Journal: IEEE Computer

Volume 35, Issue 9

6 -- 0. Article Summaries
8 -- 10. Home Theater Strategies
12 -- 15Robert P. Colwell. Employee Performance Reviews
19 -- 21Steven J. Vaughan-Nichols. Developing the Distributed-Computing OS
25 -- 30Oliver Bimber, Stephen M. Gatesy, Lawrence M. Witmer, Ramesh Raskar, L. Miguel Encarnação. Merging Fossil Specimens with Computer-Generated Information
31 -- 38Charlene (Chuck) Walrad, Darrel Strom. The Importance of Branching Models in SCM
39 -- 47Vinod Kathail, Shail Aditya, Robert Schreiber, B. Ramakrishna Rau, Darren C. Cronquist, Mukund Sivaraman. PICO: Automatically Designing Custom Computers
48 -- 53Wayne Wolf, Burak Ozer, Tiehan Lv. Smart Cameras as Embedded Systems
54 -- 60Jiannong Cao, Xinyu Feng, Jian Lu, Sajal K. Das. Mailbox-Based Scheme for Designing Mobile Agent Communication Protocols
62 -- 68. IEEE Computer Society Election
70 -- 76. IEEE President-Elect Candidates Address Computer Society Concerns
81 -- 0. Risk-Based Approach to Mission-Critical Software Testing
82 -- 83. Products
93 -- 95Abdelsalam Heddaya. An Economically Scalable Internet
96 -- 97Wayne Wolf. Whither Warhol s Law?
98 -- 100Clay Shirky. Web Services and Context Horizons
102 -- 104W. Neville Holmes. Jobs, Trades, Skills, and the Profession

Volume 35, Issue 8

10 -- 12Robert P. Colwell. Weird Books
13 -- 15Lee Garber. Romanian Disaster-Response Project Wins Design Competition
20 -- 22Linda Dailey Paulson. Computer System, Heal Thyself
23 -- 25Linda Dailey Paulson. Distributed Storage Challenges Data Glut - Professors Use Technology to Fight Plagiarism - Startup Wants to Automate Chip Design
26 -- 33Mary Lacity. Lessons in Global Information Technology Sourcing
34 -- 40Rahul Gupta, Sumeet Talwar, Dharma P. Agrawal. Jini Home Networking: A Step toward Pervasive Computing
41 -- 49Peter Gutmann. PKI: It s Not Dead, Just Resting
50 -- 56George Cybenko, Annarita Giani, Paul Thompson. Cognitive Hacking: A Battle for the Mind
57 -- 63Jeffrey B. Lotspiech, Stefan Nusser, Florian Pestoni. Broadcast Encryption s Bright Future
64 -- 66. Computer Society
67 -- 69. Call and Calendar
70 -- 72. Career Opportunities
77 -- 79William A. Arbaugh. Improving the TCPA Specification
80 -- 82Panagiotis Demestichas, Louisa Papadopoulou, Vera Stavroulaki, Michael E. Theologou, Guillaume Vivier, Georges Martinez, Fabio Galliano. Wireless Beyond 3G: Managing Services and Network Resources
87 -- 88Atif M. Memon. GUI Testing: Pitfalls and Process
90 -- 92Diana Orrick. Toward Adequate Online Privacy Safeguards

Volume 35, Issue 7

6 -- 8Robert P. Colwell. What Technology Is Doing to Music
9 -- 10. Article Summaries
11 -- 14Sixto Ortiz Jr.. Is Business Intelligence a Smart Move?
15 -- 18George Lawton. Invasive Software: Who s Inside Your Computer?
25 -- 32Junhyong Kim. Computers Are from Mars, Organisms Are from Venus
34 -- 40Dror G. Feitelson, Millet Treinin. The Blueprint for Life?
41 -- 45Lenwood S. Heath, Naren Ramakrishnan. The Emerging Landscape of Bioinformatics Software Systems
47 -- 54Mihai Pop, Steven Salzberg, Martin Shumway. Genome Sequence Assembly: Algorithms and Issues
55 -- 64Bernard M. E. Moret, Li-San Wang, Tandy Warnow. Toward New Software for Computational Phylogenetics
65 -- 71Bahram Parvin, Qing Yang, Gerald Fontenay, Mary Helen Barcellos-Hoff. BioSig: An Imaging Bioinformatic System for Studying Phenomic
73 -- 79Salvatore Paxia, Archisman Rudra, Yi Zhou, Bud Mishra. A Random Walk Down the Genomes: DNA Evolution in Valis
80 -- 86Jinwook Seo, Ben Shneiderman. Interactively Exploring Hierarchical Clustering Results
92 -- 94. Call and Calender
95 -- 0. Putting Discrepancy Theory to Work
96 -- 97. Products
102 -- 103Jonathan W. Palmer. Designing for Web Site Usability
106 -- 107Thomas M. Conte. Choosing the Brain(s) of an Embedded System
108 -- 109Simon S. Y. Shim, Yen-Jen Lee. Interactive TV: VoD Meets the Internet
110 -- 112W. Neville Holmes. Seven Great Blunders of the Computing World

Volume 35, Issue 6

10 -- 12Robert P. Colwell. When the real world intervenes on well-planned experiments, the lessons you learn stick with you
13 -- 0. Article Summaries
17 -- 20George Lawton. Moving Java into Mobile Phones
22 -- 24Steven J. Vaughan-Nichols. Will 10-Gigabit Ethernet Have a Bright Future?
28 -- 30Ross J. Anderson. Free Speech Online and Offline
31 -- 33Leonard L. Tripp. Software Certification Debate: Benefits of Certification
34 -- 35Adam Kolawa. Software Certification Debate: Certification Will Do More Harm than Good
37 -- 46Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, Steven Tuecke. Grid Services for Distributed System Integration
47 -- 55William T. C. Kramer. SCinet: Testbed for High-Performance Networked Applications
56 -- 64Cyrus Shahabi, Roger Zimmermann, Kun Fu, Shu-Yuen Didi Yao. Yima: A Second-Generation Continuous Media Server
65 -- 73Hyokyung Bahn, Kern Koh, Sang Lyul Min, Sam H. Noh. Efficient Replacement of Nonuniform Objects in Web Caches
74 -- 76. IEEE Computer Society Recognizes Achievements of Leading Computer Engineers
81 -- 0. Recipes for Image Analysis
90 -- 92Tom DeMarco, Barry W. Boehm. The Agile Methods Fray
93 -- 95Erin Kenneally. Who s Liable for Insecure Networks?
96 -- 99Sasikanth Avancha, Anupam Joshi, Timothy W. Finin. Enhanced Service Discovery in Bluetooth
100 -- 102Donald A. Norman. Home Theater: Not Ready for Prime Time

Volume 35, Issue 5

11 -- 13Robert P. Colwell. If You Didn t Test It, It Doesn t Work
18 -- 21John Edwards, Linda Dailey Paulson. Smart Graphics: A New Approach to Meeting User Needs
22 -- 24Neal Leavitt. Data Mining for the Corporate Masses?
28 -- 34Michael R. Blaha, Cheryl Smith. A Pattern for Softcoded Values
36 -- 44Kyle Eischen. Software Development: An Outsider s View
46 -- 54Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Sang Ho Lee, Seung-Soo Park, Hwan-Seung Yong. The Chamois Component-Based Knowledge Engineering Framework
55 -- 62Selim Aissi, Pallavi Malu, Krishnamurthy Srinivasan. E-Business Process Modeling: The Next Big Step
63 -- 70T. S. Raghu, Ram Ramesh, Andrew B. Whinston. Next Steps for Mobile Entertainment Portals
72 -- 79Laura E. Jackson, George N. Rouskas. Deterministic Preemtive Scheduling of Real-Time Tasks
80 -- 87Fayaz A. Shaikh, Stan McClellan, Manpreet Singh, Sannedhi K. Chakravarthy. End-to-End Testing of IP QoS Mechanisms
88 -- 91. Call and Calendar
96 -- 98. Career Opportunities
99 -- 0. Bookshelf: The Art of Evolutionary Computation
102 -- 103Douglas A. Lyon, Christopher L. Huntley. There s More Than One Way to Build a Bridge
104 -- 105Kate McMillan. Technology Standards Pros Aid Homeland Security
106 -- 108Wayne Wolf. Household Hints for Embedded Systems Designers
110 -- 112W. Neville Holmes. Would a Digital Brain Have a Mind?

Volume 35, Issue 4

9 -- 12Robert P. Colwell. Near Misses: Murphy s Law is Wrong
13 -- 0. Article Summaries
17 -- 19Linda Dailey Paulson. Faster RAM Tackles Data and Marketplace Bottlenecks
23 -- 28Nachiketh R. Potlapally. Optical Fingerprinting to Protect Data: A Proposal
30 -- 37Donald Welch, Daniel Ragsdale, Wayne Schepens. Training for Information Assurance
38 -- 41Savitha Srinivasan, Eric W. Brown. Is Speech Recognition Becoming Mainstream?
42 -- 50Mukund Padmanabhan, Michael Picheny. Large-Vocabulary Speech Recognition Algorithms
51 -- 56Allen L. Gorin, Alicia Abella, Tirso Alonso, Giuseppe Riccardi, Jeremy H. Wright. Automated Natural Spoken Dialog
58 -- 66Pedro J. Moreno, Jean-Manuel Van Thong, Beth Logan, Gareth J. F. Jones. From Multimedia Retrieval to Knowledge Management
68 -- 73Richard H. Thayer. Software System Engineering: A Tutorial
80 -- 84. Career Opportunities
86 -- 88Bertrand Meyer. Assessing a C# Text
89 -- 0. Bookshelf
92 -- 94Rashmi Bajaj, Samantha Ranaweera, Dharma P. Agrawal. GPS: Location-Tracking Technology
96 -- 98James Korris, Michael R. Macedonia. The End of Celluloid: Digital Cinema Emerges
99 -- 101Gary McGraw. Managing Software Security Risks
102 -- 104W. Neville Holmes. Side Effects of Digital Technology

Volume 35, Issue 3

6 -- 7. Letters
8 -- 10Robert P. Colwell. Engineering, Science, and Quantum Mechanics
18 -- 21George Lawton. Open Source Security: Opportunity or Oxymoron?
22 -- 25David Clark. Mobile Processors Begin to Grow Up
30 -- 37Roslin V. Hauck, Homa Atabakhsh, Pichai Ongvasith, Harsh Gupta, Hsinchun Chen. Using Coplink to Analyze Criminal-Justice Data
38 -- 43André Guéziec. Tracking Pitches for Broadcast Television
44 -- 50Ivan Poupyrev, Desney S. Tan, Mark Billinghurst, Hirokazu Kato, Holger Regenbrecht, Nobuji Tetsutani. Developing a Generic Augmented-Reality Interface
51 -- 59Kurt D. Fenstermacher, Mark Ginsburg. A Lightweight Framework for Cross-Application User Monitoring
60 -- 65Jennifer Allanson. Electrophysiologically Interactive Computer Systems
66 -- 71Gary William Flake, Steve Lawrence, C. Lee Giles, Frans Coetzee. Self-Organization and Identification of Web Communities
73 -- 79Eduardo Miranda. Planning and Executing Time-Bound Projects
85 -- 88. Call and Calendar
90 -- 95. Career Opportunities
100 -- 103Grant Martin, Frank Schirrmeister. A Design Chain for Embedded Systems
104 -- 106Charles Steinfield. Realizing the Benefits of Virtual Teams
107 -- 109Amanda Spink, Bernard J. Jansen, Dietmar Wolfram, Tefko Saracevic. From E-Sex to E-Commerce: Web Search Changes
110 -- 112W. Neville Holmes. Computers, Programming, and People

Volume 35, Issue 2

9 -- 11Robert P. Colwell. On Computers and Rock n Roll
18 -- 21Steven J. Vaughan-Nichols. Web Services: Beyond the Hype
22 -- 24Linda Dailey Paulson. Wanted: More Network-Security Graduates and Research
25 -- 27. News Briefs
28 -- 36Kenneth L. Kraemer, Jason L. Dedrick. Enter the Dragon: China s Computer Industry
38 -- 39Shubhendu S. Mukherjee, Sarita V. Adve, Todd M. Austin, Joel S. Emer, Peter S. Magnusson. Performance Simulation Tools
40 -- 49Christopher J. Hughes, Vijay S. Pai, Parthasarathy Ranganathan, Sarita V. Adve. RSIM: Simulating Shared-Memory Multiprocessors with ILP Processors
50 -- 58Peter S. Magnusson, Magnus Christensson, Jesper Eskilson, Daniel Forsgren, Gustav Hållberg, Johan Högberg, Fredrik Larsson, Andreas Moestedt, Bengt Werner. Simics: A Full System Simulation Platform
59 -- 67Todd M. Austin, Eric Larson, Dan Ernst. SimpleScalar: An Infrastructure for Computer System Modeling
68 -- 76Joel S. Emer, Pritpal Ahuja, Eric Borch, Artur Klauser, Chi-Keung Luk, Srilatha Manne, Shubhendu S. Mukherjee, Harish Patil, Steven Wallace, Nathan L. Binkert, Roger Espasa, Toni Juan. Asim: A Performance Model Framework
77 -- 83Norman F. Schneidewind. Body of Knowledge for Software Quality Measurement
84 -- 88. Computer Society Connection
106 -- 108. Products
109 -- 111William A. Arbaugh. Security: Technical, Social, and Legal Challenges
112 -- 114Michael R. Macedonia. Linux in Hollywood: A Star is Born
115 -- 117Upkar Varshney. Multicast Support in Mobile Commerce Applications
118 -- 120W. Neville Holmes. Representative Democracy and the Profession

Volume 35, Issue 12

6 -- 8. Letters
10 -- 11Willis K. King. President s Message: Year in Review
12 -- 0James H. Aylor. EIC s Message: It has been a Great Ride!
13 -- 15Robert P. Colwell. Science-Philosophy Celebrity Death Match
19 -- 21Steven J. Vaughan-Nichols. OFDM: Back to the Wireless Future
22 -- 24George Lawton. Virus Wars: Fewer Attacks, New Threats
25 -- 27Linda Dailey Paulson. News Briefs Topics include: Researchers Upgrade Smart Card Technology / New Optical Clock Could Synchronize Chips
29 -- 34Chris Rowen. Reducing SoC Simulation and Development Time
35 -- 41Gary S. Robinson. Toward the Age of Smarter Storage
48 -- 55Michael T. LoBue, Harry Mason, Thomas Hammond-Doel, Eric Anderson, Mike Alexenko, Tom Clark. Surveying Today s Most Popular Storage Interfaces
56 -- 63Robert Griswold. Storage Topologies
65 -- 72Roger Cummings. The Evolution of Information Assurance
73 -- 74. Report to Members
77 -- 79. Call and Calendar
92 -- 115. Career Opportunities
117 -- 0. Bookshelf
118 -- 119. Products
120 -- 121Upkar Varshney. Mobile Payments
122 -- 124Christopher B. Stapleton, Charles E. Hughes, J. Michael Moshell, Paulius Micikevicius, Marty Altman. Applying Mixed Reality to Entertainment
125 -- 0O. Sami Saydjari. Defending Cyberspace
126 -- 128Simone Santini. Using Language More Responsibly

Volume 35, Issue 11

8 -- 9. Cognitive Hacking of a Different Sort
10 -- 12Robert P. Colwell. The Coolest Thing on Earth
17 -- 19Steven J. Vaughan-Nichols. Bull Market for IEEE 802.11 WLAN Chipsets
20 -- 22Linda Dailey Paulson. Stopping Intruders Outside the Gates
23 -- 0Linda Dailey Paulson. News Briefs Topics include: IBM Works on a Universal Virtual Computer / Battling Intrusions with a Network Telescope / Choreographing Web Services
27 -- 31Ning Zhong, Jiming Liu, Yiyu Yao. In Search of the Wisdom Web
32 -- 36Ravi Kumar, Prabhakar Raghavan, Sridhar Rajagopalan, Andrew Tomkins. The Web and Social Networks
37 -- 41Toyoaki Nishida. Social Intelligence Design for the Web
42 -- 47Toru Ishida. Q: A Scenario Description Language for Interactive Agents
48 -- 54Joanna Bryson, David L. Martin, Sheila A. McIlraith, Lynn Andrea Stein. Toward Behavioral Intelligence in the Semantic Web
56 -- 59Dieter Fensel. Ontology-Based Knowledge Management
60 -- 63Michele Missikoff, Roberto Navigli, Paola Velardi. Integrated Approach to Web Ontology Learning and Engineering
64 -- 70Jiawei Han, Kevin Chen-Chuan Chang. Data Mining for Web Intelligence
72 -- 76Nick Cercone, Lijun Hou, Vlado Keselj, Aijun An, Kanlaya Naruedomkul, Xiaohua Hu. From Computational Intelligence to Web Intelligence
77 -- 0. Bookshelf
80 -- 83. Computer Society Connection
84 -- 86. Call and Calendar
106 -- 107Roger Norton. Using Virtual Linux Servers
108 -- 110Jan Madsen, Jørgen Steensgaard-Madsen, Lars Christensen. A Sophomore Course in Codesign
111 -- 112Stephen Ransom, Xindong Wu. Using Knowledge Anchors to Reduce Cognitive Overheads
114 -- 116W. Neville Holmes. The Profession and the World

Volume 35, Issue 10

8 -- 10. Content Protection Alternatives
12 -- 14Robert P. Colwell. The Power of the Most Likely
19 -- 22David Clark. Do Web Standards and Patents Mix?
23 -- 25Neal Leavitt. Let s Hear It for Audio Mining
26 -- 28Linda Dailey Paulson. News Briefs Topics include: Project Promises Accessible Technology for the Disabled / Two Efforts Aim to Upgrade Mobile Memory / Prime Breakthrough May Improve Encryption
29 -- 36Ravi Kalakota, Pavan Gundepudi, Jonathan Wareham, Arun Rai, Richard J. Welke. The Economics of DSL Regulation
37 -- 45Bill N. Schilit, Jonathan Trevor, David M. Hilbert, Tzu Khiau Koh. Web Interaction Using Very Small Internet Devices
46 -- 53Suman Banerjee, Sulabh Agarwal, Kevin Kamel, Andrzej Kochut, Christopher Kommareddy, Tamer Nadeem, Pankaj Thakkar, Bao Trinh, Adel M. Youssef, Moustafa Youssef, Ronald L. Larsen, A. Udaya Shankar, Ashok K. Agrawala. Rover: Scalable Location-Aware Computing
54 -- 62Anthony D. Wood, John A. Stankovic. Denial of Service in Sensor Networks
63 -- 68Samitha Samaranayake, Nodari Sitchinava, Rohit Kapur, Minesh B. Amin, Thomas W. Williams. Dynamic Scan: Driving Down the Cost of Test
70 -- 71. Products
78 -- 81. Call and Calendar
97 -- 99Michael R. Macedonia. The Computer Graphics Wars Heat Up
100 -- 102Josef F. Huber. Toward the Mobile Internet
103 -- 105Andrew Huang. The Trusted PC: Skin-Deep Security
106 -- 108Laura K. Briggs, Kari Boyd McBride. Rethinking the Digital Divide

Volume 35, Issue 1

4 -- 0James H. Aylor. The End of Computing Disciplines as We Know Them?
6 -- 8Willis K. King. Implementing Our Future Vision in 2002
9 -- 11. Letters
12 -- 14Robert P. Colwell. logy, Astrology, Risk, and Product Quality
26 -- 32Lee Garber. Technology News
33 -- 41Chandrasekhar Narayanaswami, Noboru Kamijoh, Mandayam T. Raghunath, Tadanobu Inoue, Thomas M. Cipolla, James L. Sanford, Eugene S. Schlig, Sreekrishnan Venkiteswaran, Dinakar Guniguntala, Vishal Kulkarni, Kazuhiko Yamazaki. IBM s Linux Watch: The Challenge of Miniaturization
42 -- 53Alan Allan, Don Edenfeld, William H. Joyner Jr., Andrew B. Kahng, Mike Rodgers, Yervant Zorian. 2001 Technology Roadmap for Semiconductors
54 -- 62Bruce R. Schatz. The Interspace: Concept Navigation Across Distributed Communities
64 -- 69Barry W. Boehm. Get Ready for Agile Methods, with Care
70 -- 78Luca Benini, Giovanni De Micheli. Networks on Chips: A New SoC Paradigm
79 -- 87Mark Oskin, Frederic T. Chong, Isaac L. Chuang. A Practical Architecture for Reliable Quantum Computers
88 -- 93Gabriel Leen, Donal Heffernan. Expanding Automotive Electronic Systems
133 -- 135Thad Starner. Web Technologies - Thick Clients for Personal Wireless Devices
136 -- 137Wayne Wolf. Embedded Computing - What Is Embedded Computing?
138 -- 139Richard G. Mathieu. IT Systems Perspective- Top-Down Approach to Computing
140 -- 141Sam Fuller, Tom Cox. Standards - Anatomy of a Forward-Looking Open Standard
142 -- 144W. Neville Holmes. The Profession - To See Ourselves as Others See Us