Journal: IEEE Computer

Volume 37, Issue 9

12 -- 15George Lawton. Machine-to-Machine Technology Gears Up for Growth
16 -- 18Neal Leavitt. Scob Attack: A Sign of Bad Things to Come?
23 -- 28Thaddeus Kobylarz. Beyond 3G: Compound Wireless Services
30 -- 37Runsheng Wang, Xiaorui Hu. VoIP Development in China
38 -- 47Sarita Thakoor, John Michael Morookian, Javaan S. Chahl, Butler Hine, Steven Zornetzer. BEES: Exploring Mars with Bioinspired Technologies
48 -- 53Linda Dailey Paulson. Biomimetic Robots
55 -- 61Federico Avanzini, Davide Rocchesso, Alberto Belussi, Alessandro Dal Palù, Agostino Dovier. Designing an Urban-Scale Auditory Alert System
65 -- 72Zeljko Obrenovic, Dusan Starcevic. Modeling Multimodal Human-Computer Interactio
108 -- 111Dimitrios N. Serpanos. Speeding Up High-Speed Protocol Processors
112 -- 113Jack Cole. Raising the Bar
114 -- 116W. Neville Holmes. Rationality and Digital Technology

Volume 37, Issue 8

8 -- 10Bob Colwell. The Art of the Possible
19 -- 22David Geer. E-Micropayments Sweat the Small Stuff
24 -- 26Sixto Ortiz Jr.. 3D Searching Starts to Take Shape
28 -- 30Linda Dailey Paulson. News Briefs
32 -- 40Hans Dybkjær, Laila Dybkjær. Modeling Complex Spoken Dialog
41 -- 49David E. Culler, Deborah Estrin, Mani B. Srivastava. Guest Editors Introduction: Overview of Sensor Networks
50 -- 56Kirk Martinez, Jane K. Hart, Royan Ong. Environmental Sensor Networks
57 -- 59Sean M. Brennan, Angela M. Mielke, David C. Torney, Arthur B. Maccabe. Radiation Detection with Distributed Sensor Networks
60 -- 61Miklos Maroti, Gyula Simon, Ákos Lédeczi, Janos Sztipanovits. Shooter Localization in Urban Terrain
62 -- 70Christian C. Enz, Amre El-Hoiydi, Jean-Dominique Decotignie, Vincent Peiris. WiseNET: An Ultralow-Power Wireless Sensor Network Solution
72 -- 78Bruce Hemingway, Waylon Brunette, Tom Anderl, Gaetano Borriello. The Flock: Mote Sensors Sing in Undergraduate Curriculum
91 -- 93Kenneth J. Christensen, Bruce Nordman, Rich Brown. Power Management in Networked Devices
94 -- 96Angelos D. Keromytis. Patch on Demand Saves Even More Time?
97 -- 99Siobhán Clarke, Cormac Driver. Context-Aware Trails
100 -- 101Michael R. Macedonia. The Digital World s Midlife Crisis
102 -- 104David A. Swayne, Qusay H. Mahmoud, Wlodzimierz Dobosiewicz. An Offshore-Resistant Degree Program

Volume 37, Issue 7

8 -- 10Bob Colwell. Travel Stories
13 -- 15Linda Dailey Paulson. Open Source Databases Move into the Marketplace
20 -- 22George Lawton. Is MIMO the Future of Wireless Communications?
24 -- 26Linda Dailey Paulson. News Briefs
27 -- 34Nancy R. Mead. Who Is Liable for Insecure Systems?
36 -- 42Peder Jungck, Simon S. Y. Shim. Issues in High-Speed Internet Security
44 -- 55Doug Burger, Stephen W. Keckler, Kathryn S. McKinley, Michael Dahlin, Lizy Kurian John, Calvin Lin, Charles R. Moore, James H. Burrill, Robert G. McDonald, William Yode. Scaling to the End of Silicon with EDGE Architectures
56 -- 64Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H. C. Cheng. Composing Adaptive Software
65 -- 72Michael Kozuch, Mahadev Satyanarayanan, Thomas C. Bressoud, Casey Helfrich, Shafeeq Sinnamohideen. Seamless Mobile Computing on Fixed Infrastructure
73 -- 80Rebecca Montanari, Emil Lupu, Cesare Stefanelli. Policy-Based Dynamic Reconfiguration of Mobile-Code Applications
92 -- 94Brian Fitzgerald. A Critical Look at Open Source
95 -- 97Philip Koopman. Embedded System Security
98 -- 99W. Neville Holmes. In Defense of PowerPoint

Volume 37, Issue 6

6 -- 9Bob Colwell. Let s Hear from Those in the Back
10 -- 13Steven J. Vaughan-Nichols. Achieving Wireless Broadband with WiMax
14 -- 16David Geer. Just How Secure Are Security Products?
18 -- 20Linda Dailey Paulson. News Briefs
22 -- 29Diane M. Strong, Olga Volkoff. A Roadmap for Enterprise System Implementation
33 -- 35Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap. Guest Editors Introduction: Securing the High-Speed Internet
37 -- 46Butler W. Lampson. Computer Security in the Real World
48 -- 53Thomas M. Chen, Jean-Marc Robert. Worm Epidemics in High-Speed Networks
54 -- 60Robert Friend. Making the Gigabit IPsec VPN Architecture Secure
62 -- 67Avishai Wool. A Quantitative Study of Firewall Configuration Errors
79 -- 81Byung K. Yi, S. R. Subramanya. Enhancing Personal Communications with Multimedia
82 -- 83William A. Arbaugh. A Patch in Nine Saves Time?
84 -- 85Joshua R. Smith. Imperceptible Sensory Channels
87 -- 89Albert A. Rizzo, Todd Bowerly, Cyrus Shahabi, J. Galen Buckwalter, Dean Klimchuk, Roman Mitura. Diagnosing Attention Disorders in a Virtual Classroom
90 -- 91Kai A. Olsen. The Economics of International Conferences

Volume 37, Issue 5

15 -- 17Linda Dailey Paulson. Using MPLS to Unify Multiple Network Types
18 -- 20Steven J. Vaughan-Nichols. Wireless Middleware: Glue for the Mobile Infrastructure
26 -- 33Anthony Finkelstein, James Hetherington, Linzhong Li, Ofer Margoninski, Peter Saffrey, Rob Seymour, Anne Warner. Computational Challenges of Systems Biology
34 -- 41Eric Dishman. Inventing Wellness Systems for Aging in Place
42 -- 49Alex Pentland. Healthwear: Medical Technology Becomes Wearable
53 -- 59Atsushi Kara. Private-to-Private Communications over the Internet
60 -- 67Patrick Th. Eugster, Rachid Guerraoui, Anne-Marie Kermarrec, Laurent Massoulié. Epidemic Information Dissemination in Distributed Systems
81 -- 83Todd M. Austin, David Blaauw, Scott A. Mahlke, Trevor N. Mudge, Chaitali Chakrabarti, Wayne Wolf. Mobile Supercomputers
84 -- 86Gary Richardson, Blake Ives. Systems Development Processes
87 -- 89Wojciech Cellary, Wojciech Wiza, Krzysztof Walczak. Visualizing Web Search Results in 3D
90 -- 92W. Neville Holmes. Data and Information as Property

Volume 37, Issue 4

4 -- 0. Article Summaries
6 -- 7. Letters
9 -- 12Robert P. Colwell. Brainstorming, Influence, and Icebergs
13 -- 15George Lawton. Will Network Processor Units Live Up to Their Promise?
16 -- 18Linda Dailey Paulson. News Briefs
20 -- 27Bo Sanden. Coping with Java Threads
28 -- 33Carlo Blundo, Stelvio Cimato. A Software Infrastructure for Authenticated Web Metering
34 -- 40Santosh K. Rangarajan, Vir V. Phoha, Kiran S. Balagani, Rastko R. Selmic, S. Sitharama Iyengar. Adaptive Neural Network Clustering of Web Users
41 -- 49Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi. XML-Based Specification for Web Services Document Security
50 -- 56Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang, Yi Qin, Michael Chau. Crime Data Mining: A General Framework and Some Examples
58 -- 65Nimrod Megiddo, Dharmendra S. Modha. Outperforming LRU with an Adaptive Replacement Cache Algorithm
69 -- 70. Computer Society Connection
74 -- 75. Career Opportunities
77 -- 0. Products
78 -- 80Dipanjan Chakraborty, Hui Lei. Extending the Reach of Business Processes
81 -- 83Mark H. Overmars. Teaching Computer Science through Game Design
84 -- 86Roy Want. Enabling Ubiquitous Sensing with RFID
87 -- 89Bruce Schneier. Hacking the Business Climate for Network Security
90 -- 92Margaret L. Johnson. Biometrics and the Threat to Civil Liberties

Volume 37, Issue 3

9 -- 12Robert P. Colwell. The Zen of Overclocking
13 -- 15Steven J. Vaughan-Nichols. Voice Authentication Speaks to the Marketplace
16 -- 18Neal Leavitt. Will Interoperability Problems Give IP Telephony a Busy Signal?
19 -- 21Linda Dailey Paulson. News Briefs
22 -- 28Doug Burger, James R. Goodman. Billion-Transistor Architectures: There and Back Again
30 -- 38Peter M. Maurer. Metamorphic Programming: Unconventional High Performance
40 -- 41Robert P. Colwell. Theme Issue Introduction: We May Need a New Box
42 -- 50Naresh R. Shanbhag. Reliable and Efficient System-on-Chip Design
51 -- 56Augustus K. Uht. Going Beyond Worst-Case Specs with TEAtime
57 -- 65Todd M. Austin, David Blaauw, Trevor N. Mudge, Krisztián Flautner. Making Typical Silicon Matter with Razor
67 -- 73Shih-Lien Lu. Speeding Up Processing with Approximation Circuits
93 -- 94Gary Richardson, Blake Ives. Managing Systems Development
96 -- 98Franco Zambonelli, Michael Luck. Agent Hell: A Scenario of Worst Practices
99 -- 101Wayne Wolf. Embedded Is the New Paradigm(s)
102 -- 104W. Neville Holmes. Languages and the Computing Profession

Volume 37, Issue 2

7 -- 9Robert P. Colwell. Computer Lessons from Pop Songs
10 -- 13Steven J. Vaughan-Nichols. New Trends Revive Supercomputing Industry
14 -- 16David Geer. Will New Standards Help Curb Spam?
17 -- 19Linda Dailey Paulson. News Briefs Topics include: Researcher Develops Colorful Map of the Internet / Using Plastic to Make High-Capacity Memory / Businesses Adopt Web Site s Satirical Company Names / Researchers Develop Self-Assembling Chip Technique
21 -- 25Michael R. Blaha. A Copper Bullet for Software Quality Improvement
29 -- 31Jie Wu, Ivan Stojmenovic. Guest Editors Introduction: Ad Hoc Networks
32 -- 39Guohong Cao, Liangzhong Yin, Chita R. Das. Cooperative Cache-Based Data Access in Ad Hoc Networks
40 -- 46Jean Carle, David Simplot. Energy-Efficient Area Monitoring for Sensor Networks
48 -- 51Marco Conti, Gaia Maselli, Giovanni Turi, Silvia Giordano. Cross-Layering in Mobile Ad Hoc Network Design
52 -- 59Prasant Mohapatra, Chao Gui, Jian Li. Group Communications in Mobile Ad Hoc Networks
61 -- 65Nikola Milanovic, Miroslaw Malek, Anthony Davidson, Veljko M. Milutinovic. Routing and Security in Mobile Ad Hoc Networks
67 -- 74Li Xiao, Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Abdol-Hossein Esfahanian. Prioritized Overlay Multicast in Mobile Ad Hoc Environments
80 -- 82. Call and Calendar
84 -- 93. Career Opportunities
95 -- 97Mike Hazas, James Scott, John Krumm. Location-Aware Computing Comes of Age
98 -- 100Lydia Plowman, Rosemary Luckin. Interactivity, Interfaces, and Smart Toys
101 -- 103Peter Gutmann. Simplifying Public Key Management
104 -- 105Luminita Vasiu, Qusay H. Mahmoud. Mobile Agents in Wireless Devices
106 -- 108Qusay H. Mahmoud, Wlodzimierz Dobosiewicz, David A. Swayne. Making Computer Programming Fun and Accessible

Volume 37, Issue 12

10 -- 12Bob Colwell. Interface Quotas and Internet-Derived Value
14 -- 15Carl K. Chang. Transforming the World s Computer Society: Together, We Will Get It Done!
16 -- 19Sixto Ortiz Jr.. Internet Telephony Jumps off the Wires
20 -- 22David Geer. Digital Rights Technology Sparks Interoperability Concerns
23 -- 25Linda Dailey Paulson. News Briefs
26 -- 34Mikael Lindvall, Dirk Muthig, Aldo Dagnino, Christina Wallin, Michael Stupperich, David Kiefer, John May, Tuomo Kähkönen. Agile Software Development in Large Organizations
36 -- 43Brad A. Myers, Jeffrey Nichols, Jacob O. Wobbrock, Robert C. Miller. Taking Handheld Devices to the Next Level
47 -- 54Thorsten Prante, Norbert A. Streitz, Peter Tandler. Roomware: Computers Disappear and Interaction Evolves
56 -- 64Bill N. Schilit, Uttam Sengupta. Device Ensembles
65 -- 73Chandrasekhar Narayanaswami, Mandayam T. Raghunath. Expanding the Digital Camera s Reach
74 -- 86. 2004 Annual Index
87 -- 88. Call and Calendar
89 -- 91Doris L. Carver. Reviewers Make Vital Contributions to Computer
94 -- 0. Bookshelf
116 -- 118Upkar Varshney. Vehicular Mobile Commerce
119 -- 121Malik Audeh. Metropolitan-Scale Wi-Fi Mesh Networks
122 -- 123Michael R. Macedonia. Small is Beautifu
124 -- 125William A. Arbaugh. he Real Risk of Digital Voting?
126 -- 128Simone Santini. Determining Computing Science s Role

Volume 37, Issue 11

10 -- 12Bob Colwell. All Things Are Connected
14 -- 18Neal Leavitt. Are Web Services Finally Ready to Deliver?
20 -- 22Linda Dailey Paulson. News Briefs
23 -- 28Paul S. Rosenbloom. A New Framework for Computer Science and Engineering
29 -- 34Mike O Neal. Restructuring Computing Programs to Meet Employment Challenges
35 -- 37Krishna Kant, Prasant Mohapatra. Guest Editors Introduction: Internet Data Centers
38 -- 46Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan, David E. Lowell, Mike Wray, Tom Christian, Nigel Edwards, Chris I. Dalton, Frederic Gittler. SoftUDC: A Software-Based Data Center for Utility Computing
48 -- 58Greg J. Regnier, Srihari Makineni, Ramesh Illikkal, Ravi R. Iyer, Dave B. Minturn, Ram Huggahalli, Donald Newell, Linda S. Cline, Annie Foong. TCP Onloading for Data Center Servers
60 -- 67George Candea, Aaron B. Brown, Armando Fox, David A. Patterson. Recovery-Oriented Computing: Building Multitier Dependability
68 -- 74Ricardo Bianchini, Ramakrishnan Rajamony. Power and Energy Management for Server Systems
78 -- 0. Bookshelf
80 -- 83. Computer Society Connection
106 -- 109Vesna Hassler. Online Collaboration Products
110 -- 112Jim Hughes. IEEE Standard for Encrypted Storage
114 -- 116Wayne Wolf. Applications and Architectures
118 -- 120W. Neville Holmes. The Usefulness of Hindsight

Volume 37, Issue 10

8 -- 10Bob Colwell. Trusting a Chaotic Future
20 -- 23David Geer. Will Gesture-Recognition Technology Point the Way?
24 -- 27George Lawton. The Lowdown on High-Rise Chips
28 -- 30Linda Dailey Paulson. News Briefs
31 -- 37Cecil Chua Eng Huang, Jonathan Wareham. Fighting Internet Auction Fraud: An Assessment and Proposal
38 -- 45Brian Whitworth, Elizabeth Whitworth. Spam and the Social-Technical Gap
46 -- 54David Garlan, Shang-Wen Cheng, An-Cheng Huang, Bradley R. Schmerl, Peter Steenkiste. Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure
56 -- 63Hossein Saiedian, Srikrishnan Raguraman. Using UML-Based Rate Monotonic Analysis to Predict Schedulability
64 -- 72David Harel, Bernhard Rumpe. Meaningful Modeling: What s the Semantics of Semantics ?
73 -- 81William G. Griswold, Patricia Shanahan, Steven W. Brown, Robert T. Boyer, Matt Ratto, R. Benjamin Shapiro, Tan Minh Truong. ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing
106 -- 109Sean Smith. Magic Boxes and Boots: Security in Hardware
110 -- 111Chris Schmandt, Natalia Marmasse. User-Centered Location Awareness
112 -- 114Mike Goslin, Mark R. Mine. The Panda3D Graphics Engine
115 -- 117Muthucumaru Maheswaran, Shoukat Ali. A Taxonomy of Network Computing Systems
120 -- 0Victor J. Skowronski. Do Agile Methods Marginalize Problem Solvers?

Volume 37, Issue 1

4 -- 0. Article Summaries
6 -- 7. The Problem with AI / Defining Memory / Divisible Load-Scheduling Discovery
8 -- 9Doris L. Carver. EIC s Message: Computer in 2004
10 -- 12Carl K. Chang. President s Message: Evolving the World with the World s Computer Society
13 -- 16Robert P. Colwell. Design Fragility
17 -- 0W. Neville Holmes. January 1972 / January 1988
18 -- 20Steven J. Vaughan-Nichols. Vendors Go to Extreme Lengths for New Chips
22 -- 25George Lawton. Is Peer-to-Peer Secure Enough for Corporate Use?
26 -- 28Linda Dailey Paulson. News Briefs Topics include: E-Mail Security Gets Personal / Ceiling for Controversial US H-1B Visas Drops / Technique Speeds Data Transmission in Computers / Viewing the World through Interactive Panoramic Images
30 -- 36Jesse H. Poore. A Tale of Three Disciplines ...and a Revolution
37 -- 43John Horgan. The End of Science Revisited
47 -- 56Don Edenfeld, Andrew B. Kahng, Mike Rodgers, Yervant Zorian. 2003 Technology Roadmap for Semiconductors
59 -- 68Patrick Regan, Scott Hamilton. NASA s Mission Reliable
69 -- 77Fred Niederman. IT Employment Prospects in 2004: A Mixed Bag
78 -- 83Alex Pentland, Richard Fletcher, Amir Hasson. DakNet: Rethinking Connectivity in Developing Nations
85 -- 91Oliver Bimber. Combining Optical Holograms with Interactive Computer Graphics
100 -- 112. Career Opportunities
114 -- 0. Products
116 -- 117Thanaa M. Ghanem, Walid G. Aref. Databases Deepen the Web
118 -- 120David L. Andrews, Douglas Niehaus, Peter J. Ashenden. Programming Models for Hybrid CPU/FPGA Chips
121 -- 122Maryam Alavi. Distributed Learning Environments
124 -- 125Michael T. LoBue. Best Business Practices for Standards Groups
126 -- 128Mohan Babu. From Organization Man to Free Agent