Journal: IEEE Computer

Volume 40, Issue 9

7 -- 9David Alan Grier. Controlling the Conversation
10 -- 11W. Neville Holmes. 32 & 16 Years Ago
13 -- 16Brett Allan King, Linda Dailey Paulson. Motion Capture Moves into New Realms
17 -- 19David Geer. For Programmers, Multicore Chips Mean Multiple Challenges
20 -- 22Linda Dailey Paulson. News Briefs
23 -- 30Sean M. Pieper, JoAnn M. Paul, Michael J. Schulte. A New Era of Performance Evaluation
32 -- 33Jane Prey, Alffred C. Weaver. Guest Editors Introduction: Tablet PC Technology--The Next Generation
34 -- 41Randall Davis. Magic Paper: Sketch-Understanding Research
42 -- 48Jeremy Roschelle, Deborah G. Tatar, S. Raj Chaudhury, Yannis A. Dimitriadis, Charles Patton, Chris DiGiano. Ink, Improvisation, and Interactive Engagement: Learning with Tablets
49 -- 54James A. Pittman. Handwriting Recognition: Tablet PC Text Input
56 -- 61Richard J. Anderson, Ruth E. Anderson, Peter Davis, Natalie Linnell, Craig Prince, Valentin Razmov, Fred Videon. Classroom Presenter: Enhancing Interactive Education with Digital Ink
62 -- 68Joseph G. Tront. Facilitating Pedagogical Practices through a Large-Scale Tablet PC Deployment
96 -- 99Hugh J. Watson, Barbara Wixom. The Current State of Business Intelligence
100 -- 102François Coallier. Standards, Agility, and Engineering
103 -- 105Ron Kohavi, Roger Longbotham. Online Experiments: Lessons Learned
106 -- 108Frank Vahid. It s Time to Stop Calling Circuits Hardware
110 -- 112W. Neville Holmes. The Profession as a Culture Killer

Volume 40, Issue 8

0 -- 103Les Hatton. The Chimera of Software Quality
6 -- 9David Alan Grier. In Our Time: Annie and the Boys
10 -- 11W. Neville Holmes. 32 & 16 Years Ago
12 -- 15Steven J. Vaughan-Nichols. New Interfaces at the Touch of a Fingertip
16 -- 19Sixto Ortiz Jr.. Protecting Networks by Controlling Access
20 -- 22Linda Dailey Paulson. News Briefs
24 -- 30Jiri Soukup, Martin Soukup. The Inevitable Cycle: Graphical Tools and Programming Paradigms
34 -- 40Thorsten Joachims, Filip Radlinski. Search Engines that Learn from Implicit Feedback
42 -- 50Barry Smyth. A Community-Based Approach to Personalizing Web Search
52 -- 57Bernard J. Jansen, Amanda Spink. Sponsored Search: Is Money a Motivator for Providing Relevant Results?
58 -- 62Maryam Kamvar, Shumeet Baluja. Deciphering Trends in Mobile Search
63 -- 72Raghu Ramakrishnan, Andrew Tomkins. Toward a PeopleWeb
77 -- 79Bob Ward. Computer Society Connection
85 -- 87Raghvinder S. Sangwan, Colin J. Neill. How Business Goals Drive Architectural Design
88 -- 91Ron Ross. Managing Enterprise Security Risk with NIST Standards
92 -- 95Jeremy Epstein. Electronic Voting
96 -- 97Cristen Torrey, David W. McDonald. How-To Web Pages
98 -- 100Michael van Lent, William R. Swartout. Games: Once More, with Feeling

Volume 40, Issue 7

5 -- 7David Alan Grier. The Boundaries of Time
10 -- 13George Lawton. These Are Not Your Father s Widgets
14 -- 16Neal Leavitt. For Wireless USB, the Future Starts Now
17 -- 19Linda Dailey Paulson. News Briefs
20 -- 26Nuno Vasconcelos. From Pixels to Semantic Spaces: Advances in Content-Based Image Retrieval
28 -- 34Philip C. Treleaven, Jonathan Wells. 3D Body Scanning and Healthcare Applications
36 -- 43Doug A. Bowman, Ryan P. McMahan. Virtual Reality: How Much Immersion Is Enough?
45 -- 52Cyrus Shahabi, Tim Marsh, Kiyoung Yang, Hyunjin Yoon, Albert A. Rizzo, Margaret McLaughlin, Minyoung Mun. Immersidata Analysis: Four Case Studies
54 -- 63Shree K. Nayar, Vijay N. Anand. 3D Display Using Passive Optical Scatterers
64 -- 71Luigina Ciolfi, Mikael Fernström, Liam J. Bannon, Parag Deshpande, Paul Gallagher, Colm McGettrick, Nicola Quinn, Stephen Shirley. The Shannon Portal Installation: Interaction Design for Public Places
77 -- 80Bob Ward. Computer Society Connection
85 -- 86Bernard J. Jansen. Click Fraud
87 -- 89Anna Carlin, Frederick Gallegos. IT Audit: A Critical Business Process
90 -- 93Suman Nath, Jie Liu, Feng Zhao. SensorMap for Wide-Area Sensor Webs
94 -- 96Jeffrey M. Voas, Phillip A. Laplante. Standards Confusion and Harmonization
98 -- 100W. Neville Holmes. Consciousness and Computers

Volume 40, Issue 6

6 -- 8David Alan Grier. The Camino Real
12 -- 14Sixto Ortiz Jr.. Searching the Visual Web
15 -- 18Linda Dailey Paulson, George Lawton. News Briefs
19 -- 26Feisal Keblawi, Dick Sullivan. The Case for Flexible NIST Security Standards
27 -- 35Jane Cleland-Huang, Brian Berenbach, Stephen Clark, Raffaella Settimi, Eli Romanova. Best Practices for Automated Traceability
37 -- 47Michael Gschwind, David Erb, Sid Manning, Mark Nutter. An Open Source Environment for Cell Broadband Engine System Software
49 -- 59Nidhi Aggarwal, Parthasarathy Ranganathan, Norman P. Jouppi, James E. Smith. Isolation in Commodity Multicore Processors
60 -- 66Yu-Chee Tseng, You-Chiun Wang, Kai-Yang Cheng, Yao-Yu Hsieh. iMouse: An Integrated Mobile Surveillance and Wireless Sensor System
68 -- 74Saikat Chakrabarti 0002, Mukesh Singhal. Password-Based Authentication: Preventing Dictionary Attacks
84 -- 85Bob Ward. Computer Society Connection
90 -- 93W. Neville Holmes. Binary Arithmetic
94 -- 95Michael R. Macedonia. iPhones Target the Tech Elite
96 -- 98Tessa A. Lau. Social Scripting for the Web
100 -- 102Shawn A. Bohner. An Era of Change-Tolerant Systems
103 -- 105Laszlo Hars. Discryption: Internal Hard-Disk Encryption for Secure Storage
106 -- 108Sean M. Price. Supporting Resource-Constrained Collaboration Environments

Volume 40, Issue 5

8 -- 10David Alan Grier. Working Class Hero
14 -- 17George Lawton. Stronger Domain Name System Thwarts Root-Server Attacks
21 -- 23Linda Dailey Paulson. News Briefs
24 -- 29Les Hatton. Empirical Test Observations in Client-Server Systems
30 -- 34Alejandro Jaimes, Daniel Gatica-Perez, Nicu Sebe, Thomas S. Huang. Guest Editors Introduction: Human-Centered Computing--Toward a Human Revolution
35 -- 41Norman Alm, Richard Dye, Gary Gowans, Jim Campbell, Arlene Astell, Maggie Ellis. A Communication Support System for Older People with Dementia
42 -- 51Gutemberg Guerra-Filho, Yiannis Aloimonos. A Language for Human Action
52 -- 59Gamhewage C. de Silva, Toshihiko Yamasaki, Kiyoharu Aizawa. An Interactive Multimedia Diary for the Home
60 -- 68Mohan M. Trivedi, Shinko Y. Cheng. Holistic Sensing and Active Displays for Intelligent Driver Support Systems
70 -- 77Shinichi Yamagiwa, Leonel Sousa. Caravela: A Novel Stream-Based Distributed Computing Environment
85 -- 88Bob Ward. Computer Society Connection
94 -- 97Sheryl Burgstahler, Richard E. Ladner. Increasing the Participation of People with Disabilities in Computing Fields
98 -- 100Ben Clacy, Brian Jennings. Service Management: Driving the Future of IT
101 -- 102Kwei-Jay Lin. Building Web 2.0
103 -- 105Paul Joannou. Enterprise, Systems, and Software Engineering--The Need for Integration
106 -- 108John Iselin Woodfill, Ron Buck, Dave Jurasek, Gaile Gordon, Terrance Brown. 3D Vision: Developing an Embedded Stereo-Vision System
110 -- 112Jiming Liu. Computing as an Evolving Discipline: 10 Observations

Volume 40, Issue 4

8 -- 11David Alan Grier. The Best Deal in Town
15 -- 17Sixto Ortiz Jr.. Getting on Board the Enterprise Service Bus
18 -- 20George Lawton. The Next Big Thing in Chipmaking
21 -- 23Linda Dailey Paulson. News Briefs
25 -- 32Dirk Riehle. The Economic Motivation of Open Source Software: Stakeholder Perspectives
34 -- 41David Budgen, Michael Rigby, Pearl Brereton, Mark Turner. A Data Integration Broker for Healthcare Systems
42 -- 50Peter Aiken, M. David Allen, Burt Parker, Angela Mattia. Measuring Data Management Practice Maturity: A Community s Self-Assessment
52 -- 58Nan Zhang 0004, Wei Zhao. Privacy-Preserving Data Mining Systems
60 -- 66Jiannong Cao, Yang Zhang, Guohong Cao, Li Xie. Data Consistency for Cooperative Caching in Mobile Environments
68 -- 75Joe Gebis, David A. Patterson. Embracing and Extending 20th-Century Instruction Set Architectures
76 -- 81Albrecht Mayer, Harry Siebert, Klaus D. McDonald-Maier. Boosting Debugging Support for Complex Systems on Chip
89 -- 91Bob Ward. Computer Society Connection
99 -- 101Michael van Lent. Game Smarts
102 -- 104Donald Rich. Authentication in Transient Storage Device Attachments
105 -- 107John Krumm, Eric Horvitz. Predestination: Where Do You Want to Go Today?
108 -- 110David G. Leeper. Wi-Fi - The Nimble Musician in Your Laptop
111 -- 113Michael G. Hinchey, Roy Sterritt, Christopher A. Rouff. Swarms and Swarm Intelligence
114 -- 116Nicholas Harkiolakis. Incorporating a Variable-Expertise-Level System in IT Course Modules

Volume 40, Issue 3

8 -- 10David Alan Grier. Outposts
13 -- 15Cameron Laird. Taking a Hard-Line Approach to Encryption
16 -- 19Neal Leavitt. Vendors Fight Spam s Sudden Rise
20 -- 22Linda Dailey Paulson. News Briefs
23 -- 27Duncan A. Buell, Tarek A. El-Ghazawi, Kris Gaj, Volodymyr V. Kindratenko. Guest Editors Introduction: High-Performance Reconfigurable Computing
28 -- 37Justin L. Tripp, Maya Gokhale, Kristopher D. Peterson. Trident: From High-Level Language to Hardware Circuitry
39 -- 49Nicholas Moore, Albert Conti, Miriam Leeser, Laurie A. Smith King. Vforce: An Extensible Framework for Reconfigurable Supercomputing
50 -- 57Martin C. Herbordt, Tom Van Court, Yongfeng Gu, Bharat Sukhwani, Al Conti, Josh Model, Douglas DiSabello. Achieving High Performance with FPGA-Based Computing
58 -- 64Gerald R. Morris, Viktor K. Prasanna. Sparse Matrix Computations on Reconfigurable Hardware
66 -- 73Sadaf R. Alam, Pratul K. Agarwal, Melissa C. Smith, Jeffrey S. Vetter, David Caliga. Using FPGA Devices to Accelerate Biomolecular Simulations
77 -- 79Bob Ward. Computer Society Connection
90 -- 92Janos Sztipanovits, John Bay, Larry Rohrbough, Shankar Sastry, Douglas C. Schmidt, Norm Whitaker, Don Wilson, Don Winter. Escher: A New Technology Transitioning Model
93 -- 95Christoph Bussler. The Fractal Nature of Web Services
96 -- 97Don Hardaway. Replacing Proprietary Software on the Desktop
98 -- 100W. Neville Holmes. Digital Technology and the Skills Shortage

Volume 40, Issue 2

6 -- 8David Alan Grier. Dirty Electricity
12 -- 15Linda Dailey Paulson. Developers Shift to Dynamic Programming Languages
16 -- 19George Lawton. Powering Down the Computing Infrastructure
20 -- 22Linda Dailey Paulson. News Briefs
24 -- 30André N. Klingsheim, Vebjørn Moen, Kjell Jørgen Hole. Challenges in Securing Networked J2ME Applications
31 -- 36David Schuff, Ozgur Turetken, John D Arcy, David Croson. Managing E-Mail Overload: Solutions and Future Challenges
38 -- 44Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar. Cryptography on a Speck of Dust
45 -- 53Huaizhi Li, Mukesh Singhal. Trust Management in Distributed Systems
54 -- 58Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Venkatesh Srinivasan, Lokesh Bhatia. Marking Technique to Isolate Boundary Router and Attacker
59 -- 63Min Tian, Andreas Gramm, Hartmut Ritter, Jochen H. Schiller, Thiemo Voigt. Adaptive QoS for Mobile Web Services through Cross-Layer Communication
64 -- 69Les Hatton. How Accurately Do Engineers Predict Software Maintenance Tasks?
89 -- 92Katie A. Siek, Kay Connelly, Suzanne Menzel, Laura Hopkins. Propagating Diversity through Active Dissemination
93 -- 95Daniel Peek, Jason Flinn. Consumer Electronics Meets Distributed Storage
96 -- 100David P. Luebke, Greg Humphreys. How GPUs Work
101 -- 103Michael R. Macedonia. The Future Arrives ... Finally
104 -- 106Mahesh V. Tripunitara, Thomas S. Messerges. Resolving the Micropayment Problem
107 -- 109Michael Grottke, Kishor S. Trivedi. Fighting Bugs: Remove, Retry, Replicate, and Rejuvenate
110 -- 112Raghavendra Rao Loka. Software Development: What Is the Problem?

Volume 40, Issue 12

6 -- 7Michael R. Williams. An Interesting Year
8 -- 10David Alan Grier. A Force of Nature
13 -- 16Neal Leavitt. The Changing World of Outsourcing
20 -- 22Linda Dailey Paulson. News Briefs
24 -- 32Yolanda Gil, Ewa Deelman, Mark H. Ellisman, Thomas Fahringer, Geoffrey Fox, Dennis Gannon, Carole A. Goble, Miron Livny, Luc Moreau, Jim Myers. Examining the Challenges of Scientific Workflows
33 -- 37Luiz André Barroso, Urs Hölzle. The Case for Energy-Proportional Computing
39 -- 48Suzanne Rivoire, Mehul A. Shah, Parthasarathy Ranganathan, Christos Kozyrakis, Justin Meza. Models and Metrics to Enable Energy-Efficiency Optimizations
50 -- 55Wu-chun Feng, Kirk W. Cameron. The Green500 List: Encouraging Sustainable Supercomputing
56 -- 61John Y. Oliver, Rajeevan Amirtharajah, Venkatesh Akella, Roland Geyer, Frederic T. Chong. Life Cycle Aware Computing: Reusing Silicon Technology
62 -- 63Bob Ward. Land Voted 2008 Computer Society President-Elect
64 -- 65Carl K. Chang. Computer Recognizes Expert Reviewers
103 -- 105Allen Stone. Natural-Language Processing for Intrusion Detection
106 -- 110Jeff Brown, Bill Shipman, Ron Vetter. SMS: The Short Message Service
111 -- 113Gerard J. Holzmann. Conquering Complexity
114 -- 117S. R. Subramanya, Byung K. Yi. Enhancing the User Experience in Mobile Phones
118 -- 120Luc Vincent. Taking Online Maps Down to Street Level
122 -- 124Simone Santini. Making Computers Do More with Less

Volume 40, Issue 11

8 -- 10David Alan Grier. Counting Beans
14 -- 17David Geer. Improving Data Accessibility with File Area Networks
18 -- 21Sixto Ortiz Jr.. 4G Wireless Begins to Take Shape
22 -- 24Linda Dailey Paulson. News Briefs
25 -- 31Maksym Petrenko, Denys Poshyvanyk, Václav Rajlich, Joseph Buchta. Teaching Software Evolution in Open Source
33 -- 37Tiziana Margaria. Service Is in the Eyes of the Beholder
38 -- 45Mike P. Papazoglou, Paolo Traverso, Schahram Dustdar, Frank Leymann. Service-Oriented Computing: State of the Art and Research Challenges
46 -- 50Thomas Magedanz, Niklas Blum, Simon Dutkowski. Evolution of SOA Concepts in Telecommunications
51 -- 56Jan Bosch, Stefan Friedrichs, Stefan Jung, Johannes Helbig, Alexander Scherdin. Service Orientation in the Enterprise
57 -- 63Matthias Kaiser. Toward the Realization of Policy-Oriented Enterprise Management
64 -- 73Bernhard Steffen, Prakash Narayan. Full Life-Cycle Support for End-to-End Processes
74 -- 80Francisco Curbera. Component Contracts in Service-Oriented Architectures
81 -- 85Bob Ward. Computer Society Connection
104 -- 105Wayne Wolf. The Good News and the Bad News
109 -- 111Martyn Thomas. Unsafe Standardization
113 -- 115Alexander Mikroyannidis. Toward a Social Semantic Web
117 -- 119Mary Ann Davidson, Elad Yoran. Enterprise Security for Web 2.0
122 -- 124Noel E. Sharkey. Automated Killers and the Computing Profession

Volume 40, Issue 10

8 -- 10David Alan Grier. E-Mailing from Armenia
13 -- 16George Lawton. Web 2.0 Creates Security Challenges
17 -- 20Linda Dailey Paulson. News Briefs
21 -- 28Hanna Oktaba, Félix García, Mario Piattini, Francisco Ruiz, Francisco J. Pino, Claudia Alquicira. Software Process Improvement: The Competisoft Project
29 -- 31Wayne Wolf. Guest Editor s Introduction: The Embedded Systems Landscape
32 -- 40Thomas A. Henzinger, Joseph Sifakis. The Discipline of Embedded Systems Design
42 -- 51Alberto L. Sangiovanni-Vincentelli, Marco Di Natale. Embedded System Design for Automotive Applications
53 -- 61Deepu Talla, Jeremiah Golston. Using DaVinci Technology for Digital Video Devices
62 -- 69Ulrich Ramacher. Software-Defined Radio Prospects for Multistandard Mobile Phones
73 -- 75Bob Ward. Computer Society Connection
89 -- 91Jianming Yong, Elisa Bertino. Replacing Lost or Stolen E-Passports
92 -- 95John Knight. The Glass Cockpit
96 -- 98William G. Griswold. Five Enablers for Mobile 2.0
99 -- 101Michael R. Macedonia. Generation 3D: Living in Virtual Worlds
102 -- 104Marco A. Casanova, Karin Koogan Breitman, Daniela F. Brauner, André L. A. Marins. Database Conceptual Schema Matching
106 -- 108Michiel van Genuchten, Douglas R. Vogel. Getting Real in the Classroom

Volume 40, Issue 1

7 -- 8Carl K. Chang. My Vision for Computer
9 -- 11Michael R. Williams. A Year of Decision
12 -- 14David Alan Grier. The Wave of the Future
17 -- 21Sixto Ortiz Jr.. Brain-Computer Interfaces: Where Human and Machine Meet
22 -- 24Linda Dailey Paulson. News Briefs
25 -- 33R. Iris Bahar, Dan W. Hammerstrom, Justin E. Harlow III, William H. Joyner Jr., Clifford Lau, Diana Marculescu, Alex Orailoglu, Massoud Pedram. Architectures for Silicon Nanoelectronics and Beyond
34 -- 39José Luiz Fiadeiro. Designing for Software s Social Complexity
40 -- 44Manoj Parameswaran, Xia Zhao, Andrew B. Whinston, Fang Fang. Reengineering the Internet for Better Security
46 -- 53Gregory Dudek, Philippe Giguère, Chris Prahacs, Shane Saunderson, Junaed Sattar, Luz Abril Torres-Méndez, Michael Jenkin, Andrew German, Andrew Hogue, Arlene Ripsman, James E. Zacher, Evangelos E. Milios, Hui Liu, Pifu Zhang, Martin Buehler, Christina Georgiades. AQUA: An Amphibious Autonomous Robot
54 -- 60Tim Menzies, David Owen, Julian Richardson. The Strangest Thing About Software
62 -- 70George Cybenko, Vincent H. Berk. Process Query Systems
71 -- 77James C. Spohrer, Paul P. Maglio, John Bailey, Daniel Gruhl. Steps Toward a Science of Service Systems
84 -- 93Bob Ward. Computer Society Connection
104 -- 105Vinton G. Cerf. An Information Avalanche
106 -- 108Michiel van Genuchten. The Impact of Software Growth on the Electronics Industry
110 -- 112Priya Narasimhan. Fault-Tolerant CORBA: From Specification to Reality
114 -- 116W. Neville Holmes. The Computing Profession and Higher Education