Journal: IEEE Computer

Volume 33, Issue 12

13 -- 15Sixto Ortiz Jr.. Will PKI Become a Key to Online Security?
16 -- 19Neal Leavitt. Malicious Code Moves to Mobile Devices
30 -- 35Morgan Björkander. Graphical Programming Using UML and SDL
36 -- 42James A. Whittaker, Jeffrey M. Voas. Toward a More Reliable Theory of Software Reliability
43 -- 51Thomas A. Longstaff, Clyde Chittister, Rich Pethia, Yacov Y. Haimes. Are We Forgetting the Risks of Information Technology?
52 -- 59William A. Arbaugh, William L. Fithen, John McHugh. Windows of Vulnerability: A Case Study Analysis
60 -- 66Randy Butler, Von Welch, Douglas Engert, Ian T. Foster, Steven Tuecke, John Volmer, Carl Kesselman. A National-Scale Authentication Infrastructur
67 -- 74Trishul M. Chilimbi, Mark D. Hill, James R. Larus. Making Pointer-Based Data Structures Cache Conscious
148 -- 150James A. Senn. The Emergence of M-Commerce
152 -- 153Harry Mason. SCSI, the Industry Workhorse, Is Still Working Hard
154 -- 156Theresa-Marie Rhyne. Computer Games Influence on Scientific and Information Visualization
158 -- 160W. Neville Holmes. Why Johnny Can t Program