


default search action
IEEE Computer, Volume 47
Volume 47, Number 1, January 2014
- Dejan S. Milojicic
:
Reinventing Relevance. 6-8 - Raghu Machiraju
:
Fixing the Mercator Projection for the Internet Age. 9 - Charles R. Severance:
Massimo Banzi: Building Arduino. 11-12 - Brian M. Gaff:
Corporate Risks from Social Media. 13-15 - Ron Vetter:
Digital Magazines: The Future of Publishing Is Here. 22-23 - Karin Strauss, Doug Burger:
What the Future Holds for Solid-State Memory. 24-31 - Shyamnath Gollakota, Matthew S. Reynolds, Joshua R. Smith, David Wetherall:
The Emergence of RF-Powered Computing. 32-39 - Anuj Kumar, Florian Metze
, Matthew Kam:
Enabling the Rapid Development and Adoption of Speech-User Interfaces. 40-47 - Emerson R. Murphy-Hill:
The Future of Social Learning in Software Engineering. 48-54 - Hye-Chung Kum, Ashok Kumar Krishnamurthy, Ashwin Machanavajjhala, Stanley C. Ahalt:
Social Genome: Putting Big Data to Work for Population Informatics. 56-63 - Paolo Montuschi
, Alfredo Benso:
Augmented Reading: The Present and Future of Electronic Scientific Publications. 64-74 - Eli Tilevich
, Young-Woo Kwon
:
Cloud-Based Execution to Improve Mobile Application Energy Efficiency. 75-77 - Hal Berghel:
Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege. 78-82 - Nir Kshetri:
Japan's Changing Cybersecurity Landscape. 83-86 - Brian David Johnson:
Utopia Rising. 87-89 - David Alan Grier:
Just Out of It. 104
Volume 47, Number 2, February 2014
- David A. Forsyth:
Object Detection with Discriminatively Trained Part-Based Models. 6-7 - Charles R. Severance:
Joseph Hardin: NCSA Mosaic. 8-10 - Brian M. Gaff:
IP 2013-2014: Looking Forward and Looking Back. 11-13 - W. Neville Holmes:
32 & 16 Years Ago. 14-15 - Lee Garber:
News Briefs. 16-20 - Renée C. Bryce, Rick Kuhn:
Software Testing. 21-22 - Midhat Ali, Francesco De Angelis, Daniele Fanì, Antonia Bertolino
, Guglielmo De Angelis, Andrea Polini
:
An Extensible Framework for Online Testing of Choreographed Services. 23-29 - Nuno Antunes
, Marco Vieira
:
Penetration Testing for Web Services. 30-36 - Cemal Yilmaz
, Sandro Fouché, Myra B. Cohen, Adam A. Porter, Gülsen Demiröz
, Ugur Koc:
Moving Forward with Combinatorial Interaction Testing. 37-45 - Jerry Gao, Xiaoying Bai, Wei-Tek Tsai, Tadahiro Uehara:
Mobile Application Testing: A Tutorial. 46-55 - Andreas Dähn, Clemens H. Cap
:
Application Transparency and Manipulation. 56-61 - William J. Chimiak, Samuel T. Patton, Stephen Janansky:
Enhanced IP: IPv4 with 64-Bit Addresses. 62-69 - Manfred Broy, Albrecht Schmidt
:
Challenges in Engineering Cyber-Physical Systems. 70-72 - Hal Berghel:
Moral Hazards, Negative Externalities, and the Surveillance Economy. 73-77 - Apostol Vassilev, Timothy A. Hall:
The Importance of Entropy to Information Security. 78-81 - Peter Gruenbaum:
Undergraduates Teach Game Programming Using Scratch. 82-84 - Rafael Capilla
, Óscar Ortiz, Mike Hinchey
:
Context Variability for Context-Aware Systems. 85-87 - Jeffrey E. Froyd:
The Nature of Scholarship in Computing Education: An Approach from IEEE Transactions on Education. 88-90 - David Alan Grier:
Practice and Theory. 104
Volume 47, Number 3, March 2014
- Peter Brusilovsky
:
Collective Class Wisdom: Collaborative Lecture Annotation. 6 - Charles R. Severance:
Len Kleinrock: The First Two Packets on the Internet. 10-11 - Brian M. Gaff:
Contracts 101. 12-15 - Lee Garber:
News Briefs. 18-21 - Chirag Shah
, Robert Capra
, Preben Hansen
:
Collaborative Information Seeking. 22-25 - Zhe Xu, Jay Ramanathan, Rajiv Ramnath:
Identifying Knowledge Brokers and Their Role in Enterprise Research through Social Media. 26-31 - Thilo Böhm, Claus-Peter Klas, Matthias L. Hemmje:
ezDL: Collaborative Information Seeking and Retrieval in a Heterogeneous Environment. 32-37 - Yihan Tao, Anastasios Tombros:
Investigating Collaborative Sensemaking Behavior in Collaborative Information Seeking. 38-45 - Zhen Yue, Shuguang Han, Daqing He
, Jiepu Jiang
:
Influences on Query Reformulation in Collaborative Web Search. 46-53 - Jaime Teevan, Meredith Ringel Morris, Shiri Azenkot:
Supporting Interpersonal Interaction during Collaborative Mobile Search. 54-57 - Marti A. Hearst:
What's Missing from Collaborative Search? 58-61 - Zheng Chen, Jian-Tao Sun, Xuedong Huang:
Web Information at Your Fingertips: Paper as an Interaction Metaphor. 62-66 - Christian Timmerer, Benjamin Rainer:
The Social Multimedia Experience. 67-69 - Hal Berghel:
STEM, Revisited. 70-73 - Hugo Plácido da Silva
, Ana L. N. Fred
:
Harnessing the Power of Biosignals. 74-77 - Kirk W. Cameron
:
The Evolution of Power Measurement. 78-80 - Gary McGraw:
Security Fatigue? Shift Your Paradigm. 81-83 - Brian David Johnson:
The Darwin App. 84-86 - David Alan Grier:
Assets to the Table. 100
Volume 47, Number 4, April 2014
- Ling Liu:
Service Selection and Recommendation through Collective Intelligence. 6 - Charles R. Severance:
Doug Van Houweling: Building the NSFNet. 7-9 - Brian M. Gaff:
Readers' Choice [Intellectual Property laws]. 10-12 - Carl K. Chang, Bill N. Schilit:
Aware Computing [Guest editors' introduction]. 20-21 - Sarah Vieweg, Adam Hodges
:
Rethinking Context: Leveraging Human and Machine Computation in Disaster Response. 22-27 - Mohammed (Ehsan) Hoque, Rosalind W. Picard:
Rich Nonverbal Sensing Technology for Automated Social Skills Training. 28-35 - Mark Matthews
, Saeed Abdullah
, Geri Gay, Tanzeem Choudhury:
Tracking Mental Well-Being: Balancing Rich Sensing and Patient Needs. 36-43 - Giampiero E. G. Beroggi:
Internet Voting: An Empirical Evaluation. 44-50 - Juan R. Terven
, Joaquín Salas
, Bogdan Raducanu:
New Opportunities for Computer Vision-Based Assistive Technology Systems for the Visually Impaired. 52-58 - Ying-Dar Lin, Chia-Yin Lee, Yu-Sung Wu, Pei-Hsiu Ho, Fu-Yu Wang, Yi-Lang Tsai:
Active versus Passive Malware Collection. 59-65 - Hal Berghel:
Mr. Snowden's Legacy. 66-70 - Katia Vega, Hugo Fuks:
Beauty Technology: Body Surface Computing. 71-75 - Young Lae Moon, Kazuomi Sugamoto, Alberto Paoluzzi, Antonio DiCarlo, Jaekeun Kwak, Dong Sun Shin, Dae Ok Kim, Dae Hyun Lee, Jooyoung Kim:
Standardizing 3D Medical Imaging. 76-79 - Sarah Beecham, Pádraig O'Leary, Seán Baker, Ita Richardson
, John Noll:
Making Software Engineering Research Relevant. 80-83 - George F. Hurlburt
, Jeffrey M. Voas:
Big Data, Networked Worlds. 84-87 - Fernando Arnez, Jason Pace, Kelvin Sung:
Learning while Building Games for Teaching. 88-91 - Sorel Reisman:
The Future of Online Instruction, Part 1. 92-93 - Patrick Butler, Naren Ramakrishnan
, Elaine O. Nsoesie, John S. Brownstein:
Satellite Imagery Analysis: What Can Hospital Parking Lots Tell Us about a Disease Outbreak? 94-97 - Gopal Pingali, T. S. Mohan:
The Cloud Ascends in Emerging Markets: Highlights of IEEE CCEM 2013. 98-101 - David Alan Grier:
All That Glitters Is Not Gold. 116
Volume 47, Number 5, May 2014
- Albert Y. Zomaya
:
Power-Performance Tradeoff in a Federated Cloud. 6-7 - Charles R. Severance:
Nathaniel Borenstein: Multipurpose Internet Mail Extensions (MIME). 9-11 - Martin Reisslein
, Bernhard Rinner, Amit K. Roy-Chowdhury:
Smart Camera Networks [Guest editors' introduction]. 23-25 - Ching-Hui Chen, Julien Favre
, Gregorij Kurillo, Thomas P. Andriacchi, Ruzena Bajcsy, Rama Chellappa:
Camera Networks for Healthcare, Teleimmersion, and Surveillance. 26-36 - Kevin Abas, Caio Porto, Katia Obraczka:
Wireless Smart Camera Networks for the Surveillance of Public Spaces. 37-44 - Andrea Prati
, Faisal Z. Qureshi:
Integrating Consumer Smart Cameras into Camera Networks: Opportunities and Obstacles. 45-51 - Kaushik Mitra
, Ashok Veeraraghavan, Aswin C. Sankaranarayanan, Richard G. Baraniuk:
Toward Compressive Camera Networks. 52-59 - Zhangyu Guan, Tommaso Melodia
:
Cloud-Assisted Smart Camera Networks for Energy-Efficient 3D Video Streaming. 60-66 - Juan C. SanMiguel
, Christian Micheloni
, Karen Shoop, Gian Luca Foresti, Andrea Cavallaro:
Self-Reconfigurable Smart Camera Networks. 67-73 - Xian-He Sun, Dawei Wang:
Concurrent Average Memory Access Time. 74-80 - Wen Gao, Tiejun Huang, Cliff Reader, Weibei Dou, Xilin Chen:
IEEE Standards for Advanced Audio and Video Coding in Emerging Applications. 81-83 - Symeon Papadopoulos, Yiannis Kompatsiaris:
Social Multimedia Crawling for Mining and Search. 84-87 - Michael Cheng Yi Cho, Pokai Chen, Shiuhpyng Winston Shieh:
Dmail: A Globally Authenticated Email Service. 88-91 - Chris Preist
, Daniel Schien, Paul Shabajee, Stephen G. Wood, Christopher Hodgson:
Analyzing End-to-End Energy Consumption for Digital Services. 92-95 - Kevin W. Bowyer
, James S. Doyle Jr.:
Cosmetic Contact Lenses and Iris Recognition Spoofing. 96-98 - Brian David Johnson:
A New Doorway into Time. 99-101 - Hal Berghel:
PII, the FTC, Car Dealers, and You. 102-106 - David Alan Grier:
The Real Change [The Errant Hashtag]. 120
Volume 47, Number 6, June 2014
- Song Guo:
On-Time Warning Delivery for Vehicular Ad Hoc Networks. 6 - Brian M. Gaff, Heather Egan Sussman, Jennifer Geetter:
Privacy and Big Data. 7-9 - Lee Garber:
News Briefs. 12-17 - Ying-Dar Lin, Chun-Ying Huang
, Matthew K. Wright
, Georgios Kambourakis:
Mobile Application Security. 21-23 - Guillermo Suarez-Tangil
, Juan E. Tapiador
, Flavio Lombardi
, Roberto Di Pietro
:
Thwarting Obfuscated Malware via Differential Fault Analysis. 24-31 - Yuru Shao, Xiapu Luo
, Chenxiong Qian:
RootGuard: Protecting Rooted Android Phones. 32-40 - Félix Gómez Mármol
, Gregor Rozinaj
, Sebastian Schumann
, Ondrej Labaj, Juraj Kacur:
Smart AppStore: Expanding the Frontiers of Smartphone Ecosystems. 42-47 - Alessandro Armando
, Gabriele Costa
, Luca Verderame
, Alessio Merlo:
Securing the "Bring Your Own Device" Paradigm. 48-56 - Olga Gadyatskaya, Fabio Massacci
, Yury Zhauniarovich:
Security in the Firefox OS and Tizen Mobile Platforms. 57-63 - Hal Berghel:
Leadership Failures in the National Security Complex. 64-67 - Benoît Combemale, Julien DeAntoni
, Benoit Baudry, Robert B. France, Jean-Marc Jézéquel
, Jeff Gray
:
Globalizing Modeling Languages. 68-71 - Irena Bojanova, George F. Hurlburt
, Jeffrey M. Voas:
Imagineering an Internet of Anything. 72-77 - Jason Pace:
Working with Students Where Theory and Practice Intersect. 78-80 - Sorel Reisman
:
The Future of Online Instruction, Part 2. 82-84 - Edwin Sturrus, Olga Kulikova:
Orchestrating Hybrid Cloud Deployment: An Overview. 85-87 - David Alan Grier:
Peace in Our Time. 104
Volume 47, Number 7, July 2014
- Jian Pei:
Managing Data-Intensive Applications in the Cloud. 6 - Charles R. Severance:
Andrew S. Tanenbaum: The Impact of MINIX. 7-8 - Brian M. Gaff:
Supreme Court IP Update. 9-12 - Oliver Bimber:
Thinking Virtual. 22-23 - Mel Slater
, Maria V. Sanchez-Vives:
Transcending the Self in Immersive Virtual Reality. 24-30 - Albert A. Rizzo, Arno Hartholt, Mario Grimani, Andrew Leeds, Matt Liewer:
Virtual Reality Exposure Therapy for Combat-Related Posttraumatic Stress Disorder. 31-37 - John R. Stowers, Anton L. Fuhrmann, Maximilian Hofbauer, Martin Streinzer
, Axel Schmid, Michael H. Dickinson, Andrew D. Straw
:
Reverse Engineering Animal Vision with Virtual Reality and Genetics. 38-45 - Henry Fuchs, Andrei State, Jean-Charles Bazin:
Immersive 3D Telepresence. 46-52 - Xia Yang, Nan Sang, Jim Alves-Foss:
Shortening the Boot Time of Android OS. 53-58 - Minyong Kim, Young Geun Kim, Sung Woo Chung, Cheol Hong Kim:
Measuring Variance between Smartphone Energy Consumption and Battery Life. 59-65 - Youngjung Ahn, Yongsuk Lee, Jin-Young Choi
, Gyungho Lee, Dongkyun Ahn:
Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks. 66-72 - Brian David Johnson:
Talking to the Future. 73-75 - Hal Berghel:
Robert David Steele on OSINT. 76-81 - Dimitrios S. Nikolopoulos
, Hans Vandierendonck, Nikolaos Bellas
, Christos D. Antonopoulos
, Spyros Lalis, Georgios Karakonstantis, Andreas Burg
, Uwe Naumann:
Energy Efficiency through Significance-Based Computing. 82-85 - Pablo César
, Rene Kaiser
, Marian Florin Ursu:
Toward Connected Shared Experiences. 86-89 - Chi-Wei Wang, Chia-Wei Wang, Chu-An Hsieh, Shiuhpyng Winston Shieh:
Cloudebug: A Programmable Online Malware Testbed. 90-92 - Paul Nikolich:
802 LAN/MAN Standards: High Quality and Market Relevant. 93-95 - David Alan Grier:
The Half-Told Lie. 108
Volume 47, Number 8, August 2014
- John Grundy
:
Determining the Cause of Design Model Inconsistencies. 6 - Charles R. Severance:
Elizabeth Fong: Creating the SQL Database Standards. 7-8 - Brian M. Gaff, Bruce Rubinger:
The Significance of Prior Art. 9-11 - Ron Vetter:
Technology Commercialization in the Innovation Economy [Guest editor's introduction]. 20-21 - Gary L. Miller, Robert R. Hoon:
The Role of Public Comprehensive Universities in Closing the Innovation Deficit. 22-27 - Elyse N. Ball, Kenneth G. Preston:
University Commercialization Models: The University of Akron. 28-36 - Audrey Speicher:
tekMountain: A Community-Driven Corporate Incubator. 37-39 - Savitha Srinivasan, Isaac Barchas, Mark Gorenberg, Evangelos Simoudis:
Venture Capital: Fueling the Innovation Economy. 40-47 - Ian Gorton:
Cyberinfrastructures: Bridging the Divide between Scientific Research and Software Engineering. 48-55 - Sebastian Boring
, Saul Greenberg, Jo Vermeulen
, Jakub Dostal, Nicolai Marquardt
:
The Dark Patterns of Proxemic Sensing. 56-60 - Nabor C. Mendonça
:
Architectural Options for Cloud Migration. 62-66 - Ernest L. McDuffie, Victor P. Piotrowski:
The Future of Cybersecurity Education. 67-69 - Hal Berghel:
The Future of Digital Money Laundering. 70-75 - Dirk Basten, Thomas Hoerstrup:
Organizational Effort Estimation. 76-79 - David A. Wheeler:
Preventing Heartbleed. 80-83 - Christiane Gresse von Wangenheim
, Aldo von Wangenheim:
Teaching Game Programming in Family Workshops. 84-87 - David Alan Grier:
The Guest at the Feast. 116
Volume 47, Number 9, September 2014
- Prasant Mohapatra:
Channel Bonding in Evolving Wireless LANs. 6 - Charles R. Severance:
Nii Quaynor: Bringing the Internet to Africa. 7-9 - Victor Pankratius, Chris Mattmann:
Computing in Astronomy: To See the Unseen. 23-25 - Mark Jenne, Owen Boberg, Hasan Kurban
, Mehmet M. Dalkilic:
Studying the Milky Way Galaxy Using ParaHeap-k. 26-33 - Daniel Frascarelli, Sergio Nesmachnow
, Gonzalo Tancredi:
High-Performance Computing of Self-Gravity for Small Solar System Bodies. 34-39 - Stefan C. Müller, Gustavo Alonso, André Csillaghy
:
Scaling Astroinformatics: Python + Automatic Parallelization. 41-47 - Rik Jongerius, Stefan J. Wijnholds
, Ronald Nijboer, Henk Corporaal:
An End-to-End Computing Model for the Square Kilometre Array. 48-54 - Lisa Gerhardt, Juan Carlos Díaz-Vélez
, Spencer R. Klein
:
Adventures in Antarctic Computing, or How I Learned to Stop Worrying and Love the Neutrino. 56-61 - F. Alexander Bogert, Nicholas Smith, John Holdener, Eric M. De Jong, Andrew F. Hart, Luca Cinquini, Shakeh E. Khudikyan, David R. Thompson, Chris A. Mattmann, Kiri Wagstaff
, Joseph Lazio, Dayton L. Jones, Alice Allen
, Lior Shamir, Peter J. Teuben:
Computing in Astronomy: Applications and Examples. 62-69 - Zachary A. Collier, Daniel DiMase, Steve Walters, Mark Mohammad Tehranipoor, James H. Lambert, Igor Linkov:
Cybersecurity Standards: Managing Risk and Creating Resilience. 70-76 - Hillery C. Hunter, Luis Alfonso Lastras-Montaño, Bishwaranjan Bhattacharjee:
Adapting Server Systems for New Memory Technologies. 78-84 - Julie Hubschman:
My Summer with a Robot. 85-86 - Karl Ricanek:
Beyond Recognition: The Promise of Biometric Analytics. 87-89 - Hal Berghel:
Sticky Wikis. 90-93 - John Wack:
IEEE VSSC/1622: Voting System Standards. 94-97 - Tobias Hoßfeld, Christian Keimel, Christian Timmerer:
Crowdsourcing Quality-of-Experience Assessments. 98-102 - Robin A. Gandhi, Keesha Crosby, Harvey P. Siy, Sayonnha Mandal:
Gauging the Impact of FISMA on Software Security. 103-107 - David Alan Grier:
The Point of Recognition. 120
Volume 47, Number 10, October 2014
- Leonard Heilig:
A View on Cloud Computing from above the Clouds. 8 - Brian M. Gaff:
3D IP. 9-11 - Carlos E. Jimenez-Gomez
, Agusti Solanas
, Francisco Falcone:
E-Government Interoperability: Linking Open and Smart Government. 22-24 - Konstantinos Bovalis, Vassilios Peristeras
, Margarida Abecasis, Raul-Mario Abril-Jimenez, Miguel Alvarez Rodriguez, Corinne Gattegno, Athanasios Karalopoulos, Ioannis Sagias, Szabolcs Szekacs, Suzanne Wigard:
Promoting Interoperability in Europe's E-Government. 25-33 - Mario Kovac:
E-Health Demystified: An E-Government Showcase. 34-42 - Marijn Janssen
, Elsa Estevez
, Tomasz Janowski
:
Interoperability in Big, Open, and Linked Data-Organizational Maturity, Capabilities, and Data Portfolios. 44-49 - Pieter Colpaert, Mathias Van Compernolle, Laurens De Vocht, Anastasia Dimou
, Miel Vander Sande, Ruben Verborgh
, Peter Mechant
, Erik Mannens
:
Quantifying the Interoperability of Open Government Datasets. 50-56 - Martin le Vrang, Agis Papantoniou, Erika Pauwels, Pieter Fannes, Dominique Vandensteen, Johan De Smedt
:
ESCO: Boosting Job Matching in Europe with Semantic Interoperability. 57-64 - Jesús Cano
, Roberto Hernández, Salvador Ros
:
Distributed Framework for Electronic Democracy in Smart Cities. 65-71 - Pu Liu, Zhenghong Peng:
China's Smart City Pilots: A Progress Report. 72-81 - Stefano Secci
, San Murugesan
:
Cloud Networks: Enhancing Performance and Resiliency. 82-85 - Jonathan P. Bowen
, Mike Hinchey
, Helge Janicke
, Martin P. Ward
, Hussein Zedan:
Formality, Agility, Security, and Evolution in Software Development. 86-89 - Wendy M. DuBow
:
Attracting and Retaining Women in Computing. 90-93 - Hal Berghel:
Defending against Big Dada: Defensive Tactics for Weapons of Mass Deception. 94-98 - Jason W. Bay:
Turning Video Gamers into Software Developers. 99-101 - Apostol Vassilev, Christopher Celi:
Avoiding Cyberspace Catastrophes through Smarter Testing. 102-106 - David Alan Grier:
Lying to the Future. 128
Volume 47, Number 11, November 2014
- Roberta L. Klatzky, J. Edward Colgate:
Rendering Tactile Features on Touchscreens. 8 - Charles R. Severance:
Ian Foster and the Globus Project. 10-11 - Lee Garber:
News Briefs. 14-18 - Ying-Dar Lin, Dan Pitt, David Hausheer
, Erica Johnson, Yi-Bing Lin:
Software-Defined Networking: Standardization for Cloud Computing's Second Wave. 19-21 - Jean Tourrilhes, Puneet Sharma, Sujata Banerjee
, Justin Pettit:
SDN and OpenFlow Evolution: A Standards Perspective. 22-29 - Rick Bauer, Ron Milford, Li Zhen:
Aligning Technology and Market Drivers in an Open Source Standards Testing Program. 30-36 - Paul Quinn, Jim Guichard:
Service Function Chaining: Creating a Service Plane via Network Service Headers. 38-44 - Christian Esteve Rothenberg
, Roy Chua, Josh Bailey, Martin Winter, Carlos N. A. Corrêa, Sidney C. de Lucena, Marcos Rogério Salvador, Thomas D. Nadeau:
When Open Source Meets Network Control Planes. 46-54 - Marco Canini
, Anja Feldmann
, Dan Levin, Fabian Schaffert, Stefan Schmid
:
Software-Defined Networks: Incremental Deployment with Panopticon. 56-60 - Marion Dillon, Timothy Winters:
Virtualization of Home Network Gateways. 62-65 - Lindsey Lowther:
Defensive Biometrics. 66-69 - m. c. schraefel
, Elizabeth F. Churchill:
Wellth Creation: Using Computer Science to Support Proactive Health. 70-72 - James H. Faghmous, Arindam Banerjee, Shashi Shekhar, Michael S. Steinbach
, Vipin Kumar, Auroop R. Ganguly, Nagiza F. Samatova:
Theory-Guided Data Science for Climate Change. 74-78 - Brian David Johnson:
Imagining and Building Robots (in Capes!). 79-81 - Hal Berghel:
Why Clouds Give Me a Case of the Vapors. 82-85 - Ramesh C. Jain:
Toward Social Life Networks. 86-88 - Kirk W. Cameron
:
Energy Efficiency in the Wild: Why Datacenters Fear Power Management. 89-92 - George F. Hurlburt
, Irena Bojanova, Ann E. Kelley Sobel, Keesha Crosby:
Security or Privacy? A Matter of Perspective. 94-98 - Paul Joannou, Alan Wassyng:
Understanding Integrity Level Concepts. 99-101 - David Alan Grier:
The External Environment. 124
Volume 47, Number 12, December 2014
- Hai Jin:
When Data Grows Big. 8 - Dejan S. Milojicic
:
Revitalization. 10-13 - Brian David Johnson:
Making in the 21st Century. 22-23 - Jun Axup, AnnMarie P. Thomas, Ariel Waldman, Susan Faulkner, Carolina Odman-Govender
, Jim St. Leger, Jessica K. Polka, Melissa Gregg
, Brian David Johnson:
The World of Making. 24-40 - Crystal Beasley, Emmeline Parsons, Melissa Pierce, Sam Baumgarten, Andrius Neviera, Shubham Banerjee, Tyesha Snow, Carla Diana, Nicholas Nakadate, Shruti Satsangi:
Passionate Projects: This Is What I Made. 42-54 - Yasaman Sheri, Enrique Gabriel Legaspi, Cynthia Erenas, Brian Kessler, Eri Gentry, Ruben Estrada:
The Future of Making. 56-63 - William Edwards, Judith Gebauer, Bryan Reinicke:
White Space Networks: Architecture, Application, and Opportunity. 64-71 - Alberto Bartoli
, Giorgio Davanzo, Andrea De Lorenzo
, Eric Medvet
, Enrico Sorio:
Automatic Synthesis of Regular Expressions from Examples. 72-80 - Eun-Sung Jung
, Rajkumar Kettimuthu:
Challenges and Opportunities for Data-Intensive Computing in the Cloud. 82-85 - Carmelo Ardito
, Paolo Buono
, Danilo Caivano
, Maria Francesca Costabile, Rosa Lanzilotti
, Yvonne Dittrich
:
Human-Centered Design in Industry: Lessons from the Trenches. 86-89 - Fang Jin
, Wei Wang, Liang Zhao, Edward R. Dougherty, Yang Cao, Chang-Tien Lu
, Naren Ramakrishnan
:
Misinformation Propagation in the Age of Twitter. 90-94 - Hal Berghel:
Judson Rosebush on Computer Graphics and Animation. 95-99 - Brian Chau, Adam Robinson, Jason Pace, Rob Nash, Kelvin Sung:
Corrupted: A Game to Teach Programming Concepts. 100-103 - Alexander Kott, Ananthram Swami, Patrick D. McDaniel:
Security Outlook: Six Cyber Game Changers for the Next 15 Years. 104-106 - David Alan Grier:
State Secrets. 128

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.