| 8 | -- | 9 | Leila De Floriani. Globe Browsing in OpenSpace |
| 10 | -- | 11 | Erich J. Neuhold. Computer, 1968 and 1993 |
| 12 | -- | 16 | Nicholas D. Lane, Pete Warden. The Deep (Learning) Transformation of Mobile and Embedded Computing |
| 18 | -- | 30 | Andreas Moshovos, Jorge Albericio, Patrick Judd, Alberto Delmas Lascorz, Sayeh Sharify, Zissis Poulos, Tayler H. Hetherington, Tor M. Aamodt, Natalie D. Enright Jerger. Exploiting Typical Values to Accelerate Deep Learning |
| 32 | -- | 41 | Shuochao Yao, Yiran Zhao, Aston Zhang, Shaohan Hu, Huajie Shao, Chao Zhang, Lu Su, Tarek F. Abdelzaher. Deep Learning for the Internet of Things |
| 42 | -- | 49 | Seyed Ali Ossia, Ali Shahin Shamsabadi, Ali Taheri, Hamid R. Rabiee, Hamed Haddadi. Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning |
| 50 | -- | 59 | Thomas Plötz, Yu Guan. Deep Learning for Human Activity Recognition in Mobile Computing |
| 60 | -- | 67 | Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee. Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks |
| 68 | -- | 76 | Jungmo Ahn, Huynh Nguyen Loc, Rajesh Krishna Balan, Youngki Lee, JeongGil Ko. Finding Small-Bowel Lesions: Challenges in Endoscopy-Image-Based Learning Systems |
| 78 | -- | 83 | Robert N. Charette. Puncturing Pernicious Project Pufferies |
| 84 | -- | 89 | Hal Berghel. Malice Domestic: The Cambridge Analytica Dystopia |
| 90 | -- | 91 | Marilyn Wolf. Computing in the Real World Is the Grandest of Challenges |
| 92 | -- | 95 | Nir Kshetri, Jeffrey M. Voas. Cyberthreats under the Bed |