default search action
IEEE Computer, Volume 45
Volume 45, Number 1, January 2012
- John W. Walz:
Creating Our Future. 6-7 - Ron Vetter:
Digital Computer: The Next-Generation Flagship Publication. 8-9 - Charles R. Severance:
The Second-Order Effects of Steve Jobs. 10-11 - Brian M. Gaff, Ralph A. Loren, Gabriel J. McCool:
Intellectual Property, Part I. 14-16 - Lee Garber:
The Challenges of Securing the Virtualized Environment. 17-20 - Daniel A. Reed, James R. Larus, Dennis Gannon:
Imagining the Future: Thoughts on Computing. 25-30 - Alex Pentland:
Society's Nervous System: Building Effective Government, Energy, and Public Health Systems. 31-38 - Dawn Song, Elaine Shi, Ian Fischer, Umesh Shankar:
Cloud Data Protection for the Masses. 39-45 - Bjarne Stroustrup:
Software Development for Infrastructure. 47-58 - S. Sitharama Iyengar, Xin Li, Huanhuan Xu, Supratik Mukhopadhyay, N. Balakrishnan, Amit Sawant, Puneeth Iyengar:
Toward More Precise Radiotherapy Treatment of Lung Tumors. 59-65 - Antonia Bertolino, Guglielmo De Angelis, Sampo Kellomaki, Andrea Polini:
Enhancing Service Federation Trustworthiness through Online Testing. 66-72 - Anil K. Jain, Soweon Yoon:
Automatic Detection of Altered Fingerprints. 79-82 - Doug Lyon:
The Java Tree Withers. 83-85 - Hal Berghel:
Identity Theft and Financial Fraud: Some Strangeness in the Proportions. 86-89 - Shyong K. Lam, John Riedl:
Are Our Online "Friends" Really Friends? 91-93 - Matthew E. Tolentino, Kirk W. Cameron:
The Optimist, the Pessimist, and the Global Race to Exascale in 20 Megawatts. 95-97 - David Alan Grier, Erin Dian Dumbacher:
The Common Future. 108
Volume 45, Number 2, February 2012
- Charles R. Severance:
JavaScript: Designing a Language in 10 Days. 7-8 - Brian M. Gaff, Ralph A. Loren, Elizabeth A. Spinney:
Intellectual Property, Part II. 9-11 - George Lawton:
Cloud Streaming Brings Video to Mobile Devices. 14-16 - Lee Garber:
News Briefs. 17-19 - Simon S. Y. Shim:
Guest Editor's Introduction: The CAP Theorem's Growing Impact. 21-22 - Eric A. Brewer:
Pushing the CAP: Strategies for Consistency and Availability. 23-29 - Seth Gilbert, Nancy A. Lynch:
Perspectives on the CAP Theorem. 30-36 - Daniel Abadi:
Consistency Tradeoffs in Modern Distributed Database System Design: CAP is Only Part of the Story. 37-42 - Raghu Ramakrishnan:
CAP and Cloud Data Management. 43-49 - Kenneth P. Birman, Daniel A. Freedman, Qi Huang, Patrick Dowell:
Overcoming CAP with Consistent Soft-State Replication. 50-58 - Gary C. Kessler:
Information Security: New Threats or Familiar Problems? 59-65 - Nuno Antunes, Marco Vieira:
Defending against Web Application Vulnerabilities. 66-72 - Justin Jee, Lee Case Klippel, Mahmud Shahriar Hossain, Naren Ramakrishnan, Bud Mishra:
Discovering the Ebb and Flow of Ideas from Text Corpora. 73-77 - Christian Müller-Tomfelde, Morten Fjeld:
Tabletops: Interactive Horizontal Displays for Ubiquitous Computing. 78-81 - Angelos Stavrou, Jeffrey M. Voas, Tom Karygiannis, Steve Quirolgico:
Building Security into Off-the-Shelf Smartphones. 82-84 - Jimmy Gambier:
An Independent Social Game Company's Perspective. 85-87 - Bo Brinkman:
The Next Step for Ethics Education Is Enforcing the Code. 88-90 - Francis Hsu:
The Impossible and the Possible. 91-92 - Bob Ward:
Computer Society Names Winners of Three Key Awards. 93-95 - David Alan Grier, Erin Dian Dumbacher:
The New Internationalists. 112
Volume 45, Number 3, March 2012
- Charles R. Severance:
Monash Museum of Computing History. 6-7 - Brian M. Gaff, Thomas J. Smedinghoff, Socheth Sor:
Privacy and Data Security. 8-10 - Lee Garber:
Wi-Fi Races into a Faster Future. 13-16 - Lee Garber:
News Briefs. 18-20 - T. M. Murali:
Guest Editor's Introduction: Computationally Driven Experimental Biology. 22-23 - Michael B. Mayhew, Xin Guo, Steven B. Haase, Alexander J. Hartemink:
Close Encounters of the Collaborative Kind. 24-30 - Mehmet Koyutürk:
Using Protein Interaction Networks to Understand Complex Diseases. 31-38 - Fabio Vandin, Eli Upfal, Benjamin J. Raphael:
Algorithms and Genome Sequencing: Identifying Driver Pathways in Cancer. 39-46 - Steven Skiena:
Redesigning Viral Genomes. 47-53 - Lwin Khin Shar, Hee Beng Kuan Tan:
Defending against Cross-Site Scripting Attacks. 55-62 - Xiaojun Quan, Liu Wenyin, Wenyu Dou, Hui Xiong, Yong Ge:
Link Graph Analysis for Business Site Selection. 64-69 - Hal Berghel:
WikiLeaks and the Matter of Private Manning. 70-73 - Kirk W. Cameron, Rong Ge:
Generalizing Amdahl's Law for Power and Energy. 75-77 - Aaron Halfaker, John Riedl:
Bots and Cyborgs: Wikipedia's Immune System. 79-82 - Cornelius Held, Julia Krumm, Petra Markel, Ralf P. Schenke:
Intelligent Video Surveillance. 83-84 - Bob Ward:
Call and Calendar. 88-89 - David Alan Grier, Erin Dian Dumbacher:
Free Agency. 104
Volume 45, Number 4, April 2012
- Charles R. Severance:
Discovering JavaScript Object Notation. 6-8 - Brian M. Gaff, Brian P. Murphy, Peter J. Cuomo:
Defending Against Patent Infringement. 9-12 - Sixto Ortiz Jr.:
New Approach Keeps Security in Context. 15-17 - Albrecht Schmidt, Elizabeth F. Churchill:
Interaction Beyond the Keyboard. 21-24 - Jan B. F. van Erp, Fabien Lotte, Michael Tangermann:
Brain-Computer Interfaces: Beyond Medical Applications. 26-34 - Hans Gellersen, Florian Block:
Novel Interactions on the Keyboard. 36-40 - Andreas Riener:
Gestural Interaction in Vehicular Applications. 42-47 - Michel Beaudouin-Lafon, Stéphane Huot, Mathieu Nancel, Wendy E. Mackay, Emmanuel Pietriga, Romain Primet, Julie Wagner, Olivier Chapuis, Clément Pillias, James Eagan, Tony Gjerlufsen, Clemens Nylandsted Klokmose:
Multisurface Interaction in the WILD Room. 48-56 - Andrea Bianchi, Ian Oakley, Dong-Soo Kwon:
Open Sesame: Design Guidelines for Invisible Passwords. 58-65 - Kai-Hui Chang, Chris Browy:
Parallel Logic Simulation: Myth or Reality? 67-73 - Daniel M. Yellin, Yifat Yulevich, Alexander Pyasic, Avshalom Houri:
Optimized Interactive Processes. 74-81 - Gary Marsden, Edward Cutrell, Matt Jones, Amit Anil Nanavati, Nitendra Rajput:
Making Technology Invisible in the Developing World. 82-85 - David C. Hodge:
Increasing Tuition's Affordability. 86-88 - Brian Fitzgerald:
Software Crisis 2.0. 89-91 - Anthony Patrick Melaragno, Damindra Bandara, Duminda Wijesekera, James Bret Michael:
Securing the ZigBee Protocol in the Smart Grid. 92-94 - Henry Tsai, Kelvin Sung:
Mobile Applications and Museum Visitation. 95-98 - David Alan Grier, Erin Dian Dumbacher:
Learning from the Best. 116
Volume 45, Number 5, May 2012
- Charles R. Severance:
Van Jacobson: Getting NSFNet off the Ground. 6-9 - Brian M. Gaff, Stephen G. Huggard, Gregory W. Carey:
Do I Need A Lawyer? If You Have to Ask, You Probably Do. 10-12 - Neal Leavitt:
Will Power Problems Curtail Processor Progress? 15-17 - Lee Garber:
News Briefs. 18-20 - Roy Want, Bill N. Schilit:
Interactive Digital Signage. 21-24 - Nick Taylor, Keith Cheverst:
Supporting Community Awareness with Interactive Displays. 26-32 - Adrian Friday, Nigel Davies, Christos Efstratiou:
Reflections on Long-Term Experiments with Public Displays. 34-41 - Timo Ojala, Vassilis Kostakos, Hannu Kukka, Tommi Heikkinen, Tomas Lindén, Marko Jurmu, Simo Hosio, Fabio Kruger, Daniele Zanni:
Multipurpose Interactive Public Displays in the Wild: Three Years Later. 42-49 - Florian Alt, Jörg Müller, Albrecht Schmidt:
Advertising on Public Display Networks. 50-56 - Nigel Davies, Marc Langheinrich, Rui José, Albrecht Schmidt:
Open Display Networks: A Communications Medium for the 21st Century. 58-64 - Jamie Erbes, Hamid R. Motahari Nezhad, Sven Graupner:
The Future of Enterprise IT in the Cloud. 66-72 - Lars Hopland Nestås, Kjell Jørgen Hole:
Building and Maintaining Trust in Internet Voting. 74-80 - Tony Hey, Dennis Gannon, Jim Pinkelman:
The Future of Data-Intensive Science. 81-82 - Zhiwei Xu:
Measuring Green IT in Society. 83-85 - Hal Berghel:
Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians. 86-88 - Alessio Malizia, Kai A. Olsen:
Toward a New Search Paradigm-Can We Learn from Ants? 89-91 - Anil K. Jain, Rong Jin, Jung-Eun Lee:
Tattoo Image Matching and Retrieval. 93-96 - David Alan Grier, Erin Dian Dumbacher:
Teaching the Intangible. 116
Volume 45, Number 6, 2012
- Brian M. Gaff, Gregory J. Ploussios:
Open Source Software. 9-11 - Hong Mei, Gang Huang, Tao Xie:
Internetware: A Software Paradigm for Internet Computing. 26-31 - Mikio Aoyama:
Computing for the Next-Generation Automobile. 32-37 - Lijuan Wang, Yao Qian, Matthew R. Scott, Gang Chen, Frank K. Soong:
Computer-Assisted Audiovisual Language Learning. 38-47 - William Cheng-Chung Chu, Chao-Tung Yang, Chih-Wei Lu, Chih-Hung Chang, Juei-Nan Chen, Pao-Ann Hsiung, Hahn-Ming Lee:
Cloud Computing in Taiwan. 48-56 - Wing-Kin Sung:
Bioinformatics Applications in Genomics. 57-63 - Zhenyu Zhang, W. K. Chan, T. H. Tse:
Fault Localization Based Only on Failed Runs. 64-71 - Jerome Israel:
Why the FBI Can't Build a Case Management System. 73-80 - Virginia N. L. Franqueira, Roel J. Wieringa:
Role-Based Access Control in Retrospect. 81-88 - Jeff Munson, Phillip T. Pasqual:
Using Technology in Autism Research: The Promise and the Perils. 89-91 - Devon M. Simmonds:
The Programming Paradigm Evolution. 93-95 - Richard J. Lipton:
Might Turing Have Won a Turing Award? 96-97 - Robert K. Harle, Andy Hopper:
Sports Sensing: An Olympic Challenge for Computing. 98-101 - Rolf Oppliger, Bruno Wildhaber:
Common Misconceptions in Computer and Information Security. 102-104 - David Alan Grier, Erin Dian Dumbacher:
Controlling Share. 128
Volume 45, Number 7, 2012
- Charles R. Severance:
The Art of Teaching Computer Science: Niklaus Wirth. 8-10 - Brian M. Gaff, Richard N. Kimball, Jill M. Hanson:
Raising Capital: Where to Find It, How to Secure It, and Tips on What to Avoid. 11-13 - Michael Gervautz, Dieter Schmalstieg:
Anywhere Interfaces Using Handheld Augmented Reality. 26-31 - Mark R. Mine, Jeroen van Baar, Anselm Grundhöfer, David Rose, Bei Yang:
Projection-Based Augmented Reality in Disney Theme Parks. 32-40 - Ailsa Barry, Graham A. Thomas, Paul Debenham, Jonathan Trout:
Augmented Reality in a Public Space: The Natural History Museum, London. 42-47 - Mark Billinghurst, Andreas Dünser:
Augmented Reality in the Classroom. 56-63 - Daniel E. O'Leary:
Computer-Based Political Action: The Battle and Internet Blackout over PIPA. 64-72 - Jianyong Chen, Yang Wang, Xiaomin Wang:
On-Demand Security Architecture for Cloud Computing. 73-78 - Hal Berghel:
The OuijAmazon Desktop Metaphor. 80-82 - Eitan Frachtenberg:
Holistic Datacenter Design in the Open Compute Project. 83-85 - Patrizio Campisi, Daria La Rocca, Gaetano Scarano:
EEG for Automatic Person Recognition. 87-89 - Anuradha Uduwage, Joseph A. Konstan:
The Answer Is Out There: Online Q&A Sites. 90-92 - David Alan Grier, Erin Dian Dumbacher:
Repurposers. 116
Volume 45, Number 8, August 2012
- Charles R. Severance:
Teaching the World: Daphne Koller and Coursera. 8-9 - Brian M. Gaff, Kenneth Choy, Jamie Chan:
Doing Business in China. 11-13 - Lee Garber:
Converged Infrastructure: Addressing the Efficiency Challenge. 17-20 - Stephen W. Keckler, Steven K. Reinhardt:
Massively Multithreaded Computing Systems. 24-25 - John A. Stratton, Christopher I. Rodrigues, I-Jui Sung, Li-Wen Chang, Nasser Anssari, Geng (Daniel) Liu, Wen-mei W. Hwu, Nady Obeid:
Algorithm and Data Optimization Techniques for Scaling to Massively Threaded Systems. 26-32 - Stanley Tzeng, Brandon Lloyd, John D. Owens:
A GPU Task-Parallel Model with Dependency Resolution. 34-41 - Benedict R. Gaster, Lee W. Howes:
Can GPGPU Programming Be Liberated from the Data-Parallel Bottleneck? 42-52 - Antonino Tumeo, Simone Secchi, Oreste Villa:
Designing Next-Generation Massively Multithreaded Architectures for Irregular Applications. 53-61 - Stephen Davies, Stacey Aylor Seal, Jesse Hatfield:
Cinefile: A Category-Based Analytic Browser. 62-69 - Lorraine J. Haricombe, L. Ada Emmett, Perry Alexander:
Open Access: An Evolving Alternative. 70-72 - Victor Ng-Thow-Hing, Sandra Y. Okita:
Playdates with Robots. 73-75 - Franco Zambonelli:
Toward Sociotechnical Urban Superorganisms. 76-78 - Tom Mens:
On the Complexity of Software Systems. 79-81 - William H. Boothby, Wolff Heintschel von Heinegg, James Bret Michael, Michael N. Schmitt, Thomas C. Wingfield:
When Is a Cyberattack a Use of Force or an Armed Attack? 82-84 - David Alan Grier, Erin Dian Dumbacher:
The Winner Takes It All. 120
Volume 45, Number 9, September 2012
- Charles R. Severance:
Bertrand Meyer: Software Engineering and the Eiffel Programming Language. 6-8 - Brian M. Gaff, Brian P. Murphy, Ralph A. Loren, Christine A. Dudzik, Lisa Swiszcz:
Patent Reform: New Tools for Challenging Patent Validity as of September 2012. 9-11 - Neal Leavitt:
Are Mobile Payments Ready to Cash in Yet? 15-18 - Kaushik R. Chowdhury, Dave Cavalcanti, Mostafa El-Said, Tommaso Mazza, Chittabrata Ghosh:
Modeling and Simulation of Smart and Green Computing Systems. 22-23 - Swades De, Riya Singhal:
Toward Uninterrupted Operation of Wireless Sensor Networks. 24-30 - Prabhakar T. Venkata, S. N. Akshay Uttama Nambi, R. Venkatesha Prasad, Ignas G. Niemegeers:
Bond Graph Modeling for Energy-Harvesting Wireless Sensor Networks. 31-38 - Murat Kocaoglu, Derya Malak, Özgür B. Akan:
Fundamentals of Green Communications and Computing: Modeling and Simulation. 40-46 - Sungkap Yeo, Hsien-Hsin S. Lee:
SimWare: A Holistic Warehouse-Scale Computer Simulator. 48-55 - Baris Aksanli, Jagannathan Venkatesh, Tajana Simunic Rosing:
Using Datacenter Simulation to Evaluate Green Energy Integration. 56-64 - Mahinthan Chandramohan, Hee Beng Kuan Tan:
Detection of Mobile Malware in the Wild. 65-71 - Julian Ohrt, Volker Turau:
Cross-Platform Development Tools for Smartphone Applications. 72-79 - Xiaoqi Yan, Chi-Wing Fu, Andrew J. Hanson:
Multitouching the Fourth Dimension. 80-88 - Bruce Nordman, Ken Christensen, Alan K. Meier:
Think Globally, Distribute Power Locally: The Promise of Nanogrids. 89-91 - Hal Berghel:
The Dumbing Down of SportPhishing. 92-94 - Karl Ricanek Jr., Chris Boehnen:
Facial Analytics: From Big Data to Law Enforcement. 95-97 - Cliff Lampe, Nicole B. Ellison:
Understanding Facebook: Social Computing Isn't 'Just' Social. 98-100 - Dejan S. Milojicic, Martin F. Arlitt, Dorée Duncan Seligmann, George K. Thiruvathukal, Christian Timmerer:
Innovation Mashups: Academic Rigor Meets Social Networking Buzz. 101-105 - David Alan Grier, Erin Dian Dumbacher:
It's Complicated. 124
Volume 45, Number 10, October 2012
- Charles R. Severance:
The Apache Software Foundation: Brian Behlendorf. 8-9 - Brian M. Gaff, Karl P. Fryzel:
Starting a Business: Which Entity Structure Is Best for You? 10-12 - Lee Garber:
Using In-Memory Analytics to Quickly Crunch Big Data. 16-18 - Mike Hinchey, Sooyong Park, Klaus Schmid:
Building Dynamic Software Product Lines. 22-26 - Jan Bosch, Rafael Capilla:
Dynamic Variability in Software-Intensive Embedded System Families. 28-35 - Nelly Bencomo, Svein O. Hallsteinsen, Eduardo Santana de Almeida:
A View of the Dynamic Software Product Line Landscape. 36-41 - Luciano Baresi, Sam Guinea, Liliana Pasquale:
Service-Oriented Dynamic Software Product Lines. 42-48 - Jaejoon Lee, Gerald Kotonya, Daniel Robinson:
Engineering Service-Based Dynamic Software Product Lines. 49-55 - Pete Sawyer, Raúl Mazo, Daniel Diaz, Camille Salinesi, Danny Hughes:
Using Constraint Programming to Manage Configurations in Self-Adaptive Systems. 56-63 - Mark Hedley, Jian (Andrew) Zhang:
Accurate Wireless Localization in Sports. 64-70 - Moustafa AbdelBaky, Manish Parashar, Hyunjoo Kim, Kirk E. Jordan, Vipin Sachdeva, James C. Sexton, Hani Jamjoom, Zon-Yin Shae, Gergina Pencheva, Reza Tavakoli, Mary F. Wheeler:
Enabling High-Performance Computing as a Service. 72-80 - Ann E. K. Sobel:
Should Everyone Go to College? 82-83 - James D. Hollan:
Activity-Enriched Computing: Capturing and Mining Activity Histories. 84-87 - Tim Boland, Paul E. Black:
Juliet 1.1 C/C++ and Java Test Suite. 88-90 - Peter Gruenbaum:
Underrepresented Youth Creating Culturally Relevant Games. 91-93 - Krishna P. C. Madhavan, Mihaela Vorvoreanu, Niklas Elmqvist, Aditya Johri, Naren Ramakrishnan, G. Alan Wang, Ann F. McKenna:
Portfolio Mining. 95-99 - Bryan Reinicke:
It's 2012, So Why Am I Driving a 1972 Bug? 100-103 - David Alan Grier, Erin Dian Dumbacher:
The Computer in the Mirror. 128
Volume 45, Number 11, 2012
- Brian M. Gaff, Ralph A. Loren, Amy M. DeCloux:
A Brief Overview of the America Invents Act. 8-10 - Doug B. Fridsma:
Electronic Health Records: The HHS Perspective. 24-26 - Inmaculada Carrión Señor, José Luis Fernández-Alemán, Ambrosio Toval:
Personal Health Records: New Means to Safely Handle Health Data? 27-33 - Raik Kuhlisch, Ben Kraufmann, Hannes Restel:
Electronic Case Records in a Box: Integrating Patient Data in Healthcare Networks. 34-40 - Sujoy Basu, Alan H. Karp, Jun Li, James Pruyne, Jerry Rolia, Sharad Singhal, Jaap Suermondt, Ram Swaminathan:
Fusion: Managing Healthcare Records at Cloud Scale. 42-49 - Kevin Brady, Ram D. Sriram, Bettijoyce Lide, Kathleen Roberts:
Testing the Nation's Healthcare Information Infrastructure: NIST Perspective. 50-57 - Barry Fagin, Dale Skrien:
Debugging on the Shoulders of Giants: Von Neumann's Programs 65 Years Later. 59-68 - Jason L. Dedrick, Jian Tang, Kenneth L. Kraemer:
China's Indigenous Innovation Policy: Impact on Multi-national R&D. 70-78 - Edward Curry, Bill Guyon, Charles Sheridan, Brian Donnellan:
Sustainable IT: Challenges, Postures, and Outcomes. 79-81 - Hal Berghel:
Stratfor or Stratagainst. 82-85 - Anil K. Jain, Karthik Nandakumar:
Biometric Authentication: System Security and User Privacy. 87-92 - Frank Bi, Joseph A. Konstan:
Customer Service 2.0: Where Social Computing Meets Customer Relations. 93-95
Volume 45, Number 12, December 2012
- John W. Walz:
Implementing SP7: A Review of Progress in 2012. 6-9 - Charles R. Severance:
Vint Cerf: A Brief History of Packets. 10-12 - Brian M. Gaff, Timothy P. Van Dyck, Elizabeth A. Peters:
Employment Issues Confronting Start-Up Companies. 13-15 - Lee Garber:
Have Java's Security Issues Gotten out of Hand? 18-21 - Gary C. Kessler:
Advancing the Science of Digital Forensics. 25-27 - Joel Young, Kristina Foster, Simson L. Garfinkel, Kevin D. Fairbanks:
Distinct Sector Hashes for Target File Detection. 28-35 - Ray Hunt, Sherali Zeadally:
Network Forensics: An Analysis of Techniques, Tools, and Trends. 36-43 - Irfan Ahmed, Sebastian Obermeier, Martin Naedele, Golden G. Richard III:
SCADA Systems: Challenges for Forensic Investigators. 44-51 - Yong Wang, Kevin Streff, Sonell Raman:
Smartphone Security Challenges. 52-58 - Aaron Spear, Markus Levy, Mathieu Desnoyers:
Using Tracing to Solve the Multicore System Debug Problem. 60-64 - Rafael Moreno-Vozmediano, Rubén S. Montero, Ignacio Martín Llorente:
IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures. 65-72 - Naren Sundaravaradan, Naren Ramakrishnan, David A. Hanauer:
Factorizing Event Sequences. 73-75 - Manfred Lau, Jun Mitani, Takeo Igarashi:
Digital Fabrication. 76-79 - Arnold Brown, Benjamin Apple, James Bret Michael, Michael A. Schumann:
Atomic-Level Security for Web Applications in a Cloud Environment. 80-83 - Emil Vassev, Mike Hinchey:
Awareness in Software-Intensive Systems. 84-87 - Brad Hallisey:
Building a Virtual World: The Pipeline and Process. 90-92 - David Alan Grier, Erin Dian Dumbacher:
Work/Play. 116
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.