8 | -- | 9 | Charles Severance. Teaching the World: Daphne Koller and Coursera |
11 | -- | 13 | Brian M. Gaff, Kenneth Choy, Jamie Chan. Doing Business in China |
17 | -- | 20 | Lee Garber. Converged Infrastructure: Addressing the Efficiency Challenge |
24 | -- | 25 | Stephen W. Keckler, Steven K. Reinhardt. Massively Multithreaded Computing Systems |
26 | -- | 32 | John A. Stratton, Christopher I. Rodrigues, I-Jui Sung, Li-Wen Chang, Nasser Anssari, Geng (Daniel) Liu, Wen-mei W. Hwu, Nady Obeid. Algorithm and Data Optimization Techniques for Scaling to Massively Threaded Systems |
34 | -- | 41 | Stanley Tzeng, Brandon Lloyd, John D. Owens. A GPU Task-Parallel Model with Dependency Resolution |
42 | -- | 52 | Benedict R. Gaster, Lee W. Howes. Can GPGPU Programming Be Liberated from the Data-Parallel Bottleneck? |
53 | -- | 61 | Antonino Tumeo, Simone Secchi, Oreste Villa. Designing Next-Generation Massively Multithreaded Architectures for Irregular Applications |
62 | -- | 69 | Stephen Davies, Stacey Aylor Seal, Jesse Hatfield. Cinefile: A Category-Based Analytic Browser |
70 | -- | 72 | Lorraine J. Haricombe, L. Ada Emmett, Perry Alexander. Open Access: An Evolving Alternative |
73 | -- | 75 | Victor Ng-Thow-Hing, Sandra Y. Okita. Playdates with Robots |
76 | -- | 78 | Franco Zambonelli. Toward Sociotechnical Urban Superorganisms |
79 | -- | 81 | Tom Mens. On the Complexity of Software Systems |
79 | -- | 81 | Tom Mens. On the Complexity of Software Systems |
82 | -- | 84 | William H. Boothby, Wolff Heintschel von Heinegg, James Bret Michael, Michael N. Schmitt, Thomas C. Wingfield. When Is a Cyberattack a Use of Force or an Armed Attack? |
120 | -- | 0 | David Alan Grier, Erin Dian Dumbacher. The Winner Takes It All |