Journal: IEEE Computer

Volume 33, Issue 9

12 -- 16George Lawton. The Wild World of 3D Graphics Chips
18 -- 26Edward A. Lee. What s Ahead for Embedded Software?
27 -- 34Michael A. Olson. Selecting and Implementing an Embedded Database System
35 -- 43Rodger Lea, Simon Gibbs, Alec Dara-Abrams, Edward Eytchison. Networking Home Entertainment Devices with HAVi
44 -- 52Domenico Talia. Cellular Processing Tools for High-Performance Simulation
91 -- 0W. Neville Holmes. Olympic Games Reform: A Study in System Engineering
94 -- 96Barry W. Boehm. Termination Doesn t Equal Project Failure
98 -- 99Edmund M. A. Ronald, Moshe Sipper. The Challenge of Tamperproof Internet Computing
102 -- 104Ted G. Lewis. XM and Sirius Get Serious about Broadcast Satellite Radio

Volume 33, Issue 8

16 -- 19Neal Leavitt. Whatever Happened to Object-Oriented Databases?
20 -- 24David Clark. Encryption Advances to Meet Internet Challenges
32 -- 37Jeffrey M. Voas. Developing a Usage-Based Software Certification Process
39 -- 43Anita K. Jones. The Challenge of Building Survivable Information-Intensive Systems - Guest Editor s Introduction
44 -- 53Massoud Amin. Toward Self-Healing Infrastructure Systems
54 -- 60Kenneth P. Birman. The Next-Generation Internet: Unsafe at Any Speed?
61 -- 68Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliççöte, Pradeep K. Khosla. Survivable Information Storage Systems
69 -- 77Donald E. Brown, Louise E. Gunderson, Marc H. Evans. Interactive Analysis of Computer Crimes
99 -- 101Michael R. Macedonia. Distributed File Sharing: Barbarians at the Gates?
102 -- 103Richard Hay. Comparing POS and ATM Interfaces
104 -- 106Peter J. Danielsen. The Promise of a Voice-Enabled Web
107 -- 109David Chadwick. Windows 2000: A Threat to Internet Diversity and Open Standards?
110 -- 112Ted G. Lewis. Why WAP May Never Get off the Ground

Volume 33, Issue 7

12 -- 17George Lawton. Video Streams into the Mainstream
18 -- 21Sixto Ortiz Jr.. Broadband Fixed Wireless Travels the Last Mile
28 -- 35John L. Henning. SPEC CPU2000: Measuring CPU Performance in the New Millennium
36 -- 41David J. Goodman. The Wireless Internet: Promises and Challenges
42 -- 48Jan M. Rabaey, M. Josie Ammer, Julio Leao da Silva Jr., Danny Patel, Shad Roundy. PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking
49 -- 55Andrew P. Snow, Upkar Varshney, Alisha D. Malloy. Reliability and Survivability of Wireless and Mobile Networks
57 -- 65Thomas Ball, James R. Larus. Using Paths to Measure, Explain, and Enhance Program Behavior
66 -- 71Václav Rajlich, Keith H. Bennett. A Staged Model for the Software Life Cycle
73 -- 79Forrest Shull, Ioana Rus, Victor R. Basili. How Perspective-Based Reading Can Improve Requirements Inspections
97 -- 98W. Neville Holmes. Fashioning a Foundation for the Computing Profession
99 -- 102Barry W. Boehm. Requirements that Handle IKIWISI, COTS, and Rapid Change
104 -- 107Veljko M. Milutinovic, Predrag Knezevic, Bozidar Radunovic, Steve Casselman, John Schewel. Obelix Searches Internet Using Customer Data
108 -- 110John R. Michener, Tolga Acar. Managing System and Active-Content Integrity
110 -- 112Ted G. Lewis. The Web Fosters a Rust-Belt Renaissance

Volume 33, Issue 6

12 -- 15David Clark. Are Too Many Programmers Too Narrowly Trained?
16 -- 20George Lawton. Distributed Net Applications Create Virtual Supercomputers
28 -- 34Peter M. Maurer. Components: What If They Gave a Revolution and Nobody Came?
36 -- 44Robert Oshana. Winning Teams: Performance Engineering during Development
45 -- 46Eltefaat Shokri, Phillip C.-Y. Sheu. Guest Editors Introduction - Real-Time Distributed Object Computing: An Emerging Field
47 -- 54Gregory Bollella, James Gosling. The Real-Time Specification for Java
56 -- 63Douglas C. Schmidt, Fred Kuhns. An Overview of the Real-Time CORBA Specification
64 -- 69Bran Selic. A Generic Framework for Modeling Resources with UML
72 -- 80K. H. Kim. APIs for Real-Time Distributed Object Programming
100 -- 103Upkar Varshney. Recent Advances in Wireless Networking
104 -- 106Michael R. Macedonia. The Empire Strikes Back ... with the X-Box
107 -- 109Jim Waldo. Alive and Well: Jini Technology Today
110 -- 112Ted G. Lewis. The End of Research as We Know It?

Volume 33, Issue 5

12 -- 15Reed Hellman. The Future of the OS for Internet Applications
16 -- 20Neal Leavitt. Will WAP Deliver the Wireless Internet?
27 -- 33Barry W. Boehm, Victor R. Basili. Gaining Intellectual Control of Software Development
35 -- 43Gilda Pour, Martin L. Griss, Michael J. Lutz. The Push to Make Software Engineering Respectable
44 -- 50Timothy Lethbridge. What Knowledge Is Important to a Software Professional?
52 -- 58Brian E. Brewington, George Cybenko. Keeping Up with the Changing Web
59 -- 67Lee Breslau, Deborah Estrin, Kevin R. Fall, Sally Floyd, John S. Heidemann, Ahmed Helmy, Polly Huang, Steven McCanne, Kannan Varadhan, Ya Xu, Haobo Yu. Advances in Network Simulation
68 -- 75Jørgen Staunstrup, Henrik Reif Andersen, Henrik Hulgaard, Jørn Lind-Nielsen, Kim Guldstrand Larsen, Gerd Behrmann, Kåre J. Kristoffersen, Arne Skou, Henrik Leerberg, Niels Bo Theilgaard. Practical Verification of Embedded Software
102 -- 105Anitesh Barua, Andrew B. Whinston, Fang Yin. Value and Productivity in the Internet Economy
106 -- 108Jonathan R. Agre, Loren P. Clare. An Integrated Architecture for Cooperative Sensing Networks
110 -- 112Ted G. Lewis. Why Funny Money Will Have the Last Laugh

Volume 33, Issue 4

12 -- 17Lee Garber. Denial-of-Service Attacks Rip the Internet
24 -- 29Bashar Nuseibeh, Steve M. Easterbrook, Alessandra Russo. Leveraging Inconsistency in Software Development
30 -- 38Roger T. Alexander, James M. Bieman, John Viega. Coping with Java Programming Stress
39 -- 40Ranga Vemuri, Randolph E. Harr. Configurable Computing: Technology and Applications - Guest Editors Introduction
41 -- 49André DeHon. The Density Advantage of Configurable Computing
50 -- 57Simon D. Haynes, John Stone, Peter Y. K. Cheung, Wayne Luk. Video Image Processing with the Sonic Architecture
58 -- 60Marco Platzner. Reconfigurable Accelerators for Combinatorial Problems
62 -- 69Timothy J. Callahan, John R. Hauser, John Wawrzynek. The Garp Architecture and C Compiler
70 -- 77Seth Copen Goldstein, Herman Schmit, Mihai Budiu, Srihari Cadambi, Matthew Moe, R. Reed Taylor. PipeRench: A Reconfigurable Architecture and Compiler
107 -- 109Upkar Varshney. Recent Advances in Wired Networking
110 -- 112Michael R. Macedonia. Using Technology and Innovations to Simulate Daily Life
113 -- 0Peter Flynn, Richard Wiggins. XML: An Interview with Peter Flynn
115 -- 116Michael J. Lutz. Fundamental Ideas and Change
118 -- 120Ted G. Lewis. When Atoms and Bit Collide: Detroit Goes Digital

Volume 33, Issue 3

4 -- 6James H. Aylor. New Computer Departments Reflect our Changing Industry
16 -- 19Sixto Ortiz Jr.. Embedded Databases Come out of Hiding
20 -- 23John Edwards. Buidling the Optical-Networking Infrastructure
30 -- 34W. Neville Holmes. The Evitability of Software Patents
35 -- 39Roy Ladner, Mahdi Abdelguerfi, Kevin Shaw. 3D Mapping of an Interactive Synthetic Environment
40 -- 45Erik R. Altman, David R. Kaeli, Yaron Sheffer. Welcome to the Opportunities of Binary Translation
47 -- 52Cindy Zheng, Carol L. Thompson. PA-RISC to IA-64: Transparent Execution, No Recompilation
54 -- 59Michael Gschwind, Erik R. Altman, Sumedh W. Sathaye, Paul Ledak, David Appenzeller. Dynamic and Transparent Binary Translation
60 -- 66Cristina Cifuentes, Mike Van Emmerik. UQBT: Adaptive Binary Translation at Low Cost
68 -- 76Jean Bacon, Ken Moody, John Bates, Richard Hayton, Chaoying Ma, Andrew McNeil, Oliver Seidel, Mark D. Spiteri. Generic Support for Distributed Applications
78 -- 85Rob C. van Ommering, Frank van der Linden, Jeff Kramer, Jeff Magee. The Koala Component Model for Consumer Electronics Software
108 -- 109Lee W. McKnight, Jahangir Boroumand. Pricing Internet Services: Proposed Improvements
110 -- 113Hessam S. Sarjoughian, Bernard P. Zeigler, Daryl R. Hild. A Codesign Approach for Distributed Systems
114 -- 116Barry W. Boehm. Unifying Software Engineering and Systems Engineering
118 -- 120Ted G. Lewis. AOL, Time Warner, and the Crash of 2000

Volume 33, Issue 2

14 -- 0George Lawton. Intellectual-Property Protection Opens Path for E-commerce
18 -- 21David Clark. Shopbots Become Agents for Business Change
28 -- 35Emilie O Connell, Hossein Saiedian. Can You Trust Software Capability Evaluations?
37 -- 45Michael S. Schlansker, B. Ramakrishna Rau. EPIC: Explicititly Parallel Instruction Computing
46 -- 49Sharath Pankanti, Ruud M. Bolle, Anil K. Jain. Biometrics: The Future of Identification - Guest Editors Introduction
50 -- 55Alex Pentland, Tanzeem Choudhury. Face Recognition for Smart Environments
56 -- 63P. Jonathon Phillips, Alvin F. Martin, Charles L. Wilson, Mark A. Przybocki. An Introduction to Evaluating Biometric Systems
64 -- 68Robert Frischholz, Ulrich Dieckmann. BioID: A Multimodal Biometric Identification System
70 -- 75Michael Negin, Thomas A. Chmielewski Jr., Theodure A. Camus, Ulf M. Cahn von Seelen, Péter L. Venetianer, Guanghua G. Zhang. An Iris Biometric System for Public and Personal Use
76 -- 80James L. Wayman. Federal Biometric Technology Legislation
82 -- 89Giacomo Cabri, Letizia Leonardi, Franco Zambonelli. Mobile-Agent Coordination Models for Internet Applications
124 -- 127Michael R. Macedonia. Why Digital Entertainment Drives the Need for Speed
128 -- 129Lee W. McKnight, Jahangir Boroumand. Pricing Internet Services: Approaches and Challenges
130 -- 132Catherine J. Tilton. An Emerging Biometric API Industry Standard
134 -- 136Ted G. Lewis. Tracking the Anywhere, Anytime Inflection Point

Volume 33, Issue 12

13 -- 15Sixto Ortiz Jr.. Will PKI Become a Key to Online Security?
16 -- 19Neal Leavitt. Malicious Code Moves to Mobile Devices
30 -- 35Morgan Björkander. Graphical Programming Using UML and SDL
36 -- 42James A. Whittaker, Jeffrey M. Voas. Toward a More Reliable Theory of Software Reliability
43 -- 51Thomas A. Longstaff, Clyde Chittister, Rich Pethia, Yacov Y. Haimes. Are We Forgetting the Risks of Information Technology?
52 -- 59William A. Arbaugh, William L. Fithen, John McHugh. Windows of Vulnerability: A Case Study Analysis
60 -- 66Randy Butler, Von Welch, Douglas Engert, Ian T. Foster, Steven Tuecke, John Volmer, Carl Kesselman. A National-Scale Authentication Infrastructur
67 -- 74Trishul M. Chilimbi, Mark D. Hill, James R. Larus. Making Pointer-Based Data Structures Cache Conscious
148 -- 150James A. Senn. The Emergence of M-Commerce
152 -- 153Harry Mason. SCSI, the Industry Workhorse, Is Still Working Hard
154 -- 156Theresa-Marie Rhyne. Computer Games Influence on Scientific and Information Visualization
158 -- 160W. Neville Holmes. Why Johnny Can t Program

Volume 33, Issue 11

12 -- 15David Clark. Handhelds Drive Mixed-Signal Chip Development
22 -- 28Nisha Talagala, Satoshi Asami, David A. Patterson, Bob Futernick, Dakin Hart. The Art of Massive Storage: A Web Image Archive
29 -- 36Udo Hahn, Inderjeet Mani. The Challenges of Automatic Summarization
37 -- 44Nivio Ziviani, Edleno Silva de Moura, Gonzalo Navarro, Ricardo A. Baeza-Yates. Compression: A Key for Next-Generation Text Retrieval Systems
46 -- 53Michael S. Lew. Next-Generation Web Searches for Visual Content
54 -- 62Pearl Brereton, David Budgen. Component-Based Systems: A Classification of Issues
63 -- 68Deborah Estrin, Mark Handley, John S. Heidemann, Steven McCanne, Ya Xu, Haobo Yu. Network Visualization with Nam, the VINT Network Animator
118 -- 119Veljko M. Milutinovic, Dragana Cvetkovic, Jelena Mirkovic. Genetic Search Based on Multiple Mutations
120 -- 122Barry W. Boehm, Daniel Port, Mohammed Al-Said. Avoiding the Software Model-Clash Spiderweb
123 -- 125Gaetano Borriello. The Challenges to Invisible Computing
126 -- 128W. Neville Holmes. Some Comments on the Coding of Programs

Volume 33, Issue 10

12 -- 16Linda Dailey Paulson. Exploring the Wireless LANscape
23 -- 29Lutz Prechelt. An Empirical Comparison of Seven Programming Languages
30 -- 31Alfred C. Weaver, Ronald J. Vetter, Andrew B. Whinston, Kathleen M. Swigger. Guest Editors Introduction: The Future of E-Commerce
32 -- 38Upkar Varshney, Ronald J. Vetter, Ravi Kalakota. Mobile Commerce: A New Frontier
40 -- 47Simon S. Y. Shim, Vishnu S. Pendyala, Meera Sundaram, Jerry Z. Gao. Business-to-Business E-Commerce Frameworks
48 -- 53Wenli Wang, Zoltán Hidvégi, Andrew D. Bailey Jr., Andrew B. Whinston. E-Process Design and Assurance Using Model Checking
54 -- 60Tim Ebringer, Peter Thorne, Yuliang Zheng. Parasitic Authentication To Protect Your E-Wallet
98 -- 101Gerald Lui-Kwan. In-Flight Entertainment: The Sky s the Limit
102 -- 103Jim Isaak. New Laws and Technologies Morph Web Page Best Practices
104 -- 106David G. Stork. Using Open Data Collection for Intelligent Software
107 -- 110Joseph Samaha, Ayman I. Kayssi, Ralph Achkar, Mark Azar. G3 Integrates Three System Technologies
111 -- 112Ted G. Lewis. Innovation Equals Risk Reduction

Volume 33, Issue 1

16 -- 20John Edwards. Redefining IT Career Paths for the New Millennium
21 -- 23Sixto Ortiz Jr.. E-mail Protection Advances with New Technologies
29 -- 37Jonathan Vos Post, Kirk L. Kroeker. Writing the Future: Computers in Science Fiction
38 -- 45Andrew M. Steane, Eleanor G. Rieffel. Beyond Bits: The Future of Quantum Information Processing
46 -- 53Christine Peterson. Taking Technology to the Molecular Level
54 -- 62Lucas D. Introna, Helen Nissenbaum. Defining the Web: The Politics of Search Engines
63 -- 71Daniel E. Cooke, Scott Hamilton. New Directions at NASA Ames Research Center
72 -- 76Janet Wilson. Toward Things That Think
117 -- 119Lawrence G. Roberts. Beyond Moore s Law: Internet Growth Trends
120 -- 121Moshe Sipper, Eduardo Sanchez. Configurable Chips Meld Software and Hardware
122 -- 124Barry W. Boehm. The Art of Expectations Management
126 -- 128Ted G. Lewis. Service: The Next Inflection Point