4 | -- | 5 | Jaideep Vaidya. Advances in Hardware Trojan Detection |
9 | -- | 11 | Erich J. Neuhold. 50 & 25 Years Ago |
12 | -- | 0 | David Alan Grier. Exploring the Current State of Quantum Computing |
13 | -- | 17 | Travis S. Humble, Erik P. DeBenedictis. Quantum Realism |
18 | -- | 26 | Ruslan Shaydulin, Hayato Ushijima-Mwesigwa, Christian F. A. Negre, Ilya Safro, Susan M. Mniszewski, Yuri Alexeev. A Hybrid Approach for Solving Optimization Problems on Small Quantum Computers |
27 | -- | 37 | Alexandru Paler, Daniel Herr, Simon J. Devitt. Really Small Shoe Boxes: On Realistic Quantum Resource Estimation |
38 | -- | 46 | Catherine C. McGeoch, Richard Harris, Steven P. Reinhardt, Paul I. Bunyk. Practical Annealing-Based Quantum Computing |
47 | -- | 57 | Shaohan Hu, Peng Liu 0010, Chun-Fu Richard Chen, Marco Pistoia, Jay M. Gambetta. Reduction-Based Problem Mapping for Quantum Computing |
58 | -- | 67 | Peng Liu 0010, Shaohan Hu, Marco Pistoia, Chun-Fu Richard Chen, Jay M. Gambetta. Stochastic Optimization of Quantum Programs |
68 | -- | 72 | George F. Hurlburt. The Tyranny of Urgency |
73 | -- | 76 | Phil Laplante, Sohpia Applebaum. NIST's 18 Internet of Things Trust Concerns |
78 | -- | 81 | Dimitrios Serpanos. There Is No Safety Without Security and Dependability |
82 | -- | 86 | Miriam Ballhausen. Free and Open Source Software Licenses Explained |
88 | -- | 92 | Don Wright. Meeting Industry's Standardization Needs |