The Community for Technology Leaders
Green Image
Issue No. 03 - March (vol. 46)
ISSN: 0018-9162
Elsewhere in the CS
Computing Conversations
Computing and the Law

Design Patents (HTML)

Peter J. Cuomo , Edwards Wildman Palmer LLP
Brian M. Gaff , Edwards Wildman Palmer LLP
pp. 8-10
32 & 16 Years Ago
Technology News

A Technology that Comes Highly Recommended (Abstract)

Neal Leavitt , Leavitt Communications
pp. 14-17
News Briefs

News Briefs (HTML)

pp. 18-20
Guest Editors' Introduction

Fostering Gender Diversity in Computing (HTML)

Jane Chu Prey , National Science Foundation
Alfred C. Weaver , University of Virginia
pp. 22-23
Cover Feature

Diversity in Computing: Why It Matters and How Organizations Can Achieve It (Abstract)

Wendy M. DuBow , National Center for Women & Information Technology
pp. 24-29

Priming the Pipeline: Addressing Gender-Based Barriers in Computing (Abstract)

Caroline Simard , Anita Borg Institute
Jody Mahoney , Anita Borg Institute
Barbara Gee , Anita Borg Institute
Denise Gammal , Anita Borg Institute
Telle Whitney , Anita Borg Institute
pp. 30-36
Gender Diversity in Computing

More than Gender: Taking a Systemic Approach to Improving K-12 Computer Science Education (Abstract)

Chris Stephenson , Computer Science Teachers Association
Rebecca Dovi , Patrick Henry High School, Richmond, Virginia
pp. 42-46

Broadening participation: The why and the how (Abstract)

E. Lazowska , Univ. of Washington, Seattle, WA, USA
H. Martin , Univ. of Washington, Seattle, WA, USA
S. Reges , Univ. of Washington, Seattle, WA, USA
C. Eney , Univ. of Washington, Seattle, WA, USA
pp. 48-51

Educating Diverse Computing Students at the University of Virginia (Abstract)

James P. Cohoon , University of Virginia
J. McGrath Cohoon , University of Virginia
Mary Lou Soffa , University of Virginia
pp. 52-55

Serving Women with a Purposeful Vision (Abstract)

Deepak Kumar , Bryn Mawr College
pp. 60-61

Facing challenges and having fun (Abstract)

Annie I. Anton , Georgia Institute of Technology
pp. 65-66

Pursuing Professional Changes (Abstract)

Raquel Romano , Google Crisis Response
Alice Bonhomme-Biais , Google Crisis Response
pp. 66-68

Defeating SQL Injection (Abstract)

Lwin Khin Shar , Nanyang Technological University, Singapore
Hee Beng Kuan Tan , Nanyang Technological University, Singapore
pp. 69-77
Research Feature

Shin: Generalized Trust Propagation with Limited Evidence (Abstract)

Chung-Wei Hang , North Carolina State University
Zhe Zhang , North Carolina State University
Munindar P. Singh , North Carolina State University
pp. 78-85
Cloud Cover

Cloud Computing and EU Data Privacy Regulations (Abstract)

San Murugesan , BRITE Professional Services, Australia
Nir Kshetri , University of North Carolina at Greensboro
pp. 86-89
Green IT
Identity Sciences

Biometrically, How Identical Are Identical Twins? (Abstract)

Gayathri Mahalingam , University of North Carolina Wilmington
Karl Ricanek Jr. , University of North Carolina Wilmington
pp. 94-96
Out of Band

The SCDOR Hack: Great Security Theater in Five Stages (Abstract)

Hal Berghel , University of Nevada, Las Vegas
pp. 97-99
Social Computing

Crowdfunding Technology Innovation (Abstract)

John Riedl , University of Minnesota
pp. 100-103
Science Fiction Prototyping
Computer Society Connection

Computer Society Connection (HTML)

pp. 120-121
Call and Calendar

Call and Calendar (HTML)

pp. 122-123
The Errant Hashtag

Attention to Context (HTML)

David Alan Grier , George Washington University
pp. 124
94 ms
(Ver 3.1 (10032016))