| 6 | -- | 8 | David Alan Grier. Mental Discipline |
| 11 | -- | 14 | Neal Leavitt. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers |
| 15 | -- | 18 | Linda Dailey Paulson. Project Converts Arms and Hands into Input Devices |
| 20 | -- | 26 | Jacek Izydorczyk, Michal Izydorczyk. Microprocessor Scaling: What Limits Will Hold? |
| 27 | -- | 36 | YongHong Tian, Jaideep Srivastava, Tiejun Huang, Noshir S. Contractor. Social Multimedia Computing |
| 37 | -- | 43 | Moonam Ko, Gorrell P. Cheek, Mohamed Shehab, Ravi S. Sandhu. Social-Networks Connect Services |
| 45 | -- | 53 | Fei-Yue Wang, Daniel Zeng, James A. Hendler, Qingpeng Zhang, Zhuo Feng, Yanqing Gao, Hui Wang, Guanpi Lai. A Study of the Human Flesh Search Engine: Crowd-Powered Expansion of Online Knowledge |
| 54 | -- | 62 | Henri E. Bal, Jason Maassen, Rob van Nieuwpoort, Niels Drost, Roelof Kemp, Nick Palmer, Thilo Kielmann, Frank J. Seinstra, Ceriel J. H. Jacobs. Real-World Distributed Computer with Ibis |
| 63 | -- | 70 | Simon Portegies Zwart, Derek Groen, Tomoaki Ishiyama, Keigo Nitadori, Junichiro Makino, Cees de Laat, Steve McMillan, Kei Hiraki, Stefan Harfst, Paola Grosso. Simulating the Universe on an Intercontinental Grid |
| 91 | -- | 94 | James Bret Michael, Eneken Tikk, Peter Wahlgren, Thomas C. Wingfield. From Chaos to Collective Defense |
| 95 | -- | 97 | S. S. Iyengar, Supratik Mukhopadhyay, Christopher Steinmuller, Xin Li. Preventing Future Oil Spills with Software-Based Event Detection |
| 98 | -- | 101 | Stephen T. Frezza. Computer Science: Is It Really the Scientific Foundation for Software Engineering? |
| 102 | -- | 104 | James C. Spohrer. IBM s University Programs |
| 106 | -- | 109 | Steve Hodges, Nicolas Villar. The Hardware Is Not a Given |
| 110 | -- | 112 | Anthony Cleve, Tom Mens, Jean-Luc Hainaut. Data-Intensive System Evolution |
| 114 | -- | 116 | Noel E. Sharkey, Marc Goodman, Nick Ross. The Coming Robot Crime Wave |