Q&A.
Puzzled.
Managing time, part 2.
Vetting browser extensions for security vulnerabilities with VEX.
Making browser extensions secure: technical perspective.
The most expensive one-byte mistake.
Quantitative analysis of real-time systems using priced timed automata.
Invasion of the mobile apps.
Arrogance in business planning.
ACM CTO roundtable on mobile devices in the enterprise.
Realizing the future of wireless data communications.
Abstracting abstract machines: technical perspective.
Corporate social responsibility and global IT outsourcing.
Remix nation.
Protecting users of the cyber commons.
Are you talking to me?
In praise of 'Wilkes, Wheeler, and Gill'.
A breakthrough in algorithm design.
Realizing the value of social media requires innovative computing research.
Jeannette M. Wing @ PCAST; Barbara Liskov keynote.
Satisfiability modulo theories: introduction and applications.
Solved, for all practical purposes.
Abstracting abstract machines: a systematic approach to higher-order program analysis.
In the Virtual Extension.
Calculating and improving ROI in software and system programs.
Remaking American medicine.