7 | -- | 9 | David Alan Grier. Raising Barns |
12 | -- | 14 | Neal Leavitt. Will NoSQL Databases Live Up to Their Promise? |
15 | -- | 18 | Linda Dailey Paulson. Onboard Cooler Keeps Chips Comfortable |
19 | -- | 26 | Awais Rashid, Thomas Cottenier, Phil Greenwood, Ruzanna Chitchyan, Regine Meunier, Roberta Coelho, Mario Südholt, Wouter Joosen. Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe |
28 | -- | 29 | Ron Vetter. Authentication by Biometric Verification |
36 | -- | 44 | Anil K. Jain, Jianjiang Feng, Karthik Nandakumar. Fingerprint Matching |
46 | -- | 55 | Rama Chellappa, Pawan Sinha, P. Jonathon Phillips. Face Recognition by Computers and Humans |
56 | -- | 62 | Marios Savvides, Karl Ricanek Jr., Damon L. Woodard, Gerry V. Dozier. Unconstrained Biometric Identification: Emerging Technologies |
64 | -- | 71 | Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood. Compliance with Information Security Policies: An Empirical Investigation |
79 | -- | 84 | Bob Ward. Moore Wins Karlsson Award |
87 | -- | 89 | Jay Liebowitz. Strategic Intelligence, Social Networking, and Knowledge Retention |
90 | -- | 93 | Patricia O Hagan, Edward Hanna, Roy Sterritt. Addressing the Corrections Crisis with Software Technology |
95 | -- | 97 | Albrecht Schmidt. Ubiquitous Computing: Are We There Yet? |
98 | -- | 100 | Ann Q. Gates. Discovery, Innovation, and Creativity: The Core of Computing |
101 | -- | 104 | William W. Agresti. The Four Forces Shaping Cybersecurity |