6 | -- | 8 | David Alan Grier. Leisure Science |
11 | -- | 13 | Brian M. Gaff, Catherine J. Toppin. Ten Things to Know When Your Patent Application Is Allowed |
14 | -- | 16 | Neal Leavitt. IPv6: Any Closer to Adoption? |
21 | -- | 22 | Rolf Oppliger. Security and Privacy in an Online World |
23 | -- | 28 | Saeed Abu-Nimeh, Thomas M. Chen, Omar Alzubi. Malicious and Spam Posts in Online Social Networks |
29 | -- | 36 | Hossein Saiedian, Dan Broyle. Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives |
38 | -- | 43 | Florian Kerschbaum, Axel Schröpfer, Antonio Zilli, Richard Pibernik, Octavian Catrina, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato, Ernesto Damiani. Secure Collaborative Supply-Chain Management |
44 | -- | 50 | Francisco Rocha, Salvador Abreu, Miguel Correia. The Final Frontier: Confidentiality and Privacy in the Cloud |
51 | -- | 58 | Rodrigo Roman, Pablo Najera, Javier Lopez. Securing the Internet of Things |
60 | -- | 68 | Siani Pearson, Marco Casassa Mont. Sticky Policies: An Approach for Managing Privacy across Multiple Parties |
69 | -- | 72 | Frederick Ryckbosch, Stijn Polfliet, Lieven Eeckhout. Trends in Server Energy Proportionality |
73 | -- | 79 | Vivek Menon, Bharat Jayaraman, Venu Govindaraju. The Three Rs of Cyberphysical Spaces |
93 | -- | 96 | Henry Lieberman, Karthik Dinakar, Birago Jones. Let's Gang Up on Cyberbullying |
97 | -- | 101 | Suparna Bhattacharya, K. Gopinath, Karthick Rajamani, Manish Gupta. Software Bloat and Wasted Joules: Is Modularity a Hurdle to Green Software? |
102 | -- | 104 | Christopher L. Huntley. Onshore Mobile App Development: Successes and Challenges |
106 | -- | 108 | Karl Ricanek Jr., Benjamin Barbour. What Are Soft Biometrics and How Can They Be Used? |
112 | -- | 111 | Alessio Malizia, Kai A. Olsen. Has Everything Been Invented? On Software Development and the Future of Apps |