


default search action
IEEE Computer, Volume 33, 2000
Volume 33, Number 1, January 2000
- John Edwards:

Redefining IT Career Paths for the New Millennium. 16-20
- Sixto Ortiz Jr.:

E-mail Protection Advances with New Technologies. 21-23
- Jonathan Vos Post, Kirk L. Kroeker:

Writing the Future: Computers in Science Fiction. 29-37 - Andrew M. Steane, Eleanor Gilbert Rieffel:

Beyond Bits: The Future of Quantum Information Processing. 38-45 - Christine Peterson:

Taking Technology to the Molecular Level. 46-53 - Lucas D. Introna, Helen Nissenbaum:

Defining the Web: The Politics of Search Engines. 54-62 - Daniel E. Cooke, Scott Hamilton:

New Directions at NASA Ames Research Center. 63-71 - Janet Wilson:

Toward Things That Think. 72-76
- Lawrence G. Roberts:

Beyond Moore's Law: Internet Growth Trends. 117-119
- Moshe Sipper

, Eduardo Sanchez:
Configurable Chips Meld Software and Hardware. 120-121
- Barry W. Boehm:

The Art of Expectations Management. 122-124
- Ted G. Lewis:

Service: The Next Inflection Point. 126-128
Volume 33, Number 2, February 2000
- George Lawton:

Intellectual-Property Protection Opens Path for E-commerce. 14-17
- David Clark:

Shopbots Become Agents for Business Change. 18-21
- Emilie O'Connell, Hossein Saiedian

:
Can You Trust Software Capability Evaluations? 28-35
- Michael S. Schlansker, B. Ramakrishna Rau:

EPIC: Explicititly Parallel Instruction Computing. 37-45
- Sharath Pankanti, Ruud M. Bolle, Anil K. Jain:

Biometrics: The Future of Identification - Guest Editors' Introduction. 46-49 - Alex Pentland, Tanzeem Choudhury:

Face Recognition for Smart Environments. 50-55 - P. Jonathon Phillips, Alvin F. Martin, Charles L. Wilson, Mark A. Przybocki:

An Introduction to Evaluating Biometric Systems. 56-63 - Robert Frischholz

, Ulrich Dieckmann:
BioID: A Multimodal Biometric Identification System. 64-68 - Michael Negin, Thomas A. Chmielewski Jr., Theodure A. Camus, Ulf M. Cahn von Seelen, Péter L. Venetianer, Guanghua G. Zhang:

An Iris Biometric System for Public and Personal Use. 70-75 - James L. Wayman:

Federal Biometric Technology Legislation. 76-80
- Giacomo Cabri

, Letizia Leonardi
, Franco Zambonelli
:
Mobile-Agent Coordination Models for Internet Applications. 82-89
- Michael R. Macedonia:

Why Digital Entertainment Drives the Need for Speed. 124-127
- Lee W. McKnight, Jahangir Boroumand:

Pricing Internet Services: Approaches and Challenges. 128-129
- Catherine J. Tilton:

An Emerging Biometric API Industry Standard. 130-132
- Ted G. Lewis:

Tracking the 'Anywhere, Anytime' Inflection Point. 134-136
Volume 33, Number 3, March 2000
- James H. Aylor:

New Computer Departments Reflect our Changing Industry. 4-6
- Sixto Ortiz Jr.:

Embedded Databases Come out of Hiding. 16-19
- John Edwards:

Buidling the Optical-Networking Infrastructure. 20-23
- W. Neville Holmes:

The Evitability of Software Patents. 30-34
- Roy Ladner, Mahdi Abdelguerfi, Kevin Shaw:

3D Mapping of an Interactive Synthetic Environment. 35-39
- Erik R. Altman, David R. Kaeli, Yaron Sheffer

:
Welcome to the Opportunities of Binary Translation. 40-45 - Cindy Zheng, Carol L. Thompson:

PA-RISC to IA-64: Transparent Execution, No Recompilation. 47-52 - Michael Gschwind, Erik R. Altman, Sumedh W. Sathaye, Paul Ledak, David Appenzeller:

Dynamic and Transparent Binary Translation. 54-59 - Cristina Cifuentes, Mike Van Emmerik:

UQBT: Adaptive Binary Translation at Low Cost. 60-66
- Jean Bacon, Ken Moody, John Bates, Richard Hayton, Chaoying Ma, Andrew McNeil, Oliver Seidel, Mark D. Spiteri:

Generic Support for Distributed Applications. 68-76 - Rob C. van Ommering, Frank van der Linden, Jeff Kramer, Jeff Magee:

The Koala Component Model for Consumer Electronics Software. 78-85
- Lee W. McKnight

, Jahangir Boroumand:
Pricing Internet Services: Proposed Improvements. 108-109
- Hessam S. Sarjoughian, Bernard P. Zeigler, Daryl R. Hild:

A Codesign Approach for Distributed Systems. 110-113
- Barry W. Boehm:

Unifying Software Engineering and Systems Engineering. 114-116
- Ted G. Lewis:

AOL, Time Warner, and the Crash of 2000. 118-120
Volume 33, Number 4, April 2000
- Lee Garber:

Denial-of-Service Attacks Rip the Internet. 12-17
- Bashar Nuseibeh, Steve M. Easterbrook, Alessandra Russo

:
Leveraging Inconsistency in Software Development. 24-29
- Roger T. Alexander, James M. Bieman, John Viega:

Coping with Java Programming Stress. 30-38
- Ranga Vemuri

, Randolph E. Harr:
Configurable Computing: Technology and Applications - Guest Editors' Introduction. 39-40 - André DeHon:

The Density Advantage of Configurable Computing. 41-49 - Simon D. Haynes, John Stone, Peter Y. K. Cheung, Wayne Luk:

Video Image Processing with the Sonic Architecture. 50-57 - Marco Platzner

:
Reconfigurable Accelerators for Combinatorial Problems. 58-60 - Timothy J. Callahan, John R. Hauser, John Wawrzynek:

The Garp Architecture and C Compiler. 62-69 - Seth Copen Goldstein, Herman Schmit, Mihai Budiu, Srihari Cadambi, Matthew Moe, R. Reed Taylor:

PipeRench: A Reconfigurable Architecture and Compiler. 70-77
- Upkar Varshney:

Recent Advances in Wired Networking. 107-109
- Michael R. Macedonia:

Using Technology and Innovations to Simulate Daily Life. 110-112
- Peter Flynn, Richard Wiggins:

XML: An Interview with Peter Flynn. 113-114
- Michael J. Lutz:

Fundamental Ideas and Change. 115-116
- Ted G. Lewis:

When Atoms and Bit Collide: Detroit Goes Digital. 118-120
Volume 33, Number 5, May 2000
- Reed Hellman:

The Future of the OS for Internet Applications. 12-15
- Neal Leavitt:

Will WAP Deliver the Wireless Internet? 16-20
- Barry W. Boehm, Victor R. Basili:

Gaining Intellectual Control of Software Development. 27-33
- Gilda Pour, Martin L. Griss, Michael J. Lutz:

The Push to Make Software Engineering Respectable. 35-43 - Timothy Lethbridge

:
What Knowledge Is Important to a Software Professional? 44-50
- Brian E. Brewington, George Cybenko:

Keeping Up with the Changing Web. 52-58 - Lee Breslau, Deborah Estrin, Kevin R. Fall, Sally Floyd, John S. Heidemann, Ahmed Helmy

, Polly Huang, Steven McCanne, Kannan Varadhan, Ya Xu, Haobo Yu:
Advances in Network Simulation. 59-67 - Jørgen Staunstrup, Henrik Reif Andersen, Henrik Hulgaard, Jørn Lind-Nielsen, Kim Guldstrand Larsen, Gerd Behrmann, Kåre J. Kristoffersen, Arne Skou

, Henrik Leerberg, Niels Bo Theilgaard:
Practical Verification of Embedded Software. 68-75
- Anitesh Barua, Andrew B. Whinston, Fang Yin:

Value and Productivity in the Internet Economy. 102-105
- Jonathan R. Agre, Loren P. Clare:

An Integrated Architecture for Cooperative Sensing Networks. 106-108
- Ted G. Lewis:

Why Funny Money Will Have the Last Laugh. 110-112
Volume 33, Number 6, June 2000
- David Clark:

Are Too Many Programmers Too Narrowly Trained? 12-15
- George Lawton:

Distributed Net Applications Create Virtual Supercomputers. 16-20
- Peter M. Maurer:

Components: What If They Gave a Revolution and Nobody Came? 28-34
- Robert S. Oshana:

Winning Teams: Performance Engineering during Development. 36-44
- Eltefaat Shokri, Phillip C.-Y. Sheu:

Guest Editors' Introduction - Real-Time Distributed Object Computing: An Emerging Field. 45-46 - Gregory Bollella, James Gosling:

The Real-Time Specification for Java. 47-54 - Douglas C. Schmidt, Fred Kuhns:

An Overview of the Real-Time CORBA Specification. 56-63 - Bran Selic:

A Generic Framework for Modeling Resources with UML. 64-69 - K. H. Kim:

APIs for Real-Time Distributed Object Programming. 72-80
- Upkar Varshney:

Recent Advances in Wireless Networking. 100-103
- Michael R. Macedonia:

The Empire Strikes Back ... with the X-Box. 104-106
- Jim Waldo:

Alive and Well: Jini Technology Today. 107-109
- Ted G. Lewis:

The End of Research as We Know It? 110-112
Volume 33, Number 7, July 2000
- George Lawton:

Video Streams into the Mainstream. 12-17
- Sixto Ortiz Jr.:

Broadband Fixed Wireless Travels the Last Mile. 18-21
- John L. Henning:

SPEC CPU2000: Measuring CPU Performance in the New Millennium. 28-35
- David J. Goodman:

The Wireless Internet: Promises and Challenges. 36-41
- Jan M. Rabaey, M. Josie Ammer, Julio Leao da Silva Jr., Danny Patel, Shad Roundy

:
PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking. 42-48 - Andrew P. Snow, Upkar Varshney, Alisha D. Malloy:

Reliability and Survivability of Wireless and Mobile Networks. 49-55
- Thomas Ball, James R. Larus:

Using Paths to Measure, Explain, and Enhance Program Behavior. 57-65 - Václav Rajlich, Keith H. Bennett:

A Staged Model for the Software Life Cycle. 66-71 - Forrest Shull, Ioana Rus, Victor R. Basili:

How Perspective-Based Reading Can Improve Requirements Inspections. 73-79
- W. Neville Holmes:

Fashioning a Foundation for the Computing Profession. 97-98
- Barry W. Boehm:

Requirements that Handle IKIWISI, COTS, and Rapid Change. 99-102
- Veljko M. Milutinovic, Predrag Knezevic, Bozidar Radunovic, Steve Casselman, John Schewel:

Obelix Searches Internet Using Customer Data. 104-107
- John R. Michener, Tolga Acar:

Managing System and Active-Content Integrity. 108-110
- Ted G. Lewis:

The Web Fosters a Rust-Belt Renaissance. 110-112
Volume 33, Number 8, August 2000
- Neal Leavitt:

Whatever Happened to Object-Oriented Databases? 16-19
- David Clark:

Encryption Advances to Meet Internet Challenges. 20-24
- Jeffrey M. Voas:

Developing a Usage-Based Software Certification Process. 32-37
- Anita K. Jones:

The Challenge of Building Survivable Information-Intensive Systems - Guest Editor's Introduction. 39-43 - Massoud Amin:

Toward Self-Healing Infrastructure Systems. 44-53 - Kenneth P. Birman

:
The Next-Generation Internet: Unsafe at Any Speed? 54-60 - Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliççöte, Pradeep K. Khosla:

Survivable Information Storage Systems. 61-68 - Donald E. Brown

, Louise F. Gunderson, Marc H. Evans:
Interactive Analysis of Computer Crimes. 69-77
- Michael R. Macedonia:

Distributed File Sharing: Barbarians at the Gates? 99-101
- Richard Hay:

Comparing POS and ATM Interfaces. 102-103
- Peter J. Danielsen:

The Promise of a Voice-Enabled Web. 104-106
- David Chadwick:

Windows 2000: A Threat to Internet Diversity and Open Standards? 107-109
- Ted G. Lewis:

Why WAP May Never Get off the Ground. 110-112
Volume 33, Number 9, September 2000
- George Lawton:

The Wild World of 3D Graphics Chips. 12-16
- Edward A. Lee

:
What's Ahead for Embedded Software? 18-26
- Michael A. Olson:

Selecting and Implementing an Embedded Database System. 27-34 - Rodger Lea, Simon Gibbs, Alec Dara-Abrams, Edward Eytchison:

Networking Home Entertainment Devices with HAVi. 35-43
- Domenico Talia

:
Cellular Processing Tools for High-Performance Simulation. 44-52
- W. Neville Holmes:

Olympic Games Reform: A Study in System Engineering. 91-93
- Barry W. Boehm:

Termination Doesn't Equal Project Failure. 94-96
- Edmund M. A. Ronald, Moshe Sipper

:
The Challenge of Tamperproof Internet Computing. 98-99
- Ted G. Lewis:

XM and Sirius Get Serious about Broadcast Satellite Radio. 102-104
Volume 33, Number 10, October 2000
- Linda Dailey Paulson:

Exploring the Wireless LANscape. 12-16
- Lutz Prechelt

:
An Empirical Comparison of Seven Programming Languages. 23-29
- Alfred C. Weaver

, Ronald J. Vetter, Andrew B. Whinston, Kathleen M. Swigger:
Guest Editors' Introduction: The Future of E-Commerce. 30-31 - Upkar Varshney, Ronald J. Vetter, Ravi Kalakota:

Mobile Commerce: A New Frontier. 32-38 - Simon S. Y. Shim, Vishnu S. Pendyala

, Meera Sundaram, Jerry Z. Gao:
Business-to-Business E-Commerce Frameworks. 40-47 - Wenli Wang, Zoltán Hidvégi, Andrew D. Bailey Jr., Andrew B. Whinston:

E-Process Design and Assurance Using Model Checking. 48-53 - Tim Ebringer, Peter Thorne, Yuliang Zheng

:
Parasitic Authentication To Protect Your E-Wallet. 54-60
- Gerald Lui-Kwan:

In-Flight Entertainment: The Sky's the Limit. 98-101
- Jim Isaak:

New Laws and Technologies Morph Web Page Best Practices. 102-103
- David G. Stork:

Using Open Data Collection for Intelligent Software. 104-106
- Joseph Samaha, Ayman I. Kayssi, Ralph Achkar, Mark Azar:

G3 Integrates Three System Technologies. 107-110
- Ted G. Lewis:

Innovation Equals Risk Reduction. 111-112
Volume 33, Number 11, November 2000
- David Clark:

Handhelds Drive Mixed-Signal Chip Development. 12-15
- Nisha Talagala, Satoshi Asami, David A. Patterson, Bob Futernick, Dakin Hart:

The Art of Massive Storage: A Web Image Archive. 22-28
- Udo Hahn, Inderjeet Mani:

The Challenges of Automatic Summarization. 29-36 - Nivio Ziviani, Edleno Silva de Moura, Gonzalo Navarro, Ricardo A. Baeza-Yates

:
Compression: A Key for Next-Generation Text Retrieval Systems. 37-44 - Michael S. Lew:

Next-Generation Web Searches for Visual Content. 46-53
- Pearl Brereton, David Budgen

:
Component-Based Systems: A Classification of Issues. 54-62 - Deborah Estrin, Mark Handley, John S. Heidemann, Steven McCanne, Ya Xu, Haobo Yu:

Network Visualization with Nam, the VINT Network Animator. 63-68
- Veljko M. Milutinovic, Dragana Cvetkovic, Jelena Mirkovic:

Genetic Search Based on Multiple Mutations. 118-119
- Barry W. Boehm, Daniel Port, Mohammed Al-Said:

Avoiding the Software Model-Clash Spiderweb. 120-122
- Gaetano Borriello:

The Challenges to Invisible Computing. 123-125
- W. Neville Holmes:

Some Comments on the Coding of Programs. 126-128
Volume 33, Number 12, December 2000
- Sixto Ortiz Jr.:

Will PKI Become a Key to Online Security? 13-15
- Neal Leavitt:

Malicious Code Moves to Mobile Devices. 16-19
- T. Michael Elliott:

Reflections on 18 Years of Change at the Computer Society. 26-29
- Morgan Björkander:

Graphical Programming Using UML and SDL. 30-35
- James A. Whittaker, Jeffrey M. Voas:

Toward a More Reliable Theory of Software Reliability. 36-42
- Thomas A. Longstaff, Clyde Chittister, Rich Pethia, Yacov Y. Haimes:

Are We Forgetting the Risks of Information Technology? 43-51 - William A. Arbaugh, William L. Fithen, John McHugh:

Windows of Vulnerability: A Case Study Analysis. 52-59
- Randy Butler, Von Welch

, Douglas Engert, Ian T. Foster, Steven Tuecke
, John Volmer, Carl Kesselman
:
A National-Scale Authentication Infrastructur. 60-66 - Trishul M. Chilimbi, Mark D. Hill, James R. Larus:

Making Pointer-Based Data Structures Cache Conscious. 67-74
- James A. Senn:

The Emergence of M-Commerce. 148-150
- Harry Mason:

SCSI, the Industry Workhorse, Is Still Working Hard. 152-153
- Theresa-Marie Rhyne:

Computer Games' Influence on Scientific and Information Visualization. 154-156
- W. Neville Holmes:

Why Johnny Can't Program. 158-160

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














