- 2009
- Ahmed Abbasi, Hsinchun Chen:
A Comparison of Tools for Detecting Fake Websites. Computer 42(10): 78-86 (2009) - Jean-Raymond Abrial:
Faultless Systems: Yes We Can!. Computer 42(9): 30-36 (2009) - Matt Adcock, Jaewoo Chung, Chris Schmandt:
Are We There Yet? User-Centered Temporal Awareness. Computer 42(2): 97-99 (2009) - Yuichiro Ajima, Shinji Sumimoto, Toshiyuki Shimizu:
Tofu: A 6D Mesh/Torus Interconnect for Exascale Computers. Computer 42(11): 36-40 (2009) - Eyhab Al-Masri, Qusay H. Mahmoud:
Web Service Discovery and Client Goals. Computer 42(1): 104-107 (2009) - Perry Alexander:
Rosetta: Standardization at the System Level. Computer 42(1): 108-110 (2009) - Yaw Anokwa, Carl Hartung, Waylon Brunette, Gaetano Borriello, Adam Lerer:
Open Source Data Collection in the Developing World. Computer 42(10): 97-99 (2009) - Andrea Apolloni, V. S. Anil Kumar, Madhav V. Marathe, Samarth Swarup:
Computational Epidemiology in a Connected World. Computer 42(11): 83-86 (2009) - Itamar Arel, Scott C. Livingston:
Beyond the Turing Test. Computer 42(3): 90-91 (2009) - Muhammad Ali Babar, Ian Gorton:
Software Architecture Review: The State of Practice. Computer 42(7): 26-32 (2009) - Denis L. Baggi, Goffredo Haus:
IEEE 1599: Music Encoding and Interaction. Computer 42(3): 84-87 (2009) - Rajesh Krishna Balan, Narayan Ramasubbu:
The Digital Wallet: Opportunities and Prototypes. Computer 42(4): 100-102 (2009) - Kevin J. Barker, Kei Davis, Adolfy Hoisie, Darren J. Kerbyson, Michael Lang, Scott Pakin, José Carlos Sancho:
Using Performance Modeling to Design Large-Scale Systems. Computer 42(11): 42-49 (2009) - Manuel Barranco, Julián Proenza, Luís Almeida:
Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate. Computer 42(5): 66-73 (2009) - Alexander J. Beecroft, James Bret Michael:
Passive Fingerprinting of Network Reconnaissance Tools. Computer 42(11): 91-93 (2009) - Brian Berenbach, Manfred Broy:
Professional and Ethical Dilemmas in Software Engineering. Computer 42(1): 74-80 (2009) - Kristof Beyls, Erik H. D'Hollander:
Refactoring for Data Locality. Computer 42(2): 62-71 (2009) - Oliver Bimber:
Visual Effects and Beyond. Computer 42(7): 33-34 (2009) - Ian Bird, Bob Jones, Kerk F. Kee:
The Organization and Management of Grid Infrastructures. Computer 42(1): 36-46 (2009) - Ken Birman, Jared Cantwell, Daniel A. Freedman, Qi Huang, Petko Nikolov, Krzysztof Ostrowski:
Edge Mashups for Service-Oriented Collaboration. Computer 42(5): 90-94 (2009) - Sue Black, Paul Boca, Jonathan P. Bowen, Jason Gorman, Mike Hinchey:
Formal Versus Agile: Survival of the Fittest. Computer 42(9): 37-45 (2009) - Gordon S. Blair, Nelly Bencomo, Robert B. France:
Models@ run.time. Computer 42(10): 22-27 (2009) - Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee:
Dynamic Trust Management. Computer 42(2): 44-52 (2009) - Josh C. Bongard:
Biologically Inspired Computing. Computer 42(4): 95-98 (2009) - Manfred Broy, Mario Gleirscher, Stefano Merenda, Doris Wild, Peter Kluge, Wolfgang Krenzer:
Toward a Holistic and Standardized Automotive Architecture Description. Computer 42(11): 98-101 (2009) - Jim Buckley:
Requirements-Based Visualization Tools for Software Maintenance and Evolution. Computer 42(4): 106-108 (2009) - Carlos E. Caicedo, James B. D. Joshi, Summit R. Tuladhar:
IPv6 Security Challenges. Computer 42(2): 36-42 (2009) - Kirk W. Cameron:
Green Introspection. Computer 42(1): 101-103 (2009) - Kirk W. Cameron:
The Road to Greener IT Pastures. Computer 42(5): 87-89 (2009) - Kirk W. Cameron:
My IT Carbon Footprint. Computer 42(11): 99-101 (2009)