6 | -- | 7 | David Forsyth. Object Detection with Discriminatively Trained Part-Based Models |
8 | -- | 10 | Charles Severance. Joseph Hardin: NCSA Mosaic |
11 | -- | 13 | Brian M. Gaff. IP 2013-2014: Looking Forward and Looking Back |
14 | -- | 15 | W. Neville Holmes. 32 & 16 Years Ago |
16 | -- | 20 | Lee Garber. News Briefs |
21 | -- | 22 | Renee Bryce, Rick Kuhn. Software Testing |
23 | -- | 29 | Midhat Ali, Francesco De Angelis, Daniele Fanì, Antonia Bertolino, Guglielmo De Angelis, Andrea Polini. An Extensible Framework for Online Testing of Choreographed Services |
30 | -- | 36 | Nuno Antunes, Marco Vieira. Penetration Testing for Web Services |
37 | -- | 45 | Cemal Yilmaz, Sandro Fouché, Myra B. Cohen, Adam A. Porter, Gülsen Demiröz, Ugur Koc. Moving Forward with Combinatorial Interaction Testing |
46 | -- | 55 | Jerry Gao, Xiaoying Bai, Wei-Tek Tsai, Tadahiro Uehara. Mobile Application Testing: A Tutorial |
56 | -- | 61 | Andreas Dähn, Clemens H. Cap. Application Transparency and Manipulation |
62 | -- | 69 | William J. Chimiak, Samuel T. Patton, Stephen Janansky. Enhanced IP: IPv4 with 64-Bit Addresses |
70 | -- | 72 | Manfred Broy, Albrecht Schmidt. Challenges in Engineering Cyber-Physical Systems |
73 | -- | 77 | Hal Berghel. Moral Hazards, Negative Externalities, and the Surveillance Economy |
78 | -- | 81 | Apostol Vassilev, Timothy A. Hall. The Importance of Entropy to Information Security |
82 | -- | 84 | Peter Gruenbaum. Undergraduates Teach Game Programming Using Scratch |
85 | -- | 87 | Rafael Capilla, Óscar Ortiz, Mike Hinchey. Context Variability for Context-Aware Systems |
88 | -- | 90 | Jeffrey E. Froyd. The Nature of Scholarship in Computing Education: An Approach from IEEE Transactions on Education |
104 | -- | 0 | David Alan Grier. Practice and Theory |