Journal: IEEE Computer

Volume 31, Issue 9

24 -- 28Patrick W. Dowd, John T. McHenry. Network Security: It s Time to Take It Seriously (Guest Editors Introduction)
29 -- 33Bruce Schneier. Cryptographic Design Vulnerabilities
30 -- 31Andrew Csinger, Keng Siau. The Global Public Key Infrastructure: terms and Concepts
34 -- 41Aviel D. Rubin, Daniel E. Geer Jr.. A Survey of Web Security
36 -- 37Cory F. Cohen, Derek K. Simmel. Three Vulnerabilities
43 -- 47Rolf Oppliger. Security at the Internet Layer
48 -- 55William A. Arbaugh, James R. Davin, David J. Farber, Jonathan M. Smith. Security for Virtual Private Intranets
57 -- 64Thomas D. Tarman, Robert L. Hutchinson, Lyndon G. Pierson, Peter E. Sholander, Edward L. Witzke. Algorithm-Agile Encryption in ATM Networks
65 -- 72Claude Petitpierre. Synchronous C++: A Language for Interactive Applcations
73 -- 74Diana J. Bendz. Electronics and the Environment
105 -- 106Mark Resmer. Internet Architectures for Learning
109 -- 112Ted G. Lewis. What to Do About Microsoft

Volume 31, Issue 8

8 -- 0Richard Marlon Stein. T. J. Roders, H-1B Visas, and Me
16 -- 18George Lawton. Biometrics: A New Era in Security
19 -- 21Sixto Ortiz Jr.. Active Networks: The Programmable Pipeline
28 -- 34Mark D. Hill. Multiprocessors Should Support Simple Memory-Consistency Models
35 -- 43Earl Long, Amit Misra, Janos Sztipanovits. Increasing Productivity at Saturn
44 -- 49Manfred Schlett. Trends in Embedded-Microprocessor Design
51 -- 59Jennifer Eyre, Jeff Bier. DSP Processors Hit the Mainstream
60 -- 67Stephan Schulz II, Jerzy W. Rozenblit, Michael Mrva, Klaus Buchenrieder. Model-Based Codesign
68 -- 74Tony Savor, Rudolph E. Seviora. Toward Automatic Detection of Software Failures
75 -- 82Hsinchun Chen, Jay F. Nunamaker, Richard E. Orwig, Olga Titkova. Information Visualization for Collaborative Computing
108 -- 109W. Neville Holmes. Toward Decent Text Encoding
110 -- 0Mark T. Smith. Smart Cards: Integrating for Portable Complexity
113 -- 115James Bach. The Highs and Lows of Change Control
116 -- 117Janet Wilson. The IETF: Laying the Net s Asphalt
118 -- 120Simon Napper. Embedded-System Design Plays Catch-Up

Volume 31, Issue 7

10 -- 12Barry Phillips. Have Storage Area Networks Come of Age?
13 -- 15George Lawton. Multicasting: Will It Transform the Internet?
24 -- 32Carole Dulong. The IA-64 Architecture at Work
33 -- 44Barry W. Boehm, Alexander Egyed, Julie Kwan, Daniel Port, Archita Shah, Raymond J. Madachy. Using the WinWin Spiral Model: A Case Study
46 -- 53Jed Lengyel. The Convergence of Graphics and Vision
54 -- 63Sally A. McKee, Robert H. Klenke, Kenneth L. Wright, William A. Wulf, Maximo H. Salinas, James H. Aylor, Alan P. Baston. Smarter Memory: Improving Bandwidth for Streamed References
64 -- 73Hiralal Agrawal, James L. Alberi, Joseph Robert Horgan, J. Jenny Li, Saul London, W. Eric Wong, Sudipto Ghosh, Norman Wilde. Mining System Tests to Aid Software Maintenance
77 -- 78Karl Reed. Why the CS Should Help Chart the Future of IT
94 -- 95Rob Lanphier. Standardizing Real-Time Streaming Protocols (Interview)
97 -- 98Bertrand Meyer. Tell Less, Say More: The Power of Implicitness
100 -- 102Paul Bassett. Managing for Flexible Software Manufacturing
105 -- 0W. Neville Holmes. Mitigating Microsoft with Virtual Consoles
107 -- 108Ted G. Lewis. Joe Sixpack, Larry Lemming, and Ralph Nader
110 -- 112Dominique S. Black. Behind the Hype About the IT Labor Shortage

Volume 31, Issue 6

12 -- 14Lee Garber, David Sims. In Pursuit of Hardware-Software Codesign
16 -- 18George Lawton. The Internet s Challenge to Privacy
25 -- 31Niklaus Wirth. Hardware Compilation: Translating Programs into Circuits
33 -- 43Bruce L. Jacob, Trevor N. Mudge. Virtual Memory: Issues of Implementation
44 -- 45Jeffrey M. Voas. The Challenges of Using COTS Software in Component-Based Development (Guest Editor s Introduction)
46 -- 52Nancy Talbert, John A. McDermid. The Cost of COTS (Interview)
53 -- 59Jeffrey M. Voas. Certifying Off-the-Shelf Software Components
60 -- 66Ulf Lindqvist, Erland Jonsson. A Map of Security Risks Associated wuth Using COTS
67 -- 73Qun Zhong, Nigel Edwards. Security Control for COTS Components
95 -- 96John Hurd. Why Does Digital Participate in Standards?
104 -- 0Scott Bollig, Dan Xiao. Throwing Off the Shackles of a Legacy System
107 -- 109James Bach, Dave W. Smith. Plans, Lies, and Videotape
110 -- 114Scott Hamilton, Bjarne Stroustrup. The Real Stroustrup Interview
115 -- 116Alfred Bork, David R. Britton Jr.. The Web Is Not Yet Suitable for Learning
117 -- 120Timothy J. Rogers. Building the US Workforce, One Engineer At A Time

Volume 31, Issue 5

8 -- 9Sixto Ortiz Jr.. Hardware-Based Networking Widens the Pipes
11 -- 13David Clark. Are ATM, Gigabit Ethernet Ready for Prime Time?
23 -- 31Marvin V. Zelkowitz, Dolores R. Wallace. Experimental Models for Validating Technology
32 -- 40Walter F. Tichy. Should Computer Scientists Experiment More?
41 -- 49Pradip Bose, Thomas M. Conte. Performance Analysis and Its Impact on Design
50 -- 58Matt Reilly, John H. Edmondson. Performance Simulation of an Alpha Microprocessor
59 -- 65Bryan Black, John Paul Shen. Calibration of Microprocessor Performance Models
66 -- 74Kurt Maly, Ajay K. Gupta 0003, Satish Mynam. BTU: A Host Communication Benchmark
75 -- 81Spencer W. Ng. Advances in Disk Technology: Performance Issues
99 -- 0Charles Severance. Grab the Change to Work on the Leading Edge
100 -- 102Steve McConnell. The Power of Process
103 -- 0Robert L. Glass. Success? Failure? Or Both?
104 -- 105Bertrand Meyer, Christine Mingins, Heinz W. Schmidt. Providing Trusted Components to the Industry
106 -- 108Volker Turau. What Practices Are Being Adopted on the Web?
110 -- 112Ted G. Lewis. Why the Economy Is So Good

Volume 31, Issue 4

10 -- 14George Lawton. Paving the Information Superhighway s Last Mile
17 -- 0David Clark. Developments Shake Domain-Name Plan
22 -- 25Maurice V. Wilkes. A Revisionist Account of Early Language Development
27 -- 31Michael J. Flynn. Computer Engineering 30 Years After the IBM Model 91
32 -- 34I-Ling Yen, Raymond A. Paul, Kinji Mori. Toward Integrated Methods for High-Assurance Systems (Guest Editors Introduction)
35 -- 45I-Ling Yen, Raymond A. Paul, Victor L. Winter, John M. Covan, Larry J. Dalton, Leon Alkalai, Ann T. Tai, Rick Harper, Barry Flahive, Wei-Tek Tsai, Ramin Mojdehbakhsh, Sanjai Rayadurgam, Kinji Mori, Michael R. Lowry. Key Applications for High-Assurance Systems
47 -- 54Mats Per Erik Heimdahl, Jeffrey M. Thompson, Barbara J. Czerny. Specification and Analysis of Intercomponent Communication
56 -- 64Myong H. Kang, Andrew P. Moore, Ira S. Moskowitz. Design and Assurance Strategy for the NRL Pump
66 -- 72Taghi M. Khoshgoftaar, Edward B. Allen, Robert Halstead, Gary P. Trio, Ronald M. Flass. Using Process History to Predict Software Quality
76 -- 77Douglas W. Westcott. Designs for the Computers of Tomorrow
99 -- 101John R. Gilbert. Integrating CAD Tools for MEMS Design
102 -- 0Lewis Gray. Gray Rebuts Bach: No Cowboy Programmers!
104 -- 105Nick Tredennick. This Cyberfarce Stars Elvis and the Nerds
106 -- 108Al Borchers, Jonathan L. Herlocker, John Riedl. Ganging up on Information Overload
110 -- 112Ware Myers. Why Software Developers Refuse to Improve

Volume 31, Issue 3

10 -- 11John Edwards. Changing Database Market Hurts Major Vendors
12 -- 14Tammy Parker. Mobile Wireless Internet Technology Faces Hurdles
23 -- 30John K. Ousterhout. Scripting: Higher-Level Programming for the 21st Century
31 -- 41Adair Dingle, Thomas H. Hildebrandt. Improving C++ Performance Using Temporaries
43 -- 53David Krieger, Richard M. Adler. The Emergence of Distributed Component Platforms
54 -- 61Daniel E. O Leary. Enterprise Knowledge Management
62 -- 68P. M. Melliar-Smith, Louise E. Moser. Surviving Network Partitioning
69 -- 76John W. Sheppard, William R. Simpson. Managing Conflict in System Diagnosis
78 -- 84Noppanunt Utamaphethai, Sumit Ghosh. Dicaf: A Distributed Architecture for Intelligent Transportation
88 -- 89Goffredo Haus. Rescuing La Scala s Music Archives
114 -- 115William Kahan. IEEE 754 - Interview
116 -- 117Warren Bennis, Patricia Ward Biederman. None of Us Is As Smart As All of Us
118 -- 120Joseph Gil, David H. Lorenz. Design Patterns and Language Design
122 -- 123Hermann A. Maurer. Web-Based Knowledge Management
124 -- 0Richard Marlon Stein. Does Determinism Dictate Dignity?
126 -- 128Ted G. Lewis. Java Holy War 98

Volume 31, Issue 2

10 -- 11Don Kiely. Are Components the Future of Software?
22 -- 25H. John Caulfield. Perspectives in Optical Computing
26 -- 34Neil F. Johnson, Sushil Jajodia. Exploring Steganography: Seeing the Unseen
36 -- 37Leo J. Irakliotis, Pericles A. Mitkas. Optics: A Maturing Technology for Better Computing - Guest Editors Introduction
38 -- 44James Gourlay, Tsung-Yi Yang, Julian A. B. Dines, Andrew C. Walker. Development of Free-Space Digital Optics in Computing
45 -- 51Pericles A. Mitkas, George A. Betzos, Leo J. Irakliotis. Optical Processing Paradigms for Electronic Computers
52 -- 60Demetri Psaltis, Geoffrey W. Burr. Holographic Data Storage
61 -- 68Masatoshi Ishikawa, Neil McArdle. Optically Interconnected Parallel Computing Systems
69 -- 75Peter S. Guilfoyle, John M. Hessenbruch, Richard V. Stone. Free-Space Interconnects for High-Performance Optoelectronic Switching
76 -- 77Daniel E. Cooke. Outlook on Language Research and Practice
107 -- 110Andrew P. Sage. Toward Systems Ecology
111 -- 113James Bach. Microdynamics of Process Evolution
116 -- 117Joao Carreira, João Gabriel Silva. Computer Science and the Pygmalion Effect
118 -- 120Harold W. Lason. Salvation from System Complexity

Volume 31, Issue 12

15 -- 16Lee Garber. US Will Grant More High-Tech Visas
16 -- 0Lee Garber. Internet Pioneer Jon Postel Dies
17 -- 20David Clark. Heavy Traffic Drives Networks to IP over Sonet
25 -- 30Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frincke. Integrating Security into the Curriculum
31 -- 38Benjamin Falchuk, Ahmed Karmouch. Visual Modeling for Agent-Based Applications
40 -- 47Munindar P. Singh. Agent Communication Languages: Rethinking the Principles
49 -- 55Pearl Brereton, David Budgen, Geoff Hamilton. Hypertext: The Next Maintenance Mountain
68 -- 69Janos Sztipanovits. Integrated Engineering of Computer-Based Systems
124 -- 126Todd Carpenter. Avionics Integration for CNS/ATM
127 -- 128Johanna Rothman. Of Crazy Numbers and Realease Criteria
129 -- 0Jim Isaak. The Role of Government in IT Standards
130 -- 132Michael Monticino. Web-Analysis: Striping Away the Hype
133 -- 0Will Tracz. Changing the Channel

Volume 31, Issue 11

12 -- 14John Callahan. Moving Toward Effortless Networking
24 -- 32Christoforos E. Kozyrakis, David A. Patterson. A New Direction for Computer Architecture Research
33 -- 40Douglas K. Barry, Torsten Stanienda. Solving the Java Object Storage Problem
42 -- 44Andrew A. Chien, Mark D. Hill, Shubhendu S. Mukherjee. Design Challenges for High-Performance Network Interfaces - Guest Editors Introduction
46 -- 52Simon Walton, Anne Hutton, Joseph D. Touch. High-Speed Data Paths in Host-Based Routers
53 -- 60Raoul Bhoedjang, Tim Rühl, Henri E. Bal. User-Level Network Interface Protocols
61 -- 68Thorsten von Eicken, Werner Vogels. Evolution of the Virtual Interface Architecture
69 -- 75Whay Sing Lee, William J. Dally, Stephen W. Keckler, Nicholas P. Carter, Andrew Chang. An Efficient, Protected Message Interface
76 -- 78Fred Douglis, Steve J. Chapin, James Isaak. Internet Research on Internet Time
117 -- 118Charles Severance. FireWire Finally Comes Home
119 -- 120Volker Turau. The Fortune 500 Web
121 -- 122W. Neville Holmes. The Myth of the Computer Revolution
123 -- 125Bertrand Meyer. The Role of Object-Oriented Metrics
125 -- 128Ted G. Lewis. The Legacy Maturity Model

Volume 31, Issue 10

11 -- 13John Edwards. The Changing Face of Freeware
14 -- 0Barry Phillips. Designers: The Browser War Casualties
22 -- 30Harlan McGhan, Mike O Connor. PicoJava: A Direct Execution Engine For Java Bytecode
31 -- 39Daniel S. Goldin, Samuel L. Venneri, Ahmed K. Noor. Beyond Incremental Change
48 -- 54Luis-Felipe Cabrera, Brian Andrew, Kyle Peltonen, Norbert Kusters. Advances in Windows NT Storage Management
55 -- 62Rod Gamache, Rob Short, Mike Massa. Windows NT Clustering Service
63 -- 69Stephen G. Eick. A Visualization Tool for Y2K
70 -- 76Shubhendu S. Mukherjee, Mark D. Hill. Making Network Interfaces Less Peripheral
77 -- 85Rajive Bagrodia, Richard A. Meyer, Mineo Takai, Yuan Chen, Xiang Zeng, Jay Martin, Ha Yoon Song. Parssec: A Parallel Simulation Environment for Complex Systems
86 -- 0N. Ranganathan. A Forum for VLSI Practitioners
117 -- 119Harold W. Lawson. From Busyware to Stableware
120 -- 122Jon Bosak. Media-Independent Publishing: Four Myths about XML
123 -- 0David Notkin. The Lifeblood of Our Field
124 -- 126James Bach. A Framework for Good Enough Testing
127 -- 128Robert N. Britcher. Software Reliability: Numbers Aren t the Whole Story