Journal: IEEE Computer

Volume 43, Issue 9

8 -- 10David Alan Grier. Finding What You Want
13 -- 16David Geer. Whatever Happened to Network-Access-Control Technology?
17 -- 20Linda Dailey Paulson. New Service Promises to Improve Online Search
21 -- 30Nancy R. Mead, Joe Jarzombek. Advancing Software Assurance with Public-Private Collaboration
31 -- 40Frederick T. Sheldon, Claire Vishik. Moving Toward Trustworthy Systems: R&D Essentials
41 -- 46Samuel T. Redwine Jr.. Fitting Software Assurance into Higher Education
47 -- 53Ann E. Kelley Sobel, Gary McGraw. Interview: Software Security in the Real World
54 -- 61Wei Tan, Jia Zhang, Ian T. Foster. Network Analysis of Scientific Workflows: A Gateway to Reuse
62 -- 67Todd Mytkowicz, Amer Diwan, Matthias Hauswirth, Peter F. Sweeney. The Effect of Omitted-Variable Bias on the Evaluation of Compiler Optimizations
74 -- 76Bob Ward. Society Honors Five Top Computing Professionals
77 -- 78Bob Ward. Call and Calendar
79 -- 81George P. Schell. IT Value: From Moore's Law to a Flat World
82 -- 85Ron Kohavi, Roger Longbotham, Toby Walker. Online Experiments: Practical Lessons
86 -- 88Kirk W. Cameron. A Tale of Two Green Lists
90 -- 92W. Neville Holmes. Seven Digital Steps to Avoid Utter Hell

Volume 43, Issue 8

6 -- 8David Alan Grier. Mental Discipline
11 -- 14Neal Leavitt. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers
15 -- 18Linda Dailey Paulson. Project Converts Arms and Hands into Input Devices
20 -- 26Jacek Izydorczyk, Michal Izydorczyk. Microprocessor Scaling: What Limits Will Hold?
27 -- 36YongHong Tian, Jaideep Srivastava, Tiejun Huang, Noshir S. Contractor. Social Multimedia Computing
37 -- 43Moonam Ko, Gorrell P. Cheek, Mohamed Shehab, Ravi S. Sandhu. Social-Networks Connect Services
45 -- 53Fei-Yue Wang, Daniel Zeng, James A. Hendler, Qingpeng Zhang, Zhuo Feng, Yanqing Gao, Hui Wang, Guanpi Lai. A Study of the Human Flesh Search Engine: Crowd-Powered Expansion of Online Knowledge
54 -- 62Henri E. Bal, Jason Maassen, Rob van Nieuwpoort, Niels Drost, Roelof Kemp, Nick Palmer, Thilo Kielmann, Frank J. Seinstra, Ceriel J. H. Jacobs. Real-World Distributed Computer with Ibis
63 -- 70Simon Portegies Zwart, Derek Groen, Tomoaki Ishiyama, Keigo Nitadori, Junichiro Makino, Cees de Laat, Steve McMillan, Kei Hiraki, Stefan Harfst, Paola Grosso. Simulating the Universe on an Intercontinental Grid
91 -- 94James Bret Michael, Eneken Tikk, Peter Wahlgren, Thomas C. Wingfield. From Chaos to Collective Defense
95 -- 97S. S. Iyengar, Supratik Mukhopadhyay, Christopher Steinmuller, Xin Li. Preventing Future Oil Spills with Software-Based Event Detection
98 -- 101Stephen T. Frezza. Computer Science: Is It Really the Scientific Foundation for Software Engineering?
102 -- 104James C. Spohrer. IBM s University Programs
106 -- 109Steve Hodges, Nicolas Villar. The Hardware Is Not a Given
110 -- 112Anthony Cleve, Tom Mens, Jean-Luc Hainaut. Data-Intensive System Evolution
114 -- 116Noel E. Sharkey, Marc Goodman, Nick Ross. The Coming Robot Crime Wave

Volume 43, Issue 7

6 -- 9David Alan Grier. The Spirit of Combination
12 -- 15Sixto Ortiz Jr.. Taking Business Intelligence to the Masses
16 -- 19Linda Dailey Paulson. New Approach Combines TV and Social Networking
20 -- 25Mari Carmen Domingo. Managing Healthcare through Social Networks
27 -- 34Brigitte Piniewski, Johan Muskens, Leonardo Estevez, Randy Carroll, Rick Cnossen. Empowering Healthcare Patients with Smart Technology
35 -- 42Jatinder R. Palta, Vincent A. Frouhar, Robert A. Zlotecki. Leveraging Pervasive Technologies to Improve Collection of Prostate Cancer Outcome Data
43 -- 50Mark Weitzel, Andy Smith, Scott de Deugd, Robert Yates. A Web 2.0 Model for Patient-Centered Health Informatics Applications
51 -- 56Eduardo Huedo, Rubén S. Montero, Ignacio Martín Llorente. Grid Architecture from a Metascheduling Perspective
57 -- 63Kenneth R. Fleischmann, William A. Wallace. Value Conflicts in Computational Modeling
76 -- 78John Carter, Karthick Rajamani. Designing Energy-Efficient Servers and Data Centers
79 -- 81Art Gowan, Han Reichgelt. Emergence of the Information Technology Discipline
82 -- 85Daniel Schall, Schahram Dustdar, M. Brian Blake. Programming Human and Software-Based Web Services
86 -- 88W. Neville Holmes. The Future of the Computing Profession

Volume 43, Issue 6

7 -- 9David Alan Grier. The Value of a Good Name
12 -- 16David Geer. Are Companies Actually Using Secure Development Life Cycles?
18 -- 21Linda Dailey Paulson. Steganography Development Offers Promise
22 -- 23Oliver Bimber. Capturing the World
24 -- 31Franz Leberl, Horst Bischof, Thomas Pock, Arnold Irschara, Stefan Kluckner. Aerial Computer Vision for a 3D Virtual Habitat
32 -- 38Dragomir Anguelov, Carole Dulong, Daniel Filip, Christian Frueh, Stéphane Lafon, Richard Lyon, Abhijit S. Ogale, Luc Vincent, Josh Weaver. Google Street View: Capturing the World at Street Level
40 -- 47Sameer Agarwal, Yasutaka Furukawa, Noah Snavely, Brian Curless, Steven M. Seitz, Richard Szeliski. Reconstructing Rome
48 -- 53Michael Goesele, Jens Ackermann, Simon Fuhrmann, Ronny Klowsky, Fabian Langguth, Patrick Mucke, Martin Ritz. Scene Reconstruction from Community Photo Collections
54 -- 60Jaak Tepandi, Ilja Tsahhirov, Stanislav Vassiljev. Wireless PKI Security and Mobile Voting
61 -- 67Anita Sarma, David F. Redmiles, André van der Hoek. Categorizing the Spectrum of Coordination Technology
72 -- 73Bob Ward. Computer Society Announces Award Winners
76 -- 78Cees G. M. Snoek, Arnold W. M. Smeulders. Visual-Concept Search Solved?
79 -- 81D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil. Adding Attributes to Role-Based Access Control
82 -- 85Lecia Jane Barker, Joanne McGrath Cohoon, Lucy Sanders. Strategy Trumps Money: Recruiting Undergraduate Women into Computing
86 -- 89Chris Harrison. Appropriated Interaction Surfaces
90 -- 92Tiziana Margaria, Bernhard Steffen. Simplicity as a Driver for Agile Innovation
94 -- 96Anne-Françoise Rutkowski, Carol S. Saunders. Growing Pains with Information Overload

Volume 43, Issue 5

0 -- 95W. Neville Holmes. The Rise and Rise of Digital Gluttony
6 -- 8David Alan Grier. The Age of Accountability
12 -- 15George Lawton. Fighting Intrusions into Wireless Networks
16 -- 19Linda Dailey Paulson. Libraries Face the Challenge of Archiving Digital Material
20 -- 26Yun Wan, Gang Peng. What s Next for Shopbots?
28 -- 33Lorcan Coyle, Mike Hinchey, Bashar Nuseibeh, José Luiz Fiadeiro. Guest Editors Introduction: Evolving Critical Systems
34 -- 40Gabor Karsai, Fabio Massacci, Leon J. Osterweil, Ina Schieferdecker. Evolving Embedded Systems
42 -- 48Tom Mens, Jeff Magee, Bernhard Rumpe. Evolving Software Architecture Descriptions of Critical Systems
49 -- 55Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen. Evolution in Relation to Risk and Trust Management
56 -- 63Bernard Cohen, Philip Boxer. Why Critical Systems Need Help to Evolve
64 -- 72William Robinson. A Roadmap for Comprehensive Requirements Modeling
77 -- 79Bob Ward. Bertrand Meyer Recieves 2010 Mills Award
82 -- 83Kirk W. Cameron. The Challenges of Energy-Proportional Computing
84 -- 86Yoshiaki Kushiki. The Future of Embedded Software: Adapting to Drastic Change
87 -- 89Vishnu Vinekar, Christopher L. Huntley. Agility versus Maturity: Is There Really a Trade-Off?
90 -- 93David De Roure. e-Science and the Web

Volume 43, Issue 4

6 -- 9David Alan Grier. Utter Chaos
13 -- 15Steven J. Vaughan-Nichols. Will HTML 5 Restandardize the Web?
16 -- 19Linda Dailey Paulson. New Technique Provides Energy Wirelessly
20 -- 28Nickolas J. G. Falkner, Raja Sooriamurthi, Zbigniew Michalewicz. Puzzle-Based Learning for Engineering and Computer Science
29 -- 34Peter Aiken, Robert M. Stanley, Juanita Billings, Luke Anderson. Using Codes of Conduct to Resolve Legal Disputes
35 -- 43Arutyun Avetisyan, Roy H. Campbell, Indranil Gupta, Michael T. Heath, Steven Y. Ko, Gregory R. Ganger, Michael A. Kozuch, David R. O Hallaron, Marcel Kunze, Thomas T. Kwan, Kevin Lai, Martha Lyons, Dejan S. Milojicic, Hing-Yan Lee, Yeng Chai Soh, Ng Kwang Ming, Jing-Yuan Luke, Han Namgoong. Open Cirrus: A Global Cloud Computing Testbed
44 -- 50Edward Walker, Walter Brisken, Jonathan Romney. To Lease or Not to Lease from Storage Clouds
51 -- 56Karthik Kumar, Yung-Hsiang Lu. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?
57 -- 65Victor R. Basili, Mikael Lindvall, Myrna Regardie, Carolyn B. Seaman, Jens Heidrich, Jürgen Münch, H. Dieter Rombach, Adam Trendowicz. Linking Software Development and Business Strategy Through Measurement
66 -- 68Bob Ward. Ken Birman Wins Kanai Award
76 -- 80Rajesh P. N. Rao. Probabilistic Analysis of an Ancient Undeciphered Script
81 -- 83Karin Breitman, Markus Endler, Rafael Pereira, Marcello Azambuja. When TV Dies, Will It Go to the Cloud?
84 -- 86Leah Buechley. Questioning Invisibility
87 -- 89James R. Vallino. Cutting Across the Disciplines
90 -- 92James Bret Michael, John F. Sarkesain, Thomas C. Wingfield, Georgios Dementis, Goncalo Nuno Baptista Sousa. Integrating Legal and Policy Factors in Cyberpreparedness
94 -- 96Kai A. Olsen. Computing a Better World

Volume 43, Issue 3

11 -- 13David Alan Grier. Someday, You Will Understand
16 -- 19David Geer. Is It Really Time for Real-Time Search?
20 -- 22Linda Dailey Paulson. Scientists Develop Camera Made of Fabric
24 -- 32Angela C. Sodan, Jacob Machina, Arash Deshmeh, Kevin Macnaughton, Bryan Esbaugh. Parallelism via Multithreaded and Multicore CPUs
34 -- 41Moshe Bach, Mark Charney, Robert Cohn, Elena Demikhovsky, Tevi Devor, Kim M. Hazelwood, Aamer Jaleel, Chi-Keung Luk, Gail Lyons, Harish Patil, Ady Tal. Analyzing Parallel Programs with Pin
42 -- 49Roger D. Chamberlain, Mark A. Franklin, Eric J. Tyson, James H. Buckley, Jeremy Buhler, Greg Galloway, Saurabh Gayen, Michael Hall, E. F. Berkley Shands, Naveen Singla. Auto-Pipe: Streaming Applications on Architecturally Diverse Systems
50 -- 58Davide Pasetto, Fabrizio Petrini, Virat Agarwal. Tools for Very Fast Regular Expression Matching
59 -- 66Sylvain Hallé, Tevfik Bultan, Graham Hughes, Muath Alkhalaf, Roger Villemaire. Runtime Verification of Web Service Interface Contracts
67 -- 71Suman Kalyan Mandal, Rabi N. Mahapatra, Praveen Bhojwani, Saraju P. Mohanty. IntellBatt: Toward a Smarter Battery
77 -- 80Bob Ward. Computer Society Names Award Recipients
81 -- 82Bob Ward. Call and Calendar
83 -- 85Kirk W. Cameron. Trading in Green IT
86 -- 89Nicholas Bowen, Jim Spohrer. Viewpoint: The Future of Computing Practice and Education
90 -- 93Wil M. P. van der Aalst, Kees M. van Hee, Jan Martijn E. M. van der Werf, Marc Verdonk. Auditing 2.0: Using Process Mining to Support Tomorrow s Auditor
94 -- 97Thomas M. Chen, Victoria Wang. Web Filtering and Censoring
98 -- 100W. Neville Holmes. The Digital Climate of English Change

Volume 43, Issue 2

7 -- 9David Alan Grier. Raising Barns
12 -- 14Neal Leavitt. Will NoSQL Databases Live Up to Their Promise?
15 -- 18Linda Dailey Paulson. Onboard Cooler Keeps Chips Comfortable
19 -- 26Awais Rashid, Thomas Cottenier, Phil Greenwood, Ruzanna Chitchyan, Regine Meunier, Roberta Coelho, Mario Südholt, Wouter Joosen. Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe
28 -- 29Ron Vetter. Authentication by Biometric Verification
36 -- 44Anil K. Jain, Jianjiang Feng, Karthik Nandakumar. Fingerprint Matching
46 -- 55Rama Chellappa, Pawan Sinha, P. Jonathon Phillips. Face Recognition by Computers and Humans
56 -- 62Marios Savvides, Karl Ricanek Jr., Damon L. Woodard, Gerry V. Dozier. Unconstrained Biometric Identification: Emerging Technologies
64 -- 71Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood. Compliance with Information Security Policies: An Empirical Investigation
79 -- 84Bob Ward. Moore Wins Karlsson Award
87 -- 89Jay Liebowitz. Strategic Intelligence, Social Networking, and Knowledge Retention
90 -- 93Patricia O Hagan, Edward Hanna, Roy Sterritt. Addressing the Corrections Crisis with Software Technology
95 -- 97Albrecht Schmidt. Ubiquitous Computing: Are We There Yet?
98 -- 100Ann Q. Gates. Discovery, Innovation, and Creativity: The Core of Computing
101 -- 104William W. Agresti. The Four Forces Shaping Cybersecurity

Volume 43, Issue 12

9 -- 10Carl K. Chang. It Has Been a Long Journey - From the Heart of a Loyal Computer Society Volunteer
14 -- 16David Alan Grier. Investing in Ignorance
19 -- 22Neal Leavitt. Payment Applications Make E-Commerce Mobile
23 -- 26Linda Dailey Paulson. Energy-Saving PCs Work while Sleeping
28 -- 35Tiejun Huang, YongHong Tian, Wen Gao, Jian Lu. Mediaprinting: Identifying Multimedia Content for Digital Rights Management
36 -- 43Chaiyakorn Yingsaeree, Giuseppe Nuti, Philip C. Treleaven. Computational Finance
45 -- 52Badrish Chandramouli, Mohamed H. Ali, Jonathan Goldstein, Beysim Sezgin, Balan Sethu Raman. Data Stream Management Systems for Computational Finance
60 -- 68Antonio Coronato, Giuseppe De Pietro. Formal Design of Ambient Intelligence Applications
86 -- 89Evan Peck, Erin Treacy Solovey, Krysta Chauncey, Angelo Sassaroli, Sergio Fantini, Robert J. K. Jacob, Audrey Girouard, Leanne M. Hirshfield. Your Brain, Your Computer, and You
90 -- 92George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller, Phillip A. Laplante, Bret Michael. A Nonlinear Perspective on Higher Education
93 -- 96Emil Vassev, Mike Hinchey. The Challenge of Developing Autonomic Systems

Volume 43, Issue 11

6 -- 8David Alan Grier. Sabotage!
11 -- 14Steven J. Vaughan-Nichols. Gigabit Wi-Fi Is on Its Way
20 -- 21Peter Pirolli, Jenny Preece, Ben Shneiderman. Cyberinfrastructure for Social Action on National Priorities
22 -- 28R. Kraut, M. L. Maher, J. Olson, T. W. Malone, Peter Pirolli, J. C. Thomas. Scientific Foundations: A Case for Technology- Mediated Social- Participation Theory
29 -- 35Ed H. Chi, S. Munson, G. Fischer, Sarah Vieweg, C. Parr. Advancing the Design of Technology-Mediated Social Participation Systems
37 -- 43G. Olson, G. Mark, E. Churchill, D. Rotman. New Missions for a Sociotechnical Infrastructure
45 -- 52B. W. Hesse, D. Hansen, Thomas A. Finholt, Sean A. Munson, W. Kellogg, J. C. Thomas. Social Participation in Health 2.0
53 -- 59John Carlo Bertot, Paul T. Jaeger, S. Munson, T. Glaisyer. Social Media Technology and Government Transparency
60 -- 67Cliff Lampe, Paul Resnick, A. Forte, Sarita Yardi, Dana Rotman, T. Marshall, W. Lutters. Educational Priorities for Technology-Mediated Social Participation
78 -- 80Bob Ward. Blue Gene Architect Gara Receives 2010 Cray Award
84 -- 87Timo Hannay. What Can the Web Do for Science?
88 -- 90Prith Banerjee, Rich Friedrich, L. Morell. Open Innovation at HP Labs
91 -- 94Karthikeyan Umapathy, Sandeep Purao. Systems Integration and Web Services
95 -- 96Kirk W. Cameron. Green with Envy
100 -- 99W. Neville Holmes. Some Social Aspects of Computers and Numbers

Volume 43, Issue 10

8 -- 10David Alan Grier. The Curious and the Confident
13 -- 15Neal Leavitt. Network-Usage Changes Push Internet Traffic to the Edge
17 -- 20Linda Dailey Paulson. How Safe Are Secure Websites?
22 -- 29Sergio L. Toral Marín, M. Rocío Martínez-Torres, Federico Barrero. Reforming ICT Graduate Programs to Meet Professional Needs
30 -- 38Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov. Ending Piracy of Integrated Circuits
39 -- 46Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, Mohammad Tehranipoor. Trustworthy Hardware: Identifying and Classifying Hardware Trojans
47 -- 55Nir Kshetri. Cloud Computing in Developing Economies
56 -- 63Juan Hamers, Lieven Eeckhout. Scenario-Based Resource Prediction for QoS-Aware Media Processing
64 -- 65Bob Ward. Society Forms New Technical Committee on Semantic Computing
77 -- 81Naren Ramakrishnan, David A. Hanauer, Benjamin J. Keller. Mining Electronic Health Records
82 -- 84Richard J. LeBlanc. What Should All CS Graduates Know?
85 -- 87Keith W. Miller, Jeffrey M. Voas, Phillip A. Laplante. In Trust We Trust
88 -- 91Manfred Broy, Ralf Reussner. Architectural Concepts in Programming Languages
92 -- 96Paul Lukowicz, Oliver Amft, Daniel Roggen, Jingyuan Cheng. On-Body Sensing: From Gesture-Based Input to Activity-Driven Interaction
100 -- 99W. Neville Holmes. The Future of the Computing Profession: Readers E-mails

Volume 43, Issue 1

9 -- 11David Alan Grier. Designing the Future
14 -- 16Sixto Ortiz Jr.. Is 3D Finally Ready for the Web?
17 -- 20Linda Dailey Paulson. New Lithography Approach Promises Powerful Chips
22 -- 27Larry Smarr. Project GreenLight: Optimizing Cyber-infrastructure for a Carbon-Constrained World
28 -- 34David Lorge Parnas. Really Rethinking Formal Methods
35 -- 41Simon Dobson, Roy Sterritt, Paddy Nixon, Mike Hinchey. Fulfilling the Vision of Autonomic Computing
42 -- 50Marco Conti, Mohan Kumar. Opportunities in Opportunistic Computing
51 -- 56Robert P. Schumaker, Hsinchun Chen. A Discrete Stock Price Prediction Engine Based on Financial News
58 -- 64Thomas F. Stafford, Robin Poston. Online Security Threats and Computer User Intentions
65 -- 69Bob Ward. Computer Society Programs Serve Members
70 -- 71Bob Ward. Call and Calendar
77 -- 80James Hendler. Web 3.0: The Dawn of Semantic Search
81 -- 85Mark Woh, Scott A. Mahlke, Trevor N. Mudge, Chaitali Chakrabarti. Mobile Supercomputers for the Next-Generation Cell Phone
86 -- 90Dirk Riehle. The Economic Case for Open Source Foundations
91 -- 93Bruce Nordman, Kenneth J. Christensen. Proxying: The Next Step in Reducing IT Energy Use
94 -- 96W. Neville Holmes. The Profession