Journal: IEEE Computer

Volume 47, Issue 9

6 -- 0Prasant Mohapatra. Channel Bonding in Evolving Wireless LANs
7 -- 9Charles Severance. Nii Quaynor: Bringing the Internet to Africa
23 -- 25Victor Pankratius, Chris Mattmann. Computing in Astronomy: To See the Unseen
26 -- 33Mark Jenne, Owen Boberg, Hasan Kurban, Mehmet M. Dalkilic. Studying the Milky Way Galaxy Using ParaHeap-k
34 -- 39Daniel Frascarelli, Sergio Nesmachnow, Gonzalo Tancredi. High-Performance Computing of Self-Gravity for Small Solar System Bodies
41 -- 47Stefan C. Muller, Gustavo Alonso, André Csillaghy. Scaling Astroinformatics: Python + Automatic Parallelization
48 -- 54Rik Jongerius, Stefan J. Wijnholds, Ronald Nijboer, Henk Corporaal. An End-to-End Computing Model for the Square Kilometre Array
56 -- 61Lisa Gerhardt, Juan Carlos Diaz Velez, Spencer R. Klein. Adventures in Antarctic Computing, or How I Learned to Stop Worrying and Love the Neutrino
62 -- 69F. Alexander Bogert, Nicholas Smith, John Holdener, Eric M. De Jong, Andrew F. Hart, Luca Cinquini, Shakeh E. Khudikyan, David R. Thompson, Chris A. Mattmann, Kiri Wagstaff, Joseph Lazio, Dayton L. Jones, Alice Allen, Lior Shamir, Peter J. Teuben. Computing in Astronomy: Applications and Examples
70 -- 76Zachary A. Collier, Daniel DiMase, Steve Walters, Mark Mohammad Tehranipoor, James H. Lambert, Igor Linkov. Cybersecurity Standards: Managing Risk and Creating Resilience
78 -- 84Hillery Hunter, Luis Alfonso Lastras-Montaño, Bishwaranjan Bhattacharjee. Adapting Server Systems for New Memory Technologies
85 -- 86Julie Hubschman. My Summer with a Robot
87 -- 89Karl Ricanek. Beyond Recognition: The Promise of Biometric Analytics
90 -- 93Hal Berghel. Sticky Wikis
94 -- 97John Wack. IEEE VSSC/1622: Voting System Standards
98 -- 102Tobias Hoßfeld, Christian Keimel, Christian Timmerer. Crowdsourcing Quality-of-Experience Assessments
103 -- 107Robin A. Gandhi, Keesha Crosby, Harvey P. Siy, Sayonnha Mandal. Gauging the Impact of FISMA on Software Security
120 -- 0David Alan Grier. The Point of Recognition

Volume 47, Issue 8

6 -- 0John Grundy. Determining the Cause of Design Model Inconsistencies
7 -- 8Charles Severance. Elizabeth Fong: Creating the SQL Database Standards
9 -- 11Brian M. Gaff, Bruce Rubinger. The Significance of Prior Art
20 -- 21Ron Vetter. Technology Commercialization in the Innovation Economy [Guest editor's introduction]
22 -- 27Gary L. Miller, Robert R. Hoon. The Role of Public Comprehensive Universities in Closing the Innovation Deficit
28 -- 36Elyse N. Ball, Kenneth G. Preston. University Commercialization Models: The University of Akron
37 -- 39Audrey Speicher. tekMountain: A Community-Driven Corporate Incubator
40 -- 47Savitha Srinivasan, Isaac Barchas, Mark Gorenberg, Evangelos Simoudis. Venture Capital: Fueling the Innovation Economy
48 -- 55Ian Gorton. Cyberinfrastructures: Bridging the Divide between Scientific Research and Software Engineering
56 -- 60Sebastian Boring, Saul Greenberg, Jo Vermeulen, Jakub Dostal, Nicolai Marquardt. The Dark Patterns of Proxemic Sensing
62 -- 66Nabor C. Mendonca. Architectural Options for Cloud Migration
67 -- 69Ernest L. McDuffie, Victor P. Piotrowski. The Future of Cybersecurity Education
70 -- 75Hal Berghel. The Future of Digital Money Laundering
76 -- 79Dirk Basten, Thomas Hoerstrup. Organizational Effort Estimation
80 -- 83David A. Wheeler. Preventing Heartbleed
84 -- 87Christiane Gresse von Wangenheim, Aldo von Wangenheim. Teaching Game Programming in Family Workshops
116 -- 0David Alan Grier. The Guest at the Feast

Volume 47, Issue 7

6 -- 0Jian Pei. Managing Data-Intensive Applications in the Cloud
7 -- 8Charles Severance. Andrew S. Tanenbaum: The Impact of MINIX
9 -- 12Brian M. Gaff. Supreme Court IP Update
22 -- 23Oliver Bimber. Thinking Virtual
24 -- 30Mel Slater, Maria V. Sanchez-Vives. Transcending the Self in Immersive Virtual Reality
31 -- 37Albert A. Rizzo, Arno Hartholt, Mario Grimani, Andrew Leeds, Matt Liewer. Virtual Reality Exposure Therapy for Combat-Related Posttraumatic Stress Disorder
38 -- 45John R. Stowers, Anton L. Fuhrmann, Maximilian Hofbauer, Martin Streinzer, Axel Schmid, Michael H. Dickinson, Andrew D. Straw. Reverse Engineering Animal Vision with Virtual Reality and Genetics
46 -- 52Henry Fuchs, Andrei State, Jean Charles Bazin. Immersive 3D Telepresence
53 -- 58Xia Yang, Nan Sang, Jim Alves-Foss. Shortening the Boot Time of Android OS
59 -- 65Minyong Kim, Young-geun Kim, Sung Woo Chung, Cheol Hong Kim. Measuring Variance between Smartphone Energy Consumption and Battery Life
66 -- 72Youngjung Ahn, Yongsuk Lee, Jin-Young Choi, Gyungho Lee, Dongkyun Ahn. Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks
73 -- 75Brian David Johnson. Talking to the Future
76 -- 81Hal Berghel. Robert David Steele on OSINT
82 -- 85Dimitrios S. Nikolopoulos, Hans Vandierendonck, Nikolaos Bellas, Christos D. Antonopoulos, Spyros Lalis, Georgios Karakonstantis, Andreas Burg, Uwe Naumann. Energy Efficiency through Significance-Based Computing
86 -- 89Pablo César, Rene Kaiser, Marian Florin Ursu. Toward Connected Shared Experiences
90 -- 92Chi-Wei Wang, Chia-Wei Wang, Chu-An Hsieh, Shiuhpyng Winston Shieh. Cloudebug: A Programmable Online Malware Testbed
93 -- 95Paul Nikolich. 802 LAN/MAN Standards: High Quality and Market Relevant
108 -- 0David Alan Grier. The Half-Told Lie

Volume 47, Issue 6

6 -- 0Song Guo. On-Time Warning Delivery for Vehicular Ad Hoc Networks
7 -- 9Brian M. Gaff, Heather Egan Sussman, Jennifer Geetter. Privacy and Big Data
12 -- 17Lee Garber. News Briefs
21 -- 23Ying-Dar Lin, Chun-Ying Huang, Matthew Wright, Georgios Kambourakis. Mobile Application Security
24 -- 31Guillermo Suarez-Tangil, Juan E. Tapiador, Flavio Lombardi, Roberto Di Pietro. Thwarting Obfuscated Malware via Differential Fault Analysis
32 -- 40Yuru Shao, Xiapu Luo, Chenxiong Qian. RootGuard: Protecting Rooted Android Phones
42 -- 47Félix Gómez Mármol, Gregor Rozinaj, Sebastian Schumann, Ondrej Labaj, Juraj Kacur. Smart AppStore: Expanding the Frontiers of Smartphone Ecosystems
48 -- 56Alessandro Armando, Gabriele Costa, Luca Verderame, Alessio Merlo. Securing the "Bring Your Own Device" Paradigm
57 -- 63Olga Gadyatskaya, Fabio Massacci, Yury Zhauniarovich. Security in the Firefox OS and Tizen Mobile Platforms
64 -- 67Hal Berghel. Leadership Failures in the National Security Complex
68 -- 71Benoît Combemale, Julien DeAntoni, Benoit Baudry, Robert B. France, Jean-Marc Jézéquel, Jeff Gray. Globalizing Modeling Languages
72 -- 77Irena Bojanova, George F. Hurlburt, Jeffrey M. Voas. Imagineering an Internet of Anything
78 -- 80Jason Pace. Working with Students Where Theory and Practice Intersect
82 -- 84Sorel Reisman. The Future of Online Instruction, Part 2
85 -- 87Edwin Sturrus, Olga Kulikova. Orchestrating Hybrid Cloud Deployment: An Overview
104 -- 0David Alan Grier. Peace in Our Time

Volume 47, Issue 5

6 -- 7Albert Y. Zomaya. Power-Performance Tradeoff in a Federated Cloud
9 -- 11Charles Severance. Nathaniel Borenstein: Multipurpose Internet Mail Extensions (MIME)
23 -- 25Martin Reisslein, Bernhard Rinner, Amit Roy-Chowdhury. Smart Camera Networks [Guest editors' introduction]
26 -- 36Ching-Hui Chen, Julien Favre, Gregorij Kurillo, Thomas P. Andriacchi, Ruzena Bajcsy, Rama Chellappa. Camera Networks for Healthcare, Teleimmersion, and Surveillance
37 -- 44Kevin Abas, Caio Porto, Katia Obraczka. Wireless Smart Camera Networks for the Surveillance of Public Spaces
45 -- 51Andrea Prati, Faisal Z. Qureshi. Integrating Consumer Smart Cameras into Camera Networks: Opportunities and Obstacles
52 -- 59Kaushik Mitra, Ashok Veeraraghavan, Aswin C. Sankaranarayanan, Richard G. Baraniuk. Toward Compressive Camera Networks
60 -- 66Zhangyu Guan, Tommaso Melodia. Cloud-Assisted Smart Camera Networks for Energy-Efficient 3D Video Streaming
67 -- 73Juan C. SanMiguel, Christian Micheloni, Karen Shoop, Gian Luca Foresti, Andrea Cavallaro. Self-Reconfigurable Smart Camera Networks
74 -- 80Xian-He Sun, Dawei Wang. Concurrent Average Memory Access Time
81 -- 83Wen Gao, Tiejun Huang, Cliff Reader, Weibei Dou, Xilin Chen. IEEE Standards for Advanced Audio and Video Coding in Emerging Applications
84 -- 87Symeon Papadopoulos, Yiannis Kompatsiaris. Social Multimedia Crawling for Mining and Search
88 -- 91Michael Cheng Yi Cho, Pokai Chen, Shiuhpyng Winston Shieh. Dmail: A Globally Authenticated Email Service
92 -- 95Chris Preist, Daniel Schien, Paul Shabajee, Stephen G. Wood, Christopher Hodgson. Analyzing End-to-End Energy Consumption for Digital Services
96 -- 98Kevin W. Bowyer, James S. Doyle Jr.. Cosmetic Contact Lenses and Iris Recognition Spoofing
99 -- 101Brian David Johnson. A New Doorway into Time
102 -- 106Hal Berghel. PII, the FTC, Car Dealers, and You
120 -- 0David Alan Grier. The Real Change [The Errant Hashtag]

Volume 47, Issue 4

6 -- 0Ling Liu. Service Selection and Recommendation through Collective Intelligence
7 -- 9Charles Severance. Doug Van Houweling: Building the NSFNet
10 -- 12Brian M. Gaff. Readers' Choice [Intellectual Property laws]
20 -- 21Carl K. Chang, Bill N. Schilit. Aware Computing [Guest editors' introduction]
22 -- 27Sarah Vieweg, Adam Hodges. Rethinking Context: Leveraging Human and Machine Computation in Disaster Response
28 -- 35Mohammed (Ehsan) Hoque, Rosalind W. Picard. Rich Nonverbal Sensing Technology for Automated Social Skills Training
36 -- 43Mark Matthews, Saeed Abdullah, Geri Gay, Tanzeem Choudhury. Tracking Mental Well-Being: Balancing Rich Sensing and Patient Needs
44 -- 50Giampiero E. G. Beroggi. Internet Voting: An Empirical Evaluation
52 -- 58Juan R. Terven, Joaquin Salas, Bogdan Raducanu. New Opportunities for Computer Vision-Based Assistive Technology Systems for the Visually Impaired
59 -- 65Ying-Dar Lin, Chia-Yin Lee, Yu-Sung Wu, Pei-Hsiu Ho, Fu-Yu Wang, Yi-Lang Tsai. Active versus Passive Malware Collection
66 -- 70Hal Berghel. Mr. Snowden's Legacy
71 -- 75Katia Vega, Hugo Fuks. Beauty Technology: Body Surface Computing
76 -- 79Young Lae Moon, Kazuomi Sugamoto, Alberto Paoluzzi, Antonio DiCarlo, Jaekeun Kwak, Dong Sun Shin, Dae Ok Kim, Dae-Hyun Lee, Jooyoung Kim. Standardizing 3D Medical Imaging
80 -- 83Sarah Beecham, Pádraig O'Leary, Seán Baker, Ita Richardson, John Noll. Making Software Engineering Research Relevant
84 -- 87George F. Hurlburt, Jeffrey M. Voas. Big Data, Networked Worlds
88 -- 91Fernando Arnez, Jason Pace, Kelvin Sung. Learning while Building Games for Teaching
92 -- 93Sorel Reisman. The Future of Online Instruction, Part 1
94 -- 97Patrick Butler, Naren Ramakrishnan, Elaine O. Nsoesie, John S. Brownstein. Satellite Imagery Analysis: What Can Hospital Parking Lots Tell Us about a Disease Outbreak?
98 -- 101Gopal Pingali, T. S. Mohan. The Cloud Ascends in Emerging Markets: Highlights of IEEE CCEM 2013
116 -- 0David Alan Grier. All That Glitters Is Not Gold

Volume 47, Issue 3

6 -- 0Peter Brusilovsky. Collective Class Wisdom: Collaborative Lecture Annotation
10 -- 11Charles Severance. Len Kleinrock: The First Two Packets on the Internet
12 -- 15Brian M. Gaff. Contracts 101
18 -- 21Lee Garber. News Briefs
22 -- 25Chirag Shah, Robert Capra, Preben Hansen. Collaborative Information Seeking
26 -- 31Zhe Xu, Jay Ramanathan, Rajiv Ramnath. Identifying Knowledge Brokers and Their Role in Enterprise Research through Social Media
32 -- 37Thilo Böhm, Claus-Peter Klas, Matthias Hemmje. ezDL: Collaborative Information Seeking and Retrieval in a Heterogeneous Environment
38 -- 45Yihan Tao, Anastasios Tombros. Investigating Collaborative Sensemaking Behavior in Collaborative Information Seeking
46 -- 53Zhen Yue, Shuguang Han, Daqing He, Jiepu Jiang. Influences on Query Reformulation in Collaborative Web Search
54 -- 57Jaime Teevan, Meredith Ringel Morris, Shiri Azenkot. Supporting Interpersonal Interaction during Collaborative Mobile Search
58 -- 61Marti A. Hearst. What's Missing from Collaborative Search?
62 -- 66Zheng Chen, Jian-Tao Sun, Xuedong Huang. Web Information at Your Fingertips: Paper as an Interaction Metaphor
67 -- 69Christian Timmerer, Benjamin Rainer. The Social Multimedia Experience
70 -- 73Hal Berghel. STEM, Revisited
74 -- 77Hugo Plácido da Silva, Ana L. N. Fred. Harnessing the Power of Biosignals
78 -- 80Kirk Cameron. The Evolution of Power Measurement
81 -- 83Gary McGraw. Security Fatigue? Shift Your Paradigm
84 -- 86Brian David Johnson. The Darwin App
100 -- 0David Alan Grier. Assets to the Table

Volume 47, Issue 2

6 -- 7David Forsyth. Object Detection with Discriminatively Trained Part-Based Models
8 -- 10Charles Severance. Joseph Hardin: NCSA Mosaic
11 -- 13Brian M. Gaff. IP 2013-2014: Looking Forward and Looking Back
14 -- 15W. Neville Holmes. 32 & 16 Years Ago
16 -- 20Lee Garber. News Briefs
21 -- 22Renee Bryce, Rick Kuhn. Software Testing
23 -- 29Midhat Ali, Francesco De Angelis, Daniele Fanì, Antonia Bertolino, Guglielmo De Angelis, Andrea Polini. An Extensible Framework for Online Testing of Choreographed Services
30 -- 36Nuno Antunes, Marco Vieira. Penetration Testing for Web Services
37 -- 45Cemal Yilmaz, Sandro Fouché, Myra B. Cohen, Adam A. Porter, Gülsen Demiröz, Ugur Koc. Moving Forward with Combinatorial Interaction Testing
46 -- 55Jerry Gao, Xiaoying Bai, Wei-Tek Tsai, Tadahiro Uehara. Mobile Application Testing: A Tutorial
56 -- 61Andreas Dähn, Clemens H. Cap. Application Transparency and Manipulation
62 -- 69William J. Chimiak, Samuel T. Patton, Stephen Janansky. Enhanced IP: IPv4 with 64-Bit Addresses
70 -- 72Manfred Broy, Albrecht Schmidt. Challenges in Engineering Cyber-Physical Systems
73 -- 77Hal Berghel. Moral Hazards, Negative Externalities, and the Surveillance Economy
78 -- 81Apostol Vassilev, Timothy A. Hall. The Importance of Entropy to Information Security
82 -- 84Peter Gruenbaum. Undergraduates Teach Game Programming Using Scratch
85 -- 87Rafael Capilla, Óscar Ortiz, Mike Hinchey. Context Variability for Context-Aware Systems
88 -- 90Jeffrey E. Froyd. The Nature of Scholarship in Computing Education: An Approach from IEEE Transactions on Education
104 -- 0David Alan Grier. Practice and Theory

Volume 47, Issue 12

8 -- 0Hai Jin. When Data Grows Big
10 -- 13Dejan S. Milojicic. Revitalization
22 -- 23Brian David Johnson. Making in the 21st Century
24 -- 40Jun Axup, AnnMarie Thomas, Ariel Waldman, Susan Faulkner, Carolina Odman-Govender, Jim St. Leger, Jessica Polka, Melissa Gregg, Brian David Johnson. The World of Making
42 -- 54Crystal Beasley, Emmeline Parsons, Melissa Pierce, Sam Baumgarten, Andrius Neviera, Shubham Banerjee, Tyesha Snow, Carla Diana, Nicholas Nakadate, Shruti Satsangi. Passionate Projects: This Is What I Made
56 -- 63Yasaman Sheri, Enrique Gabriel Legaspi, Cynthia Erenas, Brian Kessler, Eri Gentry, Ruben Estrada. The Future of Making
64 -- 71William Edwards, Judith Gebauer, Bryan Reinicke. White Space Networks: Architecture, Application, and Opportunity
72 -- 80Alberto Bartoli, Giorgio Davanzo, Andrea De Lorenzo, Eric Medvet, Enrico Sorio. Automatic Synthesis of Regular Expressions from Examples
82 -- 85Eun Sung Jung, Rajkumar Kettimuthu. Challenges and Opportunities for Data-Intensive Computing in the Cloud
86 -- 89Carmelo Ardito, Paolo Buono, Danilo Caivano, Maria Francesca Costabile, Rosa Lanzilotti, Yvonne Dittrich. Human-Centered Design in Industry: Lessons from the Trenches
90 -- 94Fang Jin, Wei Wang, Liang Zhao, Edward R. Dougherty, Yang Cao, Chang-Tien Lu, Naren Ramakrishnan. Misinformation Propagation in the Age of Twitter
95 -- 99Hal Berghel. Judson Rosebush on Computer Graphics and Animation
100 -- 103Brian Chau, Adam Robinson, Jason Pace, Rob Nash, Kelvin Sung. Corrupted: A Game to Teach Programming Concepts
104 -- 106Alexander Kott, Ananthram Swami, Patrick Drew McDaniel. Security Outlook: Six Cyber Game Changers for the Next 15 Years
128 -- 0David Alan Grier. State Secrets

Volume 47, Issue 11

8 -- 0Roberta L. Klatzky, J. Edward Colgate. Rendering Tactile Features on Touchscreens
10 -- 11Charles Severance. Ian Foster and the Globus Project
14 -- 18Lee Garber. News Briefs
19 -- 21Ying-Dar Lin, Dan Pitt, David Hausheer, Erica Johnson, Yi-Bing Lin. Software-Defined Networking: Standardization for Cloud Computing's Second Wave
22 -- 29Jean Tourrilhes, Puneet Sharma, Sujata Banerjee, Justin Pettit. SDN and OpenFlow Evolution: A Standards Perspective
30 -- 36Rick Bauer, Ron Milford, Li Zhen. Aligning Technology and Market Drivers in an Open Source Standards Testing Program
38 -- 44Paul Quinn, Jim Guichard. Service Function Chaining: Creating a Service Plane via Network Service Headers
46 -- 54Christian Esteve Rothenberg, Roy Chua, Josh Bailey, Martin Winter, Carlos N. A. Corrêa, Sidney C. de Lucena, Marcos Rogério Salvador, Thomas D. Nadeau. When Open Source Meets Network Control Planes
56 -- 60Marco Canini, Anja Feldmann, Dan Levin, Fabian Schaffert, Stefan Schmid. Software-Defined Networks: Incremental Deployment with Panopticon
62 -- 65Marion Dillon, Timothy Winters. Virtualization of Home Network Gateways
66 -- 69Lindsey Lowther. Defensive Biometrics
70 -- 72m. c. schraefel, Elizabeth F. Churchill. Wellth Creation: Using Computer Science to Support Proactive Health
74 -- 78James H. Faghmous, Arindam Banerjee, Shashi Shekhar, Michael Steinbach, Vipin Kumar, Auroop R. Ganguly, Nagiza F. Samatova. Theory-Guided Data Science for Climate Change
79 -- 81Brian David Johnson. Imagining and Building Robots (in Capes!)
82 -- 85Hal Berghel. Why Clouds Give Me a Case of the Vapors
86 -- 88Ramesh Jain. Toward Social Life Networks
89 -- 92Kirk W. Cameron. Energy Efficiency in the Wild: Why Datacenters Fear Power Management
94 -- 98George F. Hurlburt, Irena Bojanova, Ann E. Kelley Sobel, Keesha Crosby. Security or Privacy? A Matter of Perspective
99 -- 101Paul Joannou, Alan Wassyng. Understanding Integrity Level Concepts
124 -- 0David Alan Grier. The External Environment

Volume 47, Issue 10

8 -- 0Leonard Heilig. A View on Cloud Computing from above the Clouds
9 -- 11Brian M. Gaff. 3D IP
22 -- 24Carlos E. Jimenez, Agusti Solanas, Francisco Falcone. E-Government Interoperability: Linking Open and Smart Government
25 -- 33Konstantinos Bovalis, Vassilios Peristeras, Margarida Abecasis, Raul-Mario Abril-Jimenez, Miguel Alvarez Rodriguez, Corinne Gattegno, Athanasios Karalopoulos, Ioannis Sagias, Szabolcs Szekacs, Suzanne Wigard. Promoting Interoperability in Europe's E-Government
34 -- 42Mario Kovac. E-Health Demystified: An E-Government Showcase
44 -- 49Marijn Janssen, Elsa Estevez, Tomasz Janowski. Interoperability in Big, Open, and Linked Data-Organizational Maturity, Capabilities, and Data Portfolios
50 -- 56Pieter Colpaert, Mathias Van Compernolle, Laurens De Vocht, Anastasia Dimou, Miel Vander Sande, Ruben Verborgh, Peter Mechant, Erik Mannens. Quantifying the Interoperability of Open Government Datasets
57 -- 64Martin le Vrang, Agis Papantoniou, Erika Pauwels, Pieter Fannes, Dominique Vandensteen, Johan De Smedt. ESCO: Boosting Job Matching in Europe with Semantic Interoperability
65 -- 71Jesús Cano, Roberto Hernández, Salvador Ros. Distributed Framework for Electronic Democracy in Smart Cities
72 -- 81Pu Liu, Zhenghong Peng. China's Smart City Pilots: A Progress Report
82 -- 85Stefano Secci, San Murugesan. Cloud Networks: Enhancing Performance and Resiliency
86 -- 89Jonathan P. Bowen, Mike Hinchey, Helge Janicke, Martin P. Ward, Hussein Zedan. Formality, Agility, Security, and Evolution in Software Development
90 -- 93Wendy M. DuBow. Attracting and Retaining Women in Computing
94 -- 98Hal Berghel. Defending against Big Dada: Defensive Tactics for Weapons of Mass Deception
99 -- 101Jason W. Bay. Turning Video Gamers into Software Developers
102 -- 106Apostol Vassilev, Christopher Celi. Avoiding Cyberspace Catastrophes through Smarter Testing
128 -- 0David Alan Grier. Lying to the Future

Volume 47, Issue 1

6 -- 8Dejan S. Milojicic. Reinventing Relevance
9 -- 0Raghu Machiraju. Fixing the Mercator Projection for the Internet Age
11 -- 12Charles Severance. Massimo Banzi: Building Arduino
13 -- 15Brian M. Gaff. Corporate Risks from Social Media
22 -- 23Ron Vetter. Digital Magazines: The Future of Publishing Is Here
24 -- 31Karin Strauss, Doug Burger. What the Future Holds for Solid-State Memory
32 -- 39Shyamnath Gollakota, Matthew S. Reynolds, Joshua R. Smith, David Wetherall. The Emergence of RF-Powered Computing
40 -- 47Anuj Kumar, Florian Metze, Matthew Kam. Enabling the Rapid Development and Adoption of Speech-User Interfaces
48 -- 54Emerson R. Murphy-Hill. The Future of Social Learning in Software Engineering
56 -- 63Hye-Chung Kum, Ashok Krishnamurthy, Ashwin Machanavajjhala, Stanley C. Ahalt. Social Genome: Putting Big Data to Work for Population Informatics
64 -- 74Paolo Montuschi, Alfredo Benso. Augmented Reading: The Present and Future of Electronic Scientific Publications
75 -- 77Eli Tilevich, Young-Woo Kwon. Cloud-Based Execution to Improve Mobile Application Energy Efficiency
78 -- 82Hal Berghel. Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege
83 -- 86Nir Kshetri. Japan's Changing Cybersecurity Landscape
87 -- 89Brian David Johnson. Utopia Rising
104 -- 0David Alan Grier. Just Out of It