


default search action
IEEE Computer, Volume 40, 2007
Volume 40, Number 1, January 2007
- Carl K. Chang:

My Vision for Computer. 7-8 - Michael R. Williams:

A Year of Decision. 9-11 - David Alan Grier:

The Wave of the Future. 12-14 - Sixto Ortiz Jr.:

Brain-Computer Interfaces: Where Human and Machine Meet. 17-21 - Linda Dailey Paulson:

News Briefs. 22-24 - R. Iris Bahar

, Dan W. Hammerstrom, Justin E. Harlow III, William H. Joyner Jr., Clifford Lau, Diana Marculescu
, Alex Orailoglu, Massoud Pedram:
Architectures for Silicon Nanoelectronics and Beyond. 25-33 - José Luiz Fiadeiro:

Designing for Software's Social Complexity. 34-39 - Manoj Parameswaran, Xia Zhao, Andrew B. Whinston, Fang Fang:

Reengineering the Internet for Better Security. 40-44 - Gregory Dudek, Philippe Giguère

, Chris Prahacs, Shane Saunderson
, Junaed Sattar, Luz Abril Torres-Méndez, Michael Jenkin
, Andrew German, Andrew Hogue, Arlene Ripsman, James E. Zacher, Evangelos E. Milios
, Hui Liu, Pifu Zhang, Martin Buehler, Christina Georgiades:
AQUA: An Amphibious Autonomous Robot. 46-53 - Tim Menzies, David Owen, Julian Richardson:

The Strangest Thing About Software. 54-60 - George Cybenko, Vincent H. Berk:

Process Query Systems. 62-70 - James C. Spohrer, Paul P. Maglio, John H. Bailey, Daniel Gruhl:

Steps Toward a Science of Service Systems. 71-77 - Bob Ward:

Computer Society Connection. 84-93 - Vinton G. Cerf:

An Information Avalanche. 104-105 - Michiel van Genuchten:

The Impact of Software Growth on the Electronics Industry. 106-108 - Priya Narasimhan:

Fault-Tolerant CORBA: From Specification to Reality. 110-112 - W. Neville Holmes:

The Computing Profession and Higher Education. 114-116
Volume 40, Number 2, February 2007
- David Alan Grier:

Dirty Electricity. 6-8 - Linda Dailey Paulson:

Developers Shift to Dynamic Programming Languages. 12-15 - George Lawton:

Powering Down the Computing Infrastructure. 16-19 - Linda Dailey Paulson:

News Briefs. 20-22 - André N. Klingsheim, Vebjørn Moen, Kjell Jørgen Hole:

Challenges in Securing Networked J2ME Applications. 24-30 - David Schuff, Ozgur Turetken

, John D'Arcy, David C. Croson
:
Managing E-Mail Overload: Solutions and Future Challenges. 31-36 - Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar:

Cryptography on a Speck of Dust. 38-44 - Huaizhi Li, Mukesh Singhal:

Trust Management in Distributed Systems. 45-53 - Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Srinivasan Venkatesh, Lokesh Bhatia:

Marking Technique to Isolate Boundary Router and Attacker. 54-58 - Min Tian, Andreas Gramm, Hartmut Ritter, Jochen H. Schiller

, Thiemo Voigt:
Adaptive QoS for Mobile Web Services through Cross-Layer Communication. 59-63 - Les Hatton:

How Accurately Do Engineers Predict Software Maintenance Tasks? 64-69 - Katie A. Siek

, Kay Connelly
, Suzanne Menzel, Laura Hopkins:
Propagating Diversity through Active Dissemination. 89-92 - Daniel Peek, Jason Flinn:

Consumer Electronics Meets Distributed Storage. 93-95 - David P. Luebke, Greg Humphreys:

How GPUs Work. 96-100 - Michael R. Macedonia:

The Future Arrives ... Finally. 101-103 - Mahesh V. Tripunitara, Thomas S. Messerges:

Resolving the Micropayment Problem. 104-106 - Michael Grottke

, Kishor S. Trivedi:
Fighting Bugs: Remove, Retry, Replicate, and Rejuvenate. 107-109 - Raghavendra Rao Loka:

Software Development: What Is the Problem? 110-112
Volume 40, Number 3, March 2007
- David Alan Grier:

Outposts. 8-10 - Cameron Laird:

Taking a Hard-Line Approach to Encryption. 13-15 - Neal Leavitt:

Vendors Fight Spam's Sudden Rise. 16-19 - Linda Dailey Paulson:

News Briefs. 20-22 - Duncan A. Buell

, Tarek A. El-Ghazawi, Kris Gaj, Volodymyr V. Kindratenko
:
Guest Editors' Introduction: High-Performance Reconfigurable Computing. 23-27 - Justin L. Tripp

, Maya B. Gokhale, Kristopher D. Peterson:
Trident: From High-Level Language to Hardware Circuitry. 28-37 - Nicholas Moore

, Albert Conti, Miriam Leeser
, Laurie A. Smith King:
Vforce: An Extensible Framework for Reconfigurable Supercomputing. 39-49 - Martin C. Herbordt, Tom Van Court, Yongfeng Gu, Bharat Sukhwani, Al Conti, Josh Model, Douglas DiSabello:

Achieving High Performance with FPGA-Based Computing. 50-57 - Gerald R. Morris, Viktor K. Prasanna:

Sparse Matrix Computations on Reconfigurable Hardware. 58-64 - Sadaf R. Alam, Pratul K. Agarwal

, Melissa C. Smith, Jeffrey S. Vetter, David Caliga:
Using FPGA Devices to Accelerate Biomolecular Simulations. 66-73 - Bob Ward:

Computer Society Connection. 77-79 - Janos Sztipanovits, John Bay, Larry Rohrbough, Shankar Sastry, Douglas C. Schmidt, Norm Whitaker, Don Wilson, Don Winter:

Escher: A New Technology Transitioning Model. 90-92 - Christoph Bussler:

The Fractal Nature of Web Services. 93-95 - Don Hardaway:

Replacing Proprietary Software on the Desktop. 96-97 - W. Neville Holmes:

Digital Technology and the Skills Shortage. 98-100
Volume 40, Number 4, April 2007
- David Alan Grier:

The Best Deal in Town. 8-11 - Sixto Ortiz Jr.:

Getting on Board the Enterprise Service Bus. 15-17 - George Lawton:

The Next Big Thing in Chipmaking. 18-20 - Linda Dailey Paulson:

News Briefs. 21-23 - Dirk Riehle

:
The Economic Motivation of Open Source Software: Stakeholder Perspectives. 25-32 - David Budgen

, Michael Rigby, Pearl Brereton, Mark Turner:
A Data Integration Broker for Healthcare Systems. 34-41 - Peter Aiken, M. David Allen, Burt Parker, Angela Mattia:

Measuring Data Management Practice Maturity: A Community's Self-Assessment. 42-50 - Nan Zhang, Wei Zhao:

Privacy-Preserving Data Mining Systems. 52-58 - Jiannong Cao

, Yang Zhang, Guohong Cao, Li Xie:
Data Consistency for Cooperative Caching in Mobile Environments. 60-66 - Joe Gebis, David A. Patterson:

Embracing and Extending 20th-Century Instruction Set Architectures. 68-75 - Albrecht Mayer, Harry Siebert, Klaus D. McDonald-Maier

:
Boosting Debugging Support for Complex Systems on Chip. 76-81 - Bob Ward:

Computer Society Connection. 89-91 - Michael van Lent:

Game Smarts. 99-101 - Donald Rich:

Authentication in Transient Storage Device Attachments. 102-104 - John Krumm, Eric Horvitz:

Predestination: Where Do You Want to Go Today? 105-107 - David G. Leeper:

Wi-Fi - The Nimble Musician in Your Laptop. 108-110 - Michael G. Hinchey

, Roy Sterritt
, Christopher A. Rouff:
Swarms and Swarm Intelligence. 111-113 - Nicholas Harkiolakis

:
Incorporating a Variable-Expertise-Level System in IT Course Modules. 114-116
Volume 40, Number 5, May 2007
- David Alan Grier:

Working Class Hero. 8-10 - George Lawton:

Stronger Domain Name System Thwarts Root-Server Attacks. 14-17 - Karen Heyman:

New Attack Tricks Antivirus Software. 18-20 - Linda Dailey Paulson:

News Briefs. 21-23 - Les Hatton:

Empirical Test Observations in Client-Server Systems. 24-29 - Alejandro Jaimes, Daniel Gatica-Perez

, Nicu Sebe
, Thomas S. Huang:
Guest Editors' Introduction: Human-Centered Computing--Toward a Human Revolution. 30-34 - Norman Alm, Richard Dye, Gary Gowans, Jim Campbell, Arlene Astell

, Maggie Ellis:
A Communication Support System for Older People with Dementia. 35-41 - Gutemberg Guerra-Filho, Yiannis Aloimonos:

A Language for Human Action. 42-51 - Gamhewage C. de Silva, Toshihiko Yamasaki, Kiyoharu Aizawa:

An Interactive Multimedia Diary for the Home. 52-59 - Mohan M. Trivedi, Shinko Y. Cheng:

Holistic Sensing and Active Displays for Intelligent Driver Support Systems. 60-68 - Shinichi Yamagiwa, Leonel Sousa

:
Caravela: A Novel Stream-Based Distributed Computing Environment. 70-77 - Bob Ward:

Computer Society Connection. 85-88 - Sheryl Burgstahler, Richard E. Ladner

:
Increasing the Participation of People with Disabilities in Computing Fields. 94-97 - Ben Clacy, Brian Jennings:

Service Management: Driving the Future of IT. 98-100 - Kwei-Jay Lin:

Building Web 2.0. 101-102 - Paul Joannou:

Enterprise, Systems, and Software Engineering--The Need for Integration. 103-105 - John Iselin Woodfill, Ron Buck, Dave Jurasek, Gaile Gordon, Terrance Brown:

3D Vision: Developing an Embedded Stereo-Vision System. 106-108 - Jiming Liu:

Computing as an Evolving Discipline: 10 Observations. 110-112
Volume 40, Number 6, June 2007
- David Alan Grier:

The Camino Real. 6-8 - Sixto Ortiz Jr.:

Searching the Visual Web. 12-14 - Linda Dailey Paulson, George Lawton:

News Briefs. 15-18 - Feisal Keblawi, Dick Sullivan:

The Case for Flexible NIST Security Standards. 19-26 - Jane Cleland-Huang, Brian Berenbach, Stephen Clark, Raffaella Settimi, Eli Romanova:

Best Practices for Automated Traceability. 27-35 - Michael Gschwind, David Erb, Sid Manning, Mark Nutter:

An Open Source Environment for Cell Broadband Engine System Software. 37-47 - Nidhi Aggarwal, Parthasarathy Ranganathan, Norman P. Jouppi, James E. Smith:

Isolation in Commodity Multicore Processors. 49-59 - Yu-Chee Tseng, You-Chiun Wang, Kai-Yang Cheng, Yao-Yu Hsieh:

iMouse: An Integrated Mobile Surveillance and Wireless Sensor System. 60-66 - Saikat Chakrabarti, Mukesh Singhal:

Password-Based Authentication: Preventing Dictionary Attacks. 68-74 - Bob Ward:

Computer Society Connection. 84-85 - W. Neville Holmes:

Binary Arithmetic. 90-93 - Michael R. Macedonia:

iPhones Target the Tech Elite. 94-95 - Tessa A. Lau:

Social Scripting for the Web. 96-98 - Shawn A. Bohner:

An Era of Change-Tolerant Systems. 100-102 - Laszlo Hars:

Discryption: Internal Hard-Disk Encryption for Secure Storage. 103-105 - Sean M. Price:

Supporting Resource-Constrained Collaboration Environments. 106-108
Volume 40, Number 7, July 2008
- David Alan Grier:

The Boundaries of Time. 5-7 - George Lawton:

These Are Not Your Father's Widgets. 10-13 - Neal Leavitt:

For Wireless USB, the Future Starts Now. 14-16 - Linda Dailey Paulson:

News Briefs. 17-19 - Nuno Vasconcelos

:
From Pixels to Semantic Spaces: Advances in Content-Based Image Retrieval. 20-26 - Philip C. Treleaven, Jonathan Wells

:
3D Body Scanning and Healthcare Applications. 28-34 - Doug A. Bowman

, Ryan P. McMahan
:
Virtual Reality: How Much Immersion Is Enough? 36-43 - Cyrus Shahabi

, Tim Marsh
, Kiyoung Yang, Hyunjin Yoon, Albert A. Rizzo, Margaret McLaughlin, Minyoung Mun:
Immersidata Analysis: Four Case Studies. 45-52 - Shree K. Nayar, Vijay N. Anand:

3D Display Using Passive Optical Scatterers. 54-63 - Luigina Ciolfi, Mikael Fernström

, Liam J. Bannon, Parag Deshpande, Paul Gallagher, Colm McGettrick, Nicola Quinn, Stephen Shirley:
The Shannon Portal Installation: Interaction Design for Public Places. 64-71 - Bob Ward:

Computer Society Connection. 77-80 - Bernard J. Jansen

:
Click Fraud. 85-86 - Anna Carlin, Frederick Gallegos:

IT Audit: A Critical Business Process. 87-89 - Suman Nath

, Jie Liu, Feng Zhao:
SensorMap for Wide-Area Sensor Webs. 90-93 - Jeffrey M. Voas, Phillip A. Laplante:

Standards Confusion and Harmonization. 94-96 - W. Neville Holmes:

Consciousness and Computers. 98-100
Volume 40, Number 8, August 2007
- David Alan Grier:

In Our Time: Annie and the Boys. 6-9 - W. Neville Holmes:

32 & 16 Years Ago. 10-11 - Steven J. Vaughan-Nichols:

New Interfaces at the Touch of a Fingertip. 12-15 - Sixto Ortiz Jr.:

Protecting Networks by Controlling Access. 16-19 - Linda Dailey Paulson:

News Briefs. 20-22 - Jiri Soukup, Martin Soukup:

The Inevitable Cycle: Graphical Tools and Programming Paradigms. 24-30 - Naren Ramakrishnan

:
From the Area Editor: Search-The New Incarnations. 31-32 - Thorsten Joachims, Filip Radlinski:

Search Engines that Learn from Implicit Feedback. 34-40 - Barry Smyth:

A Community-Based Approach to Personalizing Web Search. 42-50 - Bernard J. Jansen

, Amanda Spink:
Sponsored Search: Is Money a Motivator for Providing Relevant Results? 52-57 - Maryam Kamvar, Shumeet Baluja:

Deciphering Trends in Mobile Search. 58-62 - Raghu Ramakrishnan, Andrew Tomkins:

Toward a PeopleWeb. 63-72 - Bob Ward:

Computer Society Connection. 77-79 - Raghvinder S. Sangwan, Colin J. Neill:

How Business Goals Drive Architectural Design. 85-87 - Ron Ross:

Managing Enterprise Security Risk with NIST Standards. 88-91 - Jeremy Epstein:

Electronic Voting. 92-95 - Cristen Torrey, David W. McDonald:

How-To Web Pages. 96-97 - Michael van Lent, William R. Swartout

:
Games: Once More, with Feeling. 98-100 - Les Hatton:

The Chimera of Software Quality. 104, 102-103
Volume 40, Number 9, September 2007
- David Alan Grier:

Controlling the Conversation. 7-9 - W. Neville Holmes:

32 & 16 Years Ago. 10-11 - Brett Allan King, Linda Dailey Paulson:

Motion Capture Moves into New Realms. 13-16 - David Geer:

For Programmers, Multicore Chips Mean Multiple Challenges. 17-19 - Linda Dailey Paulson:

News Briefs. 20-22 - Sean M. Pieper, JoAnn M. Paul, Michael J. Schulte:

A New Era of Performance Evaluation. 23-30 - Jane Prey, Alfred C. Weaver

:
Guest Editors' Introduction: Tablet PC Technology--The Next Generation. 32-33 - Randall Davis:

Magic Paper: Sketch-Understanding Research. 34-41 - Jeremy Roschelle

, Deborah G. Tatar, S. Raj Chaudhury, Yannis A. Dimitriadis
, Charles Patton, Chris DiGiano:
Ink, Improvisation, and Interactive Engagement: Learning with Tablets. 42-48 - James A. Pittman:

Handwriting Recognition: Tablet PC Text Input. 49-54 - Richard J. Anderson, Ruth E. Anderson, Peter Davis, Natalie Linnell, Craig Prince, Valentin Razmov, Fred Videon:

Classroom Presenter: Enhancing Interactive Education with Digital Ink. 56-61 - Joseph G. Tront:

Facilitating Pedagogical Practices through a Large-Scale Tablet PC Deployment. 62-68 - Hugh J. Watson, Barbara H. Wixom:

The Current State of Business Intelligence. 96-99 - François Coallier

:
Standards, Agility, and Engineering. 100-102 - Ron Kohavi, Roger Longbotham:

Online Experiments: Lessons Learned. 103-105 - Frank Vahid:

It's Time to Stop Calling Circuits "Hardware". 106-108 - W. Neville Holmes:

The Profession as a Culture Killer. 110-112
Volume 40, Number 10, October 2007
- David Alan Grier:

E-Mailing from Armenia. 8-10 - George Lawton:

Web 2.0 Creates Security Challenges. 13-16 - Linda Dailey Paulson:

News Briefs. 17-20 - Hanna Oktaba, Félix García

, Mario Piattini
, Francisco Ruiz
, Francisco J. Pino
, Claudia Alquicira:
Software Process Improvement: The Competisoft Project. 21-28 - Wayne H. Wolf:

Guest Editor's Introduction: The Embedded Systems Landscape. 29-31 - Thomas A. Henzinger, Joseph Sifakis:

The Discipline of Embedded Systems Design. 32-40 - Alberto L. Sangiovanni-Vincentelli

, Marco Di Natale
:
Embedded System Design for Automotive Applications. 42-51 - Deepu Talla, Jeremiah Golston:

Using DaVinci Technology for Digital Video Devices. 53-61 - Ulrich Ramacher:

Software-Defined Radio Prospects for Multistandard Mobile Phones. 62-69 - Bob Ward:

Computer Society Connection. 73-75 - Jianming Yong

, Elisa Bertino:
Replacing Lost or Stolen E-Passports. 89-91 - John Knight:

The Glass Cockpit. 92-95 - William G. Griswold

:
Five Enablers for Mobile 2.0. 96-98 - Michael R. Macedonia:

Generation 3D: Living in Virtual Worlds. 99-101 - Marco A. Casanova

, Karin Koogan Breitman
, Daniela F. Brauner
, André L. A. Marins:
Database Conceptual Schema Matching. 102-104 - Michiel van Genuchten, Douglas R. Vogel:

Getting Real in the Classroom. 106-108
Volume 40, Number 11, November 2007
- David Alan Grier:

Counting Beans. 8-10 - David Geer:

Improving Data Accessibility with File Area Networks. 14-17 - Sixto Ortiz Jr.:

4G Wireless Begins to Take Shape. 18-21 - Linda Dailey Paulson:

News Briefs. 22-24 - Maksym Petrenko, Denys Poshyvanyk

, Václav Rajlich, Joseph Buchta:
Teaching Software Evolution in Open Source. 25-31 - Tiziana Margaria

:
Service Is in the Eyes of the Beholder. 33-37 - Mike P. Papazoglou

, Paolo Traverso
, Schahram Dustdar
, Frank Leymann
:
Service-Oriented Computing: State of the Art and Research Challenges. 38-45 - Thomas Magedanz, Niklas Blum, Simon Dutkowski:

Evolution of SOA Concepts in Telecommunications. 46-50 - Jan Bosch, Stefan Friedrichs, Stefan Jung, Johannes Helbig, Alexander Scherdin:

Service Orientation in the Enterprise. 51-56 - Matthias Kaiser:

Toward the Realization of Policy-Oriented Enterprise Management. 57-63 - Bernhard Steffen, Prakash Narayan:

Full Life-Cycle Support for End-to-End Processes. 64-73 - Francisco Curbera:

Component Contracts in Service-Oriented Architectures. 74-80 - Bob Ward:

Computer Society Connection. 81-85 - Wayne H. Wolf:

The Good News and the Bad News. 104-105 - Martyn Thomas:

Unsafe Standardization. 109-111 - Alexander Mikroyannidis

:
Toward a Social Semantic Web. 113-115 - Mary Ann Davidson, Elad Yoran:

Enterprise Security for Web 2.0. 117-119 - Noel E. Sharkey:

Automated Killers and the Computing Profession. 122-124
Volume 40, Number 12, December 2007
- Michael R. Williams:

An Interesting Year. 6-7 - David Alan Grier:

A Force of Nature. 8-10 - Neal Leavitt:

The Changing World of Outsourcing. 13-16 - Karen Heyman:

A New Virtual Private Network for Today's Mobile World. 17-19 - Linda Dailey Paulson:

News Briefs. 20-22 - Yolanda Gil

, Ewa Deelman, Mark H. Ellisman, Thomas Fahringer
, Geoffrey C. Fox, Dennis Gannon, Carole A. Goble
, Miron Livny, Luc Moreau
, Jim Myers
:
Examining the Challenges of Scientific Workflows. 24-32 - Luiz André Barroso, Urs Hölzle:

The Case for Energy-Proportional Computing. 33-37 - Suzanne Rivoire, Mehul A. Shah, Parthasarathy Ranganathan, Christos Kozyrakis, Justin Meza:

Models and Metrics to Enable Energy-Efficiency Optimizations. 39-48 - Wu-chun Feng, Kirk W. Cameron

:
The Green500 List: Encouraging Sustainable Supercomputing. 50-55 - John Y. Oliver, Rajeevan Amirtharajah

, Venkatesh Akella, Roland Geyer, Frederic T. Chong
:
Life Cycle Aware Computing: Reusing Silicon Technology. 56-61 - Bob Ward:

Land Voted 2008 Computer Society President-Elect. 62-63 - Carl K. Chang:

Computer Recognizes Expert Reviewers. 64-65 - Allen Stone:

Natural-Language Processing for Intrusion Detection. 103-105 - Jeff Brown, Bill Shipman, Ron Vetter:

SMS: The Short Message Service. 106-110 - Gerard J. Holzmann:

Conquering Complexity. 111-113 - S. R. Subramanya, Byung K. Yi:

Enhancing the User Experience in Mobile Phones. 114-117 - Luc Vincent:

Taking Online Maps Down to Street Level. 118-120 - Simone Santini

:
Making Computers Do More with Less. 122-124

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














