8 | -- | 10 | Sorel Reisman. Looking Back, Looking Forward |
12 | -- | 14 | David Alan Grier. Uncharted Territory |
17 | -- | 20 | Neal Leavitt. Internet Security under Attack: The Undermining of Digital Certificates |
25 | -- | 32 | Jesse M. Heines, Gena R. Greher, S. Alex Ruthmann, Brendan Reilly. Two Approaches to Interdisciplinary Computing+Music Courses |
33 | -- | 38 | Joe Geigel, Marla Schweppe, David Huynh, Brian Johnstone. Adapting a Virtual World for Theatrical Performance |
39 | -- | 48 | So Yamaoka, Lev Manovich, Jeremy Douglass, Falko Kuester. Cultural Analytics in Large-Scale Visualization Environments |
49 | -- | 54 | Ami Marowka. Back to Thin-Core Massively Parallel Processors |
55 | -- | 62 | Mary Lacity, Erran Carmel, Joseph W. Rottman. Rural Outsourcing: Delivering ITO and BPO Services from Remote Domestic Locations |
63 | -- | 68 | Laura Ferrari, Marco Mamei. Discovering City Dynamics through Sports Tracking Applications |
77 | -- | 80 | Wil M. P. van der Aalst. Using Process Mining to Bridge the Gap between BI and BPM |
81 | -- | 83 | Douglas Baldwin. Is Computer Science a Relevant Academic Discipline for the 21st Century? |
84 | -- | 86 | Emi Tamaki, Jun Rekimoto. PossessedHand: Controlling Hand Movements with Computer Output |
87 | -- | 89 | Alexander Hills. Museums at Your Fingertips |
90 | -- | 92 | Kim Schaffer. Are Password Requirements too Difficult? |
93 | -- | 95 | Rafael Capilla, Jan Bosch. The Promise and Challenge of Runtime Variability |
116 | -- | 115 | W. Neville Holmes. The Profession and Digital Technology |