default search action
IEEE Computer, Volume 42, 2009
Volume 42, Number 1, January 2009
- Susan K. Land:
A Leadership Challenge in 2009. 6-8 - David Alan Grier:
Politics in Play. 9-12 - Neal Leavitt:
Is Cloud Computing Really Ready for Prime Time? 15-20 - Linda Dailey Paulson:
Start-up Unveils Flexible Supercomputing Approach. 21-24 - Richard T. Kouzes, Gordon A. Anderson, Stephen T. Elbert, Ian Gorton, Deborah K. Gracio:
The Changing Paradigm of Data-Intensive Computing. 26-34 - Ian Bird, Bob Jones, Kerk F. Kee:
The Organization and Management of Grid Infrastructures. 36-46 - Naren Ramakrishnan, Upinder S. Bhalla, John J. Tyson:
Computing with Proteins. 47-56 - Mark A. Hanson, Harry C. Powell Jr., Adam T. Barth, Kyle Ringgenberg, Benton H. Calhoun, James H. Aylor, John C. Lach:
Body Area Sensor Networks: Challenges and Opportunities. 58-65 - Amar Gupta:
The 24-Hour Knowledge Factory: Can It Replace the Graveyard Shift? 66-73 - Brian Berenbach, Manfred Broy:
Professional and Ethical Dilemmas in Software Engineering. 74-80 - Kirk W. Cameron:
Green Introspection. 101-103 - Eyhab Al-Masri, Qusay H. Mahmoud:
Web Service Discovery and Client Goals. 104-107 - Perry Alexander:
Rosetta: Standardization at the System Level. 108-110 - Jim Hendler:
Web 3.0 Emerging. 111-113 - W. Neville Holmes:
The Credit Crunch and the Digital Bite. 114-116
Volume 42, Number 2, February 2009
- David Alan Grier:
Scanning the Horizon. 8-11 - Steven J. Vaughan-Nichols:
Will Mobile Computing's Future Be Location, Location, Location? 14-17 - George Lawton:
Users Take a Close Look at Visual Analytics. 19-22 - Linda Dailey Paulson:
W3C Adopts Web-Accessibility Specifications. 23-26 - Andrew S. Grimshaw, Mark M. Morgan, Duane Merrill, Hiro Kishimoto, Andreas Savva, David Snelling, Chris Smith, Dave Berry:
An Open Grid Services Architecture Primer. 27-34 - Carlos E. Caicedo, James B. D. Joshi, Summit R. Tuladhar:
IPv6 Security Challenges. 36-42 - Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee:
Dynamic Trust Management. 44-52 - Halvard Skogsrud, Hamid R. Motahari Nezhad, Boualem Benatallah, Fabio Casati:
Modeling Trust Negotiation for Web Services. 54-61 - Kristof Beyls, Erik H. D'Hollander:
Refactoring for Data Locality. 62-71 - Veronica Liesaputra, Ian H. Witten, David Bainbridge:
Creating and Reading Realistic Electronic Books. 72-81 - Matt Adcock, Jaewoo Chung, Chris Schmandt:
Are We There Yet? User-Centered Temporal Awareness. 97-99 - Dong-hyun Lee, Keun Lee, Sooyong Park, Mike Hinchey:
A Survival Kit: Adaptive Hardware/Software Codesign Life-Cycle Model. 100-102 - Chris Swain:
Who Needs a Publisher ... or a Retailer or a Marketer? 103-105 - Abbe Mowshowitz, Nanda Kumar:
And Then There Were Three. 106-108
Volume 42, Number 3, March 2009
- David Alan Grier:
Virtual Walls. 8-10 - George Lawton:
WDM-PONs Hold Promise for the Long Haul. 13-16 - David Geer:
Networks on Processors Improve On-Chip Communications. 17-20 - Linda Dailey Paulson:
News Briefs. 21-24 - Behrooz Parhami:
Puzzling Problems in Computer Engineering. 26-29 - Gary Marchionini, Ryen W. White:
Information-Seeking Support Systems [Guest Editors' Introduction]. 30-32 - Peter Pirolli:
Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales. 33-40 - Ed H. Chi:
Information Seeking Can Be Social. 42-46 - Gene Golovchinsky, Pernilla Qvarfordt, Jeremy Pickens:
Collaborative Information Seeking. 47-51 - m. c. schraefel:
Building Knowledge: What's beyond Keyword Search? 52-59 - Diane Kelly, Susan T. Dumais, Jan O. Pedersen:
Evaluation Challenges and Directions for Information-Seeking Support Systems. 60-66 - Daniel M. Russell:
Industry-Academic Relationships. 67-68 - Denis L. Baggi, Goffredo Haus:
IEEE 1599: Music Encoding and Interaction. 84-87 - Wayne H. Wolf:
Cyber-physical Systems. 88-89 - Itamar Arel, Scott C. Livingston:
Beyond the Turing Test. 90-91 - Rajan Samtani:
Ongoing Innovation in Digital Watermarking. 92-94 - Klaus-Dieter Lange:
Identifying Shades of Green: The SPECpower Benchmarks. 95-97 - W. Neville Holmes:
The Automation of Originality. 98-100
Volume 42, Number 4, April 2009
- Bob Ward:
Elsewhere in the CS. 4-5 - Letters. 6-7
- David Alan Grier:
Top of the News. 10-13 - 32 and 16 Years Ago. 14-15
- Neal Leavitt:
Complex-Event Processing Poised for Growth. 17-20 - Sixto Ortiz Jr.:
Securing the Internet's Routing Infrastructure. 21-23 - Linda Dailey Paulson:
Technique Makes Strong Encryption Easier to Use. 24-27 - Seong Oun Hwang:
How Viable Is Digital Rights Management?. 28-34 - Edward Walker:
The Real Cost of a CPU Hour. 35-41 - Christof Ebert, Capers Jones:
Embedded Software: Facts, Figures, and Future. 42-52 - Hesham Shokry, Mike Hinchey:
Model-Based Verification of Embedded Software. 53-59 - Gregory V. Chockler, Rachid Guerraoui, Idit Keidar, Marko Vukolic:
Reliable Distributed Storage. 60-67 - Alejandro Figueroa, Günter Neumann, John Atkinson:
Searching for Definitional Answers on the Web Using Surface Patterns. 68-76 - Bookshelf. 81
- Bob Ward:
CRA Survey Counts New PhDs. 87-92 - Bob Ward:
Call and Calendar. 93-94 - Josh C. Bongard:
Biologically Inspired Computing. 95-98 - Rajesh Krishna Balan, Narayan Ramasubbu:
The Digital Wallet: Opportunities and Prototypes. 100-102 - Michael Zyda, Marc Spraragen, Balakrishnan Ranganathan:
Testing Behavioral Models with an Online Game. 103-105 - Jim Buckley:
Requirements-Based Visualization Tools for Software Maintenance and Evolution. 106-108 - Peggy Israel Doerschuk, Jiangjiang Liu, Judith Mann:
Increasing Participation of Females and Underrepresented Minorities in Computing. 110-113 - Kai A. Olsen:
In-House Programming Is Not Passe: Automating Originality. 114-116
Volume 42, Number 5, May 2009
- Elsewhere in the CS. 4-5
- David Alan Grier:
The Dictator and the Web Design. 6-8 - 32 and 16 Years Ago. 9-10
- Steven J. Vaughan-Nichols:
Vendors Draw up a New Graphics-Hardware Approach. 11-13 - George Lawton:
The Changing Face of Open Source. 14-17 - Linda Dailey Paulson:
The Changing World of Outsourcing. 18-21 - Nathanael Paul, Andrew S. Tanenbaum:
Trustworthy Voting: From Machine to System. 23-29 - Piotr Pacyna, Anthony M. Rutkowski, Amardeo Sarma, Kenji Takahashi:
Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems. 30-32 - David W. Chadwick, George Inman:
Attribute Aggregation in Federated Identity Management. 33-40 - Paul Madsen, Hiroki Itoh:
Challenges to Supporting Federated Assurance. 42-49 - Federica Paci, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino:
An Interoperable Approach to Multifactor Identity Verification. 50-57 - Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Joao Girão:
A SWIFT Take on Identity Management. 58-65 - Manuel Barranco, Julián Proenza, Luís Almeida:
Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate. 66-73 - Bob Ward:
Computer Society Connection. 79-83 - Bookshelf. 86
- Kirk W. Cameron:
The Road to Greener IT Pastures. 87-89 - Ken Birman, Jared Cantwell, Daniel A. Freedman, Qi Huang, Petko Nikolov, Krzysztof Ostrowski:
Edge Mashups for Service-Oriented Collaboration. 90-94 - Ali El Kateeb:
Hardware Reconfiguration Capability for Third-Generation Sensor Nodes. 95-97 - Bernard J. Jansen, Theresa Flaherty, Ricardo Baeza-Yates, Lee Hunter, Brendan Kitts, Jamie Murphy:
The Components and Impact of Sponsored Search. 98-101 - W. Neville Holmes:
The Design of Government. 102-104
Volume 42, Number 6, June 2009
- Computer Highlights Society Magazines. 4-5
- Letters. 6-7
- David Alan Grier:
Marking the Fall of Sparrows. 9-12 - 32 and 16 Years Ago. 13-14
- David Geer:
The Future of Mobile VoIP in the Enterprise. 15-18 - George Lawton:
On the Trail of the Conficker Worm. 19-22 - Linda Dailey Paulson:
Materials Breakthrough Could Eliminate Bootups. 23-25 - Rolf Oppliger, Ruedi Rytz, Thomas Holderegger:
Internet Banking: Client-Side Attacks and Protection Mechanisms. 27-33 - Awais Rashid, John Weckert, Richard Lucas:
Software Engineering Ethics in a Digital World. 34-41 - Amela Karahasanovic, Petter Bae Brandtzæg, Jeroen Vanattenhoven, Bram Lievens, Karen Torben Nielsen, Jo Pierson:
Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications. 42-49 - Wolter Pieters, André van Cleeff:
The Precautionary Principle in a World of Digital Dependencies. 50-56 - Tetsuo Tamai:
Social Impact of Information System Failures. 58-65 - Donald Gotterbarn, Keith W. Miller:
The Public is the Priority: Making Decisions Using the Software Engineering Code of Ethics. 66-73 - Bob Ward:
IEEE Foundation Gives Away More Than $300, 000. 78-79 - Bob Ward:
Call and Calendar. 80-81 - Bookshelf. 85
- Sunny Consolvo, James A. Landay, David W. McDonald:
Designing for Behavior Change in Everyday Life. 86-89 - Emil Vassev, Mike Hinchey:
ASSL: A Software Engineering Approach to Autonomic Computing. 90-93 - Alexander Yates:
Extracting World Knowledge from the Web. 94-97 - Jungwoo Ryoo, Phillip A. Laplante, Rick Kazman:
In Search of Architectural Patterns for Software Security. 98-100 - Atanas Radenski:
Expanding Computing as an Academic Service Discipline. 101-104
Volume 42, Number 7, July 2009
- Elsewhere in the CS. 4-5
- David Alan Grier:
The Character of Play. 7-9 - 32 and 16 Years Ago. 10-11
- Sixto Ortiz Jr.:
IEEE 802.11n: The Road Ahead. 13-15 - Linda Dailey Paulson:
Software-Based Networking Approach Could Help Internet Research. 16-19 - Carl K. Chang:
Reversing the Bipolar Drift. 20-24 - Muhammad Ali Babar, Ian Gorton:
Software Architecture Review: The State of Practice. 26-32 - Oliver Bimber:
Visual Effects and Beyond. 33-34 - Doug Roble, Nafees Bin Zafar:
Don't Trust Your Eyes: Cutting-Edge Visual Effects. 35-41 - Graham A. Thomas, Oliver Grau:
Virtual Graphics for Broadcast Production. 42-47 - Xubo Yang, Milo K. Yip, Xiaoyue Xu:
Visual Effects in Computer Games. 48-56 - Scott Trowbridge, Christopher B. Stapleton:
Melting the Boundaries Between Fantasy and Reality. 57-62 - Brian Whitworth, Tong Liu:
Channel E-mail: A Sociotechnical Response to Spam. 63-72 - Bookshelf. 77
- Bob Ward:
Computer Society Presents Technical Awards. 81-84 - Bob Ward:
Call and Calendar. 85 - Gerald T. Lane:
Best Practices for Standards Communities. 86-87 - V. S. Subrahmanian:
Mining Online Opinions. 88-90 - Amip Shah, Tom Christian, Chandrakant D. Patel, Cullen E. Bash, Ratnesh K. Sharma:
Assessing ICT's Environmental Impact. 91-93 - Henry E. Schaffer, Samuel F. Averitt, Marc I. Hoit, Aaron Peeler, Eric D. Sills, Mladen A. Vouk:
NCSU's Virtual Computing Lab: A Cloud Computing Solution. 94-97 - W. Neville Holmes:
Agility and Respect. 98-100
Volume 42, Number 8, August 2009
- Elsewhere in the CS. 4-5
- Letters. 6-7
- David Alan Grier:
Welcome to the Family. 8-10 - 32 and 16 Years Ago. 11-12
- Steven J. Vaughan-Nichols:
Game-Console Makers Battle over Motion-Sensitive Controllers. 13-15 - Linda Dailey Paulson:
Caching Scheme Could Boost Developing World's Internet Access. 16-18 - Charles Rich:
Building Task-Based User Interfaces with ANSI/CEA-2018. 20-27 - Naren Ramakrishnan:
The Pervasiveness of Data Mining asnd Machine Learning. 28-29 - Yehuda Koren, Robert M. Bell, Chris Volinsky:
Matrix Factorization Techniques for Recommender Systems. 30-37 - Andreas Krause, Carlos Guestrin:
Optimizing Sensing: From Water to the Web. 38-45 - Ross D. King, Jem J. Rowland, Wayne Aubrey, Maria Liakata, Magdalena Markham, Larisa N. Soldatova, Ken E. Whelan, Amanda Clare, Mike Young, Andrew Sparkes, Stephen G. Oliver, Pinar Pir:
The Robot Scientist Adam. 46-54 - Tao Xie, Suresh Thummalapenta, David Lo, Chao Liu:
Data Mining for Software Engineering. 55-62 - John C. Lach, Vinu Vijay Kumar:
Application-Specific Product Generics. 64-74 - IEEE President-Elect Candidates Address Computer Society Concerns. 79-84
- Bob Ward:
Benjamin Wah Wins 2008 Kanai Award. 85-89 - Bob Ward:
Call and Calendar. 90-92 - Bookshelf. 93
- Rick Kuhn, Raghu Kacker, Yu Lei, Justin Hunter:
Combinatorial Software Testing. 94-96 - Naren Ramakrishnan, Debprakash Patnaik, Vandana Sreedharan:
Temporal Process Discovery in Many Guises. 97-101 - Sorel Reisman:
Using Learning Objects to Affect Educational Outcomes. 102-104 - John Viega:
Cloud Computing and the Common Man. 106-108 - Maurice Chu:
Natural and Implicit Interaction Systems. 109-111 - Noel E. Sharkey:
The Robot Arm of the Law Grows Longer. 113-116
Volume 42, Number 9, September 2009
- Computer Highlights Society Magazines. 4-5
- Letters to the Editor. 6-7
- David Alan Grier:
Data of the Night. 8-11 - 32 and 16 Years Ago. 12-13
- George Lawton:
Routing Faces Dramatic Changes. 15-17 - Linda Dailey Paulson:
HP Announces Breakthrough in Affordable, Flexible Displays. 18-21 - Simon Moncrieff, Svetha Venkatesh, Geoff A. W. West:
Dynamic Privacy in Public Surveillance. 22-28 - Jean-Raymond Abrial:
Faultless Systems: Yes We Can!. 30-36 - Sue Black, Paul Boca, Jonathan P. Bowen, Jason Gorman, Mike Hinchey:
Formal Versus Agile: Survival of the Fittest. 37-45 - Bertrand Meyer, Arno Fiva, Ilinca Ciupa, Andreas Leitner, Yi Wei, Emmanuel Stapf:
Programs That Test Themselves. 46-55 - Daniel E. Cooke, J. Nelson Rushton:
Taking Parnas's Principles to the Next Level: Declarative Language Design. 56-63 - Bashar Nuseibeh, Charles B. Haley, Craig J. Foster:
Securing the Skies: In Requirements We Trust. 64-72 - Bob Ward:
IEEE Computer Society Election. 73-80 - Bob Ward:
Call and Calendar. 81-82 - Bookshelf. 83
- Sumi Helal:
University-Industry Synergy: An Eclectic Dialog for Revised Relationships. 88-89 - Vishnu S. Pendyala, Simon S. Y. Shim:
The Web as the Ubiquitous Computer. 90-92 - Sandeep K. Shukla:
Model-Driven Engineering and Safety-Critical Embedded Software. 93-95 - Doug Vogel, Michiel van Genuchten, Carol S. Saunders:
IS Innovation: Thinking Beyond the Silo. 96-98 - Krishna Kant:
Toward a Science of Power Management. 99-101 - W. Neville Holmes:
Music, Sociality, and Digital Technology. 102-104
Volume 42, Number 10, October 2009
- Computer Highlights Society Magazines. 4-5
- Letters. 6-7
- David Alan Grier:
The Marketplace of Ideas. 8-11 - 32 and 16 Years Ago. 12-13
- David Geer:
The OS Faces a Brave New World. 15-17 - Researchers Develop Application to Identify Ancient Documents. 18-20
- Gordon S. Blair, Nelly Bencomo, Robert B. France:
Models@ run.time. 22-27 - Shahar Maoz:
Using Model-Based Traces as Runtime Models. 28-36 - Carlos Cetina, Pau Giner, Joan Fons, Vicente Pelechano:
Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes. 37-43 - Brice Morin, Olivier Barais, Jean-Marc Jézéquel, Franck Fleurey, Arnor Solberg:
Models@ Run.time to Support Dynamic Adaptation. 44-51 - John C. Georgas, André van der Hoek, Richard N. Taylor:
Using Architectural Models to Manage and Visualize Runtime Adaptation. 52-60 - Tony Gjerlufsen, Mads Ingstrup, Jesper Wolff, Olsen Olsen:
Mirrors of Meaning: Supporting Inspectable Runtime Models. 61-68 - Kenneth Hoste, Lieven Eeckhout:
A Methodology for Analyzing Commercial Processor Performance Numbers. 70-76 - Ahmed Abbasi, Hsinchun Chen:
A Comparison of Tools for Detecting Fake Websites. 78-86 - Bookshelf. 92
- Bob Ward:
Computer Society Awards Recognize Excellence. 93-95 - Bob Ward:
Call and Calendar. 96 - Yaw Anokwa, Carl Hartung, Waylon Brunette, Gaetano Borriello, Adam Lerer:
Open Source Data Collection in the Developing World. 97-99 - Peter B. Henderson:
Ubiquitous Computational Thinking. 100-102 - Nikolaos Petrakos, George W. Dinolt, James Bret Michael, Pantelimon Stanica:
Cube-Type Algebraic Attacks on Wireless Encryption Protocols. 103-105 - Tiziana Margaria, Bernhard Steffen:
Continuous Model-Driven Engineering. 106-109 - Luis Fernández Sanz:
Personal Skills for Computing Professionals. 110-112
Volume 42, Number 11, November 2009
- Computer Highlights Society Magazines. 4-5
- Letters. 6-7
- David Alan Grier:
Bad Alignment. 8-11 - 32 and 16 Years Ago. 12-13
- Neal Leavitt:
Anonymization Technology Takes a High Profile. 15-18 - Linda Dailey Paulson:
System Takes New Approach to Speech Search. 20-23 - Adolfy Hoisie, Vladimir Getov:
Extreme-Scale Computing. 24-26 - Josep Torrellas:
Architectures for Extreme-Scale Computing. 28-35 - Yuichiro Ajima, Shinji Sumimoto, Toshiyuki Shimizu:
Tofu: A 6D Mesh/Torus Interconnect for Exascale Computers. 36-40 - Kevin J. Barker, Kei Davis, Adolfy Hoisie, Darren J. Kerbyson, Michael Lang, Scott Pakin, José Carlos Sancho:
Using Performance Modeling to Design Large-Scale Systems. 42-49 - Michael Wilde, Ian T. Foster, Kamil Iskra, Peter H. Beckman, Zhao Zhang, Allan Espinosa, Mihael Hategan, Ben Clifford, Ioan Raicu:
Parallel Scripting for Applications at the Petascale and Beyond. 50-60 - David Donofrio, Leonid Oliker, John Shalf, Michael F. Wehner, Chris Rowen, Jens Krueger, Shoaib Kamil, Marghoob Mohiyuddin:
Energy-Efficient Computing for Extreme-Scale Science. 62-71 - Munindar P. Singh, Amit K. Chopra, Nirmit Desai:
Commitment-Based Service-Oriented Architecture. 72-79 - Bob Ward:
Society Supports Software Engineering PE Examination. 87-89 - Bookshelf. 92
- Shel Finkelstein:
Managing Interns. 93-95 - Miguel Carrero:
Innovation for the Web 2.0 Era. 96-98 - Kirk W. Cameron:
My IT Carbon Footprint. 99-101 - Harry L. Reif, Richard G. Mathieu:
Global Trends in Computing Accreditation. 102-104 - W. Neville Holmes:
Truth and Breadth, Clarity and Depth in Algebra. 106-108
Volume 42, Numner 12, December 2009
- Computer Highlights Society Magazines. 4-5
- Letters to the Editor. 6-8
- Susan K. Land:
Implementing Organizational Strategies: Progress Made in 2009. 9-11 - David Alan Grier:
Honor Among Thieves. 12-15 - 32 and 16 Years Ago. 16-17
- Steven J. Vaughan-Nichols:
Augmented Reality: No Longer a Novelty? 19-22 - Linda Dailey Paulson:
Programming Language Enables Creative Visualization. 23-25 - Wu-chun Feng, Pavan Balaji:
Tools and Environments for Multicore and Many-Core Architectures. 26-27 - Scott Schneider, Jae-Seung Yeom, Dimitrios S. Nikolopoulos:
Programming Multiprocessors with Explicitly Managed Memory Hierarchies. 28-34 - Chirag Dave, Hansang Bae, Seung-Jai Min, Seyong Lee, Rudolf Eigenmann, Samuel P. Midkiff:
Cetus: A Source-to-Source Compiler Infrastructure for Multicores. 36-42 - Nathan R. Tallent, John M. Mellor-Crummey:
Identifying Performance Bottlenecks in Work-Stealing Computations. 44-50 - Terence Kelly, Yin Wang, Stéphane Lafortune, Scott A. Mahlke:
Eliminating Concurrency Bugs with Control Engineering. 52-60 - Sergio L. Toral Marín, Manuel Vargas, Federico Barrero:
Embedded Multimedia Processors for Road-Traffic Parameter Estimation. 61-68 - Bob Ward:
Reisman Voted 2010 Computer Society President-Elect. 69-70 - Bob Ward:
Miura Wins Cray Award. 71-73 - Bookshelf. 82
- Andrea Apolloni, V. S. Anil Kumar, Madhav V. Marathe, Samarth Swarup:
Computational Epidemiology in a Connected World. 83-86 - Yang Li:
Beyond Pinch and Flick: Enriching Mobile Gesture Interaction. 87-89 - Alexander J. Beecroft, James Bret Michael:
Passive Fingerprinting of Network Reconnaissance Tools. 91-93 - Gregory W. Hislop:
The Inevitability of Teaching Online. 94-96 - Manfred Broy, Mario Gleirscher, Stefano Merenda, Doris Wild, Peter Kluge, Wolfgang Krenzer:
Toward a Holistic and Standardized Automotive Architecture Description. 98-101 - Simone Santini:
Simplifying Humans. 102-104
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.