default search action
IEEE Computer, Volume 48
Volume 48, Number 1, January 2015
- Tom Conte:
A Time of Change. 4-6 - Sumi Helal:
Sustaining Computer's Impact and Adapting to Change. 7-9 - Ying Xu:
Carrying out Phylogenetic Analyses through Computational Model Checking. 12 - Charles R. Severance:
Khan Academy and Computer Science. 14-15 - Brian M. Gaff:
IP Issues for Start-ups. 16-18 - Roy Want, Bill N. Schilit, Scott Jenson:
Enabling the Internet of Things. 28-35 - Fadi H. Gebara, H. Peter Hofstee, Kevin J. Nowka:
Second-Generation Big Data Systems. 36-41 - Peter Fonash, Phyllis A. Schneck:
Cybersecurity: From Months to Milliseconds. 42-50 - Constantinos Patsakis, Paul Laird, Michael Clear, Mélanie Bouroche, Agusti Solanas:
Interoperable Privacy-Aware E-Participation within Smart Cities. 52-58 - Stephen P. Crago, John Paul Walters:
Heterogeneous Cloud Computing: The Way Forward. 59-61 - Luca Caviglione, Wojciech Mazurczyk:
Understanding Information Hiding in iOS. 62-65 - Mitchell E. Daniels:
Measuring Great Jobs and Great Lives: The Gallup-Purdue Index. 66-69 - Ari Popper:
Transforming Business through Science Fiction Prototyping. 70-72 - Jennifer Costley:
Leveraging the Standards Life Cycle for Green IT. 73-75 - Hal Berghel:
A Paperless Gamble. 76-78 - David Alan Grier:
State Transitions. 92
Volume 48, Number 2, February 2015
- Elisa Bertino:
Denial-of-Service Attacks to UMTS. 6 - Charles R. Severance:
Guido van Rossum: The Early Years of Python. 7-9 - Brian M. Gaff:
BYOD? OMG! 10-11 - Alf Weaver, Renée C. Bryce:
Technological Advances in Medicine: It's Personal [Guest editors' introduction]. 21-23 - Jingquan Li:
Ensuring Privacy in a Personal Health Record System. 24-31 - Marina Velikova, Peter J. F. Lucas, Maarten van der Heijden:
Intelligent Disease Self-Management with Mobile Technology. 32-39 - Kyungtae Kang, Qixin Wang, Junbeom Hur, Kyung-Joon Park, Lui Sha:
Medical-Grade Quality of Service for Real-Time Mobile Healthcare. 41-49 - Arshdeep Bahga, Vijay Krishna Madisetti:
Healthcare Data Integration and Informatics in the Cloud. 50-57 - Erman Ayday, Emiliano De Cristofaro, Jean-Pierre Hubaux, Gene Tsudik:
Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare? 58-66 - Adam P. Spring:
Creating Substance from a Cloud: Low-Cost Product Generation. 67-74 - Greg Byrd:
Spotlighting Student Innovation. 75-76 - Hal Berghel:
Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole. 77-80 - Emil Vassev, Mike Hinchey:
KnowLang: Knowledge Representation for Self-Adaptive Systems. 81-84 - Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo:
Attribute-Based Access Control. 85-88 - David Alan Grier:
The Tyranny of Geography. 100
Volume 48, Number 3, March 2015
- Björn W. Schuller:
Do Computers Have Personality? 6-7 - Charles R. Severance:
Guido van Rossum: The Modern Era of Python. 8-10 - Lee Garber:
News. 13-19 - Venkat N. Gudivada, Ricardo Baeza-Yates, Vijay V. Raghavan:
Big Data: Promises and Problems. 20-23 - Vito Giovanni Castellana, Alessandro Morari, Jesse Weaver, Antonino Tumeo, David Haglin, Oreste Villa, John Feo:
In-Memory Graph Databases for Web-Scale Data. 24-35 - Zhenyun Zhuang, Haricharan Ramachandra, Chaoyue Xiong:
Taming Replication Latency of Big Data Events with Capacity Planning. 36-41 - Srividya K. Bansal, Sebastian Kagemann:
Integrating Big Data: A Semantic Extract-Transform-Load Framework. 42-50 - Karamjit Kaur, Rinkle Rani:
Managing Data in Healthcare Information Systems: Many Models, One Solution. 52-59 - Martin Giese, Ahmet Soylu, Guillermo Vega-Gorgojo, Arild Waaler, Peter Haase, Ernesto Jiménez-Ruiz, Davide Lanti, Martín Rezk, Guohui Xiao, Özgür L. Özçep, Riccardo Rosati:
Optique: Zooming in on Big Data. 60-67 - Hasan Alkhatib, Paolo Faraboschi, Eitan Frachtenberg, Hironori Kasahara, Danny B. Lange, Phillip A. Laplante, Arif Merchant, Dejan S. Milojicic, Karsten Schwan:
What Will 2022 Look Like? The IEEE CS 2022 Report. 68-76 - Ninad S. Thakoor, Le An, Bir Bhanu, Santhoshkumar Sunderrajan, B. S. Manjunath:
People Tracking in Camera Networks: Three Open Questions. 78-86 - Hong Linh Truong, Schahram Dustdar:
Programming Elasticity in the Cloud. 87-90 - Kasper Hornbæk:
Flexible Displays, Rigid Designs? 92-96 - Tawny Schlieski:
Virtual Dystopia. 97-98 - James Bret Michael:
Trusted Computing: An Elusive Goal. 99-101 - Hal Berghel:
Noirware. 102-107 - Christian Timmerer, Touradj Ebrahimi, Fernando Pereira:
Toward a New Assessment of Quality. 108-110 - Bob Aiello:
Managing the High-Performance Computer Society Standards Working Group. 111-113 - Steve Roach, Mehran Sahami:
CS2013: Computer Science Curricula 2013. 114-116 - David Alan Grier:
Building Trust. 136
Volume 48, Number 4, April 2015
- David A. Forsyth:
Representation Learning. 6 - Brian M. Gaff:
Important IP Cases in 2015, Part One. 7-9 - D. Frank Hsu, Dorothy Marinucci, Jeffrey M. Voas:
Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem. 12-14 - Ruby B. Lee:
Rethinking Computers for Cybersecurity. 16-25 - David Gillman, Yin Lin, Bruce M. Maggs, Ramesh K. Sitaraman:
Protecting Websites from Attack with Secure Delivery Networks. 26-34 - Kristin E. Heckman, Frank J. Stech, Ben S. Schmoker, Roshan K. Thomas:
Denial and Deception in Cyber Defense. 36-44 - Tomas Vagoun, George O. Strawn:
Implementing the Federal Cybersecurity R&D Strategy. 45-55 - Sek Chai:
Enabling Smart Camera Networks with Smartphone Processors. 56-63 - Jon D. Hagar, Thomas L. Wissink, D. Richard Kuhn, Raghu Kacker:
Introducing Combinatorial Testing in a Large Organization. 64-72 - Greg Byrd:
A Little Ingenuity Solves an Elephant-Sized Problem. 74-77 - Emily Shen, Mayank Varia, Robert K. Cunningham, W. Konrad Vesey:
Cryptographically Secure Computation. 78-81 - Hal Berghel:
Borderline Executive Disorder. 82-86 - David Alan Grier:
Accidents Will Happen. 104
Volume 48, Number 5, May 2015
- Ling Liu:
Enhancing Cloud Services through Multitier Workload Analysis. 6 - Charles R. Severance:
John Resig: Building JQuery. 7-8 - Brian M. Gaff:
Important IP Cases in 2015, Part Two. 9-11 - Ron Vetter, San Murugesan:
The Web: The Next 25 Years. 14-17 - Vishnu S. Pendyala, Simon S. Y. Shim, Christoph Bussler:
The Web That Extends beyond the World. 18-25 - Dave Raggett:
The Web of Things: Challenges and Opportunities. 26-32 - Jörg Heuer, Johannes Hund, Oliver Pfaff:
Toward the Web of Things: Applying Web Technologies to the Physical World. 34-42 - Ron Vetter, San Murugesan:
Roundtable Discussion: The Web We Look Forward To. 44-50 - Dirk Riehle:
How Open Source Is Changing the Software Developer's Career. 51-57 - Jason Schlessman, Marilyn Wolf:
Tailoring Design for Embedded Computer Vision Applications. 58-62 - Alexander De Luca, Janne Lindqvist:
Is Secure and Usable Smartphone Authentication Asking Too Much? 64-68 - Alida Draudt, Jonjozuf Hadley, Ryan Hogan, Leticia Murray, Gregory Stock, Julia Rose West:
Six Insights about Science Fiction Prototyping. 69-71 - Wenqi Zhou, Yuhong Liu:
Online Product Rating Manipulation and Market Performance. 72-75 - Susanne E. Hambrusch, Ran Libeskind-Hadas:
The PhD Pipeline. 76-79 - Marat Zhanikeev:
A Cloud Visitation Platform to Facilitate Cloud Federation and Fog Computing. 80-83 - Hal Berghel:
What Makes a Good Column. 84-87 - George F. Hurlburt:
Cyberhuman Security. 88-91 - Karen Gundy-Burlet:
The Use of Standards on the LADEE Mission. 92-95 - Manfred Broy:
Rethinking Nonfunctional Software Requirements. 96-99 - David Alan Grier:
The GitHub Effect. 116
Volume 48, Number 6, June 2015
- Prasant Mohapatra:
Distributed Optimal Channel Access in Cognitive Radio Networks. 6 - Charles R. Severance:
Roy T. Fielding: Understanding the REST Style. 7-9 - Thad Starner, Tom L. Martin:
Wearable Computing: The New Dress Code [Guest editors' introduction]. 12-15 - Anhong Guo, Xiaolong Wu, Zhengyang Shen, Thad Starner, Hannes Baumann, Scott M. Gilliland:
Order Picking with Head-Up Displays. 16-24 - Reuben Kirkham:
Can Disability Discrimination Law Expand the Availability of Wearable Computers? 25-33 - Jon C. Hammer, Tingxin Yan:
Inferring Mobile User Status with Usage Cues. 34-40 - Andrea Rosales, Sergio Sayago, Josep Blat:
Beeping Socks and Chirping Arm Bands: Wearables That Foster Free Play. 41-48 - Najeeb Ullah, Maurizio Morisio, Antonio Vetrò:
Selecting the Best Reliability Model to Predict Residual Defects in Open Source Software. 50-58 - Greg Byrd:
Tracking Cows Wirelessly. 60-63 - Hal Berghel:
A Farewell to Air Gaps, Part 1. 64-68 - Jeffrey M. Voas:
Vetting Mobile App Vendors. 69-71 - Reiner Hähnle, Einar Broch Johnsen:
Designing Resource-Aware Cloud Applications. 72-75 - David Alan Grier:
Disruptive Computing. 100
Volume 48, Number 7, July 2015
- Jean-Luc Gaudiot:
The Times They Are A-Changin'. 4-6 - Stephen W. Keckler:
Increasing Interconnection Network Throughput with Virtual Channels. 10 - Brian M. Gaff:
"Curiouser and Curiouser!"-The Fallout from Alice. 12-14 - Jim Tørresen, Christian Plessl, Xin Yao:
Self-Aware and Self-Expressive Systems. 18-20 - Bernhard Rinner, Lukas Esterle, Jennifer Simonjan, Georg Nebehay, Roman P. Pflugfelder, Gustavo Fernández Domínguez, Peter R. Lewis:
Self-Aware and Self-Expressive Camera Networks. 21-28 - Michele Amoretti, Stefano Cagnoni:
Toward Collective Self-Awareness and Self-Expression in Distributed Systems. 29-36 - Jürgo-Sören Preden, Kalle Tammemäe, Axel Jantsch, Mairo Leier, Andri Riid, Emine Calis:
The Benefits of Self-Awareness and Attention in Fog and Mist Computing. 37-45 - Vincent van Beek, Jesse Donkervliet, Tim Hegeman, Stefan Hugtenburg, Alexandru Iosup:
Self-Expressive Management of Business-Critical Workloads in Virtualized Datacenters. 46-54 - Behrooz Parhami:
Amdahl's Reliability Law: A Simple Quantification of the Weakest-Link Phenomenon. 55-58 - Hal Berghel:
A Farewell to Air Gaps, Part 2. 59-63 - Nir Kshetri:
Recent US Cybersecurity Policy Initiatives: Challenges and Implications. 64-69 - Brian David Johnson:
Steve the Steampunk Robot. 70-72 - Soto Montalvo, Raquel Martínez-Unanue, Víctor Fresno, Rafael Capilla:
Multilingual Information Access on the Web. 73-75 - Dhananjai Madhava Rao:
Computing Efficiency in Education. 76-79 - Xiaofei Xu, Quan Z. Sheng, Liang-Jie Zhang, Yushun Fan, Schahram Dustdar:
From Big Data to Big Service. 80-83 - Per Ola Kristensson:
Next-Generation Text Entry. 84-87 - David Alan Grier:
Do We Need a Software Czar? 104
Volume 48, Number 8, August 2015
- Shixia Liu, Leila De Floriani:
Multivariate Network Exploration and Presentations. 6 - Charles R. Severance:
Anil Jain: 25 Years of Biometric Recognition. 8-10 - Antonino Tumeo, John Feo:
Irregular Applications: From Architectures to Algorithms [Guest editors' introduction]. 14-16 - G. Scott Lloyd, Maya B. Gokhale:
In-Memory Data Rearrangement for Irregular, Data-Intensive Computing. 18-25 - Daniele Buono, John A. Gunnels, Xinyu Que, Fabio Checconi, Fabrizio Petrini, Tai-Ching Tuan, Chris Long:
Optimizing Sparse Linear Algebra for Large-Scale Graph Analytics. 26-34 - Andrew Lenharth, Keshav Pingali:
Scaling Runtimes for Irregular Algorithms to Large-Scale NUMA Systems. 35-44 - Hitesh Rajput, Tanmoy Som, Soumitra Kar:
An Automated Vehicle License Plate Recognition System. 56-61 - Peter R. Lewis, Arjun Chandra, Funmilade Faniyi, Kyrre Glette, Tao Chen, Rami Bahsoon, Jim Tørresen, Xin Yao:
Architectural Aspects of Self-Aware and Self-Expressive Computing Systems: From Psychology to Engineering. 62-70 - Greg Byrd:
Cycling through Cyberspace. 72-75 - Hugo Bruneliere, Jordi Cabot, Javier Luis Cánovas Izquierdo, Leire Orue-Echevarria Arrieta, Oliver Strauß, Manuel Wimmer:
Software Modernization Revisited: Challenges and Prospects. 76-80 - Zhi-Kai Zhang, Michael Cheng Yi Cho, Zong-Yu Wu, Shiuhpyng Winston Shieh:
Identifying and Authenticating IoT Objects in a Natural Context. 81-83 - Darold Davis:
Taming the Engineering of Information Services Websites with Standards. 84-89 - Hal Berghel:
TSA: Mission Creep Meets Waste. 90-94 - David Alan Grier:
In Search of the Diabolical Disconnect. 128
Volume 48, Number 9, September 2015
- Sumi Helal:
However You Like It: Computer's Enhanced Digital Format or Affordable Print Option. 6 - Afonso S. Bandeira:
An Efficient Algorithm for Exact Recovery of Vertex Variables from Edge Measurements. 8-9 - Brian M. Gaff:
Legal Issues with Wearable Technology. 10-12 - Roy Want, Schahram Dustdar:
Activating the Internet of Things [Guest editors' introduction]. 16-20 - Jacob Beal, Danilo Pianini, Mirko Viroli:
Aggregate Programming for the Internet of Things. 22-30 - Laura Belli, Simone Cirani, Luca Davoli, Andrea Gorrieri, Mirko Mancin, Marco Picone, Gianluigi Ferrari:
Design and Deployment of an IoT Application-Oriented Testbed. 32-40 - Mateusz Mikusz, Sarah Clinch, Rachel Jones, Mike Harding, Christopher Winstanley, Nigel Davies:
Repurposing Web Analytics to Support the IoT. 42-49 - Keun Sup Shim, Mieszko Lis, Omer Khan, Srinivas Devadas:
The Execution Migration Machine: Directoryless Shared-Memory Architecture. 50-59 - Damian D. G. Gessler, Evren Sirin:
SSWAP: Enabling Transaction-Time Reasoning for Semantic Workflows. 60-68 - Amir Parssian, William Yeoh, Mong-Shan Ee:
Quality-Based SQL: Specifying Information Quality in Relational Database Queries. 69-74 - Hal Berghel:
STEM Crazy. 75-80 - Steve Brown:
The Power of Story. 82-83 - Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas:
Securely Making "Things" Right. 84-88 - Ralf Klamma:
Near-Real-Time Social Computing. 90-92 - Tao Chen, Rami Bahsoon:
Toward a Smarter Cloud: Self-Aware Autoscaling of Cloud Configurations and Resources. 93-96 - Kevin Gary:
Project-Based Learning. 98-100 - Eric Durant:
CE2016: Guidelines for Forward-Looking Computer Engineering Curricula. 102-104 - David Alan Grier:
Industrial Leadership. 120
Volume 48, Number 10, October 2015
- Paolo Montuschi:
Spiking Neural Network Architecture. 6 - Charles R. Severance:
Anant Agarwal: Inside edX. 8-9 - Giulio Jacucci, Stephen Fairclough, Erin Treacy Solovey:
Physiological Computing. 12-16 - David Rozado Fernandez, Andreas Dünser:
Combining EEG with Pupillometry to Improve Cognitive Workload Detection. 18-25 - Riccardo Sioni, Luca Chittaro:
Stress Detection Using Physiological Sensors. 26-33 - Evan M. Peck, Emily Carlin, Robert J. K. Jacob:
Designing Brain-Computer Interfaces for Attention-Aware Systems. 34-42 - Venkat N. Gudivada, Dhana Rao, Jordan Paris:
Understanding Search-Engine Optimization. 43-52 - Abdelkareem Bedri, Himanshu Sahni, Pavleen Thukral, Thad Starner, David Byrd, Peter Presti, Gabriel Reyes, Maysam Ghovanloo, Zehua Guo:
Toward Silent-Speech Control of Consumer Wearables. 54-62 - Madison Blake, Rabih Younes, Jacob Dennis, Thomas L. Martin, Mark T. Jones:
A User-Independent and Sensor-Tolerant Wearable Activity Classifier. 64-71 - Hal Berghel:
Legislating Technology (Badly). 72-78 - Greg Byrd:
21st Century Pong. 80-84 - Tom Mens, Philippe Grosjean:
The Ecology of Software Ecosystems. 85-87 - Chia-Wei Wang, Michael Cheng Yi Cho, Chi-Wei Wang, Shiuhpyng Winston Shieh:
Combating Software Piracy in Public Clouds. 88-91 - David Alan Grier:
The Voracious Discipline. 120
Volume 48, Number 11, November 2015
- Mike Sharples:
Seamless Learning: Using Location-Aware Technology to Support Art Education. 6 - Brian M. Gaff:
Patent Infringement Damages. 7-9 - Vladimir Getov:
Scientific Grand Challenges: Toward Exascale Supercomputing and Beyond. 12-14 - Takemasa Miyoshi, Keiichi Kondo, Koji Terasaki:
Big Ensemble Data Assimilation in Numerical Weather Prediction. 15-21 - Dylan Keon, Cherri M. Pancake, Harry Yeh:
Protecting Our Shorelines: Modeling the Effects of Tsunamis and Storm Waves. 23-32 - Nichols A. Romero, Aiichiro Nakano, Katherine Riley, Fuyuki Shimojo, Rajiv K. Kalia, Priya Vashishta, Paul C. Messina:
Quantum Molecular Dynamics in the Post-Petaflops Era. 33-41 - Erich Strohmaier, Hans Werner Meuer, Jack J. Dongarra, Horst D. Simon:
The TOP500 List and Progress in High-Performance Computing. 42-49 - Simon Portegies Zwart, Jeroen Bédorf:
Using GPUs to Enable Simulation with Computational Gravitational Dynamics in Astrophysics. 50-58 - Andrea Valdi, Eros Lever, Simone Benefico, Davide Quarta, Stefano Zanero, Federico Maggi:
Scalable Testing of Mobile Antivirus Applications. 60-68 - Jia Liu, Yong Xue, Dominic Palmer-Brown, Ziqiang Chen, Xingwei He:
High-Throughput Geocomputational Workflows in a Grid Environment. 70-80 - Hal Berghel:
The Dystory of Ahmed's Clock. 82-85 - Marco A. S. Netto, Renato Luiz de Freitas Cunha, Nicole Sultanum:
Deciding When and How to Move HPC Jobs to the Cloud. 86-89 - Ed Finn:
We Can Build the Future. 90-91 - Kim Schaffer:
Expanding Continuous Authentication with Mobile Devices. 92-95 - Steve Tockey:
Insanity, Hiring, and the Software Industry. 96-101 - Mukesh Kumar Saini, Abdulmotaleb El-Saddik:
Absence Privacy Loss. 102-105 - Mark A. Ardis, David Budgen, Gregory W. Hislop, Jeff Offutt, Mark J. Sebern, Willem Visser:
SE 2014: Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering. 106-109 - Adam Eck, Leen-Kiat Soh, Kristen Olson, Allan L. McCutcheon, Jolene Smyth, Robert F. Belli:
Understanding the Human Condition through Survey Informatics. 110-114 - David Alan Grier:
Hidden Persuaders. 136
Volume 48, Number 12, December 2015
- Tim Menzies:
Cross-Project Data for Software Engineering. 6 - Thomas M. Conte:
The Computer Society Must Change. 9 - Thomas M. Conte, Elie K. Track, Erik DeBenedictis:
Rebooting Computing: New Strategies for Technology Scaling. 10-13 - John M. Shalf, Robert Leland:
Computing beyond Moore's Law. 14-23 - Mohamed M. Sabry, Mingyu Gao, Gage Hills, Chi-Shuen Lee, Greg Pitner, Max M. Shulaker, Tony F. Wu, Mehdi Asheghi, Jeffrey Bokor, Franz Franchetti, Kenneth E. Goodson, Christos Kozyrakis, Igor L. Markov, Kunle Olukotun, Larry T. Pileggi, Eric Pop, Jan M. Rabaey, Christopher Ré, H.-S. Philip Wong, Subhasish Mitra:
Energy-Efficient Abundant-Data Computing: The N3XT 1, 000x. 24-33 - D. Scott Holmes, Alan M. Kadin, Mark W. Johnson:
Superconducting Computing in Large-Scale Hybrid Systems. 34-42 - Kirk Bresniker, Sharad Singhal, R. Stanley Williams:
Adapting to Thrive in a New Economy of Memory Abundance. 44-53 - Santosh Khasanvis, Mingyu Li, Mostafizur Rahman, Ayan Kumar Biswas, Mohammad Salehi Fashami, Jayasimha Atulasimha, Supriyo Bandyopadhyay, Csaba Andras Moritz:
Architecting for Causal Intelligence at Nanoscale. 54-64 - David J. Mountain, Mark R. McLean, Doug Palmer, Joshua D. Prucnal, Christopher D. Krieger:
Ohmic Weave: Memristor-Based Threshold Gate Networks. 65-71 - Michael K. Papamichael, James C. Hoe:
The CONNECT Network-on-Chip Generator. 72-79 - Jeffrey M. Voas, George F. Hurlburt:
Third-Party Software's Trust Quagmire. 80-87 - Hal Berghel:
What Price Gonzo Ethics? 88-93 - Davide Brugali, Rafael Capilla, Mike Hinchey:
Dynamic Variability Meets Robotics. 94-97 - Alexander Kott, David S. Alberts, Cliff Wang:
Will Cybersecurity Dictate the Outcome of Future Wars? 98-101 - David Alan Grier:
Quantum Imagination. 128
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.