Journal: IEEE Computer

Volume 45, Issue 9

6 -- 8Charles Severance. Bertrand Meyer: Software Engineering and the Eiffel Programming Language
9 -- 11Brian M. Gaff, Brian P. Murphy, Ralph A. Loren, Christine A. Dudzik, Lisa Swiszcz. Patent Reform: New Tools for Challenging Patent Validity as of September 2012
15 -- 18Neal Leavitt. Are Mobile Payments Ready to Cash in Yet?
22 -- 23Kaushik R. Chowdhury, Dave Cavalcanti, Mostafa El-Said, Tommaso Mazza, Chittabrata Ghosh. Modeling and Simulation of Smart and Green Computing Systems
24 -- 30Swades De, Riya Singhal. Toward Uninterrupted Operation of Wireless Sensor Networks
31 -- 38Prabhakar T. Venkata, S. N. Akshay Uttama Nambi, R. Venkatesha Prasad, Ignas G. Niemegeers. Bond Graph Modeling for Energy-Harvesting Wireless Sensor Networks
40 -- 46Murat Kocaoglu, Derya Malak, Özgür B. Akan. Fundamentals of Green Communications and Computing: Modeling and Simulation
48 -- 55Sungkap Yeo, Hsien-Hsin S. Lee. SimWare: A Holistic Warehouse-Scale Computer Simulator
56 -- 64Baris Aksanli, Jagannathan Venkatesh, Tajana Simunic Rosing. Using Datacenter Simulation to Evaluate Green Energy Integration
65 -- 71Mahinthan Chandramohan, Hee Beng Kuan Tan. Detection of Mobile Malware in the Wild
72 -- 79Julian Ohrt, Volker Turau. Cross-Platform Development Tools for Smartphone Applications
80 -- 88Xiaoqi Yan, Chi-Wing Fu, Andrew J. Hanson. Multitouching the Fourth Dimension
89 -- 91Bruce Nordman, Ken Christensen, Alan Meier. Think Globally, Distribute Power Locally: The Promise of Nanogrids
92 -- 94Hal Berghel. The Dumbing Down of SportPhishing
95 -- 97Karl Ricanek Jr., Chris Boehnen. Facial Analytics: From Big Data to Law Enforcement
98 -- 100Cliff Lampe, Nicole B. Ellison. Understanding Facebook: Social Computing Isn't 'Just' Social
101 -- 105Dejan S. Milojicic, Martin F. Arlitt, Dorée Duncan Seligmann, George K. Thiruvathukal, Christian Timmerer. Innovation Mashups: Academic Rigor Meets Social Networking Buzz
124 -- 0David Alan Grier, Erin Dian Dumbacher. It's Complicated

Volume 45, Issue 8

8 -- 9Charles Severance. Teaching the World: Daphne Koller and Coursera
11 -- 13Brian M. Gaff, Kenneth Choy, Jamie Chan. Doing Business in China
17 -- 20Lee Garber. Converged Infrastructure: Addressing the Efficiency Challenge
24 -- 25Stephen W. Keckler, Steven K. Reinhardt. Massively Multithreaded Computing Systems
26 -- 32John A. Stratton, Christopher I. Rodrigues, I-Jui Sung, Li-Wen Chang, Nasser Anssari, Geng (Daniel) Liu, Wen-mei W. Hwu, Nady Obeid. Algorithm and Data Optimization Techniques for Scaling to Massively Threaded Systems
34 -- 41Stanley Tzeng, Brandon Lloyd, John D. Owens. A GPU Task-Parallel Model with Dependency Resolution
42 -- 52Benedict R. Gaster, Lee W. Howes. Can GPGPU Programming Be Liberated from the Data-Parallel Bottleneck?
53 -- 61Antonino Tumeo, Simone Secchi, Oreste Villa. Designing Next-Generation Massively Multithreaded Architectures for Irregular Applications
62 -- 69Stephen Davies, Stacey Aylor Seal, Jesse Hatfield. Cinefile: A Category-Based Analytic Browser
70 -- 72Lorraine J. Haricombe, L. Ada Emmett, Perry Alexander. Open Access: An Evolving Alternative
73 -- 75Victor Ng-Thow-Hing, Sandra Y. Okita. Playdates with Robots
76 -- 78Franco Zambonelli. Toward Sociotechnical Urban Superorganisms
79 -- 81Tom Mens. On the Complexity of Software Systems
79 -- 81Tom Mens. On the Complexity of Software Systems
82 -- 84William H. Boothby, Wolff Heintschel von Heinegg, James Bret Michael, Michael N. Schmitt, Thomas C. Wingfield. When Is a Cyberattack a Use of Force or an Armed Attack?
120 -- 0David Alan Grier, Erin Dian Dumbacher. The Winner Takes It All

Volume 45, Issue 7

8 -- 10Charles Severance. The Art of Teaching Computer Science: Niklaus Wirth
11 -- 13Brian M. Gaff, Richard N. Kimball, Jill M. Hanson. Raising Capital: Where to Find It, How to Secure It, and Tips on What to Avoid
26 -- 31Michael Gervautz, Dieter Schmalstieg. Anywhere Interfaces Using Handheld Augmented Reality
32 -- 40Mark R. Mine, Jeroen van Baar, Anselm Grundhöfer, David Rose, Bei Yang. Projection-Based Augmented Reality in Disney Theme Parks
42 -- 47Ailsa Barry, Graham A. Thomas, Paul Debenham, Jonathan Trout. Augmented Reality in a Public Space: The Natural History Museum, London
48 -- 55Nassir Navab, Tobias Blum, Lejing Wang, Asli Okur, Thomas Wendler. First Deployments of Augmented Reality in Operating Rooms
56 -- 63Mark Billinghurst, Andreas Dünser. Augmented Reality in the Classroom
64 -- 72Daniel E. O'Leary. Computer-Based Political Action: The Battle and Internet Blackout over PIPA
73 -- 78Jianyong Chen, Yang Wang, Xiaomin Wang. On-Demand Security Architecture for Cloud Computing
80 -- 82Hal Berghel. The OuijAmazon Desktop Metaphor
83 -- 85Eitan Frachtenberg. Holistic Datacenter Design in the Open Compute Project
87 -- 89Patrizio Campisi, Daria La Rocca, Gaetano Scarano. EEG for Automatic Person Recognition
90 -- 92Anuradha Uduwage, Joseph A. Konstan. The Answer Is Out There: Online Q&A Sites
116 -- 0David Alan Grier, Erin Dian Dumbacher. Repurposers

Volume 45, Issue 6

9 -- 11Brian M. Gaff, Gregory J. Ploussios. Open Source Software
26 -- 31Hong Mei, Gang Huang 0001, Tao Xie. Internetware: A Software Paradigm for Internet Computing
32 -- 37Mikio Aoyama. Computing for the Next-Generation Automobile
38 -- 47Lijuan Wang, Yao Qian, Matthew R. Scott, Gang Chen, Frank K. Soong. Computer-Assisted Audiovisual Language Learning
48 -- 56William Cheng-Chung Chu, Chao-Tung Yang, Chih-Wei Lu, Chih-Hung Chang, Juei-Nan Chen, Pao-Ann Hsiung, Hahn-Ming Lee. Cloud Computing in Taiwan
57 -- 63Wing-Kin Sung. Bioinformatics Applications in Genomics
64 -- 71Zhenyu Zhang, W. K. Chan, T. H. Tse. Fault Localization Based Only on Failed Runs
73 -- 80Jerome Israel. Why the FBI Can't Build a Case Management System
81 -- 88Virginia N. L. Franqueira, Roel Wieringa. Role-Based Access Control in Retrospect
89 -- 91Jeff Munson, Phillip Pasqual. Using Technology in Autism Research: The Promise and the Perils
93 -- 95Devon M. Simmonds. The Programming Paradigm Evolution
96 -- 97Richard J. Lipton. Might Turing Have Won a Turing Award?
98 -- 101Robert K. Harle, Andy Hopper. Sports Sensing: An Olympic Challenge for Computing
102 -- 104Rolf Oppliger, Bruno Wildhaber. Common Misconceptions in Computer and Information Security
128 -- 0David Alan Grier, Erin Dian Dumbacher. Controlling Share

Volume 45, Issue 5

6 -- 9Charles Severance. Van Jacobson: Getting NSFNet off the Ground
10 -- 12Brian M. Gaff, Stephen G. Huggard, Gregory W. Carey. Do I Need A Lawyer? If You Have to Ask, You Probably Do
15 -- 17Neal Leavitt. Will Power Problems Curtail Processor Progress?
18 -- 20Lee Garber. News Briefs
21 -- 24Roy Want, Bill N. Schilit. Interactive Digital Signage
26 -- 32Nick Taylor 0002, Keith Cheverst. Supporting Community Awareness with Interactive Displays
34 -- 41Adrian Friday, Nigel Davies, Christos Efstratiou. Reflections on Long-Term Experiments with Public Displays
42 -- 49Timo Ojala, Vassilis Kostakos, Hannu Kukka, Tommi Heikkinen, Tomas Lindén, Marko Jurmu, Simo Hosio, Fabio Kruger, Daniele Zanni. Multipurpose Interactive Public Displays in the Wild: Three Years Later
50 -- 56Florian Alt, Jörg Müller, Albrecht Schmidt. Advertising on Public Display Networks
58 -- 64Nigel Davies, Marc Langheinrich, Rui José, Albrecht Schmidt. Open Display Networks: A Communications Medium for the 21st Century
66 -- 72Jamie Erbes, Hamid R. Motahari Nezhad, Sven Graupner. The Future of Enterprise IT in the Cloud
74 -- 80Lars Hopland Nestås, Kjell Jørgen Hole. Building and Maintaining Trust in Internet Voting
81 -- 82Tony Hey, Dennis Gannon, Jim Pinkelman. The Future of Data-Intensive Science
83 -- 85Zhiwei Xu. Measuring Green IT in Society
86 -- 88Hal Berghel. Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians
89 -- 91Alessio Malizia, Kai A. Olsen. Toward a New Search Paradigm-Can We Learn from Ants?
93 -- 96Anil K. Jain, Rong Jin, Jung-Eun Lee. Tattoo Image Matching and Retrieval
116 -- 0David Alan Grier, Erin Dian Dumbacher. Teaching the Intangible

Volume 45, Issue 4

6 -- 8Charles Severance. Discovering JavaScript Object Notation
9 -- 12Brian M. Gaff, Brian P. Murphy, Peter J. Cuomo. Defending Against Patent Infringement
15 -- 17Sixto Ortiz Jr.. New Approach Keeps Security in Context
21 -- 24Albrecht Schmidt, Elizabeth F. Churchill. Interaction Beyond the Keyboard
26 -- 34Jan B. F. Van Erp, Fabien Lotte, Michael Tangermann. Brain-Computer Interfaces: Beyond Medical Applications
36 -- 40Hans Gellersen, Florian Block. Novel Interactions on the Keyboard
42 -- 47Andreas Riener. Gestural Interaction in Vehicular Applications
48 -- 56Michel Beaudouin-Lafon, Stéphane Huot, Mathieu Nancel, Wendy E. Mackay, Emmanuel Pietriga, Romain Primet, Julie Wagner, Olivier Chapuis, Clément Pillias, James Eagan, Tony Gjerlufsen, Clemens Nylandsted Klokmose. Multisurface Interaction in the WILD Room
58 -- 65Andrea Bianchi, Ian Oakley, Dong-Soo Kwon. Open Sesame: Design Guidelines for Invisible Passwords
67 -- 73Kai-Hui Chang, Chris Browy. Parallel Logic Simulation: Myth or Reality?
74 -- 81Daniel Yellin, Yifat Yulevich, Alexander Pyasic, Avshalom Houri. Optimized Interactive Processes
82 -- 85Gary Marsden, Edward Cutrell, Matt Jones, Amit Anil Nanavati, Nitendra Rajput. Making Technology Invisible in the Developing World
86 -- 88David C. Hodge. Increasing Tuition's Affordability
89 -- 91Brian Fitzgerald. Software Crisis 2.0
92 -- 94Anthony Patrick Melaragno, Damindra Bandara, Duminda Wijesekera, James Bret Michael. Securing the ZigBee Protocol in the Smart Grid
95 -- 98Henry Tsai, Kelvin Sung. Mobile Applications and Museum Visitation
116 -- 0David Alan Grier, Erin Dian Dumbacher. Learning from the Best

Volume 45, Issue 3

6 -- 7Charles Severance. Monash Museum of Computing History
8 -- 10Brian M. Gaff, Thomas J. Smedinghoff, Socheth Sor. Privacy and Data Security
13 -- 16Lee Garber. Wi-Fi Races into a Faster Future
18 -- 20Lee Garber. News Briefs
22 -- 23T. M. Murali. Guest Editor's Introduction: Computationally Driven Experimental Biology
24 -- 30Michael B. Mayhew, Xin Guo, Steven B. Haase, Alexander J. Hartemink. Close Encounters of the Collaborative Kind
31 -- 38Mehmet Koyutürk. Using Protein Interaction Networks to Understand Complex Diseases
39 -- 46Fabio Vandin, Eli Upfal, Benjamin J. Raphael. Algorithms and Genome Sequencing: Identifying Driver Pathways in Cancer
47 -- 53Steven Skiena. Redesigning Viral Genomes
55 -- 62Lwin Khin Shar, Hee Beng Kuan Tan. Defending against Cross-Site Scripting Attacks
64 -- 69Xiaojun Quan, Liu Wenyin, Wenyu Dou, Hui Xiong, Yong Ge. Link Graph Analysis for Business Site Selection
70 -- 73Hal Berghel. WikiLeaks and the Matter of Private Manning
75 -- 77Kirk W. Cameron, Rong Ge. Generalizing Amdahl's Law for Power and Energy
79 -- 82Aaron Halfaker, John Riedl. Bots and Cyborgs: Wikipedia's Immune System
83 -- 84Cornelius Held, Julia Krumm, Petra Markel, Ralf P. Schenke. Intelligent Video Surveillance
88 -- 89Bob Ward. Call and Calendar
104 -- 0David Alan Grier, Erin Dian Dumbacher. Free Agency

Volume 45, Issue 2

7 -- 8Charles Severance. JavaScript: Designing a Language in 10 Days
9 -- 11Brian M. Gaff, Ralph A. Loren, Elizabeth A. Spinney. Intellectual Property, Part II
14 -- 16George Lawton. Cloud Streaming Brings Video to Mobile Devices
17 -- 19Lee Garber. News Briefs
21 -- 22Simon S. Y. Shim. Guest Editor's Introduction: The CAP Theorem's Growing Impact
23 -- 29Eric A. Brewer. Pushing the CAP: Strategies for Consistency and Availability
30 -- 36Seth Gilbert, Nancy A. Lynch. Perspectives on the CAP Theorem
37 -- 42Daniel Abadi. Consistency Tradeoffs in Modern Distributed Database System Design: CAP is Only Part of the Story
43 -- 49Raghu Ramakrishnan. CAP and Cloud Data Management
50 -- 58Kenneth A. Birman, Daniel A. Freedman, Qi Huang, Patrick Dowell. Overcoming CAP with Consistent Soft-State Replication
59 -- 65Gary C. Kessler. Information Security: New Threats or Familiar Problems?
66 -- 72Nuno Antunes, Marco Vieira. Defending against Web Application Vulnerabilities
73 -- 77Justin Jee, Lee Case Klippel, M. Shahriar Hossain, Naren Ramakrishnan, Bud Mishra. Discovering the Ebb and Flow of Ideas from Text Corpora
78 -- 81Christian Müller-Tomfelde, Morten Fjeld. Tabletops: Interactive Horizontal Displays for Ubiquitous Computing
82 -- 84Angelos Stavrou, Jeffrey M. Voas, Tom Karygiannis, Steve Quirolgico. Building Security into Off-the-Shelf Smartphones
85 -- 87Jimmy Gambier. An Independent Social Game Company's Perspective
88 -- 90Bo Brinkman. The Next Step for Ethics Education Is Enforcing the Code
91 -- 92Francis Hsu. The Impossible and the Possible
93 -- 95Bob Ward. Computer Society Names Winners of Three Key Awards
112 -- 0David Alan Grier, Erin Dian Dumbacher. The New Internationalists

Volume 45, Issue 12

6 -- 9John W. Walz. Implementing SP7: A Review of Progress in 2012
10 -- 12Charles Severance. Vint Cerf: A Brief History of Packets
13 -- 15Brian M. Gaff, Timothy P. Van Dyck, Elizabeth A. Peters. Employment Issues Confronting Start-Up Companies
18 -- 21Lee Garber. Have Java's Security Issues Gotten out of Hand?
25 -- 27Gary C. Kessler. Advancing the Science of Digital Forensics
28 -- 35Joel Young, Kristina Foster, Simson Garfinkel, Kevin D. Fairbanks. Distinct Sector Hashes for Target File Detection
36 -- 43Ray Hunt, Sherali Zeadally. Network Forensics: An Analysis of Techniques, Tools, and Trends
44 -- 51Irfan Ahmed, Sebastian Obermeier, Martin Naedele, Golden G. Richard III. SCADA Systems: Challenges for Forensic Investigators
52 -- 58Yong Wang, Kevin Streff, Sonell Raman. Smartphone Security Challenges
60 -- 64Aaron Spear, Markus Levy, Mathieu Desnoyers. Using Tracing to Solve the Multicore System Debug Problem
65 -- 72Rafael Moreno-Vozmediano, Rubén S. Montero, Ignacio Martín Llorente. IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures
73 -- 75Naren Sundaravaradan, Naren Ramakrishnan, David A. Hanauer. Factorizing Event Sequences
76 -- 79Manfred Lau, Jun Mitani, Takeo Igarashi. Digital Fabrication
80 -- 83Arnold Brown, Benjamin Apple, James Bret Michael, Michael Schumann. Atomic-Level Security for Web Applications in a Cloud Environment
84 -- 87Emil Vassev, Mike Hinchey. Awareness in Software-Intensive Systems
90 -- 92Brad Hallisey. Building a Virtual World: The Pipeline and Process
116 -- 0David Alan Grier, Erin Dian Dumbacher. Work/Play

Volume 45, Issue 11

8 -- 10Brian M. Gaff, Ralph A. Loren, Amy M. DeCloux. A Brief Overview of the America Invents Act
24 -- 26Doug Fridsma. Electronic Health Records: The HHS Perspective
27 -- 33Inmaculada Carrión Señor, José Luis Fernández Alemán, Ambrosio Toval. Personal Health Records: New Means to Safely Handle Health Data?
34 -- 40Raik Kuhlisch, Ben Kraufmann, Hannes Restel. Electronic Case Records in a Box: Integrating Patient Data in Healthcare Networks
42 -- 49Sujoy Basu, Alan H. Karp, Jun Li 0008, James Pruyne, Jerry Rolia, Sharad Singhal, Jaap Suermondt, Ram Swaminathan. Fusion: Managing Healthcare Records at Cloud Scale
50 -- 57Kevin Brady, Ram D. Sriram, Bettijoyce Lide, Kathleen Roberts. Testing the Nation's Healthcare Information Infrastructure: NIST Perspective
59 -- 68Barry Fagin, Dale Skrien. Debugging on the Shoulders of Giants: Von Neumann's Programs 65 Years Later
70 -- 78Jason L. Dedrick, Jian Tang, Kenneth L. Kraemer. China's Indigenous Innovation Policy: Impact on Multi-national R&D
79 -- 81Edward Curry, Bill Guyon, Charles Sheridan, Brian Donnellan. Sustainable IT: Challenges, Postures, and Outcomes
82 -- 85Hal Berghel. Stratfor or Stratagainst
87 -- 92Anil K. Jain, Karthik Nandakumar. Biometric Authentication: System Security and User Privacy
93 -- 95Frank Bi, Joseph A. Konstan. Customer Service 2.0: Where Social Computing Meets Customer Relations

Volume 45, Issue 10

8 -- 9Charles Severance. The Apache Software Foundation: Brian Behlendorf
10 -- 12Brian M. Gaff, Karl P. Fryzel. Starting a Business: Which Entity Structure Is Best for You?
16 -- 18Lee Garber. Using In-Memory Analytics to Quickly Crunch Big Data
22 -- 26Mike Hinchey, Sooyong Park, Klaus Schmid. Building Dynamic Software Product Lines
28 -- 35Jan Bosch, Rafael Capilla. Dynamic Variability in Software-Intensive Embedded System Families
36 -- 41Nelly Bencomo, Svein O. Hallsteinsen, Eduardo Santana de Almeida. A View of the Dynamic Software Product Line Landscape
42 -- 48Luciano Baresi, Sam Guinea, Liliana Pasquale. Service-Oriented Dynamic Software Product Lines
49 -- 55Jaejoon Lee, Gerald Kotonya, Daniel Robinson. Engineering Service-Based Dynamic Software Product Lines
56 -- 63Pete Sawyer, Raúl Mazo, Daniel Diaz, Camille Salinesi, Danny Hughes. Using Constraint Programming to Manage Configurations in Self-Adaptive Systems
64 -- 70Mark Hedley, Jian (Andrew) Zhang. Accurate Wireless Localization in Sports
72 -- 80Moustafa AbdelBaky, Manish Parashar, Hyunjoo Kim, Kirk E. Jordan, Vipin Sachdeva, James Sexton, Hani Jamjoom, Zon-Yin Shae, Gergina Pencheva, Reza Tavakoli, Mary F. Wheeler. Enabling High-Performance Computing as a Service
82 -- 83Ann E. K. Sobel. Should Everyone Go to College?
84 -- 87James D. Hollan. Activity-Enriched Computing: Capturing and Mining Activity Histories
88 -- 90Tim Boland, Paul E. Black. Juliet 1.1 C/C++ and Java Test Suite
91 -- 93Peter Gruenbaum. Underrepresented Youth Creating Culturally Relevant Games
95 -- 99Krishna P. C. Madhavan, Mihaela Vorvoreanu, Niklas Elmqvist, Aditya Johri, Naren Ramakrishnan, G. Alan Wang, Ann F. McKenna. Portfolio Mining
100 -- 103Bryan Reinicke. It's 2012, So Why Am I Driving a 1972 Bug?
128 -- 0David Alan Grier, Erin Dian Dumbacher. The Computer in the Mirror

Volume 45, Issue 1

6 -- 7John Walz. Creating Our Future
8 -- 9Ron Vetter. Digital Computer: The Next-Generation Flagship Publication
10 -- 11Charles Severance. The Second-Order Effects of Steve Jobs
14 -- 16Brian M. Gaff, Ralph A. Loren, Gabriel J. McCool. Intellectual Property, Part I
17 -- 20Lee Garber. The Challenges of Securing the Virtualized Environment
25 -- 30Daniel A. Reed, James R. Larus, Dennis Gannon. Imagining the Future: Thoughts on Computing
31 -- 38Alex Pentland. Society's Nervous System: Building Effective Government, Energy, and Public Health Systems
39 -- 45Dawn Song, Elaine Shi, Ian Fischer, Umesh Shankar. Cloud Data Protection for the Masses
47 -- 58Bjarne Stroustrup. Software Development for Infrastructure
59 -- 65S. Sitharama Iyengar, Xin Li, Huanhuan Xu, Supratik Mukhopadhyay, N. Balakrishnan 0001, Amit Sawant, Puneeth Iyengar. Toward More Precise Radiotherapy Treatment of Lung Tumors
66 -- 72Antonia Bertolino, Guglielmo De Angelis, Sampo Kellomaki, Andrea Polini. Enhancing Service Federation Trustworthiness through Online Testing
79 -- 82Anil K. Jain, Soweon Yoon. Automatic Detection of Altered Fingerprints
83 -- 85Doug Lyon. The Java Tree Withers
86 -- 89Hal Berghel. Identity Theft and Financial Fraud: Some Strangeness in the Proportions
91 -- 93Shyong K. Lam, John Riedl. Are Our Online "Friends" Really Friends?
95 -- 97Matthew E. Tolentino, Kirk W. Cameron. The Optimist, the Pessimist, and the Global Race to Exascale in 20 Megawatts
108 -- 0David Alan Grier, Erin Dian Dumbacher. The Common Future