Automatically profiling the author of an anonymous text.
Women in computing - take 2.
USACM's policy role.
Shadow systems: the good, the bad and the ugly.
Seven principles for secure e-voting.
Technical opinion - Multitasking with laptops during meetings.
Economic and business dimensions - The extent of globalization of software innovation.
Toward 2
Parallel programming with transactional memory.
Photography's bright future.
Education - Human computing skills: rethinking the K-12 experience.
The dot-org difference.
Making sense of sensors.
Oracle, where shall I submit my papers?
Why IS management is in trouble and how to save it: lessons learned in the automotive industry.
The first internet president.
SIGGRAPH debuts in Asia.
Puzzled - Will my algorithm terminate?
Building secure web applications with automatic partitioning.
Privacy and security - International communications surveillance.
The complexity of computing a Nash equilibrium.
Technical perspective - The complexity of computing Nash equilibrium.
Why file sharing networks are dangerous?
Inside risks - U.S. election after-math.
For sale by owner online: who gets the saved commission?
Improving performance on the internet.
Technical perspective - Tools for information to flow securely and Swift-ly.
Compiler research: the next 50 years.
Point/Counterpoint - Network neutrality nuances.
Networks of contextualized data: a framework for cyberinfrastructure data management.