The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 06 - June (vol. 49)
ISSN: 0018-9162

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 1-2

Masthead (PDF)

pp. 3
32 & 16 Years Ago

32 & 16 Years Ago (HTML)

pp. 4-5
Elsewhere in the CS
Spotlight on Transactions

Digital-Microfluidic Biochips (HTML)

Mohamed Ibrahim , Duke University
Krishnendu Chakrabarty , Duke University
pp. 8-9
70th Anniversary Milestones
Guest Editor's Introduction
Security Threats

The Perils of Android Security Configuration (Abstract)

Daniel Vecchiato , University of Campinas
Marco Vieira , University of Coimbra
Eliane Martins , University of Campinas
pp. 15-21

Privacy and Security in Mobile Health: A Research Agenda (Abstract)

David Kotz , Dartmouth College
Carl A. Gunter , University of Illinois at Urbana-Champaign
Santosh Kumar , University of Memphis
Jonathan P. Weiner , Johns Hopkins University
pp. 22-30

How to Survive a Cyber Pearl Harbor (Abstract)

Ronald P. Loui , University of Illinois at Springfield
pp. 31-37

The DARPA Twitter Bot Challenge (Abstract)

V.S. Subrahmanian , University of Maryland
Amos Azaria , Carnegie Mellon University
Skylar Durst , SentiMetrix
Vadim Kagan , SentiMetrix
Aram Galstyan , University of Southern California
Kristina Lerman , University of Southern California
Linhong Zhu , University of Southern California
Emilio Ferrara , Indiana University
Alessandro Flammini , Indiana University
Filippo Menczer , Indiana University
pp. 38-46
Security Threats

Metamorphic Testing for Cybersecurity (Abstract)

Tsong Yueh Chen , Swinburne University of Technology
Fei-Ching Kuo , Swinburne University of Technology
Wenjuan Ma , University of Wollongong
Willy Susilo , University of Wollongong
Dave Towey , University of Nottingham Ningbo China
Jeffrey Voas , US National Institute of Standards and Technology
Zhi Quan Zhou , University of Wollongong
pp. 48-55
Research Feature

Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing System (Abstract)

Qingpeng Zhang , City University of Hong Kong
Daniel Dajun Zeng , University of Arizona and Chinese Academy of Sciences
Fei-Yue Wang , Chinese Academy of Sciences
Ronald Breiger , University of Arizona
James A. Hendler , Rensselaer Polytechnic Institute
pp. 56-64
Computing Practices

Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System (Abstract)

Qiuming Luo , Shenzhen University
Feng Xiao , Shenzhen University
Zhong Ming , Shenzhen University
Hao Li , Huawei Technologies
Jianyong Chen , Shenzhen University
Jianhua Zhang , Huawei Technologies
pp. 66-74
Computing Education

Opening the Instructional Doors to Computer Science and IT--Finally (Abstract)

Sorel Reisman , California State University, Fullerton
pp. 77-79
The IoT Connection

Demystifying the Internet of Things (Abstract)

Jeffrey Voas , National Institute of Standards and Technology
pp. 80-83
Rebooting Computing

Rebooting Computers as Learning Machines (Abstract)

Erik P. DeBenedictis , Sandia National Laboratories
pp. 84-87
Indistinguishable from Magic

Social Robots for the 21st Century (Abstract)

Daniel Ullrich , LMU Munich
Andreas Butz , LMU Munich
pp. 88-92
Science Fiction Prototyping
Cybertrust

Security-Informed Safety (Abstract)

Kate Netkachova , Adelard LLP and City University London
Robin E. Bloomfield , Adelard LLP and City University London
pp. 98-102

Career Opportunities (PDF)

pp. 108-119
The Errant Hashtag

Scientific Conversations (HTML)

David Alan Grier , George Washington University
pp. 120
76 ms
(Ver 3.3 (11022016))