Journal: IEEE Computer

Volume 48, Issue 9

6 -- 0Sumi Helal. However You Like It: Computer's Enhanced Digital Format or Affordable Print Option
8 -- 9Afonso S. Bandeira. An Efficient Algorithm for Exact Recovery of Vertex Variables from Edge Measurements
10 -- 12Brian M. Gaff. Legal Issues with Wearable Technology
16 -- 20Roy Want, Schahram Dustdar. Activating the Internet of Things [Guest editors' introduction]
22 -- 30Jacob Beal, Danilo Pianini, Mirko Viroli. Aggregate Programming for the Internet of Things
32 -- 40Laura Belli, Simone Cirani, Luca Davoli, Andrea Gorrieri, Mirko Mancin, Marco Picone, GianLuigi Ferrari. Design and Deployment of an IoT Application-Oriented Testbed
42 -- 49Mateusz Mikusz, Sarah Clinch, Rachel Jones, Mike Harding, Christopher Winstanley, Nigel Davies. Repurposing Web Analytics to Support the IoT
50 -- 59Keun Sup Shim, Mieszko Lis, Omer Khan, Srinivas Devadas. The Execution Migration Machine: Directoryless Shared-Memory Architecture
60 -- 68Damian D. G. Gessler, Evren Sirin. SSWAP: Enabling Transaction-Time Reasoning for Semantic Workflows
69 -- 74Amir Parssian, William Yeoh, Mong-Shan Ee. Quality-Based SQL: Specifying Information Quality in Relational Database Queries
75 -- 80Hal Berghel. STEM Crazy
82 -- 83Steve Brown. The Power of Story
84 -- 88Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas. Securely Making "Things" Right
90 -- 92Ralf Klamma. Near-Real-Time Social Computing
93 -- 96Tao Chen, Rami Bahsoon. Toward a Smarter Cloud: Self-Aware Autoscaling of Cloud Configurations and Resources
98 -- 100Kevin Gary. Project-Based Learning
102 -- 104Eric Durant. CE2016: Guidelines for Forward-Looking Computer Engineering Curricula
120 -- 0David Alan Grier. Industrial Leadership

Volume 48, Issue 8

6 -- 0Shixia Liu, Leila De Floriani. Multivariate Network Exploration and Presentations
8 -- 10Charles Severance. Anil Jain: 25 Years of Biometric Recognition
14 -- 16Antonino Tumeo, John Feo. Irregular Applications: From Architectures to Algorithms [Guest editors' introduction]
18 -- 25G. Scott Lloyd, Maya Gokhale. In-Memory Data Rearrangement for Irregular, Data-Intensive Computing
26 -- 34Daniele Buono, John A. Gunnels, Xinyu Que, Fabio Checconi, Fabrizio Petrini, Tai-Ching Tuan, Chris Long. Optimizing Sparse Linear Algebra for Large-Scale Graph Analytics
35 -- 44Andrew Lenharth, Keshav Pingali. Scaling Runtimes for Irregular Algorithms to Large-Scale NUMA Systems
46 -- 55Mahantesh Halappanavar, Alex Pothen, Ariful Azad, Fredrik Manne, Johannes Langguth, Arif M. Khan. Codesign Lessons Learned from Implementing Graph Matching on Multithreaded Architectures
56 -- 61Hitesh Rajput, Tanmoy Som, Soumitra Kar. An Automated Vehicle License Plate Recognition System
62 -- 70Peter R. Lewis, Arjun Chandra, Funmilade Faniyi, Kyrre Glette, Tao Chen, Rami Bahsoon, Jim Tørresen, Xin Yao. Architectural Aspects of Self-Aware and Self-Expressive Computing Systems: From Psychology to Engineering
72 -- 75Greg Byrd. Cycling through Cyberspace
76 -- 80Hugo Bruneliere, Jordi Cabot, Javier Luis Cánovas Izquierdo, Leire Orue-Echevarria Arrieta, Oliver Strauß, Manuel Wimmer. Software Modernization Revisited: Challenges and Prospects
81 -- 83Zhi-Kai Zhang, Michael Cheng Yi Cho, Zong-Yu Wu, Shiuhpyng Winston Shieh. Identifying and Authenticating IoT Objects in a Natural Context
84 -- 89Darold Davis. Taming the Engineering of Information Services Websites with Standards
90 -- 94Hal Berghel. TSA: Mission Creep Meets Waste
128 -- 0David Alan Grier. In Search of the Diabolical Disconnect

Volume 48, Issue 7

4 -- 6Jean-Luc Gaudiot. The Times They Are A-Changin'
10 -- 0Stephen W. Keckler. Increasing Interconnection Network Throughput with Virtual Channels
12 -- 14Brian M. Gaff. "Curiouser and Curiouser!"-The Fallout from Alice
18 -- 20Jim Tørresen, Christian Plessl, Xin Yao. Self-Aware and Self-Expressive Systems
21 -- 28Bernhard Rinner, Lukas Esterle, Jennifer Simonjan, Georg Nebehay, Roman P. Pflugfelder, Gustavo Fernández Domínguez, Peter R. Lewis. Self-Aware and Self-Expressive Camera Networks
29 -- 36Michele Amoretti, Stefano Cagnoni. Toward Collective Self-Awareness and Self-Expression in Distributed Systems
37 -- 45Jürgo S. Preden, Kalle Tammemäe, Axel Jantsch, Mairo Leier, Andri Riid, Emine Calis. The Benefits of Self-Awareness and Attention in Fog and Mist Computing
46 -- 54Vincent van Beek, Jesse Donkervliet, Tim Hegeman, Stefan Hugtenburg, Alexandru Iosup. Self-Expressive Management of Business-Critical Workloads in Virtualized Datacenters
55 -- 58Behrooz Parhami. Amdahl's Reliability Law: A Simple Quantification of the Weakest-Link Phenomenon
59 -- 63Hal Berghel. A Farewell to Air Gaps, Part 2
64 -- 69Nir Kshetri. Recent US Cybersecurity Policy Initiatives: Challenges and Implications
70 -- 72Brian David Johnson. Steve the Steampunk Robot
73 -- 75Soto Montalvo, Raquel Martínez, Víctor Fresno, Rafael Capilla. Multilingual Information Access on the Web
76 -- 79Dhananjai M. Rao. Computing Efficiency in Education
80 -- 83Xiaofei Xu, Quan Z. Sheng, Liang-Jie Zhang, Yushun Fan, Schahram Dustdar. From Big Data to Big Service
84 -- 87Per Ola Kristensson. Next-Generation Text Entry
104 -- 0David Alan Grier. Do We Need a Software Czar?

Volume 48, Issue 6

6 -- 0Prasant Mohapatra. Distributed Optimal Channel Access in Cognitive Radio Networks
7 -- 9Charles Severance. Roy T. Fielding: Understanding the REST Style
12 -- 15Thad Starner, Tom Martin. Wearable Computing: The New Dress Code [Guest editors' introduction]
16 -- 24Anhong Guo, Xiaolong Wu, Zhengyang Shen, Thad Starner, Hannes Baumann, Scott M. Gilliland. Order Picking with Head-Up Displays
25 -- 33Reuben Kirkham. Can Disability Discrimination Law Expand the Availability of Wearable Computers?
34 -- 40Jon C. Hammer, Tingxin Yan. Inferring Mobile User Status with Usage Cues
41 -- 48Andrea Rosales, Sergio Sayago, Josep Blat. Beeping Socks and Chirping Arm Bands: Wearables That Foster Free Play
50 -- 58Najeeb Ullah, Maurizio Morisio, Antonio Vetro. Selecting the Best Reliability Model to Predict Residual Defects in Open Source Software
60 -- 63Greg Byrd. Tracking Cows Wirelessly
64 -- 68Hal Berghel. A Farewell to Air Gaps, Part 1
69 -- 71Jeffrey M. Voas. Vetting Mobile App Vendors
72 -- 75Reiner Hähnle, Einar Broch Johnsen. Rethinking Nonfunctional Software Requirements
100 -- 0David Alan Grier. Disruptive Computing

Volume 48, Issue 5

6 -- 0Ling Liu. Enhancing Cloud Services through Multitier Workload Analysis
7 -- 8Charles Severance. John Resig: Building JQuery
9 -- 11Brian M. Gaff. Important IP Cases in 2015, Part Two
14 -- 17Ron Vetter, San Murugesan. The Web: The Next 25 Years
18 -- 25Vishnu S. Pendyala, Simon S. Y. Shim, Christoph Bussler. The Web That Extends beyond the World
26 -- 32Dave Raggett. The Web of Things: Challenges and Opportunities
34 -- 42Jörg Heuer, Johannes Hund, Oliver Pfaff. Toward the Web of Things: Applying Web Technologies to the Physical World
44 -- 50Ron Vetter, San Murugesan. Roundtable Discussion: The Web We Look Forward To
51 -- 57Dirk Riehle. How Open Source Is Changing the Software Developer's Career
58 -- 62Jason Schlessman, Marilyn Wolf. Tailoring Design for Embedded Computer Vision Applications
64 -- 68Alexander De Luca, Janne Lindqvist. Is Secure and Usable Smartphone Authentication Asking Too Much?
69 -- 71Alida Draudt, Jonjozuf Hadley, Ryan Hogan, Leticia Murray, Gregory Stock, Julia Rose West. Six Insights about Science Fiction Prototyping
72 -- 75Wenqi Zhou, Yuhong Liu. Online Product Rating Manipulation and Market Performance
76 -- 79Susanne E. Hambrusch, Ran Libeskind-Hadas. The PhD Pipeline
80 -- 83Marat Zhanikeev. A Cloud Visitation Platform to Facilitate Cloud Federation and Fog Computing
84 -- 87Hal Berghel. What Makes a Good Column
88 -- 91George F. Hurlburt. Cyberhuman Security
92 -- 95Karen Gundy-Burlet. The Use of Standards on the LADEE Mission
96 -- 99Manfred Broy. Rethinking Nonfunctional Software Requirements
116 -- 0David Alan Grier. The GitHub Effect

Volume 48, Issue 4

6 -- 0David Forsyth. Representation Learning
7 -- 9Brian M. Gaff. Important IP Cases in 2015, Part One
12 -- 14D. Frank Hsu, Dorothy Marinucci, Jeffrey M. Voas. Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem
16 -- 25Ruby B. Lee. Rethinking Computers for Cybersecurity
26 -- 34David Gillman, Yin Lin, Bruce M. Maggs, Ramesh K. Sitaraman. Protecting Websites from Attack with Secure Delivery Networks
36 -- 44Kristin E. Heckman, Frank J. Stech, Ben S. Schmoker, Roshan K. Thomas. Denial and Deception in Cyber Defense
45 -- 55Tomas Vagoun, George O. Strawn. Implementing the Federal Cybersecurity R&D Strategy
56 -- 63Sek Chai. Enabling Smart Camera Networks with Smartphone Processors
64 -- 72Jon D. Hagar, Thomas L. Wissink, D. Richard Kuhn, Raghu Kacker. Introducing Combinatorial Testing in a Large Organization
74 -- 77Greg Byrd. A Little Ingenuity Solves an Elephant-Sized Problem
78 -- 81Emily Shen, Mayank Varia, Robert K. Cunningham, W. Konrad Vesey. Cryptographically Secure Computation
82 -- 86Hal Berghel. Borderline Executive Disorder
104 -- 0David Alan Grier. Accidents Will Happen

Volume 48, Issue 3

6 -- 7Björn Schuller. Do Computers Have Personality?
8 -- 10Charles Severance. Guido van Rossum: The Modern Era of Python
13 -- 19Lee Garber. News
20 -- 23Venkat N. Gudivada, Ricardo A. Baeza-Yates, Vijay V. Raghavan. Big Data: Promises and Problems
24 -- 35Vito Giovanni Castellana, Alessandro Morari, Jesse Weaver, Antonino Tumeo, David Haglin, Oreste Villa, John Feo. In-Memory Graph Databases for Web-Scale Data
36 -- 41Zhenyun Zhuang, Haricharan Ramachandra, Chaoyue Xiong. Taming Replication Latency of Big Data Events with Capacity Planning
42 -- 50Srividya K. Bansal, Sebastian Kagemann. Integrating Big Data: A Semantic Extract-Transform-Load Framework
52 -- 59Karamjit Kaur, Rinkle Rani. Managing Data in Healthcare Information Systems: Many Models, One Solution
60 -- 67Martin Giese, Ahmet Soylu, Guillermo Vega-Gorgojo, Arild Waaler, Peter Haase, Ernesto Jiménez-Ruiz, Davide Lanti, Martín Rezk, Guohui Xiao, Özgür L. Özçep, Riccardo Rosati. Optique: Zooming in on Big Data
68 -- 76Hasan Alkhatib, Paolo Faraboschi, Eitan Frachtenberg, Hironori Kasahara, Danny B. Lange, Phil Laplante, Arif Merchant, Dejan S. Milojicic, Karsten Schwan. What Will 2022 Look Like? The IEEE CS 2022 Report
78 -- 86Ninad S. Thakoor, Le An, Bir Bhanu, Santhoshkumar Sunderrajan, B. S. Manjunath. People Tracking in Camera Networks: Three Open Questions
87 -- 90Hong Linh Truong, Schahram Dustdar. Programming Elasticity in the Cloud
92 -- 96Kasper Hornbæk. Flexible Displays, Rigid Designs?
97 -- 98Tawny Schlieski. Virtual Dystopia
99 -- 101James Bret Michael. Trusted Computing: An Elusive Goal
102 -- 107Hal Berghel. Noirware
108 -- 110Christian Timmerer, Touradj Ebrahimi, Fernando Pereira 0001. Toward a New Assessment of Quality
111 -- 113Bob Aiello. Managing the High-Performance Computer Society Standards Working Group
114 -- 116Steve Roach, Mehran Sahami. CS2013: Computer Science Curricula 2013
136 -- 0David Alan Grier. Building Trust

Volume 48, Issue 2

6 -- 0Elisa Bertino. Denial-of-Service Attacks to UMTS
7 -- 9Charles Severance. Guido van Rossum: The Early Years of Python
10 -- 11Brian M. Gaff. BYOD? OMG!
21 -- 23Alf Weaver, Renée C. Bryce. Technological Advances in Medicine: It's Personal [Guest editors' introduction]
24 -- 31Jingquan Li. Ensuring Privacy in a Personal Health Record System
32 -- 39Marina Velikova, Peter J. F. Lucas, Maarten van der Heijden. Intelligent Disease Self-Management with Mobile Technology
41 -- 49Kyungtae Kang, Qixin Wang, Junbeom Hur, Kyung-Joon Park, Lui Sha. Medical-Grade Quality of Service for Real-Time Mobile Healthcare
50 -- 57Arshdeep Bahga, Vijay Krishna Madisetti. Healthcare Data Integration and Informatics in the Cloud
58 -- 66Erman Ayday, Emiliano De Cristofaro, Jean-Pierre Hubaux, Gene Tsudik. Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?
67 -- 74Adam P. Spring. Creating Substance from a Cloud: Low-Cost Product Generation
75 -- 76Greg Byrd. Spotlighting Student Innovation
77 -- 80Hal Berghel. Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole
81 -- 84Emil Vassev, Mike Hinchey. KnowLang: Knowledge Representation for Self-Adaptive Systems
85 -- 88Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo. Attribute-Based Access Control
100 -- 0David Alan Grier. The Tyranny of Geography

Volume 48, Issue 12

6 -- 0Tim Menzies. Cross-Project Data for Software Engineering
9 -- 0Thomas M. Conte. The Computer Society Must Change
10 -- 13Thomas M. Conte, Elie K. Track, Erik DeBenedictis. Rebooting Computing: New Strategies for Technology Scaling
14 -- 23John M. Shalf, Robert Leland. Computing beyond Moore's Law
24 -- 33Mohamed M. Sabry, Mingyu Gao, Gage Hills, Chi-Shuen Lee, Greg Pitner, Max M. Shulaker, Tony F. Wu, Mehdi Asheghi, Jeffrey Bokor, Franz Franchetti, Kenneth E. Goodson, Christos Kozyrakis, Igor L. Markov, Kunle Olukotun, Larry T. Pileggi, Eric Pop, Jan M. Rabaey, Christopher Re, H.-S. Philip Wong, Subhasish Mitra. Energy-Efficient Abundant-Data Computing: The N3XT 1, 000x
34 -- 42D. Scott Holmes, Alan M. Kadin, Mark W. Johnson. Superconducting Computing in Large-Scale Hybrid Systems
44 -- 53Kirk Bresniker, Sharad Singhal, R. Stanley Williams. Adapting to Thrive in a New Economy of Memory Abundance
54 -- 64Santosh Khasanvis, Mingyu Li, Mostafizur Rahman, Ayan Kumar Biswas, Mohammad Salehi Fashami, Jayasimha Atulasimha, Supriyo Bandyopadhyay, Csaba Andras Moritz. Architecting for Causal Intelligence at Nanoscale
65 -- 71David J. Mountain, Mark R. McLean, Doug Palmer, Joshua D. Prucnal, Christopher D. Krieger. Ohmic Weave: Memristor-Based Threshold Gate Networks
72 -- 79Michael K. Papamichael, James C. Hoe. The CONNECT Network-on-Chip Generator
80 -- 87Jeffrey M. Voas, George F. Hurlburt. Third-Party Software's Trust Quagmire
88 -- 93Hal Berghel. What Price Gonzo Ethics?
94 -- 97Davide Brugali, Rafael Capilla, Mike Hinchey. Dynamic Variability Meets Robotics
98 -- 101Alexander Kott, David S. Alberts, Cliff Wang. Will Cybersecurity Dictate the Outcome of Future Wars?
128 -- 0David Alan Grier. Quantum Imagination

Volume 48, Issue 11

6 -- 0Mike Sharples. Seamless Learning: Using Location-Aware Technology to Support Art Education
7 -- 9Brian M. Gaff. Patent Infringement Damages
12 -- 14Vladimir Getov. Scientific Grand Challenges: Toward Exascale Supercomputing and Beyond
15 -- 21Takemasa Miyoshi, Keiichi Kondo, Koji Terasaki. Big Ensemble Data Assimilation in Numerical Weather Prediction
23 -- 32Dylan Keon, Cherri M. Pancake, Harry Yeh. Protecting Our Shorelines: Modeling the Effects of Tsunamis and Storm Waves
33 -- 41Nichols A. Romero, Aiichiro Nakano, Katherine Riley, Fuyuki Shimojo, Rajiv K. Kalia, Priya Vashishta, Paul C. Messina. Quantum Molecular Dynamics in the Post-Petaflops Era
42 -- 49Erich Strohmaier, Hans Werner Meuer, Jack Dongarra, Horst D. Simon. The TOP500 List and Progress in High-Performance Computing
50 -- 58Simon Portegies Zwart, Jeroen Bédorf. Using GPUs to Enable Simulation with Computational Gravitational Dynamics in Astrophysics
60 -- 68Andrea Valdi, Eros Lever, Simone Benefico, Davide Quarta, Stefano Zanero, Federico Maggi. Scalable Testing of Mobile Antivirus Applications
70 -- 80Jia Liu, Yong Xue, Dominic Palmer-Brown, Ziqiang Chen, Xingwei He. High-Throughput Geocomputational Workflows in a Grid Environment
82 -- 85Hal Berghel. The Dystory of Ahmed's Clock
86 -- 89Marco A. S. Netto, Renato L. F. Cunha, Nicole Sultanum. Deciding When and How to Move HPC Jobs to the Cloud
90 -- 91Ed Finn. We Can Build the Future
92 -- 95Kim Schaffer. Expanding Continuous Authentication with Mobile Devices
96 -- 101Steve Tockey. Insanity, Hiring, and the Software Industry
102 -- 105Mukesh Kumar Saini, Abdulmotaleb El-Saddik. Absence Privacy Loss
106 -- 109Mark A. Ardis, David Budgen, Gregory W. Hislop, Jeff Offutt, Mark J. Sebern, Willem Visser. SE 2014: Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering
110 -- 114Adam Eck, Leen-Kiat Soh, Kristen Olson, Allan L. McCutcheon, Jolene Smyth, Robert F. Belli. Understanding the Human Condition through Survey Informatics
136 -- 0David Alan Grier. Hidden Persuaders

Volume 48, Issue 10

6 -- 0Paolo Montuschi. Spiking Neural Network Architecture
8 -- 9Charles Severance. Anant Agarwal: Inside edX
12 -- 16Giulio Jacucci, Stephen Fairclough, Erin Treacy Solovey. Physiological Computing
18 -- 25David Rozado Fernandez, Andreas Dünser. Combining EEG with Pupillometry to Improve Cognitive Workload Detection
26 -- 33Riccardo Sioni, Luca Chittaro. Stress Detection Using Physiological Sensors
34 -- 42Evan M. Peck, Emily Carlin, Robert J. K. Jacob. Designing Brain-Computer Interfaces for Attention-Aware Systems
43 -- 52Venkat N. Gudivada, Dhana Rao, Jordan Paris. Understanding Search-Engine Optimization
54 -- 62Abdelkareem Bedri, Himanshu Sahni, Pavleen Thukral, Thad Starner, David Byrd, Peter Presti, Gabriel Reyes, Maysam Ghovanloo, Zehua Guo. Toward Silent-Speech Control of Consumer Wearables
64 -- 71Madison Blake, Rabih Younes, Jacob Dennis, Thomas L. Martin, Mark T. Jones. A User-Independent and Sensor-Tolerant Wearable Activity Classifier
72 -- 78Hal Berghel. Legislating Technology (Badly)
80 -- 84Greg Byrd. 21st Century Pong
85 -- 87Tom Mens, Philippe Grosjean. The Ecology of Software Ecosystems
88 -- 91Chia-Wei Wang, Michael Cheng Yi Cho, Chi-Wei Wang, Shiuhpyng Winston Shieh. Combating Software Piracy in Public Clouds
120 -- 0David Alan Grier. The Voracious Discipline

Volume 48, Issue 1

4 -- 6Tom Conte. A Time of Change
7 -- 9Sumi Helal. Sustaining Computer's Impact and Adapting to Change
12 -- 0Ying Xu. Carrying out Phylogenetic Analyses through Computational Model Checking
14 -- 15Charles Severance. Khan Academy and Computer Science
16 -- 18Brian M. Gaff. IP Issues for Start-ups
28 -- 35Roy Want, Bill N. Schilit, Scott Jenson. Enabling the Internet of Things
36 -- 41Fadi H. Gebara, H. Peter Hofstee, Kevin J. Nowka. Second-Generation Big Data Systems
42 -- 50Peter Fonash, Phyllis Schneck. Cybersecurity: From Months to Milliseconds
52 -- 58Constantinos Patsakis, Paul Laird, Michael Clear, Mélanie Bouroche, Agusti Solanas. Interoperable Privacy-Aware E-Participation within Smart Cities
59 -- 61Stephen P. Crago, John Paul Walters. Heterogeneous Cloud Computing: The Way Forward
62 -- 65Luca Caviglione, Wojciech Mazurczyk. Understanding Information Hiding in iOS
66 -- 69Mitchell E. Daniels. Measuring Great Jobs and Great Lives: The Gallup-Purdue Index
70 -- 72Ari Popper. Transforming Business through Science Fiction Prototyping
73 -- 75Jennifer Costley. Leveraging the Standards Life Cycle for Green IT
76 -- 78Hal Berghel. A Paperless Gamble
92 -- 0David Alan Grier. State Transitions