Journal: IEEE Computer

Volume 42, Issue 9

8 -- 11David Alan Grier. Data of the Night
15 -- 17George Lawton. Routing Faces Dramatic Changes
18 -- 21Linda Dailey Paulson. HP Announces Breakthrough in Affordable, Flexible Displays
22 -- 28Simon Moncrieff, Svetha Venkatesh, Geoff A. W. West. Dynamic Privacy in Public Surveillance
30 -- 36Jean-Raymond Abrial. Faultless Systems: Yes We Can!
37 -- 45Sue Black, Paul Boca, Jonathan P. Bowen, Jason Gorman, Mike Hinchey. Formal Versus Agile: Survival of the Fittest
46 -- 55Bertrand Meyer, Arno Fiva, Ilinca Ciupa, Andreas Leitner, Yi Wei, Emmanuel Stapf. Programs That Test Themselves
56 -- 63Daniel E. Cooke, J. Nelson Rushton. Taking Parnas s Principles to the Next Level: Declarative Language Design
64 -- 72Bashar Nuseibeh, Charles B. Haley, Craig Foster. Securing the Skies: In Requirements We Trust
73 -- 80Bob Ward. IEEE Computer Society Election
81 -- 82Bob Ward. Call and Calendar
88 -- 89Sumi Helal. University-Industry Synergy: An Eclectic Dialog for Revised Relationships
90 -- 92Vishnu S. Pendyala, Simon S. Y. Shim. The Web as the Ubiquitous Computer
93 -- 95Sandeep K. Shukla. Model-Driven Engineering and Safety-Critical Embedded Software
96 -- 98Doug Vogel, Michiel van Genuchten, Carol Saunders. IS Innovation: Thinking Beyond the Silo
99 -- 101Krishna Kant. Toward a Science of Power Management
102 -- 104W. Neville Holmes. Music, Sociality, and Digital Technology

Volume 42, Issue 8

8 -- 10David Alan Grier. Welcome to the Family
13 -- 15Steven J. Vaughan-Nichols. Game-Console Makers Battle over Motion-Sensitive Controllers
16 -- 18Linda Dailey Paulson. Caching Scheme Could Boost Developing World s Internet Access
20 -- 27Charles Rich. Building Task-Based User Interfaces with ANSI/CEA-2018
30 -- 37Yehuda Koren, Robert M. Bell, Chris Volinsky. Matrix Factorization Techniques for Recommender Systems
38 -- 45Andreas Krause, Carlos Guestrin. Optimizing Sensing: From Water to the Web
46 -- 54Ross D. King, Jem J. Rowland, Wayne Aubrey, Maria Liakata, Magdalena Markham, Larisa N. Soldatova, Ken E. Whelan, Amanda Clare, Mike Young, Andrew Sparkes, Stephen G. Oliver, Pinar Pir. The Robot Scientist Adam
55 -- 62Tao Xie, Suresh Thummalapenta, David Lo, Chao Liu 0001. Data Mining for Software Engineering
64 -- 74John Lach, Vinu Vijay Kumar. Application-Specific Product Generics
85 -- 89Bob Ward. Benjamin Wah Wins 2008 Kanai Award
90 -- 92Bob Ward. Call and Calendar
94 -- 96Rick Kuhn, Raghu Kacker, Yu Lei, Justin Hunter. Combinatorial Software Testing
97 -- 101Naren Ramakrishnan, Debprakash Patnaik, Vandana Sreedharan. Temporal Process Discovery in Many Guises
102 -- 104Sorel Reisman. Using Learning Objects to Affect Educational Outcomes
106 -- 108John Viega. Cloud Computing and the Common Man
109 -- 111Maurice Chu. Natural and Implicit Interaction Systems
113 -- 116Noel E. Sharkey. The Robot Arm of the Law Grows Longer

Volume 42, Issue 7

7 -- 9David Alan Grier. The Character of Play
13 -- 15Sixto Ortiz Jr.. IEEE 802.11n: The Road Ahead
16 -- 19Linda Dailey Paulson. Software-Based Networking Approach Could Help Internet Research
20 -- 24Carl K. Chang. Reversing the Bipolar Drift
26 -- 32Muhammad Ali Babar, Ian Gorton. Software Architecture Review: The State of Practice
33 -- 34Oliver Bimber. Visual Effects and Beyond
35 -- 41Doug Roble, Nafees Bin Zafar. Don t Trust Your Eyes: Cutting-Edge Visual Effects
42 -- 47Graham A. Thomas, Oliver Grau. Virtual Graphics for Broadcast Production
48 -- 56Xubo Yang, Milo Yip, Xiaoyue Xu. Visual Effects in Computer Games
57 -- 62Scott Trowbridge, Christopher B. Stapleton. Melting the Boundaries Between Fantasy and Reality
63 -- 72Brian Whitworth, Tong Liu. Channel E-mail: A Sociotechnical Response to Spam
81 -- 84Bob Ward. Computer Society Presents Technical Awards
85 -- 0Bob Ward. Call and Calendar
91 -- 93Amip Shah, Tom Christian, Chandrakant D. Patel, Cullen Bash, Ratnesh K. Sharma. Assessing ICT s Environmental Impact
94 -- 97Henry E. Schaffer, Samuel F. Averitt, Marc I. Hoit, Aaron Peeler, Eric D. Sills, Mladen A. Vouk. NCSU s Virtual Computing Lab: A Cloud Computing Solution
98 -- 100W. Neville Holmes. Agility and Respect

Volume 42, Issue 6

9 -- 12David Alan Grier. Marking the Fall of Sparrows
15 -- 18David Geer. The Future of Mobile VoIP in the Enterprise
19 -- 22George Lawton. On the Trail of the Conficker Worm
23 -- 25Linda Dailey Paulson. Materials Breakthrough Could Eliminate Bootups
27 -- 33Rolf Oppliger, Ruedi Rytz, Thomas Holderegger. Internet Banking: Client-Side Attacks and Protection Mechanisms
34 -- 41Awais Rashid, John Weckert, Richard Lucas. Software Engineering Ethics in a Digital World
42 -- 49Amela Karahasanovic, Petter Bae Brandtzæg, Jeroen Vanattenhoven, Bram Lievens, Karen Torben Nielsen, Jo Pierson. Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications
50 -- 56Wolter Pieters, André van Cleeff. The Precautionary Principle in a World of Digital Dependencies
58 -- 65Tetsuo Tamai. Social Impact of Information System Failures
66 -- 73Donald Gotterbarn, Keith W. Miller. The Public is the Priority: Making Decisions Using the Software Engineering Code of Ethics
78 -- 79Bob Ward. IEEE Foundation Gives Away More Than 300, 000
80 -- 81Bob Ward. Call and Calendar
86 -- 89Sunny Consolvo, James A. Landay, David W. McDonald. Designing for Behavior Change in Everyday Life
90 -- 93Emil Vassev, Mike Hinchey. ASSL: A Software Engineering Approach to Autonomic Computing
94 -- 97Alexander Yates. Extracting World Knowledge from the Web
98 -- 100Jungwoo Ryoo, Phillip A. Laplante, Rick Kazman. In Search of Architectural Patterns for Software Security
101 -- 104Atanas Radenski. Expanding Computing as an Academic Service Discipline

Volume 42, Issue 5

6 -- 8David Alan Grier. The Dictator and the Web Design
11 -- 13Steven J. Vaughan-Nichols. Vendors Draw up a New Graphics-Hardware Approach
14 -- 17George Lawton. The Changing Face of Open Source
18 -- 21Linda Dailey Paulson. The Changing World of Outsourcing
23 -- 29Nathanael Paul, Andrew S. Tanenbaum. Trustworthy Voting: From Machine to System
30 -- 32Piotr Pacyna, Anthony M. Rutkowski, Amardeo Sarma, Kenji Takahashi. Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems
33 -- 40David W. Chadwick, George Inman. Attribute Aggregation in Federated Identity Management
42 -- 49Paul Madsen, Hiroki Itoh. Challenges to Supporting Federated Assurance
50 -- 57Federica Paci, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino. An Interoperable Approach to Multifactor Identity Verification
58 -- 65Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Joao Girão. A SWIFT Take on Identity Management
66 -- 73Manuel Barranco, Julian Proenza, Luís Almeida. Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate
79 -- 83Bob Ward. Computer Society Connection
87 -- 89Kirk W. Cameron. The Road to Greener IT Pastures
90 -- 94Ken Birman, Jared Cantwell, Daniel Freedman, Qi Huang, Petko Nikolov, Krzysztof Ostrowski. Edge Mashups for Service-Oriented Collaboration
95 -- 97Ali El Kateeb. Hardware Reconfiguration Capability for Third-Generation Sensor Nodes
98 -- 101Bernard J. Jansen, Theresa Flaherty, Ricardo A. Baeza-Yates, Lee Hunter, Brendan Kitts, Jamie Murphy. The Components and Impact of Sponsored Search
102 -- 104W. Neville Holmes. The Design of Government

Volume 42, Issue 4

4 -- 5Bob Ward. Elsewhere in the CS
10 -- 13David Alan Grier. Top of the News
17 -- 20Neal Leavitt. Complex-Event Processing Poised for Growth
21 -- 23Sixto Ortiz Jr.. Securing the Internet s Routing Infrastructure
24 -- 27Linda Dailey Paulson. Technique Makes Strong Encryption Easier to Use
28 -- 34Seong Oun Hwang. How Viable Is Digital Rights Management?
35 -- 41Edward Walker. The Real Cost of a CPU Hour
42 -- 52Christof Ebert, Capers Jones. Embedded Software: Facts, Figures, and Future
53 -- 59Hesham Shokry, Mike Hinchey. Model-Based Verification of Embedded Software
60 -- 67Gregory Chockler, Rachid Guerraoui, Idit Keidar, Marko Vukolic. Reliable Distributed Storage
68 -- 76Alejandro Figueroa, Günter Neumann, John Atkinson. Searching for Definitional Answers on the Web Using Surface Patterns
87 -- 92Bob Ward. CRA Survey Counts New PhDs
93 -- 94Bob Ward. Call and Calendar
95 -- 98Josh Bongard. Biologically Inspired Computing
100 -- 102Rajesh Krishna Balan, Narayan Ramasubbu. The Digital Wallet: Opportunities and Prototypes
103 -- 105Michael Zyda, Marc Spraragen, Balakrishnan Ranganathan. Testing Behavioral Models with an Online Game
106 -- 108Jim Buckley. Requirements-Based Visualization Tools for Software Maintenance and Evolution
110 -- 113Peggy Israel Doerschuk, Jiangjiang Liu, Judith Mann. Increasing Participation of Females and Underrepresented Minorities in Computing
114 -- 116Kai A. Olsen. In-House Programming Is Not Passe: Automating Originality

Volume 42, Issue 3

8 -- 10David Alan Grier. Virtual Walls
13 -- 16George Lawton. WDM-PONs Hold Promise for the Long Haul
17 -- 20David Geer. Networks on Processors Improve On-Chip Communications
21 -- 24Linda Dailey Paulson. News Briefs
26 -- 29Behrooz Parhami. Puzzling Problems in Computer Engineering
30 -- 32Gary Marchionini, Ryen W. White. Information-Seeking Support Systems [Guest Editors Introduction]
33 -- 40Peter Pirolli. Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales
42 -- 46Ed H. Chi. Information Seeking Can Be Social
47 -- 51Gene Golovchinsky, Pernilla Qvarfordt, Jeremy Pickens. Collaborative Information Seeking
52 -- 59m. c. schraefel. Building Knowledge: What s beyond Keyword Search?
60 -- 66Diane Kelly, Susan T. Dumais, Jan O. Pedersen. Evaluation Challenges and Directions for Information-Seeking Support Systems
67 -- 68Daniel M. Russell. Industry-Academic Relationships
84 -- 87Denis L. Baggi, Goffredo Haus. IEEE 1599: Music Encoding and Interaction
88 -- 89Wayne Wolf. Cyber-physical Systems
90 -- 91Itamar Arel, Scott Livingston. Beyond the Turing Test
92 -- 94Rajan Samtani. Ongoing Innovation in Digital Watermarking
95 -- 97Klaus-Dieter Lange. Identifying Shades of Green: The SPECpower Benchmarks
98 -- 100W. Neville Holmes. The Automation of Originality

Volume 42, Issue 2

8 -- 11David Alan Grier. Scanning the Horizon
14 -- 17Steven J. Vaughan-Nichols. Will Mobile Computing s Future Be Location, Location, Location?
19 -- 22George Lawton. Users Take a Close Look at Visual Analytics
23 -- 26Linda Dailey Paulson. W3C Adopts Web-Accessibility Specifications
27 -- 34Andrew S. Grimshaw, Mark M. Morgan, Duane Merrill, Hiro Kishimoto, Andreas Savva, David Snelling, Chris Smith, Dave Berry. An Open Grid Services Architecture Primer
36 -- 42Carlos E. Caicedo, James B. D. Joshi, Summit R. Tuladhar. IPv6 Security Challenges
44 -- 52Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee. Dynamic Trust Management
54 -- 61Halvard Skogsrud, Hamid R. Motahari Nezhad, Boualem Benatallah, Fabio Casati. Modeling Trust Negotiation for Web Services
62 -- 71. Refactoring for Data Locality
72 -- 81Veronica Liesaputra, Ian H. Witten, David Bainbridge. Creating and Reading Realistic Electronic Books
97 -- 99Matt Adcock, Jaewoo Chung, Chris Schmandt. Are We There Yet? User-Centered Temporal Awareness
100 -- 102Dong-hyun Lee, Keun Lee, Sooyong Park, Mike Hinchey. A Survival Kit: Adaptive Hardware/Software Codesign Life-Cycle Model
103 -- 105Chris Swain. Who Needs a Publisher ... or a Retailer or a Marketer?
106 -- 108Abbe Mowshowitz, Nanda Kumar. And Then There Were Three

Volume 42, Issue 11

8 -- 11David Alan Grier. Bad Alignment
9 -- 11Susan K. Land. Implementing Organizational Strategies: Progress Made in 2009
12 -- 15David Alan Grier. Honor Among Thieves
15 -- 18Neal Leavitt. Anonymization Technology Takes a High Profile
19 -- 22Steven J. Vaughan-Nichols. Augmented Reality: No Longer a Novelty?
20 -- 23Linda Dailey Paulson. System Takes New Approach to Speech Search
23 -- 25Linda Dailey Paulson. Programming Language Enables Creative Visualization
24 -- 26Adolfy Hoisie, Vladimir Getov. Extreme-Scale Computing
26 -- 27Wu-chun Feng, Pavan Balaji. Tools and Environments for Multicore and Many-Core Architectures
28 -- 35Josep Torrellas. Architectures for Extreme-Scale Computing
28 -- 34Scott Schneider, Jae-Seung Yeom, Dimitrios S. Nikolopoulos. Programming Multiprocessors with Explicitly Managed Memory Hierarchies
36 -- 40Yuichiro Ajima, Shinji Sumimoto, Toshiyuki Shimizu. Tofu: A 6D Mesh/Torus Interconnect for Exascale Computers
36 -- 42Chirag Dave, Hansang Bae, Seung-Jai Min, Seyong Lee, Rudolf Eigenmann, Samuel P. Midkiff. Cetus: A Source-to-Source Compiler Infrastructure for Multicores
42 -- 49Kevin J. Barker, Kei Davis, Adolfy Hoisie, Darren J. Kerbyson, Michael Lang 0003, Scott Pakin, José Carlos Sancho. Using Performance Modeling to Design Large-Scale Systems
44 -- 50Nathan R. Tallent, John M. Mellor-Crummey. Identifying Performance Bottlenecks in Work-Stealing Computations
50 -- 60Michael Wilde, Ian T. Foster, Kamil Iskra, Peter H. Beckman, Zhao Zhang, Allan Espinosa, Mihael Hategan, Ben Clifford, Ioan Raicu. Parallel Scripting for Applications at the Petascale and Beyond
52 -- 60Terence Kelly, Yin Wang, Stéphane Lafortune, Scott A. Mahlke. Eliminating Concurrency Bugs with Control Engineering
61 -- 68Sergio L. Toral Marín, Manuel Vargas, Federico Barrero. Embedded Multimedia Processors for Road-Traffic Parameter Estimation
62 -- 71David Donofrio, Leonid Oliker, John Shalf, Michael F. Wehner, Chris Rowen, Jens Krueger, Shoaib Kamil, Marghoob Mohiyuddin. Energy-Efficient Computing for Extreme-Scale Science
69 -- 70Bob Ward. Reisman Voted 2010 Computer Society President-Elect
71 -- 73Bob Ward. Miura Wins Cray Award
72 -- 79Munindar P. Singh, Amit K. Chopra, Nirmit Desai. Commitment-Based Service-Oriented Architecture
83 -- 86Andrea Apolloni, V. S. Anil Kumar, Madhav V. Marathe, Samarth Swarup. Computational Epidemiology in a Connected World
87 -- 89Bob Ward. Society Supports Software Engineering PE Examination
87 -- 89Yang Li. Beyond Pinch and Flick: Enriching Mobile Gesture Interaction
91 -- 93Alexander J. Beecroft, James Bret Michael. Passive Fingerprinting of Network Reconnaissance Tools
93 -- 95Shel Finkelstein. Managing Interns
94 -- 96Gregory W. Hislop. The Inevitability of Teaching Online
98 -- 101Manfred Broy, Mario Gleirscher, Stefano Merenda, Doris Wild, Peter Kluge, Wolfgang Krenzer. Toward a Holistic and Standardized Automotive Architecture Description
99 -- 101Kirk W. Cameron. My IT Carbon Footprint
102 -- 104Harry L. Reif, Richard G. Mathieu. Global Trends in Computing Accreditation
102 -- 104Simone Santini. Simplifying Humans
106 -- 108W. Neville Holmes. Truth and Breadth, Clarity and Depth in Algebra

Volume 42, Issue 10

8 -- 11David Alan Grier. The Marketplace of Ideas
15 -- 17David Geer. The OS Faces a Brave New World
22 -- 27Gordon S. Blair, Nelly Bencomo, Robert B. France. Models@ run.time
28 -- 36Shahar Maoz. Using Model-Based Traces as Runtime Models
37 -- 43Carlos Cetina, Pau Giner, Joan Fons, Vicente Pelechano. Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes
44 -- 51Brice Morin, Olivier Barais, Jean-Marc Jézéquel, Franck Fleurey, Arnor Solberg. Models@ Run.time to Support Dynamic Adaptation
52 -- 60John C. Georgas, André van der Hoek, Richard N. Taylor. Using Architectural Models to Manage and Visualize Runtime Adaptation
61 -- 68Tony Gjerlufsen, Mads Ingstrup, Jesper Wolff, Olsen Olsen. Mirrors of Meaning: Supporting Inspectable Runtime Models
70 -- 76Kenneth Hoste, Lieven Eeckhout. A Methodology for Analyzing Commercial Processor Performance Numbers
78 -- 86Ahmed Abbasi, Hsinchun Chen. A Comparison of Tools for Detecting Fake Websites
93 -- 95Bob Ward. Computer Society Awards Recognize Excellence
96 -- 0Bob Ward. Call and Calendar
97 -- 99Yaw Anokwa, Carl Hartung, Waylon Brunette, Gaetano Borriello, Adam Lerer. Open Source Data Collection in the Developing World
100 -- 102Peter B. Henderson. Ubiquitous Computational Thinking
103 -- 105Nikolaos Petrakos, George W. Dinolt, James Bret Michael, Pantelimon Stanica. Cube-Type Algebraic Attacks on Wireless Encryption Protocols
106 -- 109Tiziana Margaria, Bernhard Steffen. Continuous Model-Driven Engineering
110 -- 112Luis Fernández Sanz. Personal Skills for Computing Professionals

Volume 42, Issue 1

6 -- 8Susan K. Land. A Leadership Challenge in 2009
9 -- 12David Alan Grier. Politics in Play
15 -- 20Neal Leavitt. Is Cloud Computing Really Ready for Prime Time?
21 -- 24Linda Dailey Paulson. Start-up Unveils Flexible Supercomputing Approach
26 -- 34Richard T. Kouzes, Gordon A. Anderson, Stephen T. Elbert, Ian Gorton, Deborah K. Gracio. The Changing Paradigm of Data-Intensive Computing
36 -- 46Ian Bird, Bob Jones, Kerk F. Kee. The Organization and Management of Grid Infrastructures
47 -- 56Naren Ramakrishnan, Upinder S. Bhalla, John J. Tyson. Computing with Proteins
58 -- 65Mark A. Hanson, Harry C. Powell Jr., Adam T. Barth, Kyle Ringgenberg, Benton H. Calhoun, James H. Aylor, John Lach. Body Area Sensor Networks: Challenges and Opportunities
66 -- 73Amar Gupta. The 24-Hour Knowledge Factory: Can It Replace the Graveyard Shift?
74 -- 80Brian Berenbach, Manfred Broy. Professional and Ethical Dilemmas in Software Engineering
101 -- 103Kirk W. Cameron. Green Introspection
104 -- 107Eyhab Al-Masri, Qusay H. Mahmoud. Web Service Discovery and Client Goals
108 -- 110Perry Alexander. Rosetta: Standardization at the System Level
111 -- 113Jim Hendler. Web 3.0 Emerging
114 -- 116W. Neville Holmes. The Credit Crunch and the Digital Bite