Journal: IEEE Computer

Volume 34, Issue 9

12 -- 15Linda Dailey Paulson. Translation Technology Tries to Hurdle the Language Barrier
16 -- 18George Lawton. Is Technology Meeting the Privacy Challenge?
24 -- 28Václav Rajlich, Norman Wilde, Michelle Buckellew, Henry Page. Software Cultures and Evolution
30 -- 36John Morris, Gareth Lee, Kris Parker, Gary A. Bundell, Chiou Peng Lam. Software Component Certification
37 -- 39Jonathan C. L. Liu, David Hung-Chang Du. Guest Editors Introduction: Continuous Media on Demand
40 -- 45Gavin B. Horn, Per Knudsgaard, Søren B. Lassen, Michael Luby, Jens Eilstrup Rasmussen. A Scalable and Reliable Paradigm for Media on Demand
46 -- 52Ingo Elsen, Frank Hartung, Uwe Horn, Markus Kampmann, Liliane Peters. Streaming Technology in 3G Mobile Communication Systems
61 -- 67Andreas Girgensohn, John S. Boreczky, Lynn Wilcox. Keyframe-Based User Interfaces for Digital Video
68 -- 74Jan Pieper, Savitha Srinivasan, Byron Dom. Streaming-Media Knowledge Discovery
116 -- 118John R. Michener, Steven D. Mohan. Clothing the E-Emperor
120 -- 122Jim Highsmith, Alistair Cockburn. Agile Software Development: The Business of Innovation
126 -- 128W. Neville Holmes. Crouching Error, Hidden Markup

Volume 34, Issue 8

6 -- 7James H. Aylor. Keep on Keepin on
11 -- 15George Lawton. Is IPv6 Finally Gaining Ground?
16 -- 18David Clark. Visual Basic and the Future of Web-Application Development
24 -- 30Timothy A. Budd. Protecting and Managing Electronic Content with a Digital Battery
31 -- 34Roy Want, Bill N. Schilit. Guest Editors Introduction: Expanding the Horizons of Location-Aware Computing
35 -- 41Nigel Davies, Keith Cheverst, Keith Mitchell, Alon Efrat. Using and Determining Location in a Context-Sensitive Tour Guide
42 -- 48Salil Pradhan, Cyril Brignone, Jun-Hong Cui, Alan McReynolds, Mark T. Smith. Websigns: Hyperlinking Physical Locations to the Web
50 -- 56Mike Addlesee, Rupert W. Curwen, Steve Hodges, Joseph Newman, Pete Steggles, Andy Ward, Andy Hopper. Implementing a Sentient Computing System
57 -- 66Jeffrey Hightower, Gaetano Borriello. Location Systems for Ubiquitous Computing
87 -- 89Xianjun Geng, Andrew B. Whinston. Profiting from Value-Added Wireless Services
90 -- 91Michael R. Macedonia. E3 2001: The Birth of Ubiquitous Gaming?
92 -- 97Bertrand Meyer. .NET Is Coming
98 -- 100Diomidis Spinellis. Fear of Coding, and How to Reduce It

Volume 34, Issue 7

12 -- 15George Lawton. Internet Appliances Struggle for Acceptance
16 -- 18Sandra Kay Miller. Facing the Challenge of Wireless Security
24 -- 30Giorgio C. Buttazzo. Artificial Consciousness: Utopia or Real Possibility?
31 -- 38Manoj Parameswaran, Anjana Susarla, Andrew B. Whinston. P2P Networking: An Information-Sharing Alternative
39 -- 46Edmund H. Durfee. Scaling Up Agent Coordination Strategies
48 -- 56Jeffrey M. Bradshaw, Niranjan Suri, Alberto J. Cañas, Robert Davis, Kenneth M. Ford, Robert R. Hoffman, Renia Jeffers, Thomas Reichherzer. Terraforming Cyberspace
57 -- 62Henry Lieberman, Elizabeth Rozenweig, Push Singh. Aria: An Agent for Annotating and Retrieving Images
64 -- 69Simon Case, Nader Azarmi, Marcus Thint, Takeshi Ohtani. Enhancing E-Communities with Agent-Based Systems
70 -- 75John E. Laird. Using a Computer Game to Develop Advanced AI
94 -- 95Alan L. Montgomery, Christos Faloutsos. Identifying Web Browsing Trends and Patterns
96 -- 98Sarah A. Sheard. Evolution of the Framework s Quagmire
99 -- 101Allalaghatta Pavan, Rakesh Jha, Lee Graba, Saul Cooper, Ionut Cardei, Vipin Gopal, Sanjay Parthasarathy, Saad Bedros. Real-Time Adaptive Resource Management
102 -- 104W. Neville Holmes. Vanity and Guilt, Humility and Pride

Volume 34, Issue 6

12 -- 15Neal Leavitt. Linux: At a Turning Point?
16 -- 18George Lawton. New I/O Technologies Seek to End Bottlenecks
24 -- 31Kurt Geihs. Middleware Challenges Ahead
33 -- 38Ming-Wei Wu, Ying-Dar Jason Lin. Open Source Software Development: An Overview
39 -- 44David G. Leeper. A Long-Term View of Short-Range Wireless
46 -- 52Yu-Chee Tseng, Shih-Lin Wu, Wen-Hwa Liao, Chih-Min Chao. Location Awareness in Ad Hoc Wireless Mobile Networks
54 -- 58Subhasis Saha, Mark Jamtgaard, John D. Villasenor. Bringing the Wireless Internet to Mobile Devices
59 -- 67Leonard J. Seligman, Arnon Rosenthal. XML s Impact on Databases and Data Sharing
68 -- 74Erik Riedel, Christos Faloutsos, Garth A. Gibson, David Nagle. Active Disks for Large-Scale Data Processing
94 -- 96Upkar Varshney, Radhika Jain. Issues in Emerging 4G Wireless Networks
97 -- 99Mark Ollis, Todd Williamson. The Future of 3D Video
100 -- 101Ken Krechmer. The Need for Openness in Standards

Volume 34, Issue 5

12 -- 14Don Kiely. Wanted: Programmers for Handheld Devices
16 -- 18John Edwards. Next-Generation Viruses Present New Challenges
24 -- 27Atsushi Kara. Protecting Privacy in Remote-Patient Monitoring
28 -- 35Bertrand Meyer. Software Engineering in the Academy
36 -- 0Michael J. Lutz. Guest Editor s Introduction: Software Engineering on Internet Time
37 -- 43Martin L. Griss, Gilda Pour. Accelerating Development with Agent Components
44 -- 50Sahra Sedigh-Ali, Arif Ghafoor, Raymond A. Paul. Software Engineering Metrics for COTS-Based Systems
51 -- 57Richard Baskerville, Linda Levine, Jan Pries-Heje, Balasubramaniam Ramesh, Sandra Slaughter. How Internet Software Companies Negotiate Quality
58 -- 63Patricia K. Lawlis, Kathryn E. Mark, Deborah A. Thomas, Terry Courtheyn. A Formal Process for Evaluating COTS Software Products
64 -- 70William E. Wright. An Efficient Video-on-Demand Model
87 -- 88David Sobel. Will Carnivore Devour Online Privacy?
89 -- 90Stanislaw Deniziak, Krzysztof Sapiecha. Developing a High-Level Fault Simulation Standard
91 -- 93Victor R. Basili, Barry W. Boehm. COTS-Based Systems Top 10 List
94 -- 96W. Neville Holmes. The Great Term Robbery

Volume 34, Issue 4

14 -- 17George Lawton. New Technologies Place Video in Your Hand
18 -- 21Sandra Kay Miller. Aspect-Oriented Programming Takes Aim at Software Complexity
28 -- 36William R. Hamburgen, Deborah A. Wallach, Marc A. Viredaz, Lawrence S. Brakmo, Carl A. Waldspurger, Joel F. Bartlett, Timothy Mann, Keith I. Farkas. Itsy: Stretching the Bounds of Mobile Computing
38 -- 42Tsugio Makimoto, Kazuhiko Eguchi, Mitsugu Yoneyama. The Cooler the Better: New Directions in the Nomadic Age
47 -- 50Sriram Vajapeyam, Mateo Valero. Early 21st Century Processors - Guest Editors Introduction
52 -- 58Trevor N. Mudge. Power: A First-Class Architectural Design Constraint
59 -- 65James E. Smith. Instruction-Level Distributed Processing
66 -- 71Gurindar S. Sohi, Amir Roth. Speculative Multithreaded Processors
75 -- 83B. Ramakrishna Rau, Michael S. Schlansker. Embedded Computer Architecture and Automation
100 -- 103James F. Dunnigan. The Curse of Fast Iron
104 -- 106Itamar Elhanany, Michael Kahane, Dan Sadot. Packet Scheduling in Next-Generation Multiterabit Networks
107 -- 109Mark W. Maier, David E. Emery, Rich Hilliard. Software Architecture: Introducing IEEE Standard 1471
110 -- 112Abbe Mowshowitz. Virtual Organization: The New Feudalism

Volume 34, Issue 3

12 -- 15Sixto Ortiz Jr.. Instant Messaging: No Longer Just Chat
16 -- 18David Clark. Speech Recognition: The Wireless Interface Revolution
24 -- 28Su-Shing Chen. The Paradox of Digital Preservation
30 -- 35Jonathan J. Hull, Peter E. Hart. Toward Zero-Effort Personal Document Management
37 -- 45Ravin Balakrishnan, George W. Fitzmaurice, Gordon Kurtenbach. User Interfaces for Volumetric Displays
56 -- 64James A. Landay, Brad A. Myers. Sketching Interfaces: Toward More Human Interface Design
65 -- 71Chaomei Chen, Ray J. Paul. Visualizing a Knowledge Domain s Intellectual Structure
73 -- 81Paolo Bellavista, Antonio Corradi, Cesare Stefanelli. Mobile Agent Middleware for Mobile Computing
110 -- 111Paul G. Shotsberger, Ronald J. Vetter. Teaching and Learning in the Wireless Classroom
112 -- 114Frank Vahid, Tony Givargis. Platform Tuning for Embedded Systems Design
115 -- 117Bashar Nuseibeh. Weaving Together Requirements and Architectures
118 -- 120Helen Nissenbaum. How Computer Systems Embody Values

Volume 34, Issue 2

12 -- 14George Lawton. Knowledge Management: Ready for Prime Time?
16 -- 19Sandra Kay Miller. The Trusted OS Makes a Comeback
26 -- 31Steve Lawrence, David M. Pennock, Gary William Flake, Robert Krovetz, Frans Coetzee, Eric J. Glover, Finn Årup Nielsen, Andries Kruger, C. Lee Giles. Persistence of Web References in Scientific Research
32 -- 38Ahmed K. Elmagarmid, William J. McIver Jr.. The Ongoing March Toward Digital Government - Guest Editors Introduction
40 -- 45Massimo Mecella, Carlo Batini. Enabling Italian E-Government through a Cooperative Architecture
47 -- 54José Luis Ambite, Yigal Arens, Eduard H. Hovy, Andrew Philpot, Luis Gravano, Vasileios Hatzivassiloglou, Judith Klavans. Simplifying Data Access: The Energy Data Collection Project
56 -- 64Athman Bouguettaya, Mourad Ouzzani, Brahim Medjahed, Jerry Cameron. Managing Government Databases
66 -- 72James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford. Digital Government Security Infrastructure Design Challenges
74 -- 82Gediminas Adomavicius, Alexander Tuzhilin. Using Data Mining Methods to Build Customer Profiles
115 -- 117Michael R. Macedonia. Innovative Computing Powers Theme Park Adventures
118 -- 119Jim Haungs. Pair Programming on the C3 Project
120 -- 122Michael B. Spring. The Courtship Dance of Bulldogs and Turtles
123 -- 125Goran M. Djuknic, Robert E. Richton. Geolocation and Assisted GPS
126 -- 128W. Neville Holmes. US Electoral Reform: The Obvious Obligation

Volume 34, Issue 12

8 -- 9Benjamin W. Wah. Reviewing Our 2001 Strategic Accomplishments
18 -- 21George Lawton. Browsing the Mobil Internet
22 -- 24Steven J. Vaughan-Nichols. Will Vector Graphics Finally Make It on the Web?
30 -- 37Mazen Zari, Hossein Saiedian, Muhammad Naeem. Understanding and Reducing Web Delays
38 -- 39Michael R. Blaha. Data Warehouses and Decision Support Systems
40 -- 46Torben Bach Pedersen, Christian S. Jensen. Multidimensional Database Technology
48 -- 55Surajit Chaudhuri, Umeshwar Dayal, Venkatesh Ganti. Database Technology for Decision Support Systems
56 -- 65Donald J. Berndt, John W. Fisher, Alan R. Hevner, James Studnicki. Healthcare Data Warehousing and Quality Assurance
66 -- 75Juan Trujillo, Manuel Palomar, Jaime Gómez, Il-Yeol Song. Designing Data Warehouses with OO Conceptual Models
76 -- 79Robert Armstrong. Seven Steps to Optimizing Data Warehouse Performance
80 -- 86Fernando Pedone. Boosting System Performance with Optimistic Distributed Protocols
87 -- 93Carl K. Chang, Jane Cleland-Huang, Shiyan Hua, Annie Kuntzmann-Combelles. Function-Class Decomposition: A Hybrid Software Engineering Method
154 -- 157Lalana Kagal, Timothy W. Finin, Anupam Joshi. Communications - Trust-Based Security in Pervasive Computing Environments
161 -- 162Michael R. Macedonia. Entertainment Computing - Will Linux Be Computer Games Dark Horse OS?
164 -- 165Jerzy W. Rozenblit, Sanjaya Kumar. Integrated Engineering - Looking Back, Moving Forward
166 -- 168Cristina Cifuentes. The Profession - Reverse Engineering and the Computing Profession

Volume 34, Issue 11

14 -- 16Sixto Ortiz Jr.. Embedded Oss Gain the Inside Track
17 -- 20Neal Leavitt. 3D Technology: Ready for the PC?
26 -- 31Andreas Zeller. Automated Debugging: Are We Close
32 -- 38Robert A. Martin. Managing Vulnerabilities in Networked Systems
44 -- 51Ákos Lédeczi, Arpad Bakay, Miklós Maróti, Péter Völgyesi, Greg Nordstrom, Jonathan Sprinkle, Gabor Karsai. Composing Domain-Specific Design Environments
52 -- 56Tommi Mikkonen, Peeter Pruuden. Flexibility as a Design Driver
57 -- 63Andy D. Pimentel, Louis O. Hertzberger, Paul Lieverse, Pieter van der Wolf, Ed F. Deprettere. Exploring Embedded-Systems Architectures with Artemis
64 -- 70Perry Alexander, Cindy Kong. Rosetta: Semantic Support for Model-Centered Systems-Level Design
71 -- 79Mikko Kerttula, Timo Tokkonen. Virtual Design of Multiengineering Electronics Systems
128 -- 130Chris Kenyon. The Evolution of Web-Caching Markets
131 -- 133Alistair Cockburn, Jim Highsmith. Agile Software Development: The People Factor
134 -- 136W. Neville Holmes. Terrorism, Technology, and the Profession

Volume 34, Issue 10

12 -- 14Steven J. Vaughan-Nichols. Tempest over Web-Authoring Tools
15 -- 18Maria-Angeles Grado-Caffaro, Martin Grado-Caffaro. The Challenges that XML Faces
25 -- 30Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos. Search Engines as a Security Threat
32 -- 39Lixin Tao. Shifting Paradigms with the Application Service Provider Model
40 -- 41William A. Arbaugh, Leendert van Doorn. Guest Editors Introduction: Embedded Security: Challenges and Concerns
42 -- 47C. Brendan S. Traw. Protecting Digital Content within the Home
48 -- 49Dan S. Wallach. Copy Protection Technology is Doomed
50 -- 56Peter Bergstrom, Kevin Driscoll, John Kimball. Making Home Automation Communications Secure
57 -- 66Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, Steve Weingart. Building the IBM 4758 Secure Coprocessor
67 -- 75Mike Bond, Ross J. Anderson. API-Level Attacks on Embedded Systems
108 -- 110Sergei Gerasenko, Abhijit Joshi, Srinivas Rayaprolu, Kovendhan Ponnavaikko, Dharma P. Agrawal. Beacon Signals: What, Why, How, and Where?
111 -- 112Grantley Day. Online Games: Crafting Persistent-State Worlds
113 -- 115Leonard J. Bass, Bonnie E. John. Supporting Usability Through Software Architecture
116 -- 117Carl Cargill. Why Are We Doing This?
118 -- 120W. Neville Holmes. The Profession s Future Lies in Its Past

Volume 34, Issue 1

4 -- 0James H. Aylor. Can We Work Together?
6 -- 8Benjamin W. Wah. Pushing Forward into the Third Millenium
18 -- 21David Clark. Face-to-Face with Peer-to-Peer Networking
22 -- 27Lee Garber. Computer Forensics: High-Tech Law Enforcement
34 -- 43Victor V. Zhirnov, Daniel J. C. Herr. New Frontiers: Self-Assembly and Nanoelectronics
44 -- 51Brett Warneke, Matt Last, Brian Liebowitz, Kristofer S. J. Pister. Smart Dust: Communicating with a Cubic-Millimeter Computer
53 -- 60David Harel. From Play-In Scenarios to Code: An Achievable Dream
61 -- 71Scott Hamilton. Thinking Outside the Box at IHMC
72 -- 79Richard Lindheim, William R. Swartout. Forging a New Simulation Technology at the ICT
80 -- 87Maribeth Back, Rich Gold, Anne Balsamo, Mark Chow, Matthew G. Gorbet, Steve R. Harrison, Dale MacDonald, Scott L. Minneman. Designing Innovative Reading Experiences for a Museum Exhibition
132 -- 134Hal Berghel. Cyberprivacy in the New Millennium
135 -- 137Barry W. Boehm, Victor R. Basili. Software Defect Reduction Top 10 List
138 -- 140Miroslav Svéda, Radimir Vrba. Executable Specifications for Embedded Distributed Systems
142 -- 144W. Neville Holmes. The KWIC and the Dead: A Lesson in Computing History