6 | -- | 8 | David Alan Grier. Mental Discipline |
11 | -- | 14 | Neal Leavitt. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers |
15 | -- | 18 | Linda Dailey Paulson. Project Converts Arms and Hands into Input Devices |
20 | -- | 26 | Jacek Izydorczyk, Michal Izydorczyk. Microprocessor Scaling: What Limits Will Hold? |
27 | -- | 36 | YongHong Tian, Jaideep Srivastava, Tiejun Huang, Noshir S. Contractor. Social Multimedia Computing |
37 | -- | 43 | Moonam Ko, Gorrell P. Cheek, Mohamed Shehab, Ravi S. Sandhu. Social-Networks Connect Services |
45 | -- | 53 | Fei-Yue Wang, Daniel Zeng, James A. Hendler, Qingpeng Zhang, Zhuo Feng, Yanqing Gao, Hui Wang, Guanpi Lai. A Study of the Human Flesh Search Engine: Crowd-Powered Expansion of Online Knowledge |
54 | -- | 62 | Henri E. Bal, Jason Maassen, Rob van Nieuwpoort, Niels Drost, Roelof Kemp, Nick Palmer, Thilo Kielmann, Frank J. Seinstra, Ceriel J. H. Jacobs. Real-World Distributed Computer with Ibis |
63 | -- | 70 | Simon Portegies Zwart, Derek Groen, Tomoaki Ishiyama, Keigo Nitadori, Junichiro Makino, Cees de Laat, Steve McMillan, Kei Hiraki, Stefan Harfst, Paola Grosso. Simulating the Universe on an Intercontinental Grid |
91 | -- | 94 | James Bret Michael, Eneken Tikk, Peter Wahlgren, Thomas C. Wingfield. From Chaos to Collective Defense |
95 | -- | 97 | S. S. Iyengar, Supratik Mukhopadhyay, Christopher Steinmuller, Xin Li. Preventing Future Oil Spills with Software-Based Event Detection |
98 | -- | 101 | Stephen T. Frezza. Computer Science: Is It Really the Scientific Foundation for Software Engineering? |
102 | -- | 104 | James C. Spohrer. IBM s University Programs |
106 | -- | 109 | Steve Hodges, Nicolas Villar. The Hardware Is Not a Given |
110 | -- | 112 | Anthony Cleve, Tom Mens, Jean-Luc Hainaut. Data-Intensive System Evolution |
114 | -- | 116 | Noel E. Sharkey, Marc Goodman, Nick Ross. The Coming Robot Crime Wave |