6 | -- | 8 | David Alan Grier. The Cycles of Continuous Improvement |
9 | -- | 10 | Charles Severance. Andrew Tanenbaum: Writing the Book on Networks |
11 | -- | 13 | Brian M. Gaff, Judy St. John. Legal Careers for Engineers |
14 | -- | 15 | W. Neville Holmes. 32 & 16 Years Ago |
16 | -- | 20 | Lee Garber. Robot OS: A New Day for Robot Design |
24 | -- | 25 | Vladimir Getov. Computing Laws: Origins, Standing, and Impact [Guest editors' introduction] |
26 | -- | 31 | Bob Metcalfe. Metcalfe's Law after 40 Years of Ethernet |
32 | -- | 37 | Tsugio Makimoto. Implications of Makimoto's Wave |
38 | -- | 46 | Gene M. Amdahl. Computer Architecture and Amdahl's Law |
48 | -- | 53 | Andrew A. Chien, Vijay Karamcheti. Moore's Law: The First Ending and a New Beginning |
54 | -- | 59 | Patrick S. Ryan, Sarah Falvey, Ronak Merchant. When the Cloud Goes Local: The Global Problem with Data Localization |
60 | -- | 67 | Roy van Pelt, Anna Vilanova. Understanding Blood-Flow Dynamics: New Challenges for Visualization |
68 | -- | 75 | Karim El Defrawy, Sky Faber. Blindfolded Data Search via Secure Pattern Matching |
76 | -- | 79 | Kim Schaffer. Passwords, Privacy, and Policies: Can They Do Business Together? |
80 | -- | 84 | Ting Hua, Chang-Tien Lu, Naren Ramakrishnan, Feng Chen, Jaime Arredondo, David Mares, Kristen Summers. Analyzing Civil Unrest through Social Media |
85 | -- | 87 | Ann E. K. Sobel. The Escalating Cost of College |
88 | -- | 90 | Hy Resnick. Busted: A Digital Group Game to Help At-Risk Youth Stay out of Jail |
91 | -- | 95 | Hal Berghel. The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications |
96 | -- | 99 | Hao Han, Yinxing Xue, Keizo Oyama. Mashup Technology: Beyond Open Programming Interfaces |
124 | -- | 0 | David Alan Grier. The Way We Organize Ourselves |