6 | -- | 0 | Ling Liu. Enhancing Cloud Services through Multitier Workload Analysis |
7 | -- | 8 | Charles Severance. John Resig: Building JQuery |
9 | -- | 11 | Brian M. Gaff. Important IP Cases in 2015, Part Two |
14 | -- | 17 | Ron Vetter, San Murugesan. The Web: The Next 25 Years |
18 | -- | 25 | Vishnu S. Pendyala, Simon S. Y. Shim, Christoph Bussler. The Web That Extends beyond the World |
26 | -- | 32 | Dave Raggett. The Web of Things: Challenges and Opportunities |
34 | -- | 42 | Jörg Heuer, Johannes Hund, Oliver Pfaff. Toward the Web of Things: Applying Web Technologies to the Physical World |
44 | -- | 50 | Ron Vetter, San Murugesan. Roundtable Discussion: The Web We Look Forward To |
51 | -- | 57 | Dirk Riehle. How Open Source Is Changing the Software Developer's Career |
58 | -- | 62 | Jason Schlessman, Marilyn Wolf. Tailoring Design for Embedded Computer Vision Applications |
64 | -- | 68 | Alexander De Luca, Janne Lindqvist. Is Secure and Usable Smartphone Authentication Asking Too Much? |
69 | -- | 71 | Alida Draudt, Jonjozuf Hadley, Ryan Hogan, Leticia Murray, Gregory Stock, Julia Rose West. Six Insights about Science Fiction Prototyping |
72 | -- | 75 | Wenqi Zhou, Yuhong Liu. Online Product Rating Manipulation and Market Performance |
76 | -- | 79 | Susanne E. Hambrusch, Ran Libeskind-Hadas. The PhD Pipeline |
80 | -- | 83 | Marat Zhanikeev. A Cloud Visitation Platform to Facilitate Cloud Federation and Fog Computing |
84 | -- | 87 | Hal Berghel. What Makes a Good Column |
88 | -- | 91 | George F. Hurlburt. Cyberhuman Security |
92 | -- | 95 | Karen Gundy-Burlet. The Use of Standards on the LADEE Mission |
96 | -- | 99 | Manfred Broy. Rethinking Nonfunctional Software Requirements |
116 | -- | 0 | David Alan Grier. The GitHub Effect |