Journal: IEEE Computer

Volume 43, Issue 6

7 -- 9David Alan Grier. The Value of a Good Name
12 -- 16David Geer. Are Companies Actually Using Secure Development Life Cycles?
18 -- 21Linda Dailey Paulson. Steganography Development Offers Promise
22 -- 23Oliver Bimber. Capturing the World
24 -- 31Franz Leberl, Horst Bischof, Thomas Pock, Arnold Irschara, Stefan Kluckner. Aerial Computer Vision for a 3D Virtual Habitat
32 -- 38Dragomir Anguelov, Carole Dulong, Daniel Filip, Christian Frueh, Stéphane Lafon, Richard Lyon, Abhijit S. Ogale, Luc Vincent, Josh Weaver. Google Street View: Capturing the World at Street Level
40 -- 47Sameer Agarwal, Yasutaka Furukawa, Noah Snavely, Brian Curless, Steven M. Seitz, Richard Szeliski. Reconstructing Rome
48 -- 53Michael Goesele, Jens Ackermann, Simon Fuhrmann, Ronny Klowsky, Fabian Langguth, Patrick Mucke, Martin Ritz. Scene Reconstruction from Community Photo Collections
54 -- 60Jaak Tepandi, Ilja Tsahhirov, Stanislav Vassiljev. Wireless PKI Security and Mobile Voting
61 -- 67Anita Sarma, David F. Redmiles, André van der Hoek. Categorizing the Spectrum of Coordination Technology
72 -- 73Bob Ward. Computer Society Announces Award Winners
76 -- 78Cees G. M. Snoek, Arnold W. M. Smeulders. Visual-Concept Search Solved?
79 -- 81D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil. Adding Attributes to Role-Based Access Control
82 -- 85Lecia Jane Barker, Joanne McGrath Cohoon, Lucy Sanders. Strategy Trumps Money: Recruiting Undergraduate Women into Computing
86 -- 89Chris Harrison. Appropriated Interaction Surfaces
90 -- 92Tiziana Margaria, Bernhard Steffen. Simplicity as a Driver for Agile Innovation
94 -- 96Anne-Françoise Rutkowski, Carol S. Saunders. Growing Pains with Information Overload