6 | -- | 7 | Charles Severance. Pooja Sankar: Building the Piazza Collaboration System |
8 | -- | 10 | Brian M. Gaff, Peter J. Cuomo. Design Patents |
12 | -- | 13 | W. Neville Holmes. 32 & 16 Years Ago |
14 | -- | 17 | Neal Leavitt. A Technology that Comes Highly Recommended |
18 | -- | 20 | Lee Garber. News Briefs |
22 | -- | 23 | Jane Chu Prey, Alfred C. Weaver. Fostering Gender Diversity in Computing |
24 | -- | 29 | Wendy M. DuBow. Diversity in Computing: Why It Matters and How Organizations Can Achieve It |
30 | -- | 36 | Telle Whitney, Denise Gammal, Barbara Gee, Jody Mahoney, Caroline Simard. Priming the Pipeline: Addressing Gender-Based Barriers in Computing |
38 | -- | 41 | Mary Fernandez. A Path Between: Mentoring the Next Generation of Computing Professionals |
42 | -- | 46 | Chris Stephenson, Rebecca Dovi. More than Gender: Taking a Systemic Approach to Improving K-12 Computer Science Education |
48 | -- | 51 | Crystal Eney, Ed Lazowska, Hélène Martin, Stuart Reges. Broadening Participation: The Why and the How |
52 | -- | 55 | James P. Cohoon, Joanne McGrath Cohoon, Mary Lou Soffa. Educating Diverse Computing Students at the University of Virginia |
56 | -- | 58 | Maria Klawe. Increasing Female Participation in Computing: The Harvey Mudd College Story |
60 | -- | 61 | Deepak Kumar. Serving Women with a Purposeful Vision |
62 | -- | 63 | Robert B. Schnabel. Personal Reflections on Gender Diversity in Computing |
63 | -- | 65 | Kate Starbird. Returning to My Inner Nerd: Following the "Social" Disruption of Computing |
65 | -- | 66 | Annie I. Antón. Facing Challenges and Having Fun |
66 | -- | 68 | Alice Bonhomme-Biais, Raquel Romano. Pursuing Professional Changes |
69 | -- | 77 | Lwin Khin Shar, Hee Beng Kuan Tan. Defeating SQL Injection |
78 | -- | 85 | Chung-Wei Hang, Zhe Zhang, Munindar P. Singh. Shin: Generalized Trust Propagation with Limited Evidence |
86 | -- | 89 | Nir Kshetri, San Murugesan. Cloud Computing and EU Data Privacy Regulations |
90 | -- | 93 | Kirk W. Cameron. Energy Oddities, Part 2: Why Green Computing Is Odd |
94 | -- | 96 | Karl Ricanek Jr., Gayathri Mahalingam. Biometrically, How Identical Are Identical Twins? |
97 | -- | 99 | Hal Berghel. The SCDOR Hack: Great Security Theater in Five Stages |
100 | -- | 103 | John Riedl. Crowdfunding Technology Innovation |
104 | -- | 107 | Brian David Johnson. Jimmy: The Robot That Changed It All |
124 | -- | 0 | David Alan Grier. Attention to Context |