4 | -- | 5 | Bob Ward. Computer Highlights Society Magazines |
6 | -- | 8 | David Alan Grier. Experienced Hands |
11 | -- | 12 | Brian M. Gaff, Catherine J. Toppin. Ten Things to Know When Applying for a Patent |
13 | -- | 16 | Sixto Ortiz Jr.. The Problem with Cloud-Computing Standardization |
17 | -- | 19 | Lee Garber. News Briefs |
21 | -- | 28 | Daqing Zhang, Bin Guo, Zhiwen Yu. The Emergence of Social and Community Intelligence |
30 | -- | 31 | Oliver Bimber, Carl K. Chang. Computational Archaeology: Reviving the Past with Present-Day Tools |
40 | -- | 46 | Eugene Ch ng, Henry Chapman, Vincent Gaffney, Phil Murgatroyd, Chris Gaffney, Wolfgang Neubauer. From Sites to Landscapes: How Computing Technology Is Shaping Archaeological Practice |
48 | -- | 55 | Roberto Scopigno, Marco Callieri, Paolo Cignoni, Massimiliano Corsini, Matteo Dellepiane, Federico Ponchio, Guido Ranzuglia. 3D Models for Cultural Heritage: Beyond Plain Visualization |
56 | -- | 60 | Vid Petrovic, Aaron Gidding, Tom Wypych, Falko Kuester, Thomas A. DeFanti, Thomas E. Levy. Dealing with Archaeology s Data Avalanche |
62 | -- | 65 | Renju Li, Tao Luo, Hongbin Zha, Wei Lu. Computer-Assisted Archaeological Line Drawing |
66 | -- | 74 | Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang, Michel Wang, Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld. Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges |
93 | -- | 96 | Dirk Riehle. Controlling and Steering Open Source Projects |
97 | -- | 99 | Richard P. Larrick, Kirk W. Cameron. Consumption-Based Metrics: From Autos to IT |
100 | -- | 102 | Kevin W. Bowyer. What Surprises Do Identical Twins Have for Identity Science? |
103 | -- | 105 | Shyong K. Lam, John Riedl. Expressing My Inner Gnome: Appearance and Behavior in Virtual Worlds |
108 | -- | 107 | Kai A. Olsen. Programmed Politeness |