Journal: IEEE Computer

Volume 46, Issue 11

8 -- 9Charles Severance. Ian Horrocks: Standardizing OWL
10 -- 13Brian M. Gaff, David J. Levine, Raymond Gabriel. Understanding US Trade Controls
14 -- 15W. Neville Holmes. 32 & 16 Years Ago
16 -- 19Neal Leavitt. Today's Mobile Security Requires a New Approach
20 -- 22Lee Garber. News Briefs
23 -- 25Tiziana Margaria, Mike Hinchey. Simplicity in IT: The Power of Less
26 -- 32Barry D. Floyd, Steve Boßelmann. ITSy-Simplicity Research in Information and Communication Technology
34 -- 39Jan Bosch. Achieving Simplicity with the Three-Layer Product Model
40 -- 47Cristina Cerschi Seceleanu, Ivica Crnkovic. Component Models for Reasoning
48 -- 54Anna-Lena Lamprecht, Stefan Naujokat, Ina Schaefer. Variability Management beyond Feature Models
56 -- 62Johannes Neubauer, Bernhard Steffen. Plug-and-Play Higher-Order Process Integration
63 -- 66Chandra Prasad, Wolfram Schulte. Taking Control of Your Engineering Tools
68 -- 71Tiberiu Seceleanu, Gaetana Sapienza. A Tool Integration Framework for Sustainable Embedded Systems Development
72 -- 74Regina Herzlinger, Margo I. Seltzer, Mark Gaynor. Applying KISS to Healthcare Information Technology
76 -- 83Arshdeep Bahga, Vijay Krishna Madisetti. Rapid Prototyping of Multitier Cloud-Based Services and Systems
84 -- 86James Bret Michael, Phillip A. Laplante, Jeffery E. Payne, Paul E. Black, Jeffrey M. Voas. Does Security Trump Reliability?
87 -- 90David S. L. Wei, San Murugesan, Sy-Yen Kuo, Kshirasagar Naik, Danny Krizanc. Enhancing Data Integrity and Privacy in the Cloud: An Agenda
91 -- 94Joshua C. Klontz, Anil K. Jain. A Case Study of Automated Face Recognition: The Boston Marathon Bombings Suspects
95 -- 98Brian David Johnson. Jimmy Takes Manhattan
120 -- 0David Alan Grier. The Trappings of Power