| 6 | -- | 0 | Shixia Liu, Leila De Floriani. Multivariate Network Exploration and Presentations |
| 8 | -- | 10 | Charles Severance. Anil Jain: 25 Years of Biometric Recognition |
| 14 | -- | 16 | Antonino Tumeo, John Feo. Irregular Applications: From Architectures to Algorithms [Guest editors' introduction] |
| 18 | -- | 25 | G. Scott Lloyd, Maya Gokhale. In-Memory Data Rearrangement for Irregular, Data-Intensive Computing |
| 26 | -- | 34 | Daniele Buono, John A. Gunnels, Xinyu Que, Fabio Checconi, Fabrizio Petrini, Tai-Ching Tuan, Chris Long. Optimizing Sparse Linear Algebra for Large-Scale Graph Analytics |
| 35 | -- | 44 | Andrew Lenharth, Keshav Pingali. Scaling Runtimes for Irregular Algorithms to Large-Scale NUMA Systems |
| 46 | -- | 55 | Mahantesh Halappanavar, Alex Pothen, Ariful Azad, Fredrik Manne, Johannes Langguth, Arif M. Khan. Codesign Lessons Learned from Implementing Graph Matching on Multithreaded Architectures |
| 56 | -- | 61 | Hitesh Rajput, Tanmoy Som, Soumitra Kar. An Automated Vehicle License Plate Recognition System |
| 62 | -- | 70 | Peter R. Lewis, Arjun Chandra, Funmilade Faniyi, Kyrre Glette, Tao Chen, Rami Bahsoon, Jim Tørresen, Xin Yao. Architectural Aspects of Self-Aware and Self-Expressive Computing Systems: From Psychology to Engineering |
| 72 | -- | 75 | Greg Byrd. Cycling through Cyberspace |
| 76 | -- | 80 | Hugo Bruneliere, Jordi Cabot, Javier Luis Cánovas Izquierdo, Leire Orue-Echevarria Arrieta, Oliver Strauß, Manuel Wimmer. Software Modernization Revisited: Challenges and Prospects |
| 81 | -- | 83 | Zhi-Kai Zhang, Michael Cheng Yi Cho, Zong-Yu Wu, Shiuhpyng Winston Shieh. Identifying and Authenticating IoT Objects in a Natural Context |
| 84 | -- | 89 | Darold Davis. Taming the Engineering of Information Services Websites with Standards |
| 90 | -- | 94 | Hal Berghel. TSA: Mission Creep Meets Waste |
| 128 | -- | 0 | David Alan Grier. In Search of the Diabolical Disconnect |