default search action
IEEE Computer, Volume 37, 2004
Volume 37, Number 1, January 2004
- Article Summaries. 4
- The Problem with AI / Defining Memory / Divisible Load-Scheduling Discovery. 6-7
- Doris L. Carver:
EIC's Message: Computer in 2004. 8-9 - Carl K. Chang:
President's Message: Evolving the World with the World's Computer Society. 10-12
- Robert P. Colwell:
Design Fragility. 13-16
- W. Neville Holmes:
January 1972 / January 1988. 17
- Steven J. Vaughan-Nichols:
Vendors Go to Extreme Lengths for New Chips. 18-20 - George Lawton:
Is Peer-to-Peer Secure Enough for Corporate Use? 22-25
- Linda Dailey Paulson:
News Briefs Topics include: E-Mail Security Gets Personal / Ceiling for Controversial US H-1B Visas Drops / Technique Speeds Data Transmission in Computers / Viewing the World through Interactive Panoramic Images. 26-28
- Jesse H. Poore:
A Tale of Three Disciplines ...and a Revolution. 30-36 - John Horgan:
The End of Science Revisited. 37-43 - Don Edenfeld, Andrew B. Kahng, Mike Rodgers, Yervant Zorian:
2003 Technology Roadmap for Semiconductors. 47-56 - Patrick Regan, Scott Hamilton:
NASA's Mission Reliable. 59-68 - Fred Niederman:
IT Employment Prospects in 2004: A Mixed Bag. 69-77 - Alex Pentland, Richard Fletcher, Amir Hasson:
DakNet: Rethinking Connectivity in Developing Nations. 78-83 - Oliver Bimber:
Combining Optical Holograms with Interactive Computer Graphics. 85-91
- Call and Calendar. 92-94
- Computer Society Connection. 95-99
- Career Opportunities. 100-112
- Products. 114
- Implementing Verification Biometrics. 115
- Thanaa M. Ghanem, Walid G. Aref:
Databases Deepen the Web. 116-117
- David Andrews, Douglas Niehaus, Peter J. Ashenden:
Programming Models for Hybrid CPU/FPGA Chips. 118-120
- Maryam Alavi:
Distributed Learning Environments. 121-122
- Michael T. LoBue:
Best Business Practices for Standards Groups. 124-125
- Mohan Babu:
From Organization Man to Free Agent. 126-128
Volume 37, Number 2, February 2004
- Article Summaries. 4
- Improving Software Programming. 6
- Robert P. Colwell:
Computer Lessons from Pop Songs. 7-9
- Steven J. Vaughan-Nichols:
New Trends Revive Supercomputing Industry. 10-13 - David Geer:
Will New Standards Help Curb Spam? 14-16
- Linda Dailey Paulson:
News Briefs Topics include: Researcher Develops Colorful Map of the Internet / Using Plastic to Make High-Capacity Memory / Businesses Adopt Web Site's Satirical Company Names / Researchers Develop Self-Assembling Chip Technique. 17-19
- Michael R. Blaha:
A Copper Bullet for Software Quality Improvement. 21-25
- Jie Wu, Ivan Stojmenovic:
Guest Editors' Introduction: Ad Hoc Networks. 29-31 - Guohong Cao, Liangzhong Yin, Chita R. Das:
Cooperative Cache-Based Data Access in Ad Hoc Networks. 32-39 - Jean Carle, David Simplot:
Energy-Efficient Area Monitoring for Sensor Networks. 40-46 - Marco Conti, Gaia Maselli, Giovanni Turi, Silvia Giordano:
Cross-Layering in Mobile Ad Hoc Network Design. 48-51 - Prasant Mohapatra, Chao Gui, Jian Li:
Group Communications in Mobile Ad Hoc Networks. 52-59 - Nikola Milanovic, Miroslaw Malek, Anthony Davidson, Veljko M. Milutinovic:
Routing and Security in Mobile Ad Hoc Networks. 61-65 - Li Xiao, Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Abdol-Hossein Esfahanian:
Prioritized Overlay Multicast in Mobile Ad Hoc Environments. 67-74
- Computer Society Connection. 75-79
- Call and Calendar. 80-82
- Career Opportunities. 84-93
- Mike Hazas, James Scott, John Krumm:
Location-Aware Computing Comes of Age. 95-97
- Lydia Plowman, Rosemary Luckin:
Interactivity, Interfaces, and Smart Toys. 98-100
- Peter Gutmann:
Simplifying Public Key Management. 101-103
- Luminita Vasiu, Qusay H. Mahmoud:
Mobile Agents in Wireless Devices. 104-105
- Qusay H. Mahmoud, Wlodzimierz Dobosiewicz, David A. Swayne:
Making Computer Programming Fun and Accessible. 106-108
Volume 37, Number 3, March 2004
- Robert P. Colwell:
The Zen of Overclocking. 9-12
- Steven J. Vaughan-Nichols:
Voice Authentication Speaks to the Marketplace. 13-15 - Neal Leavitt:
Will Interoperability Problems Give IP Telephony a Busy Signal? 16-18 - Linda Dailey Paulson:
News Briefs. 19-21
- Doug Burger, James R. Goodman:
Billion-Transistor Architectures: There and Back Again. 22-28
- Peter M. Maurer:
Metamorphic Programming: Unconventional High Performance. 30-38
- Robert P. Colwell:
Theme Issue Introduction: We May Need a New Box. 40-41 - Naresh R. Shanbhag:
Reliable and Efficient System-on-Chip Design. 42-50 - Augustus K. Uht:
Going Beyond Worst-Case Specs with TEAtime. 51-56 - Todd M. Austin, David T. Blaauw, Trevor N. Mudge, Krisztián Flautner:
Making Typical Silicon Matter with Razor. 57-65 - Shih-Lien Lu:
Speeding Up Processing with Approximation Circuits. 67-73
- Gary Richardson, Blake Ives:
Managing Systems Development. 93-94
- Franco Zambonelli, Michael Luck:
Agent Hell: A Scenario of Worst Practices. 96-98
- Wayne H. Wolf:
Embedded Is the New Paradigm(s). 99-101
- W. Neville Holmes:
Languages and the Computing Profession. 102-104
Volume 37, Number 4, April 2004
- Article Summaries. 4
- Letters. 6-7
- Robert P. Colwell:
Brainstorming, Influence, and Icebergs. 9-12
- George Lawton:
Will Network Processor Units Live Up to Their Promise? 13-15 - Linda Dailey Paulson:
News Briefs. 16-18
- Bo Ingvar Sandén:
Coping with Java Threads. 20-27
- Carlo Blundo, Stelvio Cimato:
A Software Infrastructure for Authenticated Web Metering. 28-33 - Santosh K. Rangarajan, Vir V. Phoha, Kiran S. Balagani, Rastko R. Selmic, S. Sitharama Iyengar:
Adaptive Neural Network Clustering of Web Users. 34-40 - Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi:
XML-Based Specification for Web Services Document Security. 41-49
- Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang, Yi Qin, Michael Chau:
Crime Data Mining: A General Framework and Some Examples. 50-56 - Nimrod Megiddo, Dharmendra S. Modha:
Outperforming LRU with an Adaptive Replacement Cache Algorithm. 58-65
- Computer Society Connection. 69-70
- Call and Calendar. 71-72
- Bookshelf. 73
- Career Opportunities. 74-75
- Products. 77
- Dipanjan Chakraborty, Hui Lei:
Extending the Reach of Business Processes. 78-80
- Mark H. Overmars:
Teaching Computer Science through Game Design. 81-83
- Roy Want:
Enabling Ubiquitous Sensing with RFID. 84-86
- Bruce Schneier:
Hacking the Business Climate for Network Security. 87-89
- Margaret L. Johnson:
Biometrics and the Threat to Civil Liberties. 90-92
Volume 37, Number 5, May 2004
- Linda Dailey Paulson:
Using MPLS to Unify Multiple Network Types. 15-17 - Steven J. Vaughan-Nichols:
Wireless Middleware: Glue for the Mobile Infrastructure. 18-20
- Anthony Finkelstein, James Hetherington, Linzhong Li, Ofer Margoninski, Peter Saffrey, Robert M. Seymour, Anne Warner:
Computational Challenges of Systems Biology. 26-33
- Eric Dishman:
Inventing Wellness Systems for Aging in Place. 34-41 - Alex Pentland:
Healthwear: Medical Technology Becomes Wearable. 42-49
- Atsushi Kara:
Private-to-Private Communications over the Internet. 53-59 - Patrick Th. Eugster, Rachid Guerraoui, Anne-Marie Kermarrec, Laurent Massoulié:
Epidemic Information Dissemination in Distributed Systems. 60-67
- Computer Society Connection. 68-71
- Todd M. Austin, David T. Blaauw, Scott A. Mahlke, Trevor N. Mudge, Chaitali Chakrabarti, Wayne H. Wolf:
Mobile Supercomputers. 81-83
- Gary Richardson, Blake Ives:
Systems Development Processes. 84-86
- Wojciech Cellary, Wojciech Wiza, Krzysztof Walczak:
Visualizing Web Search Results in 3D. 87-89
- W. Neville Holmes:
Data and Information as Property. 90-92
Volume 37, Number 6, June 2004
- Bob Colwell:
Let's Hear from Those in the Back. 6-9
- Steven J. Vaughan-Nichols:
Achieving Wireless Broadband with WiMax. 10-13 - David Geer:
Just How Secure Are Security Products? 14-16 - Linda Dailey Paulson:
News Briefs. 18-20
- Diane M. Strong, Olga Volkoff:
A Roadmap for Enterprise System Implementation. 22-29
- Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap:
Guest Editors' Introduction: Securing the High-Speed Internet. 33-35 - Butler W. Lampson:
Computer Security in the Real World. 37-46 - Thomas M. Chen, Jean-Marc Robert:
Worm Epidemics in High-Speed Networks. 48-53 - Robert Friend:
Making the Gigabit IPsec VPN Architecture Secure. 54-60 - Avishai Wool:
A Quantitative Study of Firewall Configuration Errors. 62-67
- Byung K. Yi, S. R. Subramanya:
Enhancing Personal Communications with Multimedia. 79-81
- William A. Arbaugh:
A Patch in Nine Saves Time? 82-83
- Joshua R. Smith:
Imperceptible Sensory Channels. 84-85
- Albert A. Rizzo, Todd Bowerly, Cyrus Shahabi, J. Galen Buckwalter, Dean Klimchuk, Roman Mitura:
Diagnosing Attention Disorders in a Virtual Classroom. 87-89
- Kai A. Olsen:
The Economics of International Conferences. 90-91
Volume 37, Number 7, July 2004
- Bob Colwell:
Travel Stories. 8-10
- Linda Dailey Paulson:
Open Source Databases Move into the Marketplace. 13-15 - George Lawton:
Is MIMO the Future of Wireless Communications? 20-22 - Linda Dailey Paulson:
News Briefs. 24-26
- Nancy R. Mead:
Who Is Liable for Insecure Systems? 27-34
- Peder Jungck, Simon S. Y. Shim:
Issues in High-Speed Internet Security. 36-42
- Doug Burger, Stephen W. Keckler, Kathryn S. McKinley, Michael Dahlin, Lizy Kurian John, Calvin Lin, Charles R. Moore, James H. Burrill, Robert G. McDonald, William Yode:
Scaling to the End of Silicon with EDGE Architectures. 44-55 - Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H. C. Cheng:
Composing Adaptive Software. 56-64 - Michael Kozuch, Mahadev Satyanarayanan, Thomas C. Bressoud, Casey Helfrich, Shafeeq Sinnamohideen:
Seamless Mobile Computing on Fixed Infrastructure. 65-72
- Rebecca Montanari, Emil Lupu, Cesare Stefanelli:
Policy-Based Dynamic Reconfiguration of Mobile-Code Applications. 73-80
- Brian Fitzgerald:
A Critical Look at Open Source. 92-94
- Philip Koopman:
Embedded System Security. 95-97
- W. Neville Holmes:
In Defense of PowerPoint. 98-99
Volume 37, Number 8, August 2004
- Bob Colwell:
The Art of the Possible. 8-10
- David Geer:
E-Micropayments Sweat the Small Stuff. 19-22
- Sixto Ortiz Jr.:
3D Searching Starts to Take Shape. 24-26 - Linda Dailey Paulson:
News Briefs. 28-30
- Hans Dybkjær, Laila Dybkjær:
Modeling Complex Spoken Dialog. 32-40
- David E. Culler, Deborah Estrin, Mani B. Srivastava:
Guest Editors' Introduction: Overview of Sensor Networks. 41-49 - Kirk Martinez, Jane K. Hart, Royan Ong:
Environmental Sensor Networks. 50-56 - Sean M. Brennan, Angela M. Mielke, David C. Torney, Arthur B. Maccabe:
Radiation Detection with Distributed Sensor Networks. 57-59 - Miklos Maroti, Gyula Simon, Ákos Lédeczi, Janos Sztipanovits:
Shooter Localization in Urban Terrain. 60-61 - Christian C. Enz, Amre El-Hoiydi, Jean-Dominique Decotignie, Vincent Peiris:
WiseNET: An Ultralow-Power Wireless Sensor Network Solution. 62-70 - Bruce Hemingway, Waylon Brunette, Tom Anderl, Gaetano Borriello:
The Flock: Mote Sensors Sing in Undergraduate Curriculum. 72-78
- Kenneth J. Christensen, Bruce Nordman, Richard E. Brown:
Power Management in Networked Devices. 91-93
- Angelos D. Keromytis:
"Patch on Demand" Saves Even More Time? 94-96
- Siobhán Clarke, Cormac Driver:
Context-Aware Trails. 97-99
- Michael R. Macedonia:
The Digital World's Midlife Crisis. 100-101
- David A. Swayne, Qusay H. Mahmoud, Wlodzimierz Dobosiewicz:
An "Offshore-Resistant" Degree Program. 102-104
Volume 37, Number 9, September 2004
- George Lawton:
Machine-to-Machine Technology Gears Up for Growth. 12-15 - Neal Leavitt:
Scob Attack: A Sign of Bad Things to Come? 16-18
- Thaddeus Kobylarz:
Beyond 3G: Compound Wireless Services. 23-28
- Runsheng Wang, Xiaorui Hu:
VoIP Development in China. 30-37
- Sarita Thakoor, John Michael Morookian, Javaan S. Chahl, Butler Hine, Steven Zornetzer:
BEES: Exploring Mars with Bioinspired Technologies. 38-47 - Linda Dailey Paulson:
Biomimetic Robots. 48-53
- Federico Avanzini, Davide Rocchesso, Alberto Belussi, Alessandro Dal Palù, Agostino Dovier:
Designing an Urban-Scale Auditory Alert System. 55-61 - Zeljko Obrenovic, Dusan Starcevic:
Modeling Multimodal Human-Computer Interactio. 65-72
- Chris Hofstader:
Internet Accessibility: Beyond Disability. 103-105
- Tim Hayden:
Empowering Sports Fans with Technology. 106-107
- Dimitrios N. Serpanos:
Speeding Up High-Speed Protocol Processors. 108-111
- Jack Cole:
Raising the Bar. 112-113
- W. Neville Holmes:
Rationality and Digital Technology. 114-116
Volume 37, Number 10, October 2004
- Bob Colwell:
Trusting a Chaotic Future. 8-10
- David Geer:
Will Gesture-Recognition Technology Point the Way? 20-23 - George Lawton:
The Lowdown on High-Rise Chips. 24-27 - Linda Dailey Paulson:
News Briefs. 28-30
- Cecil Chua Eng Huang, Jonathan Wareham:
Fighting Internet Auction Fraud: An Assessment and Proposal. 31-37
- Brian Whitworth, Elizabeth Whitworth:
Spam and the Social-Technical Gap. 38-45
- David Garlan, Shang-Wen Cheng, An-Cheng Huang, Bradley R. Schmerl, Peter Steenkiste:
Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure. 46-54 - Hossein Saiedian, Srikrishnan Raguraman:
Using UML-Based Rate Monotonic Analysis to Predict Schedulability. 56-63 - David Harel, Bernhard Rumpe:
Meaningful Modeling: What's the Semantics of "Semantics"?. 64-72
- William G. Griswold, Patricia Shanahan, Steven W. Brown, Robert T. Boyer, Matt Ratto, R. Benjamin Shapiro, Tan Minh Truong:
ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing. 73-81
- Sean W. Smith:
Magic Boxes and Boots: Security in Hardware. 106-109
- Chris Schmandt, Natalia Marmasse:
User-Centered Location Awareness. 110-111
- Mike Goslin, Mark R. Mine:
The Panda3D Graphics Engine. 112-114
- Muthucumaru Maheswaran, Shoukat Ali:
A Taxonomy of Network Computing Systems. 115-117
- Victor J. Skowronski:
Do Agile Methods Marginalize Problem Solvers? 120
Volume 37, Number 11, November 2004
- Bob Colwell:
All Things Are Connected. 10-12
- Neal Leavitt:
Are Web Services Finally Ready to Deliver? 14-18 - Linda Dailey Paulson:
News Briefs. 20-22
- Paul S. Rosenbloom:
A New Framework for Computer Science and Engineering. 23-28 - Mike O'Neal:
Restructuring Computing Programs to Meet Employment Challenges. 29-34
- Krishna Kant, Prasant Mohapatra:
Guest Editors' Introduction: Internet Data Centers. 35-37 - Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan, David E. Lowell, Mike Wray, Tom Christian, Nigel Edwards, Chris I. Dalton, Frederic Gittler:
SoftUDC: A Software-Based Data Center for Utility Computing. 38-46 - Greg J. Regnier, Srihari Makineni, Ramesh Illikkal, Ravi R. Iyer, Dave B. Minturn, Ram Huggahalli, Donald Newell, Linda S. Cline, Annie P. Foong:
TCP Onloading for Data Center Servers. 48-58 - George Candea, Aaron B. Brown, Armando Fox, David A. Patterson:
Recovery-Oriented Computing: Building Multitier Dependability. 60-67 - Ricardo Bianchini, Ramakrishnan Rajamony:
Power and Energy Management for Server Systems. 68-74
- Products. 77
- Bookshelf. 78
- Computer Society Connection. 80-83
- Call and Calendar. Computer 37(11): 87-89 (2004)
- Career Opportunities. 90-104
- Vesna Hassler:
Online Collaboration Products. 106-109
- Jim Hughes:
IEEE Standard for Encrypted Storage. 110-112
- Wayne H. Wolf:
Applications and Architectures. 114-116
- W. Neville Holmes:
The Usefulness of Hindsight. 118-120
Volume 37, Number 12, December 2004
- Bob Colwell:
Interface Quotas and Internet-Derived Value. 10-12
- Carl K. Chang:
Transforming the World's Computer Society: Together, We Will Get It Done! 14-15
- Sixto Ortiz Jr.:
Internet Telephony Jumps off the Wires. 16-19 - David Geer:
Digital Rights Technology Sparks Interoperability Concerns. 20-22 - Linda Dailey Paulson:
News Briefs. 23-25
- Mikael Lindvall, Dirk Muthig, Aldo Dagnino, Christina Wallin, Michael Stupperich, David Kiefer, John May, Tuomo Kähkönen:
Agile Software Development in Large Organizations. 26-34
- Brad A. Myers, Jeffrey Nichols, Jacob O. Wobbrock, Robert C. Miller:
Taking Handheld Devices to the Next Level. 36-43 - Thorsten Prante, Norbert A. Streitz, Peter Tandler:
Roomware: Computers Disappear and Interaction Evolves. 47-54 - Bill N. Schilit, Uttam Sengupta:
Device Ensembles. 56-64 - Chandrasekhar Narayanaswami, Mandayam T. Raghunath:
Expanding the Digital Camera's Reach. 65-73
- 2004 Annual Index. 74-86
- Call and Calendar. Computer 37(12): 87-88 (2004)
- Doris L. Carver:
Reviewers Make Vital Contributions to Computer. 89-91 - Cooper Named 2005 Computer Society President-Elect. 92-93
- Bookshelf. 94
- Products. 95
- Career Opportunities. 96-114
- Upkar Varshney:
Vehicular Mobile Commerce. 116-118
- Malik Audeh:
Metropolitan-Scale Wi-Fi Mesh Networks. 119-121
- Michael R. Macedonia:
Small is Beautifu. 122-123
- William A. Arbaugh:
he Real Risk of Digital Voting? 124-125
- Simone Santini:
Determining Computing Science's Role. 126-128
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.