6 | -- | 0 | Tim Menzies. Cross-Project Data for Software Engineering |
9 | -- | 0 | Thomas M. Conte. The Computer Society Must Change |
10 | -- | 13 | Thomas M. Conte, Elie K. Track, Erik DeBenedictis. Rebooting Computing: New Strategies for Technology Scaling |
14 | -- | 23 | John M. Shalf, Robert Leland. Computing beyond Moore's Law |
24 | -- | 33 | Mohamed M. Sabry, Mingyu Gao, Gage Hills, Chi-Shuen Lee, Greg Pitner, Max M. Shulaker, Tony F. Wu, Mehdi Asheghi, Jeffrey Bokor, Franz Franchetti, Kenneth E. Goodson, Christos Kozyrakis, Igor L. Markov, Kunle Olukotun, Larry T. Pileggi, Eric Pop, Jan M. Rabaey, Christopher Re, H.-S. Philip Wong, Subhasish Mitra. Energy-Efficient Abundant-Data Computing: The N3XT 1, 000x |
34 | -- | 42 | D. Scott Holmes, Alan M. Kadin, Mark W. Johnson. Superconducting Computing in Large-Scale Hybrid Systems |
44 | -- | 53 | Kirk Bresniker, Sharad Singhal, R. Stanley Williams. Adapting to Thrive in a New Economy of Memory Abundance |
54 | -- | 64 | Santosh Khasanvis, Mingyu Li, Mostafizur Rahman, Ayan Kumar Biswas, Mohammad Salehi Fashami, Jayasimha Atulasimha, Supriyo Bandyopadhyay, Csaba Andras Moritz. Architecting for Causal Intelligence at Nanoscale |
65 | -- | 71 | David J. Mountain, Mark R. McLean, Doug Palmer, Joshua D. Prucnal, Christopher D. Krieger. Ohmic Weave: Memristor-Based Threshold Gate Networks |
72 | -- | 79 | Michael K. Papamichael, James C. Hoe. The CONNECT Network-on-Chip Generator |
80 | -- | 87 | Jeffrey M. Voas, George F. Hurlburt. Third-Party Software's Trust Quagmire |
88 | -- | 93 | Hal Berghel. What Price Gonzo Ethics? |
94 | -- | 97 | Davide Brugali, Rafael Capilla, Mike Hinchey. Dynamic Variability Meets Robotics |
98 | -- | 101 | Alexander Kott, David S. Alberts, Cliff Wang. Will Cybersecurity Dictate the Outcome of Future Wars? |
128 | -- | 0 | David Alan Grier. Quantum Imagination |