -- | 0 | Dennis E. Shasha. Stacking the deck |