Journal: IEEE Computer

Volume 49, Issue 9

12 -- 0Paolo Montuschi, Jean-Michel Muller. Modern Computer Arithmetic
14 -- 20San Murugesan, Bob Colwell. Next-Generation Computing Paradigms
21 -- 30Krysta M. Svore, Matthias Troyer. The Quantum Future of Computation
31 -- 42Rodney Van Meter, Simon J. Devitt. The Path to Scalable Distributed Quantum Computing
43 -- 51Victoria Coleman. Embodied Molecular Computation: Potential and Challenges
52 -- 59Xin-She Yang, Suash Deb, Simon Fong, Xingshi He, Yuxin Zhao. From Swarm Intelligence to Metaheuristics: Nature-Inspired Optimization Algorithms
60 -- 68Sameer Saproo, Josef Faller, Victor Shih, Paul Sajda, Nicholas R. Waytowich, Addison Bohannon, Vernon J. Lawhern, Brent J. Lance, David C. Jangraw. Cortically Coupled Computing: A New Paradigm for Synergistic Human-Machine Interaction
69 -- 77Lui Sha, Marco Caccamo, Renato Mancuso, Jung-Eun Kim, Man-Ki Yoon, Rodolfo Pellizzoni, Heechul Yun, Russell Kegley, Dennis R. Perlman, Greg Arundale, Richard M. Bradford. Real-Time Computing on Multicore Processors
78 -- 85Massimo Maresca. The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing
86 -- 90Xing Zhang, Zhenglei Yi, Zhi Yan, Geyong Min, Wenbo Wang 0007, Ahmed Elmokashfi, Sabita Maharjan, Yan Zhang 0002. Social Computing for Mobile Big Data
91 -- 93Scott Campbell. Teaching Cloud Computing
94 -- 97Greg Byrd. Seeing Is Understanding
98 -- 102Apostol Vassilev, Robert Staples. Entropy as a Service: Unlocking Cryptography's Full Potential
104 -- 109Hal Berghel. Coda in the Key of F2654hD4
110 -- 113Sanjay Kumar Madria. Security and Risk Assessment in the Cloud
114 -- 119Robert N. Charette. Dragging Government Legacy Systems Out of the Shadows
144 -- 0David Alan Grier. The Means of Production

Volume 49, Issue 8

10 -- 0David A. Bader. Evolving MPI+X Toward Exascale
12 -- 16Domenic Forte, Ron Perez, Yongdae Kim, Swarup Bhunia. Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction]
18 -- 26Parrish Ralston, David Fry, Scott Suko, Bryce Winters, Matthew King, Robert Kober. Defeating counterfeiters with microscopic dielets embedded in electronic components
28 -- 34Joseph P. Skudlarek, Tom Katsioulas, Michael Chen. A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management
36 -- 43Sk Subidh Ali, Mohamed Ibrahim, Jeyavijayan Rajendran, Ozgur Sinanoglu, Krishnendu Chakrabarty. Supply-Chain Security of Digital Microfluidic Biochips
44 -- 52Wei Hu, Baolei Mao, Jason Oberg, Ryan Kastner. Detecting Hardware Trojans with Gate-Level Information-Flow Tracking
54 -- 61Kan Xiao, Adib Nahiyan, Mark Tehranipoor. Security Rule Checking in IC Design
62 -- 69Olav Lysne, Kjell Jørgen Hole, Christian Otterstad, Øyvind Ytrehus, Raymond Aarseth, Jorgen Tellnes. Vendor Malware: Detection Limits and Mitigation
70 -- 79Kim Schaffer, Jeffrey Voas. What Happened to Formal Methods for Security?
80 -- 83Doug Terry. Toward a New Approach to IoT Fault Tolerance
84 -- 87Claude Y. Laporte, Rory V. O'Connor. Systems and Software Engineering Standards for Very Small Entities: Accomplishments and Overview
88 -- 91Erik P. DeBenedictis. The Search for Computing's Secretariat
92 -- 97Celia Paulsen. Cybersecuring Small Businesses
98 -- 102Hal Berghel. The Pollyanna Delusion
104 -- 108Xiangshi Ren. Rethinking the Relationship between Humans and Computers
109 -- 111Evan Atherton. Science Fiction Prototyping at Work
112 -- 116Amir Vahid Dastjerdi, Rajkumar Buyya. Fog Computing: Helping the Internet of Things Realize Its Potential
156 -- 0David Alan Grier. Changing Trust

Volume 49, Issue 7

8 -- 9Björn W. Schuller, Jian Pei. Using Computer Intelligence for Depression Diagnosis and Crowdsourcing
11 -- 13Antti Oulasvirta, Gregory D. Abowd. User Interface Design in the 21st Century
14 -- 19Yuta Sugiura, Takeo Igarashi, Masahiko Inami. Cuddly User Interfaces
20 -- 25Daisuke Sakamoto, Yuta Sugiura, Masahiko Inami, Takeo Igarashi. Graphical Instruction for Home Robots
26 -- 32John M. Carroll, Jiawei Chen, Tina Chien-Wen Yuan, Benjamin V. Hanrahan. In Search of Coproduction: Smart Services as Reciprocal Activities
34 -- 42Jun Kato, Takeo Igarashi, Masataka Goto. Programming with Examples to Develop Data-Intensive User Interfaces
44 -- 52Brad A. Myers, Andrew J. Ko, Thomas D. LaToza, YoungSeok Yoon. Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools
53 -- 61Samuel Kounev, Nikolaus Huber, Fabian Brosig, Xiaoyun Zhu. A Model-Based Approach to Designing Self-Aware IT Systems and Infrastructures
62 -- 68Xia Yang, Peng Shi, Haiyong Sun, Wenxuan Zheng, Jim Alves-Foss. A Fast Boot, Fast Shutdown Technique for Android OS Devices
70 -- 79Peter Bajcsy, Antoine Vandecreme, Julien Amelot, Joe Chalfoun, Michael Majurski, Mary Brady. Enabling Stem Cell Characterization from Large Microscopy Images
80 -- 82David Alan Grier. Free Tuition for Community College: A Role for the Tech Community?
84 -- 87Hal Berghel. The Dictator's (False) Dilemma
88 -- 93Norman Matloff. The H-1B Visa Controversy
94 -- 97Greg Byrd. Let the Sun Shine
98 -- 101George Hurlburt. "Good Enough" Security: The Best We'll Ever Have
120 -- 0David Alan Grier. Aware of the Situation

Volume 49, Issue 6

8 -- 9Mohamed Ibrahim, Krishnendu Chakrabarty. Digital-Microfluidic Biochips
11 -- 14Elisa Bertino. Security Threats: Protecting the New Cyberfrontier
15 -- 21Daniel Vecchiato, Marco Vieira, Eliane Martins. The Perils of Android Security Configuration
22 -- 30David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner. Privacy and Security in Mobile Health: A Research Agenda
31 -- 37Ronald Prescott Loui, Terrence D. Loui. How to Survive a Cyber Pearl Harbor
38 -- 46V. S. Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara, Alessandro Flammini, Filippo Menczer. The DARPA Twitter Bot Challenge
48 -- 55Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Voas, Zhi Quan Zhou. Metamorphic Testing for Cybersecurity
56 -- 64Qingpeng Zhang, Daniel Dajun Zeng, Fei-Yue Wang, Ronald L. Breiger, James A. Hendler. Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing System
66 -- 74Qiuming Luo, Feng Xiao, Zhong Ming, Hao Li, Jianyong Chen, Jianhua Zhang. Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System
77 -- 79Sorel Reisman, Eli Shmueli. Opening the Instructional Doors to Computer Science and IT-Finally
80 -- 83Jeffrey Voas. Demystifying the Internet of Things
84 -- 87Erik P. DeBenedictis. Rebooting Computers as Learning Machines
88 -- 92Daniel Ullrich, Andreas Butz. Social Robots for the 21st Century
95 -- 97Brian David Johnson. Science Fiction and the Coming Age of Sentient Tools
98 -- 102Kateryna Netkachova, Robin E. Bloomfield. Security-Informed Safety
120 -- 0David Alan Grier. Scientific Conversations

Volume 49, Issue 5

14 -- 15H. Chad Lane, David A. Forsyth. Virtual Learning and Object Reconstruction
16 -- 18Alfred C. Weaver, Greg Byrd, Renée C. Bryce. Computing Tools and Techniques for Emergency Response
19 -- 27Robin R. Murphy. Emergency Informatics: Using Computing to Improve Disaster Management
28 -- 37Marco Avvenuti, Stefano Cresci, Fabio Del Vigna, Maurizio Tesconi. Impromptu Crisis Mapping to Prioritize Emergency Response
38 -- 46Alper Bozkurt, Edgar J. Lobaton, Mihail L. Sichitiu. A Biobotic Distributed Sensor Network for Under-Rubble Search and Rescue
47 -- 53Liliya I. Besaleva, Alfred C. Weaver. Applications of Social Networks and Crowdsourcing for Disaster Management Improvement
54 -- 63Henri E. Bal, Dick H. J. Epema, Cees de Laat, Rob van Nieuwpoort, John W. Romein, Frank J. Seinstra, Cees Snoek, Harry A. G. Wijshoff. A Medium-Scale Distributed System for Computer Science Research: Infrastructure for the Long Term
64 -- 71Sebastian Gayer, Andrea Herrmann, Thorsten Keuler, Matthias Riebisch, Pablo Oliveira Antonino. Lightweight Traceability for the Agile Architect
73 -- 77Hal Berghel. Attenuated FAQs
78 -- 81Weisong Shi, Schahram Dustdar. The Promise of Edge Computing
82 -- 85John Leslie King, Jonathan Grudin. Will Computers Put Us Out of Work?
87 -- 90Phillip A. Laplante, Jeffrey M. Voas, Nancy L. Laplante. Standards for the Internet of Things: A Case Study in Disaster Response
92 -- 97Omar Niamut, Mu Mu, Spyros G. Denazis, Nicholas J. P. Race. Social Telemedia: The Relationship between Social Information and Networked Media
98 -- 101Greg Byrd. Home Sweet Mind-Controlled Home
102 -- 105Jeffrey Voas, Kim Schaffer. Insights on Formal Methods in Cybersecurity
128 -- 0David Alan Grier. Technological Improvisation

Volume 49, Issue 4

10 -- 12Brian M. Gaff. The Need for Speed
13 -- 15Charles Severance. Bruce Schneier: Building Cryptographic Systems
16 -- 17W. Neville Holmes. 32 & 16 Years Ago
18 -- 0Qiang Yang. Cross-Domain Data Fusion
20 -- 22Naren Ramakrishnan, Ravi Kumar. Big Data
23 -- 30Jignesh M. Patel. Operational NoSQL Systems: What's New and What's Next?
31 -- 42Venkat N. Gudivada, Dhana Rao, Vijay V. Raghavan 0001. Renaissance in Database Management: Navigating the Landscape of Candidate Systems
43 -- 51Giovanni Cherubini, Jens Jelitto, Vinodh Venkatesan. Cognitive Storage for Big Data
52 -- 60Hsiang-Fu Yu, Cho-Jui Hsieh, Hyokun Yun, S. V. N. Vishwanathan, Inderjit S. Dhillon. Nomadic Computing for Big Data Analytics
61 -- 69Asmaa Elbadrawy, Agoritsa Polyzou, Zhiyun Ren, Mackenzie Sweeney, George Karypis, Huzefa Rangwala. Predicting Student Performance Using Personalized Analytics
70 -- 73Behrooz Parhami. Low Acceptance Rates of Conference Papers Considered Harmful
74 -- 78Hal Berghel. The Bogus Science Theorem (and the Junk Science Wager)
79 -- 82Erik P. DeBenedictis. The Boolean Logic Tax
83 -- 87Jürgen Steimle. Skin-The Next User Interface
88 -- 91Yuvraj Agarwal, Anind K. Dey. Toward Building a Safe, Secure, and Easy-to-Use Internet of Things Infrastructure
92 -- 93Michael Bennett. Afrofuturism
94 -- 98John C. Knight, Jack W. Davidson, Anh Nguyen-Tuong, Jason Hiser, Michele Co. Diversity in Cybersecurity
120 -- 0David Alan Grier. The Global Profession

Volume 49, Issue 3

5 -- 0Leila De Floriani. Using 2D Maps for 3D Localization
10 -- 13Ying-Dar Lin, Jeffrey M. Voas, Antonio Pescapè, Peter Mueller. Communications and Privacy under Surveillance
14 -- 24Steven M. Bellovin, Matt Blaze, Susan Landau 0001. Insecure Surveillance: Technical Issues with Remote Computer Searches
25 -- 33Steven J. Murdoch. Insecure by Design: Protocols for Encrypted Phone Calls
34 -- 40Stephen Farrell. Requirements Analysis Required-Otherwise Targeted Monitoring Enables Pervasive Monitoring
42 -- 49Robert Koch 0002, Mario Golling, Gabi Dreo Rodosek. How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation
50 -- 55Hassan Metwalley, Stefano Traverso, Marco Mellia. Using Passive Measurements to Demystify Online Trackers
56 -- 63Imran Yusof, Al-Sakib Khan Pathan. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
64 -- 72Amit P. Sheth, Pramod Anantharam, Cory A. Henson. Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience
73 -- 77Hal Berghel. Net Neutrality vs. Net Neutering
78 -- 81Shams Zawoad, Ragib Hasan. Trustworthy Digital Forensics in the Cloud
82 -- 87Robert N. Charette. The STEM Anxiety Business
88 -- 91Charlene Chuck Walrad. The IEEE Computer Society and ACM's Collaboration on Computing Education
92 -- 96Karen Bartleson. Practical Insights from the Peculiar World of Standards
96 -- 99Gaurav Misra, Jose M. Such. How Socially Aware Are Social Media Privacy Controls?
100 -- 103Greg Byrd. Immortal Bits: Managing Our Digital Legacies
104 -- 107Angelos Stavrou, Daniel Fleck, Constantinos Kolias. On the Move: Evading Distributed Denial-of-Service Attacks
128 -- 0David Alan Grier. Go, Stop, Go, Stop

Volume 49, Issue 2

7 -- 8Charles Severance. Bruce Schneier: The Security Mindset
9 -- 0Elisa Bertino. Securing Mobile Applications
12 -- 13Schahram Dustdar. Cloud Computing
14 -- 22Fernando Díaz del Río, Javier Salmerón-Garcia, José Luis Sevillano. Extending Amdahl's Law for the Cloud Computing Era
24 -- 33Alireza Khoshkbarforoushha, Meisong Wang, Rajiv Ranjan, Lizhe Wang, Leila Alem, Samee Ullah Khan, Boualem Benatallah. Dimensions for Evaluating Cloud Resource Orchestration Frameworks
34 -- 45Talal H. Noor, Quan Z. Sheng, Zakaria Maamar, Sherali Zeadally. Managing Trust in the Cloud: State of the Art and Research Challenges
46 -- 52Quan Zhang, Weisong Shi. Energy-Efficient Workload Placement in Enterprise Datacenters
54 -- 62Lei Xu, Chunxiao Jiang, Yan Chen, Jian Wang, Yong Ren. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
63 -- 67Hal Berghel. Secretocracy
68 -- 72Mahmoud Barhamgi, Arosha K. Bandara, Yijun Yu, Khalid Belhajjame, Bashar Nuseibeh. Protecting Privacy in the Cloud: Current Practices, Future Directions
74 -- 77Nir Kshetri. Gambling with Source Code
78 -- 79Brian David Johnson, David H. Guston. Futures We Want to Inhabit
80 -- 86Vint Cerf, Max Senges. Taking the Internet to the Next Physical Level
104 -- 0David Alan Grier. The Post-MOOC World

Volume 49, Issue 12

6 -- 9Roger U. Fujii. Our Journey to the Future
15 -- 0Ali Jadbabaie. Defining Data Clusters
16 -- 20Roy Want, Trevor Pering, Yuvraj Agarwal. Multidevice Interaction
22 -- 30Jarno Leppanen, Mikko Pelkonen, Haipeng Guo, Samuli Hemminki, Petteri Nurmi, Sasu Tarkoma. Collaborative and Energy-Efficient Speech Monitoring on Smart Devices
32 -- 41Carlo Pinciroli, Giovanni Beltrame. Swarm-Oriented Programming of Distributed Robot Networks
42 -- 49Timothy Neate, Matt Jones, Michael Evans. Interdevice Media: Choreographing Content to Maximize Viewer Engagement
50 -- 59Tomás Bures, Frantisek Plasil, Michal Kit, Petr Tuma, Nicklas Hoch. Software Abstractions for Component Interaction in the Internet of Things
60 -- 68Charith Perera, Chang Liu, Rajiv Ranjan, Lizhe Wang, Albert Y. Zomaya. Privacy-Knowledge Modeling for the Internet of Things: A Look Back
70 -- 75Alexander Kott, Ananthram Swami, Bruce J. West. The Internet of Battle Things
76 -- 79Erik P. DeBenedictis. Computational Complexity and New Computing Approaches
80 -- 83Vincent C. Hu, Rick Kuhn. Access Control Policy Verification
84 -- 85Brian David Johnson. So Long, and Thanks for All the Robots
86 -- 88Kenneth M. Zemrowski. NIST Bases Flagship Security Engineering Publication on ISO/IEC/IEEE 15288: 2015
96 -- 0David Alan Grier. Fifteen Years to Open Source

Volume 49, Issue 11

10 -- 0Matthew B. Dwyer. Finding Flaws in Natural Language Requirements
11 -- 13Upkar Varshney, Carl K. Chang. Smart Health and Well-Being
14 -- 21S. Jay Olshansky, Bruce A. Carnes, Yang Claire Yang, Norvell Miller, Janet Anderson, Hiram Beltran-Sanchez, Karl Ricanek. The Future of Smart Health
22 -- 28Noel Carroll. Key Success Factors for Smart and Connected Health Software Solutions
29 -- 37Gina Sprint, Diane J. Cook, Roschelle Fritz, Maureen Schmitter-Edgecombe. Using Smart Homes to Detect and Analyze Health Events
38 -- 48Shurouq Hijazi, Alex Page, Burak Kantarci, Tolga Soyata. Machine Learning in Cardiac Health Monitoring and Decision Support
49 -- 59Xiang Su, Jarkko Hyysalo, Mika Rautiainen, Jukka Riekki, Jaakko J. Sauvola, Altti Ilari Maarala, Harri Hirvonsalo, Pingjiang Li, Harri Honko. Privacy as a Service: Protecting the Individual in Healthcare Data Processing
60 -- 67Humberto Cervantes, Rick Kazman, Jungwoo Ryoo, Duyoung Choi, Duksung Jang. Architectural Approaches to Security: Four Case Studies
68 -- 76Po-Ching Lin, Ying-Dar Lin, Cheng-Ying Wu, Yuan-Cheng Lai, Yi-Chih Kao. Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization
77 -- 79Amir Banifatemi, Jean-Luc Gaudiot. Engineering the New Boundaries of AI
80 -- 83Vasant Dhar. Equity, Safety, and Privacy in the Autonomous Vehicle Era
84 -- 87Alexander Kott, Ananthram Swami, Bruce J. West. The Fog of War in Cyberspace
88 -- 90Greg Byrd. Tactile Digital Braille Display
91 -- 95Hal Berghel. Chasing Elbridge's Ghost: The Digital Gerrymander
96 -- 99Dimitrios G. Kogias, Michael G. Xevgenis, Charalampos Z. Patrikakis. Cloud Federation and the Evolution of Cloud Computing
104 -- 0David Alan Grier. "I'm Not a Computer Scientist, but ..."

Volume 49, Issue 10

10 -- 0Simha Sethumadhavan. Hardware-Enforced Privacy
12 -- 13Charles R. Severance. The Living Computer Museum
14 -- 18Vladimir Getov, Adolfy Hoisie, Pradip Bose. New Frontiers in Energy-Efficient Computing [Guest editors' introduction]
20 -- 29Xingfu Wu, Valerie E. Taylor, Jeanine Cook, Philip J. Mucci. Using Performance-Power Modeling to Improve Energy Efficiency of HPC Applications
30 -- 37Bilge Acun, Akhil Langer, Esteban Meneses, Harshitha Menon, Osman Sarood, Ehsan Totoni, Laxmikant V. Kalé. Power, Reliability, and Performance: One System to Rule them All
38 -- 46Ryan E. Grant, Michael Levenhagen, Stephen L. Olivier, David Debonis, Kevin T. Pedretti, James H. Laros III. Standardizing Power Monitoring and Control at Exascale
47 -- 55Efraim Rotem, Uri C. Weiser, Avi Mendelson, Ran Ginosar, Eliezer Weissmann, Yoni Aizik. H-EARtH: Heterogeneous Multicore Platform Energy Management
56 -- 64Cory E. Merkel, Raqibul Hasan, Nicholas Soures, Dhireesha Kudithipudi, Tarek M. Taha, Sapan Agarwal, Matthew J. Marinella. Neuromemristive Systems: Boosting Efficiency through Brain-Inspired Computing
65 -- 71Gowtham Atluri, Angus W. MacDonald III, Kelvin O. Lim, Vipin Kumar. The Brain-Network Paradigm: Using Functional Imaging Data to Study How the Brain Works
72 -- 75David S. Linthicum. Responsive Data Architecture for the Internet of Things
76 -- 79Erik P. DeBenedictis, R. Stanley Williams. Help Wanted: A Modern-Day Turing
80 -- 83Dimitris E. Simos, Rick Kuhn, Artemios G. Voyiatzis, Raghu Kacker. Combinatorial Methods in Security Testing
84 -- 89Hal Berghel. Douglas Jones on Today's Voting Machines
90 -- 93Giulio Jacucci. Beyond Search Queries
94 -- 95Ryan Lee. Threatcasting
96 -- 98Fridolin Wild. The Future of Learning at the Workplace Is Augmented Reality
112 -- 0David Alan Grier. Innovating for Tomorrow

Volume 49, Issue 1

4 -- 0Roger U. Fujii. Raising the Bar: Ensuring Quality Products and Services for Our Members
7 -- 9Sumi Helal. 2016 Outlook: Humans in the Technology Loop
10 -- 0Paul Nikolich, Kenneth Christensen, Lori Cameron. 802 Standards
14 -- 0Lynette A. Jones. Designing Effective Refreshable Braille Displays
17 -- 23Gregory D. Abowd. Beyond Weiser: From Ubiquitous to Collective Computing
24 -- 33Carl K. Chang. Situation Analytics: A Foundation for a New Software Engineering Paradigm
34 -- 42Zhihao Jiang, Houssam Abbas, Kuk Jin Jang, Rahul Mangharam. The Challenges of High-Confidence Medical Device Software
43 -- 51Dejan S. Milojicic, Timothy Roscoe. Outlook on Operating Systems
52 -- 58Lalit Kumar Singh, Gopika Vinod, Anil Kumar Tripathi. Early Prediction of Software Reliability: A Case Study with a Nuclear Power Plant System
59 -- 65Hitesh Rajput, Tanmoy Som, Soumitra Kar. Using Radon Transform to Recognize Skewed Images of Vehicular License Plates
66 -- 74Kjell Jørgen Hole. Building Trust in E-Government Services
75 -- 79Hal Berghel. Digital Politics 2016
80 -- 83Dragutin Petkovic. Using Learning Analytics to Assess Capstone Project Teams
84 -- 87Gary McGraw. Four Software Security Findings
88 -- 90Marilyn Wolf. Embedded Software in Crisis
91 -- 93Brian David Johnson. Beyond Science Fiction: The American Dream
94 -- 98Andreas Bulling. Pervasive Attentive User Interfaces
99 -- 101Michael B. Spring. The Future of Standardization: Are We Destined to Repeat History?
102 -- 104Greg Byrd. IEEE/IBM Watson Student Showcase
120 -- 0David Alan Grier. New Cycles of Technology