Journal: IEEE Computer

Volume 40, Issue 6

6 -- 8David Alan Grier. The Camino Real
12 -- 14Sixto Ortiz Jr.. Searching the Visual Web
15 -- 18Linda Dailey Paulson, George Lawton. News Briefs
19 -- 26Feisal Keblawi, Dick Sullivan. The Case for Flexible NIST Security Standards
27 -- 35Jane Cleland-Huang, Brian Berenbach, Stephen Clark, Raffaella Settimi, Eli Romanova. Best Practices for Automated Traceability
37 -- 47Michael Gschwind, David Erb, Sid Manning, Mark Nutter. An Open Source Environment for Cell Broadband Engine System Software
49 -- 59Nidhi Aggarwal, Parthasarathy Ranganathan, Norman P. Jouppi, James E. Smith. Isolation in Commodity Multicore Processors
60 -- 66Yu-Chee Tseng, You-Chiun Wang, Kai-Yang Cheng, Yao-Yu Hsieh. iMouse: An Integrated Mobile Surveillance and Wireless Sensor System
68 -- 74Saikat Chakrabarti 0002, Mukesh Singhal. Password-Based Authentication: Preventing Dictionary Attacks
84 -- 85Bob Ward. Computer Society Connection
90 -- 93W. Neville Holmes. Binary Arithmetic
94 -- 95Michael R. Macedonia. iPhones Target the Tech Elite
96 -- 98Tessa A. Lau. Social Scripting for the Web
100 -- 102Shawn A. Bohner. An Era of Change-Tolerant Systems
103 -- 105Laszlo Hars. Discryption: Internal Hard-Disk Encryption for Secure Storage
106 -- 108Sean M. Price. Supporting Resource-Constrained Collaboration Environments