Journal: IEEE Computer

Volume 35, Issue 2

9 -- 11Robert P. Colwell. On Computers and Rock n Roll
18 -- 21Steven J. Vaughan-Nichols. Web Services: Beyond the Hype
22 -- 24Linda Dailey Paulson. Wanted: More Network-Security Graduates and Research
25 -- 27. News Briefs
28 -- 36Kenneth L. Kraemer, Jason L. Dedrick. Enter the Dragon: China s Computer Industry
38 -- 39Shubhendu S. Mukherjee, Sarita V. Adve, Todd M. Austin, Joel S. Emer, Peter S. Magnusson. Performance Simulation Tools
40 -- 49Christopher J. Hughes, Vijay S. Pai, Parthasarathy Ranganathan, Sarita V. Adve. RSIM: Simulating Shared-Memory Multiprocessors with ILP Processors
50 -- 58Peter S. Magnusson, Magnus Christensson, Jesper Eskilson, Daniel Forsgren, Gustav Hållberg, Johan Högberg, Fredrik Larsson, Andreas Moestedt, Bengt Werner. Simics: A Full System Simulation Platform
59 -- 67Todd M. Austin, Eric Larson, Dan Ernst. SimpleScalar: An Infrastructure for Computer System Modeling
68 -- 76Joel S. Emer, Pritpal Ahuja, Eric Borch, Artur Klauser, Chi-Keung Luk, Srilatha Manne, Shubhendu S. Mukherjee, Harish Patil, Steven Wallace, Nathan L. Binkert, Roger Espasa, Toni Juan. Asim: A Performance Model Framework
77 -- 83Norman F. Schneidewind. Body of Knowledge for Software Quality Measurement
84 -- 88. Computer Society Connection
106 -- 108. Products
109 -- 111William A. Arbaugh. Security: Technical, Social, and Legal Challenges
112 -- 114Michael R. Macedonia. Linux in Hollywood: A Star is Born
115 -- 117Upkar Varshney. Multicast Support in Mobile Commerce Applications
118 -- 120W. Neville Holmes. Representative Democracy and the Profession