Taking a flexible approach to ASPs.
Taking your network's temperature.
Informatics creativity: a role for abductive reasoning?
It takes two to tango: how relational investments improve IT outsourcing partnerships.
Wireless insecurity: examining user security behavior on public networks.
Improving disaster management.
A few billion lines of code later: using static analysis to find bugs in the real world.
Open access to scientific publications.
ACM Fellows honored.
Recent progress in quantum algorithms.
Software model checking takes off.
Want to be a bug buster?
Strange effects in high dimension.
Breaking chocolate bars.
Managing contention for shared resources on multicore processors.
Reversing the landslide in computer-related degree programs.
Alternate interface technologies emerge.
Assessing the changing U.S. IT R&D ecosystem.
Post-silicon bug localization for processors using IFRA.
Not seeing the crime for the cameras?
An issue of teamwork.
In the Virtual Extension.
An interview with Michael Rabin.
Connecting women and technology.
Power-efficient software.
Why an informatics degree?
Managing a corporate open source software asset.
Where the data is.
Type theory comes of age.
The need for a national cybersecurity research and development agenda.
Practical intelligence in IT: assessing soft skills of IT professionals.
Designs for effective implementation of trust assurances in internet stores.
Faster dimension reduction.