Stop the war!
Остановите войну!
for scientists:
default search action
IEEE Computer, Volume 42, 2009
Volume 42, Number 1, January 2009
- Susan K. Land:
A Leadership Challenge in 2009. 6-8 - David Alan Grier:
Politics in Play. 9-12 - Neal Leavitt:
Is Cloud Computing Really Ready for Prime Time? 15-20 - Linda Dailey Paulson:
Start-up Unveils Flexible Supercomputing Approach. 21-24 - Richard T. Kouzes, Gordon A. Anderson, Stephen T. Elbert, Ian Gorton, Deborah K. Gracio:
The Changing Paradigm of Data-Intensive Computing. 26-34 - Ian Bird, Bob Jones, Kerk F. Kee:
The Organization and Management of Grid Infrastructures. 36-46 - Naren Ramakrishnan, Upinder S. Bhalla, John J. Tyson:
Computing with Proteins. 47-56 - Mark A. Hanson, Harry C. Powell Jr., Adam T. Barth, Kyle Ringgenberg, Benton H. Calhoun, James H. Aylor, John C. Lach:
Body Area Sensor Networks: Challenges and Opportunities. 58-65 - Amar Gupta:
The 24-Hour Knowledge Factory: Can It Replace the Graveyard Shift? 66-73 - Brian Berenbach, Manfred Broy:
Professional and Ethical Dilemmas in Software Engineering. 74-80 - Kirk W. Cameron:
Green Introspection. 101-103 - Eyhab Al-Masri, Qusay H. Mahmoud:
Web Service Discovery and Client Goals. 104-107 - Perry Alexander:
Rosetta: Standardization at the System Level. 108-110 - Jim Hendler:
Web 3.0 Emerging. 111-113 - W. Neville Holmes:
The Credit Crunch and the Digital Bite. 114-116
Volume 42, Number 2, February 2009
- David Alan Grier:
Scanning the Horizon. 8-11 - Steven J. Vaughan-Nichols:
Will Mobile Computing's Future Be Location, Location, Location? 14-17 - George Lawton:
Users Take a Close Look at Visual Analytics. 19-22 - Linda Dailey Paulson:
W3C Adopts Web-Accessibility Specifications. 23-26 - Andrew S. Grimshaw, Mark M. Morgan, Duane Merrill, Hiro Kishimoto, Andreas Savva, David Snelling, Chris Smith, Dave Berry:
An Open Grid Services Architecture Primer. 27-34 - Carlos E. Caicedo, James B. D. Joshi, Summit R. Tuladhar:
IPv6 Security Challenges. 36-42 - Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee:
Dynamic Trust Management. 44-52 - Halvard Skogsrud, Hamid R. Motahari Nezhad, Boualem Benatallah, Fabio Casati:
Modeling Trust Negotiation for Web Services. 54-61 - Kristof Beyls, Erik H. D'Hollander:
Refactoring for Data Locality. 62-71 - Veronica Liesaputra, Ian H. Witten, David Bainbridge:
Creating and Reading Realistic Electronic Books. 72-81 - Matt Adcock, Jaewoo Chung, Chris Schmandt:
Are We There Yet? User-Centered Temporal Awareness. 97-99 - Dong-hyun Lee, Keun Lee, Sooyong Park, Mike Hinchey:
A Survival Kit: Adaptive Hardware/Software Codesign Life-Cycle Model. 100-102 - Chris Swain:
Who Needs a Publisher ... or a Retailer or a Marketer? 103-105 - Abbe Mowshowitz, Nanda Kumar:
And Then There Were Three. 106-108
Volume 42, Number 3, March 2009
- David Alan Grier:
Virtual Walls. 8-10 - George Lawton:
WDM-PONs Hold Promise for the Long Haul. 13-16 - David Geer:
Networks on Processors Improve On-Chip Communications. 17-20 - Linda Dailey Paulson:
News Briefs. 21-24 - Behrooz Parhami:
Puzzling Problems in Computer Engineering. 26-29 - Gary Marchionini, Ryen W. White:
Information-Seeking Support Systems [Guest Editors' Introduction]. 30-32 - Peter Pirolli:
Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales. 33-40 - Ed H. Chi:
Information Seeking Can Be Social. 42-46 - Gene Golovchinsky, Pernilla Qvarfordt, Jeremy Pickens:
Collaborative Information Seeking. 47-51 - m. c. schraefel:
Building Knowledge: What's beyond Keyword Search? 52-59 - Diane Kelly, Susan T. Dumais, Jan O. Pedersen:
Evaluation Challenges and Directions for Information-Seeking Support Systems. 60-66 - Daniel M. Russell:
Industry-Academic Relationships. 67-68 - Denis L. Baggi, Goffredo Haus:
IEEE 1599: Music Encoding and Interaction. 84-87 - Wayne H. Wolf:
Cyber-physical Systems. 88-89 - Itamar Arel, Scott C. Livingston:
Beyond the Turing Test. 90-91 - Rajan Samtani:
Ongoing Innovation in Digital Watermarking. 92-94 - Klaus-Dieter Lange:
Identifying Shades of Green: The SPECpower Benchmarks. 95-97 - W. Neville Holmes:
The Automation of Originality. 98-100
Volume 42, Number 4, April 2009
- Bob Ward:
Elsewhere in the CS. 4-5 - Letters. 6-7
- David Alan Grier:
Top of the News. 10-13 - 32 and 16 Years Ago. 14-15
- Neal Leavitt:
Complex-Event Processing Poised for Growth. 17-20 - Sixto Ortiz Jr.:
Securing the Internet's Routing Infrastructure. 21-23 - Linda Dailey Paulson:
Technique Makes Strong Encryption Easier to Use. 24-27 - Seong Oun Hwang:
How Viable Is Digital Rights Management?. 28-34 - Edward Walker:
The Real Cost of a CPU Hour. 35-41 - Christof Ebert, Capers Jones:
Embedded Software: Facts, Figures, and Future. 42-52 - Hesham Shokry, Mike Hinchey:
Model-Based Verification of Embedded Software. 53-59 - Gregory V. Chockler, Rachid Guerraoui, Idit Keidar, Marko Vukolic:
Reliable Distributed Storage. 60-67 - Alejandro Figueroa, Günter Neumann, John Atkinson:
Searching for Definitional Answers on the Web Using Surface Patterns. 68-76 - Bookshelf. 81
- Bob Ward:
CRA Survey Counts New PhDs. 87-92 - Bob Ward:
Call and Calendar. 93-94 - Josh C. Bongard:
Biologically Inspired Computing. 95-98 - Rajesh Krishna Balan, Narayan Ramasubbu:
The Digital Wallet: Opportunities and Prototypes. 100-102 - Michael Zyda, Marc Spraragen, Balakrishnan Ranganathan:
Testing Behavioral Models with an Online Game. 103-105 - Jim Buckley:
Requirements-Based Visualization Tools for Software Maintenance and Evolution. 106-108 - Peggy Israel Doerschuk, Jiangjiang Liu, Judith Mann:
Increasing Participation of Females and Underrepresented Minorities in Computing. 110-113 - Kai A. Olsen:
In-House Programming Is Not Passe: Automating Originality. 114-116
Volume 42, Number 5, May 2009
- Elsewhere in the CS. 4-5
- David Alan Grier:
The Dictator and the Web Design. 6-8 - 32 and 16 Years Ago. 9-10
- Steven J. Vaughan-Nichols:
Vendors Draw up a New Graphics-Hardware Approach. 11-13 - George Lawton:
The Changing Face of Open Source. 14-17 - Linda Dailey Paulson:
The Changing World of Outsourcing. 18-21 - Nathanael Paul, Andrew S. Tanenbaum:
Trustworthy Voting: From Machine to System. 23-29 - Piotr Pacyna, Anthony M. Rutkowski, Amardeo Sarma, Kenji Takahashi:
Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems. 30-32 - David W. Chadwick, George Inman:
Attribute Aggregation in Federated Identity Management. 33-40 - Paul Madsen, Hiroki Itoh:
Challenges to Supporting Federated Assurance. 42-49 - Federica Paci, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino:
An Interoperable Approach to Multifactor Identity Verification. 50-57 - Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Joao Girão:
A SWIFT Take on Identity Management. 58-65 - Manuel Barranco, Julián Proenza, Luís Almeida:
Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate. 66-73 - Bob Ward:
Computer Society Connection. 79-83 - Bookshelf. 86
- Kirk W. Cameron:
The Road to Greener IT Pastures. 87-89 - Ken Birman, Jared Cantwell, Daniel A. Freedman, Qi Huang, Petko Nikolov, Krzysztof Ostrowski:
Edge Mashups for Service-Oriented Collaboration. 90-94 - Ali El Kateeb:
Hardware Reconfiguration Capability for Third-Generation Sensor Nodes. 95-97 - Bernard J. Jansen, Theresa Flaherty, Ricardo Baeza-Yates, Lee Hunter, Brendan Kitts, Jamie Murphy:
The Components and Impact of Sponsored Search. 98-101 - W. Neville Holmes:
The Design of Government. 102-104
Volume 42, Number 6, June 2009
- Computer Highlights Society Magazines. 4-5
- Letters. 6-7
- David Alan Grier:
Marking the Fall of Sparrows. 9-12 - 32 and 16 Years Ago. 13-14
- David Geer:
The Future of Mobile VoIP in the Enterprise. 15-18 - George Lawton:
On the Trail of the Conficker Worm. 19-22 - Linda Dailey Paulson:
Materials Breakthrough Could Eliminate Bootups. 23-25 - Rolf Oppliger, Ruedi Rytz, Thomas Holderegger:
Internet Banking: Client-Side Attacks and Protection Mechanisms. 27-33 - Awais Rashid, John Weckert, Richard Lucas:
Software Engineering Ethics in a Digital World. 34-41 - Amela Karahasanovic, Petter Bae Brandtzæg, Jeroen Vanattenhoven, Bram Lievens, Karen Torben Nielsen, Jo Pierson:
Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications. 42-49 - Wolter Pieters, André van Cleeff:
The Precautionary Principle in a World of Digital Dependencies. 50-56 - Tetsuo Tamai:
Social Impact of Information System Failures. 58-65 - Donald Gotterbarn, Keith W. Miller:
The Public is the Priority: Making Decisions Using the Software Engineering Code of Ethics. 66-73 - Bob Ward:
IEEE Foundation Gives Away More Than $300, 000. 78-79 - Bob Ward:
Call and Calendar. 80-81 - Bookshelf. 85
- Sunny Consolvo, James A. Landay, David W. McDonald:
Designing for Behavior Change in Everyday Life. 86-89 - Emil Vassev, Mike Hinchey:
ASSL: A Software Engineering Approach to Autonomic Computing. 90-93 - Alexander Yates:
Extracting World Knowledge from the Web. 94-97 - Jungwoo Ryoo, Phillip A. Laplante, Rick Kazman:
In Search of Architectural Patterns for Software Security. 98-100 - Atanas Radenski:
Expanding Computing as an Academic Service Discipline. 101-104
Volume 42, Number 7, July 2009
- Elsewhere in the CS. 4-5
- David Alan Grier:
The Character of Play. 7-9 - 32 and 16 Years Ago. 10-11
- Sixto Ortiz Jr.:
IEEE 802.11n: The Road Ahead. 13-15 - Linda Dailey Paulson:
Software-Based Networking Approach Could Help Internet Research. 16-19 - Carl K. Chang:
Reversing the Bipolar Drift. 20-24 - Muhammad Ali Babar, Ian Gorton:
Software Architecture Review: The State of Practice. 26-32 - Oliver Bimber:
Visual Effects and Beyond. 33-34 - Doug Roble, Nafees Bin Zafar:
Don't Trust Your Eyes: Cutting-Edge Visual Effects. 35-41 - Graham A. Thomas, Oliver Grau:
Virtual Graphics for Broadcast Production. 42-47 - Xubo Yang, Milo K. Yip, Xiaoyue Xu:
Visual Effects in Computer Games. 48-56 - Scott Trowbridge, Christopher B. Stapleton:
Melting the Boundaries Between Fantasy and Reality. 57-62 - Brian Whitworth, Tong Liu:
Channel E-mail: A Sociotechnical Response to Spam. 63-72 - Bookshelf. 77
- Bob Ward:
Computer Society Presents Technical Awards. 81-84 - Bob Ward:
Call and Calendar. 85 - Gerald T. Lane:
Best Practices for Standards Communities. 86-87 - V. S. Subrahmanian:
Mining Online Opinions. 88-90 - Amip Shah, Tom Christian, Chandrakant D. Patel, Cullen E. Bash, Ratnesh K. Sharma:
Assessing ICT's Environmental Impac