| 4 | -- | 5 | Chia-Lin Yang. A Forward Speculative Interference Attack |
| 9 | -- | 11 | Erich J. Neuhold. 50 & 25 Years Ago |
| 10 | -- | 0 | Ergun Akleman. Computing Through Time |
| 12 | -- | 14 | Joanna F. DeFranco, Jeffrey M. Voas. Revisiting Software Metrology |
| 15 | -- | 17 | James Bret Michael, Marko Orescanin. Developing and Deploying Artificial Intelligence Systems |
| 18 | -- | 29 | Dennis Muiruri, Lucy Ellen Lwakatare, Jukka K. Nurminen, Tommi Mikkonen. Practices and Infrastructures for Machine Learning Systems: An Interview Study in Finnish Organizations |
| 30 | -- | 39 | Kunai Zhang, Yahui Liu, Weiqiang Zhang, Shaoshan Liu. π-Learner: A Lifelong Roadside Learning Framework for Infrastructure Augmented Autonomous Driving |
| 40 | -- | 55 | K. M. A. Solaiman, Tao Sun, Alina Nesen, Bharat K. Bhargava, Michael Stonebraker. Applying Machine Learning and Data Fusion to the "Missing Person" Problem |
| 56 | -- | 65 | Milad Taleby Ahvanooey, Mark Xuefang Zhu, Wojciech Mazurczyk, Malika Bendechache. Information Hiding in Digital Textual Contents: Techniques and Current Challenges |
| 66 | -- | 72 | Pedro Reviriego, Elena Merino Gómez, Fabrizio Lombardi. Latin and Greek in Computing: Ancient Words in a New World |
| 73 | -- | 76 | Oscar Pastor 0001, Alfonso Pierantonio, Gustavo Rossi. Teaching Modeling in the Time of Agile Development |
| 77 | -- | 80 | Arief Zulkifli. TikTok in 2022: Revisiting Data and Privacy |
| 81 | -- | 84 | Ildikó Vancsa. The Four Opens: Open Source Beyond the Code |
| 85 | -- | 89 | Nir Kshetri. El Salvador's Bitcoin Gamble |
| 90 | -- | 94 | Craig Iaboni, Himanshu Patel, Deepan Lobo, Ji-Won Choi, Pramod Abichandani. Where Are They Going? Clustering Event Camera Data to Detect and Track Moving Objects |
| 96 | -- | 102 | Doron Drusinsky. Cryptographic-Biometric Self-Sovereign Personal Identities |