Journal: IEEE Computer

Volume 40, Issue 2

6 -- 8David Alan Grier. Dirty Electricity
12 -- 15Linda Dailey Paulson. Developers Shift to Dynamic Programming Languages
16 -- 19George Lawton. Powering Down the Computing Infrastructure
20 -- 22Linda Dailey Paulson. News Briefs
24 -- 30André N. Klingsheim, Vebjørn Moen, Kjell Jørgen Hole. Challenges in Securing Networked J2ME Applications
31 -- 36David Schuff, Ozgur Turetken, John D Arcy, David Croson. Managing E-Mail Overload: Solutions and Future Challenges
38 -- 44Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar. Cryptography on a Speck of Dust
45 -- 53Huaizhi Li, Mukesh Singhal. Trust Management in Distributed Systems
54 -- 58Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Venkatesh Srinivasan, Lokesh Bhatia. Marking Technique to Isolate Boundary Router and Attacker
59 -- 63Min Tian, Andreas Gramm, Hartmut Ritter, Jochen H. Schiller, Thiemo Voigt. Adaptive QoS for Mobile Web Services through Cross-Layer Communication
64 -- 69Les Hatton. How Accurately Do Engineers Predict Software Maintenance Tasks?
89 -- 92Katie A. Siek, Kay Connelly, Suzanne Menzel, Laura Hopkins. Propagating Diversity through Active Dissemination
93 -- 95Daniel Peek, Jason Flinn. Consumer Electronics Meets Distributed Storage
96 -- 100David P. Luebke, Greg Humphreys. How GPUs Work
101 -- 103Michael R. Macedonia. The Future Arrives ... Finally
104 -- 106Mahesh V. Tripunitara, Thomas S. Messerges. Resolving the Micropayment Problem
107 -- 109Michael Grottke, Kishor S. Trivedi. Fighting Bugs: Remove, Retry, Replicate, and Rejuvenate
110 -- 112Raghavendra Rao Loka. Software Development: What Is the Problem?