8 | -- | 10 | David Alan Grier. The Curious and the Confident |
13 | -- | 15 | Neal Leavitt. Network-Usage Changes Push Internet Traffic to the Edge |
17 | -- | 20 | Linda Dailey Paulson. How Safe Are Secure Websites? |
22 | -- | 29 | Sergio L. Toral Marín, M. Rocío Martínez-Torres, Federico Barrero. Reforming ICT Graduate Programs to Meet Professional Needs |
30 | -- | 38 | Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov. Ending Piracy of Integrated Circuits |
39 | -- | 46 | Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, Mohammad Tehranipoor. Trustworthy Hardware: Identifying and Classifying Hardware Trojans |
47 | -- | 55 | Nir Kshetri. Cloud Computing in Developing Economies |
56 | -- | 63 | Juan Hamers, Lieven Eeckhout. Scenario-Based Resource Prediction for QoS-Aware Media Processing |
64 | -- | 65 | Bob Ward. Society Forms New Technical Committee on Semantic Computing |
77 | -- | 81 | Naren Ramakrishnan, David A. Hanauer, Benjamin J. Keller. Mining Electronic Health Records |
82 | -- | 84 | Richard J. LeBlanc. What Should All CS Graduates Know? |
85 | -- | 87 | Keith W. Miller, Jeffrey M. Voas, Phillip A. Laplante. In Trust We Trust |
88 | -- | 91 | Manfred Broy, Ralf Reussner. Architectural Concepts in Programming Languages |
92 | -- | 96 | Paul Lukowicz, Oliver Amft, Daniel Roggen, Jingyuan Cheng. On-Body Sensing: From Gesture-Based Input to Activity-Driven Interaction |
100 | -- | 99 | W. Neville Holmes. The Future of the Computing Profession: Readers E-mails |