Journal: IEEE Computer

Volume 46, Issue 9

13 -- 14Charles Severance. John C. Hollar: History of Computing
17 -- 19Brian M. Gaff, Alyssa Harvey Dawson. Working with Your Legal Department
20 -- 21W. Neville Holmes. 32 & 16 Years Ago
22 -- 25Neal Leavitt. Storage Challenge: Where Will All That Big Data Go?
30 -- 31Mark Guzdial, Betsy James DiSalvo. Computing Education: Beyond the Classroom
32 -- 37Maria Knobelsdorf, Jan Vahrenhold. Addressing the Full Range of Students: Challenges in K-12 Computer Science Education
38 -- 43Kylie A. Peppler. STEAM-Powered Computing Education: Using E-Textiles to Integrate the Arts and STEM
44 -- 51Sally Fincher, Daniel Knox. The Porous Classroom: Professional Practices in the Computing Curriculum
52 -- 59Karen Brennan. Learning Computing through Creating and Connecting
60 -- 66Allison Elliott Tew, Brian Dorn. The Case for Validated Tools in Computer Science Education Research
68 -- 76Dean N. Williams, Peer-Timo Bremer, Charles M. Doutriaux, John Patchett, Sean Williams, Galen M. Shipman, Ross Miller, David Pugmire, Brian Smith, Chad A. Steed, E. Wes Bethel, Hank Childs, Harinarayan Krishnan, Prabhat, Michael Wehner, Cláudio T. Silva, Emanuele Santos, David Koop, Tommy Ellqvist, Jorge Poco, Berk Geveci, Aashish Chaudhary, Andy Bauer, Alexander Pletzer, Dave Kindig, Gerald Potter, Thomas P. Maxwell. Ultrascale Visualization of Climate Data
78 -- 84Jianwei Niu, Jing Peng, Lei Shu, Chao Tong, Wanjiun Liao. An Empirical Study of a Chinese Online Social Network-Renren
86 -- 93Rogério Luís de Carvalho Costa, Pedro Furtado. Providing Quality of Experience for Users: The Next DBMS Challenge
94 -- 96Karl Ricanek. The Next Biometric Challenge: Medical Alterations
97 -- 100Beth Cohen. PaaS: New Opportunities for Cloud Application Development
101 -- 103Brian David Johnson. That Copernican Moment
104 -- 107Hal Berghel. Toxic Cookies
124 -- 0David Alan Grier. For the Common Good

Volume 46, Issue 8

6 -- 8Charles Severance. Len Kleinrock: The Theory of Packets [Computing Conversations]
9 -- 11Brian M. Gaff, Joanna M. Dombrowski. Ten Things to Know about Applying for Non-US Patents
12 -- 13W. Neville Holmes. 32 & 16 Years Ago
14 -- 17Lee Garber. The Lowly API Is Ready to Step Front and Center
18 -- 20Lee Garber. News Briefs
21 -- 22Greg Atwood, Soo-Ik Chae, Simon S. Y. Shim. Next-Generation Memory [Guest editors' introduction]
23 -- 29Yan Li, Khandker Quader. NAND Flash Memory: Challenges and Opportunities
30 -- 36Yoon-Jong Song, Gitae Jeong, In-Gyu Baek, Jungdal Choi. What Lies Ahead for Resistance-Based Memory Technologies?
38 -- 44Amber Huffman, Dale Juenemann. The Nonvolatile Memory Transformation of Client Storage
45 -- 51Anirudh Badam. How Persistent Memory Will Change Software Systems
52 -- 59Steven Swanson, Adrian M. Caulfield. Refactor, Reduce, Recycle: Restructuring the I/O Stack for the Future of Storage
60 -- 68Kaiping Liu, Hee Beng Kuan Tan, Xu Chen. Binary Code Analysis
70 -- 76Elise van den Hoven, Evelien van de Garde-Perik, Serge Offermans, Koen van Boerdonk, Kars-Michiel H. Lenssen. Moving Tangible Interaction Systems to the Next Level
77 -- 78Eric Brechner. Getting Diagonal on the Xbox One Trifecta
79 -- 81Lawrence O'Gorman. Putting a Kinder Face on Public Cameras
82 -- 84Emil Vassev, Mike Hinchey. Autonomy Requirements Engineering
85 -- 89Björn Hartmann, Paul K. Wright. Designing Bespoke Interactive Devices
90 -- 94Patrick Fiaux, Maoyuan Sun, Lauren Bradel, Chris North, Naren Ramakrishnan, Alex Endert. Bixplorer: Visual Analytics with Biclusters
95 -- 97Cameron Wilson. What's Up Next for Code.org?
128 -- 0David Alan Grier. The Tenor of Our Times

Volume 46, Issue 7

6 -- 7Charles Severance. Katie Hafner: The Origins of the Internet
8 -- 9W. Neville Holmes. 32 & 16 Years Ago
10 -- 12Sixto Ortiz. Software-Defined Networking: On the Verge of a Breakthrough?
13 -- 15Lee Garber. News Briefs
17 -- 19Brian M. Gaff. The Troll under the Bridge
20 -- 21Marc Streit, Oliver Bimber. Visual Analytics: Seeking the Unknown
22 -- 29Jean-Daniel Fekete. Visual Analytics Infrastructures: From Data Management to Exploration
30 -- 38Carsten Görg, Youn ah Kang, Zhicheng Liu, John T. Stasko. Visual Analytics Support for Intelligence Analysis
39 -- 46Kwan-Liu Ma, Chris Muelder. Large-Scale Graph Visualization and Analytics
47 -- 55Daniel A. Keim, Milos Krstajic, Christian Rohrdantz, Tobias Schreck. Real-Time Visual Analytics for Text Streams
56 -- 60Jarke J. van Wijk. Evaluation: A Challenge for Visual Analytics
62 -- 69Diane J. Cook, Aaron S. Crandall, Brian L. Thomas, Narayanan Chatapuram Krishnan. CASAS: A Smart Home in a Box
70 -- 77Tsahee Zidenberg, Isaac Keslassy, Uri C. Weiser. Optimal Resource Allocation with MultiAmdahl
78 -- 81Brian David Johnson. From NASA
82 -- 85Paul Witman. Social Media for Social Value
86 -- 90Hal Berghel. Through the PRISM Darkly
91 -- 93Matt Stansberry. The Future of Green IT: Solving the Accountability Issue
94 -- 96Khaled M. Khan, Qutaibah M. Malluhi. Trust in Cloud Services: Providing More Controls to Clients
112 -- 0David Alan Grier. Short-Term Loan

Volume 46, Issue 6

6 -- 7Charles Severance. Gordon Bell: Building Blocks of Computing
9 -- 11Brian M. Gaff. Are You Exhausted by Your First Sale?
12 -- 13W. Neville Holmes. 32 & 16 Years Ago
14 -- 18Lee Garber. Game Accessibility: Enabling Everyone to Play
19 -- 21Lee Garber. News Briefs
22 -- 24Katina Michael, Keith W. Miller. Big Data: New Opportunities and New Challenges [Guest editors' introduction]
25 -- 31Jess Hemerly. Public Policy Considerations for Data-Driven Innovation
32 -- 38Paul P. Tallon. Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost
40 -- 45Jeremy Pitt, Aikaterini Bourazeri, Andrzej Nowak, Magdalena Roszczynska-Kurasinska, Agnieszka Rychwalska, Inmaculada Rodríguez Santiago, Maite López-Sánchez, Monica Florea, Mihai Sanduleac. Transforming Big Data into Collective Awareness
46 -- 53Marcus R. Wigan, Roger Clarke. Big Data's Big Unintended Consequences
54 -- 59Carolyn McGregor. Big Data in Neonatal Intensive Care
60 -- 67Pauline Anthonysamy, Phil Greenwood, Awais Rashid. Social Networking Privacy: Understanding the Disconnect from Policy to Controls
68 -- 72E. Thomas Ewing, Samah Gad, Naren Ramakrishnan. Gaining Insights into Epidemics by Mining Historical Newspapers
74 -- 76Niels Henze, Alireza Sahami Shirazi, Albrecht Schmidt, Martin Pielot, Florian Michahelles. Empirical Research through Ubiquitous Data Collection
78 -- 81Alexander Repenning. Making Programming Accessible and Exciting
82 -- 83Ann E. K. Sobel. The Modern Educator
84 -- 85James Bret Michael. Empowering Users through Secure On-Demand Data Provisioning
86 -- 88Gerard J. Holzmann. A Three-Step Program for Recovering Hackers
104 -- 0David Alan Grier. The Comfort Zone

Volume 46, Issue 5

6 -- 9Charles Severance. Bob Metcalfe: Ethernet at Forty
10 -- 12Brian M. Gaff. Who Invents What
13 -- 14W. Neville Holmes. 32 & 16 Years Ago
15 -- 18Neal Leavitt. Hybrid Clouds Move to the Forefront
19 -- 21Lee Garber. News Briefs
22 -- 24Theresa-Marie Rhyne, Min Chen. Cutting-Edge Research in Visualization
26 -- 33Aditi Majumder, Behzad Sajadi. Large Area Displays: The Changing Face of Visualization
34 -- 42Hank Childs, Berk Geveci, William J. Schroeder, Jeremy S. Meredith, Kenneth Moreland, Christopher Sewell, Torsten Kuhlen, E. Wes Bethel. Research Challenges for Visualization Software
44 -- 50Robert Kosara, Jock D. Mackinlay. Storytelling: The Next Step for Visualization
51 -- 57Daniel F. Keefe, Tobias Isenberg 0001. Reimagining the Scientific Visualization Interaction Paradigm
58 -- 66Ben Shneiderman, Catherine Plaisant, Bradford W. Hesse. Improving Healthcare with Interactive Visualization
68 -- 75Tobias Schreck, Daniel A. Keim. Visual Analysis of Social Media Data
76 -- 82Qing Li, Chris Larsen, Tim van der Horst. IPv6: A Catalyst and Evasion Tool for Botnets and Malware Delivery Networks
84 -- 92Amy F. Szczepanski, Jian Huang, Troy Baer, Yashema C. Mack, Sean Ahern. Data Analysis and Visualization in High-Performance Computing
93 -- 97Hal Berghel. Computing Technology and Survivable Journalism
98 -- 101Domenico Talia. Clouds for Scalable Big Data Analytics
102 -- 104Ahmad Poursaberi, Svetlana N. Yanushkevich, Marina L. Gavrilova, Vlad P. Shmerko, Patrick S. P. Wang. Situational Awareness through Biometrics
105 -- 107Brian David Johnson. Secret Science Fiction
108 -- 111Joseph Turner. Power Management as Choice Architecture
124 -- 0David Alan Grier. Working in Conference

Volume 46, Issue 4

6 -- 8Charles Severance. Larry Smarr: Building Mosaic
9 -- 11Brian M. Gaff, Ralph A. Loren. Patent Monetization
12 -- 13W. Neville Holmes. 32 & 16 Years Ago
14 -- 17Lee Garber. Analytics Goes on Location with New Approaches
18 -- 20Lee Garber. News Briefs
22 -- 23Sherali Zeadally, Gregorio Martínez Pérez, Han-Chieh Chao. Securing Cyberspace in the 21st Century
24 -- 29Pavlos Basaras, Dimitrios Katsaros, Leandros Tassiulas. Detecting Influential Spreaders in Complex, Dynamic Networks
30 -- 37Cristina Alcaraz, Javier Lopez. Wide-Area Situational Awareness for Critical Infrastructure Protection
38 -- 44Ignasi Paredes-Oliva, Pere Barlet-Ros, Josep Solé-Pareta. Scan Detection under Sampling: A New Perspective
46 -- 53Huansheng Ning, Hong Liu, Laurence T. Yang. Cyberentity Security in the Internet of Things
54 -- 61Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood, James Walkerdine. Who Am I? Analyzing Digital Personas in Cybercrime Investigations
62 -- 66Adeeb M. Alhomoud, Irfan Awan, Jules Ferdinand Pagna Disso, Muhammad Younas. A Next-Generation Approach to Combating Botnets
68 -- 75Iyad Rahwan, Sohan Dsouza, Alex Rutherford, Victor Naroditskiy, James McInerney, Matteo Venanzi, Nicholas R. Jennings, Manuel Cebrián. Global Manhunt Pushes the Limits of Social Mobilization
76 -- 82Xiaohan Ma, Zhigang Deng, Mian Dong, Lin Zhong. Characterizing the Performance and Power Consumption of 3D Mobile Games
83 -- 85Ruth H. Sanders. Why Learn a Foreign Language?
86 -- 89Niklas Elmqvist, Pourang Irani. Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime
90 -- 93Steve Hodges. Batteries Not Included: Powering the Ubiquitous Computing Dream
94 -- 96David F. Ferraiolo, Serban I. Gavrila, Wayne A. Jansen. Enabling an Enterprise-Wide, Data-Centric Operating Environment
97 -- 99Jason Pace. The Ways We Play, Part 2: Mobile Game Changers
100 -- 102Ana María Moreno, Ahmed Seffah, Rafael Capilla, Maria Isabel Sánchez Segura. HCI Practices for Building Usable Software
116 -- 0David Alan Grier. Equal before the Bar

Volume 46, Issue 3

6 -- 7Charles Severance. Pooja Sankar: Building the Piazza Collaboration System
8 -- 10Brian M. Gaff, Peter J. Cuomo. Design Patents
12 -- 13W. Neville Holmes. 32 & 16 Years Ago
14 -- 17Neal Leavitt. A Technology that Comes Highly Recommended
18 -- 20Lee Garber. News Briefs
22 -- 23Jane Chu Prey, Alfred C. Weaver. Fostering Gender Diversity in Computing
24 -- 29Wendy M. DuBow. Diversity in Computing: Why It Matters and How Organizations Can Achieve It
30 -- 36Telle Whitney, Denise Gammal, Barbara Gee, Jody Mahoney, Caroline Simard. Priming the Pipeline: Addressing Gender-Based Barriers in Computing
38 -- 41Mary Fernandez. A Path Between: Mentoring the Next Generation of Computing Professionals
42 -- 46Chris Stephenson, Rebecca Dovi. More than Gender: Taking a Systemic Approach to Improving K-12 Computer Science Education
48 -- 51Crystal Eney, Ed Lazowska, Hélène Martin, Stuart Reges. Broadening Participation: The Why and the How
52 -- 55James P. Cohoon, Joanne McGrath Cohoon, Mary Lou Soffa. Educating Diverse Computing Students at the University of Virginia
56 -- 58Maria Klawe. Increasing Female Participation in Computing: The Harvey Mudd College Story
60 -- 61Deepak Kumar. Serving Women with a Purposeful Vision
62 -- 63Robert B. Schnabel. Personal Reflections on Gender Diversity in Computing
63 -- 65Kate Starbird. Returning to My Inner Nerd: Following the "Social" Disruption of Computing
65 -- 66Annie I. Antón. Facing Challenges and Having Fun
66 -- 68Alice Bonhomme-Biais, Raquel Romano. Pursuing Professional Changes
69 -- 77Lwin Khin Shar, Hee Beng Kuan Tan. Defeating SQL Injection
78 -- 85Chung-Wei Hang, Zhe Zhang, Munindar P. Singh. Shin: Generalized Trust Propagation with Limited Evidence
86 -- 89Nir Kshetri, San Murugesan. Cloud Computing and EU Data Privacy Regulations
90 -- 93Kirk W. Cameron. Energy Oddities, Part 2: Why Green Computing Is Odd
94 -- 96Karl Ricanek Jr., Gayathri Mahalingam. Biometrically, How Identical Are Identical Twins?
97 -- 99Hal Berghel. The SCDOR Hack: Great Security Theater in Five Stages
100 -- 103John Riedl. Crowdfunding Technology Innovation
104 -- 107Brian David Johnson. Jimmy: The Robot That Changed It All
124 -- 0David Alan Grier. Attention to Context

Volume 46, Issue 2

6 -- 0Lee Garber. Letters
7 -- 9Charles Severance. Mitchell Baker: The Mozilla Foundation
11 -- 13Brian M. Gaff, Stephen G. Huggard, Gregory W. Carey. Paying Bribes Abroad Will Get You in Hot Water in the US
16 -- 19Lee Garber. GPUs Go Mobile
20 -- 23Lee Garber. News Briefs
24 -- 25Mohamed Ali Feki, Fahim Kawsar, Mathieu Boussard, Lieven Trappeniers. The Internet of Things: The Next Technological Revolution
26 -- 34Steve Hodges, Stuart Taylor, Nicolas Villar, James Scott, Dominik Bial, Patrick Tobias Fischer. Prototyping Connected Devices for the Internet of Things
36 -- 45Daniel Roggen, Gerhard Tröster, Paul Lukowicz, Alois Ferscha, José del R. Millán, Ricardo Chavarriaga. Opportunistic Human Activity and Context Recognition
46 -- 52Sang Wan Lee, Oliver Prenzel, Zeungnam Bien. Applying Human Learning Principles to User-Centered IoT Systems
53 -- 61Gerd Kortuem, Arosha K. Bandara, Neil Smith, Mike Richards, Marian Petre. Educating the Internet-of-Things Generation
62 -- 68Sasitharan Balasubramaniam, Jussi Kangasharju. Realizing the Internet of Nano Things: Challenges, Solutions, and Applications
69 -- 75Jane W.-S. Liu, Chi-Sheng Shih, Edward T.-H. Chu. Cyberphysical Elements of Disaster-Prepared Smart Environments
76 -- 84Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi S. Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino. Collaboration in Multicloud Computing Environments: Framework and Security Issues
85 -- 87Jon G. Hall, Lucia Rapanotti. Beauty in Software Engineering
88 -- 90Michael Lutz. Undergraduate Software Engineering at RIT: Past, Present, and Future
91 -- 93Rinku Dewri, Ramakrishna Thurimella. Can a Phone's GPS "Lie" Intelligently?
94 -- 96Jason Pace. The Ways We Play, Part 1: From PCs to Consoles to Mobile Phones
112 -- 0David Alan Grier. The Ethical Dimension

Volume 46, Issue 12

6 -- 8David Alan Grier. The Cycles of Continuous Improvement
9 -- 10Charles Severance. Andrew Tanenbaum: Writing the Book on Networks
11 -- 13Brian M. Gaff, Judy St. John. Legal Careers for Engineers
14 -- 15W. Neville Holmes. 32 & 16 Years Ago
16 -- 20Lee Garber. Robot OS: A New Day for Robot Design
24 -- 25Vladimir Getov. Computing Laws: Origins, Standing, and Impact [Guest editors' introduction]
26 -- 31Bob Metcalfe. Metcalfe's Law after 40 Years of Ethernet
32 -- 37Tsugio Makimoto. Implications of Makimoto's Wave
38 -- 46Gene M. Amdahl. Computer Architecture and Amdahl's Law
48 -- 53Andrew A. Chien, Vijay Karamcheti. Moore's Law: The First Ending and a New Beginning
54 -- 59Patrick S. Ryan, Sarah Falvey, Ronak Merchant. When the Cloud Goes Local: The Global Problem with Data Localization
60 -- 67Roy van Pelt, Anna Vilanova. Understanding Blood-Flow Dynamics: New Challenges for Visualization
68 -- 75Karim El Defrawy, Sky Faber. Blindfolded Data Search via Secure Pattern Matching
76 -- 79Kim Schaffer. Passwords, Privacy, and Policies: Can They Do Business Together?
80 -- 84Ting Hua, Chang-Tien Lu, Naren Ramakrishnan, Feng Chen, Jaime Arredondo, David Mares, Kristen Summers. Analyzing Civil Unrest through Social Media
85 -- 87Ann E. K. Sobel. The Escalating Cost of College
88 -- 90Hy Resnick. Busted: A Digital Group Game to Help At-Risk Youth Stay out of Jail
91 -- 95Hal Berghel. The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications
96 -- 99Hao Han, Yinxing Xue, Keizo Oyama. Mashup Technology: Beyond Open Programming Interfaces
124 -- 0David Alan Grier. The Way We Organize Ourselves

Volume 46, Issue 11

8 -- 9Charles Severance. Ian Horrocks: Standardizing OWL
10 -- 13Brian M. Gaff, David J. Levine, Raymond Gabriel. Understanding US Trade Controls
14 -- 15W. Neville Holmes. 32 & 16 Years Ago
16 -- 19Neal Leavitt. Today's Mobile Security Requires a New Approach
20 -- 22Lee Garber. News Briefs
23 -- 25Tiziana Margaria, Mike Hinchey. Simplicity in IT: The Power of Less
26 -- 32Barry D. Floyd, Steve Boßelmann. ITSy-Simplicity Research in Information and Communication Technology
34 -- 39Jan Bosch. Achieving Simplicity with the Three-Layer Product Model
40 -- 47Cristina Cerschi Seceleanu, Ivica Crnkovic. Component Models for Reasoning
48 -- 54Anna-Lena Lamprecht, Stefan Naujokat, Ina Schaefer. Variability Management beyond Feature Models
56 -- 62Johannes Neubauer, Bernhard Steffen. Plug-and-Play Higher-Order Process Integration
63 -- 66Chandra Prasad, Wolfram Schulte. Taking Control of Your Engineering Tools
68 -- 71Tiberiu Seceleanu, Gaetana Sapienza. A Tool Integration Framework for Sustainable Embedded Systems Development
72 -- 74Regina Herzlinger, Margo I. Seltzer, Mark Gaynor. Applying KISS to Healthcare Information Technology
76 -- 83Arshdeep Bahga, Vijay Krishna Madisetti. Rapid Prototyping of Multitier Cloud-Based Services and Systems
84 -- 86James Bret Michael, Phillip A. Laplante, Jeffery E. Payne, Paul E. Black, Jeffrey M. Voas. Does Security Trump Reliability?
87 -- 90David S. L. Wei, San Murugesan, Sy-Yen Kuo, Kshirasagar Naik, Danny Krizanc. Enhancing Data Integrity and Privacy in the Cloud: An Agenda
91 -- 94Joshua C. Klontz, Anil K. Jain. A Case Study of Automated Face Recognition: The Boston Marathon Bombings Suspects
95 -- 98Brian David Johnson. Jimmy Takes Manhattan
120 -- 0David Alan Grier. The Trappings of Power

Volume 46, Issue 10

14 -- 16Charles Severance. Eben Upton: Raspberry Pi
17 -- 19Brian M. Gaff, Greg Hendershott. So, You Want to Start a Software Company?
20 -- 21W. Neville Holmes. 32 & 16 Years Ago
22 -- 25Lee Garber. Gestural Technology: Moving Interfaces in a New Direction
30 -- 31Srinivas Devadas. Toward a Coherent Multicore Memory Model
32 -- 39Matthew Schuchhardt, Abhishek Das, Nikos Hardavellas, Gokhan Memik, Alok N. Choudhary. The Impact of Dynamic Directories on Multicore Interconnects
40 -- 47Arrvindh Shriraman, Hongzhou Zhao, Sandhya Dwarkadas. An Application-Tailored Approach to Hardware Cache Coherence
48 -- 55Tushar Krishna, Chia-Hsin Owen Chen, Sunghyun Park, Woo-Cheol Kwon, Suvinay Subramanian, Anantha P. Chandrakasan, Li-Shiuan Peh. Single-Cycle Multihop Asynchronous Repeated Traversal: A SMART Future for Reconfigurable On-Chip Networks
56 -- 64Qingchuan Shi, Omer Khan. Toward Holistic Soft-Error-Resilient Shared-Memory Multicores
66 -- 72Michiel van Genuchten, Les Hatton. Quantifying Software's Impact
74 -- 83Cristina Alcaraz, Sherali Zeadally. Critical Control System Protection in the 21st Century
84 -- 88Nir Kshetri, San Murugesan. EU and US Cybersecurity Strategies and Their Impact on Businesses and Consumers
89 -- 92Grace Metri, Manuj Sabharwal, Sundar Iyer, Abhishek Agrawal. Hardware/Software Codesign to Optimize SoC Device Battery Life
93 -- 96Charles Severance. MOOCs: An Insider's View
97 -- 99Lorraine Morgan, Kieran Conboy. Key Factors Impacting Cloud Computing Adoption
101 -- 104Keri Johnson, Jebediah Pavleas, Jack Chang. Kinecting to Mathematics through Embodied Interactions
105 -- 108Kai Kunze, Masakazu Iwamura, Koichi Kise, Seiichi Uchida, Shinichiro Omachi. Activity Recognition for the Mind: Toward a Cognitive "Quantified Self"
136 -- 0David Alan Grier. Not Part of the Plan

Volume 46, Issue 1

6 -- 7David Alan Grier. The Unseen and the Seen
8 -- 10Ron Vetter. Embracing Digital Publishing
11 -- 13Charles Severance. Van Jacobson: Content-Centric Networking
15 -- 17Brian M. Gaff, Ralph A. Loren, Gareth Dickson. Protecting Bioinformatics as Intellectual Property
20 -- 23Neal Leavitt. Bringing Big Analytics to the Masses
24 -- 26Lee Garber. News Briefs
28 -- 35Santosh Kumar, Wendy Nilsen, Misha Pavel, Mani Srivastava. Mobile Health: Revolutionizing Healthcare Through Transdisciplinary Research
36 -- 45Gunar Schirner, Deniz Erdogmus, Kaushik Chowdhury, Taskin Padir. The Future of Human-in-the-Loop Cyber-Physical Systems
46 -- 54Thanassis Rikakis, Aisling Kelliher, Nicole Lehrer. Experiential Media and Digital Culture
56 -- 64Noel E. Sharkey, Amanda J. C. Sharkey. Robotic Surgery: On the Cutting Edge of Ethics
65 -- 70Kjell Jørgen Hole. Management of Hidden Risks
71 -- 76Upkar Varshney. A Smart Approach to Medication Management
77 -- 79San Murugesan. Cloud Computing: The New Normal?
80 -- 82Brian David Johnson. When Science Fiction and Science Fact Meet
83 -- 84Kirk W. Cameron. Energy Oddities, Part 1: Why the Energy World Is Odd
85 -- 88Hal Berghel. RFIDiocy: It's Déjà Vu All over Again
89 -- 92John Riedl, Eric Riedl. Crowdsourcing Medical Research
108 -- 0David Alan Grier. The Here and Now