Journal: IEEE Computer

Volume 46, Issue 3

6 -- 7Charles Severance. Pooja Sankar: Building the Piazza Collaboration System
8 -- 10Brian M. Gaff, Peter J. Cuomo. Design Patents
12 -- 13W. Neville Holmes. 32 & 16 Years Ago
14 -- 17Neal Leavitt. A Technology that Comes Highly Recommended
18 -- 20Lee Garber. News Briefs
22 -- 23Jane Chu Prey, Alfred C. Weaver. Fostering Gender Diversity in Computing
24 -- 29Wendy M. DuBow. Diversity in Computing: Why It Matters and How Organizations Can Achieve It
30 -- 36Telle Whitney, Denise Gammal, Barbara Gee, Jody Mahoney, Caroline Simard. Priming the Pipeline: Addressing Gender-Based Barriers in Computing
38 -- 41Mary Fernandez. A Path Between: Mentoring the Next Generation of Computing Professionals
42 -- 46Chris Stephenson, Rebecca Dovi. More than Gender: Taking a Systemic Approach to Improving K-12 Computer Science Education
48 -- 51Crystal Eney, Ed Lazowska, Hélène Martin, Stuart Reges. Broadening Participation: The Why and the How
52 -- 55James P. Cohoon, Joanne McGrath Cohoon, Mary Lou Soffa. Educating Diverse Computing Students at the University of Virginia
56 -- 58Maria Klawe. Increasing Female Participation in Computing: The Harvey Mudd College Story
60 -- 61Deepak Kumar. Serving Women with a Purposeful Vision
62 -- 63Robert B. Schnabel. Personal Reflections on Gender Diversity in Computing
63 -- 65Kate Starbird. Returning to My Inner Nerd: Following the "Social" Disruption of Computing
65 -- 66Annie I. Antón. Facing Challenges and Having Fun
66 -- 68Alice Bonhomme-Biais, Raquel Romano. Pursuing Professional Changes
69 -- 77Lwin Khin Shar, Hee Beng Kuan Tan. Defeating SQL Injection
78 -- 85Chung-Wei Hang, Zhe Zhang, Munindar P. Singh. Shin: Generalized Trust Propagation with Limited Evidence
86 -- 89Nir Kshetri, San Murugesan. Cloud Computing and EU Data Privacy Regulations
90 -- 93Kirk W. Cameron. Energy Oddities, Part 2: Why Green Computing Is Odd
94 -- 96Karl Ricanek Jr., Gayathri Mahalingam. Biometrically, How Identical Are Identical Twins?
97 -- 99Hal Berghel. The SCDOR Hack: Great Security Theater in Five Stages
100 -- 103John Riedl. Crowdfunding Technology Innovation
104 -- 107Brian David Johnson. Jimmy: The Robot That Changed It All
124 -- 0David Alan Grier. Attention to Context