


default search action
IEEE Computer, Volume 35, 2002
Volume 35, Number 1, January 2002
- James H. Aylor:

The End of Computing Disciplines as We Know Them? 4-5
- Willis K. King:

Implementing Our Future Vision in 2002. 6-8
- Letters. 9-11

- Robert P. Colwell:

logy, Astrology, Risk, and Product Quality. 12-14
- News Briefs. 22-25

- Lee Garber:

Technology News. 26-32
- Chandrasekhar Narayanaswami, Noboru Kamijoh, Mandayam T. Raghunath, Tadanobu Inoue, Thomas M. Cipolla, James L. Sanford, Eugene S. Schlig, Sreekrishnan Venkiteswaran, Dinakar Guniguntala, Vishal Kulkarni, Kazuhiko Yamazaki:

IBM's Linux Watch: The Challenge of Miniaturization. 33-41 - Alan Allan, Don Edenfeld, William H. Joyner Jr., Andrew B. Kahng, Mike Rodgers, Yervant Zorian:

2001 Technology Roadmap for Semiconductors. 42-53 - Bruce R. Schatz:

The Interspace: Concept Navigation Across Distributed Communities. 54-62 - Barry W. Boehm:

Get Ready for Agile Methods, with Care. 64-69 - Luca Benini, Giovanni De Micheli:

Networks on Chips: A New SoC Paradigm. 70-78 - Mark Oskin, Frederic T. Chong

, Isaac L. Chuang:
A Practical Architecture for Reliable Quantum Computers. 79-87 - Gabriel Leen

, Donal Heffernan:
Expanding Automotive Electronic Systems. 88-93
- Thad Starner:

Web Technologies - Thick Clients for Personal Wireless Devices. 133-135 - Wayne H. Wolf:

Embedded Computing - What Is Embedded Computing? 136-137 - Richard G. Mathieu:

IT Systems Perspective- Top-Down Approach to Computing. 138-139 - Sam Fuller, Tom Cox:

Standards - Anatomy of a Forward-Looking Open Standard. 140-141 - W. Neville Holmes:

The Profession - To See Ourselves as Others See Us. 142-144
Volume 35, Number 2, February 2002
- Letters. 6-8

- Robert P. Colwell:

On Computers and Rock 'n' Roll. 9-11
- Article Summaries. 12-13

- Steven J. Vaughan-Nichols:

Web Services: Beyond the Hype. 18-21
- Linda Dailey Paulson:

Wanted: More Network-Security Graduates and Research. 22-24
- News Briefs. 25-27

- Kenneth L. Kraemer, Jason L. Dedrick:

Enter the Dragon: China's Computer Industry. 28-36
- Shubhendu S. Mukherjee, Sarita V. Adve, Todd M. Austin, Joel S. Emer, Peter S. Magnusson:

Performance Simulation Tools. 38-39 - Christopher J. Hughes

, Vijay S. Pai, Parthasarathy Ranganathan, Sarita V. Adve:
RSIM: Simulating Shared-Memory Multiprocessors with ILP Processors. 40-49 - Peter S. Magnusson, Magnus Christensson, Jesper Eskilson, Daniel Forsgren, Gustav Hållberg, Johan Högberg, Fredrik Larsson, Andreas Moestedt, Bengt Werner:

Simics: A Full System Simulation Platform. 50-58 - Todd M. Austin, Eric Larson, Dan Ernst:

SimpleScalar: An Infrastructure for Computer System Modeling. 59-67 - Joel S. Emer, Pritpal S. Ahuja, Eric Borch, Artur Klauser

, Chi-Keung Luk, Srilatha Manne, Shubhendu S. Mukherjee, Harish Patil, Steven Wallace, Nathan L. Binkert, Roger Espasa, Toni Juan:
Asim: A Performance Model Framework. 68-76
- Norman F. Schneidewind:

Body of Knowledge for Software Quality Measurement. 77-83
- Computer Society Connection. 84-88

- Call and Calendar. 89-91

- Career Opportunities. 92-103

- Bookshelf. 105

- Products. 106-108

- William A. Arbaugh:

Security: Technical, Social, and Legal Challenges. 109-111
- Michael R. Macedonia:

Linux in Hollywood: A Star is Born. 112-114
- Upkar Varshney:

Multicast Support in Mobile Commerce Applications. 115-117
- W. Neville Holmes:

Representative Democracy and the Profession. 118-120
Volume 35, Number 3, March 2002
- Letters. 6-7

- Robert P. Colwell:

Engineering, Science, and Quantum Mechanics. 8-10
- Article Summaries. 11-12

- George Lawton:

Open Source Security: Opportunity or Oxymoron? 18-21
- David Clark:

Mobile Processors Begin to Grow Up. 22-25
- News Briefs. 27-29

- Roslin V. Hauck, Homa Atabakhsh, Pichai Ongvasith, Harsh Gupta, Hsinchun Chen:

Using Coplink to Analyze Criminal-Justice Data. 30-37 - André Guéziec:

Tracking Pitches for Broadcast Television. 38-43
- Ivan Poupyrev, Desney S. Tan, Mark Billinghurst

, Hirokazu Kato
, Holger Regenbrecht, Nobuji Tetsutani:
Developing a Generic Augmented-Reality Interface. 44-50 - Kurt D. Fenstermacher, Mark Ginsburg:

A Lightweight Framework for Cross-Application User Monitoring. 51-59 - Jennifer Allanson:

Electrophysiologically Interactive Computer Systems. 60-65
- Gary William Flake, Steve Lawrence, C. Lee Giles

, Frans Coetzee:
Self-Organization and Identification of Web Communities. 66-71 - Eduardo Miranda:

Planning and Executing Time-Bound Projects. 73-79
- Computer Society Connection. 80-84

- Call and Calendar. 85-88

- Career Opportunities. 90-95

- Bookshelf. 96

- Products. 97-99

- Grant Martin, Frank Schirrmeister:

A Design Chain for Embedded Systems. 100-103 - Charles Steinfield:

Realizing the Benefits of Virtual Teams. 104-106 - Amanda Spink, Bernard J. Jansen

, Dietmar Wolfram, Tefko Saracevic:
From E-Sex to E-Commerce: Web Search Changes. 107-109 - W. Neville Holmes:

Computers, Programming, and People. 110-112
Volume 35, Number 4, April 2002
- Letters. 6-8

- Robert P. Colwell:

Near Misses: Murphy's Law is Wrong. 9-12
- Article Summaries. 13

- Linda Dailey Paulson:

Faster RAM Tackles Data and Marketplace Bottlenecks. 17-19
- News Briefs. 20-22

- Nachiketh R. Potlapally:

Optical Fingerprinting to Protect Data: A Proposal. 23-28
- Donald J. Welch, Daniel Ragsdale, Wayne Schepens:

Training for Information Assurance. 30-37
- Savitha Srinivasan, Eric W. Brown:

Is Speech Recognition Becoming Mainstream? 38-41 - Mukund Padmanabhan, Michael Picheny:

Large-Vocabulary Speech Recognition Algorithms. 42-50 - Allen L. Gorin, Alicia Abella, Tirso Alonso, Giuseppe Riccardi, Jeremy H. Wright:

Automated Natural Spoken Dialog. 51-56 - Pedro J. Moreno, Jean-Manuel Van Thong, Beth Logan, Gareth J. F. Jones

:
From Multimedia Retrieval to Knowledge Management. 58-66
- Richard H. Thayer:

Software System Engineering: A Tutorial. 68-73
- Computer Society Connection. 74-76

- Call and Calendar. 77-79

- Career Opportunities. 80-84

- Bertrand Meyer:

Assessing a C# Text. 86-88
- Bookshelf. 89

- Products. 90-91

- Rashmi Bajaj, Samantha Ranaweera, Dharma P. Agrawal:

GPS: Location-Tracking Technology. 92-94
- James Korris, Michael R. Macedonia:

The End of Celluloid: Digital Cinema Emerges. 96-98
- Gary McGraw:

Managing Software Security Risks. 99-101
- W. Neville Holmes:

Side Effects of Digital Technology. 102-104
Volume 35, Number 5, May 2002
- Quantum Mystery Mongering. 6-10

- Robert P. Colwell:

If You Didn't Test It, It Doesn't Work. 11-13
- Article Summaries. 17

- John Edwards, Linda Dailey Paulson:

Smart Graphics: A New Approach to Meeting User Needs. 18-21
- Neal Leavitt:

Data Mining for the Corporate Masses? 22-24
- News Briefs: Will New Chip Revolutionize Digital Photography? / US Approves New Uses for Wireless Technology. 25-27

- Michael R. Blaha, Cheryl Smith:

A Pattern for Softcoded Values. 28-34
- Kyle Eischen:

Software Development: An Outsider's View. 36-44
- Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong:

The Chamois Component-Based Knowledge Engineering Framework. 46-54 - Selim Aissi, Pallavi Malu, Krishnamurthy Srinivasan:

E-Business Process Modeling: The Next Big Step. 55-62
- T. S. Raghu, Ram Ramesh, Andrew B. Whinston:

Next Steps for Mobile Entertainment Portals. 63-70 - Laura E. Jackson, George N. Rouskas

:
Deterministic Preemtive Scheduling of Real-Time Tasks. 72-79 - Fayaz A. Shaikh, Stan McClellan, Manpreet Singh, Sannedhi K. Chakravarthy:

End-to-End Testing of IP QoS Mechanisms. 80-87
- Call and Calendar. 88-91

- Computer Society Connection. 92-94

- Career Opportunities. 96-98

- Bookshelf: The Art of Evolutionary Computation. 99

- Products. 100-101

- Douglas A. Lyon, Christopher L. Huntley:

There's More Than One Way to Build a Bridge. 102-103
- Kate McMillan:

Technology Standards Pros Aid Homeland Security. 104-105
- Wayne H. Wolf:

Household Hints for Embedded Systems Designers. 106-108
- W. Neville Holmes:

Would a Digital Brain Have a Mind? 110-112
Volume 35, Number 6, June 2002
- Information System Engineering. 6-9

- Robert P. Colwell:

When the real world intervenes on well-planned experiments, the lessons you learn stick with you. 10-12
- Article Summaries. 13

- George Lawton:

Moving Java into Mobile Phones. 17-20
- Steven J. Vaughan-Nichols:

Will 10-Gigabit Ethernet Have a Bright Future? 22-24
- Little Chips Promise Big Power / Bioinformatics Experiences Important Breakthroughs / Company Unveils Holographic for 3D Storage. 25-27

- Ross J. Anderson:

Free Speech Online and Offline. 28-30 - Leonard L. Tripp:

Software Certification Debate: Benefits of Certification. 31-33 - Adam Kolawa:

Software Certification Debate: Certification Will Do More Harm than Good. 34-35
- Ian T. Foster, Carl Kesselman

, Jeffrey M. Nick, Steven Tuecke
:
Grid Services for Distributed System Integration. 37-46 - William T. C. Kramer:

SCinet: Testbed for High-Performance Networked Applications. 47-55
- Cyrus Shahabi

, Roger Zimmermann
, Kun Fu, Shu-Yuen Didi Yao:
Yima: A Second-Generation Continuous Media Server. 56-64 - Hyokyung Bahn

, Kern Koh, Sang Lyul Min, Sam H. Noh:
Efficient Replacement of Nonuniform Objects in Web Caches. 65-73
- IEEE Computer Society Recognizes Achievements of Leading Computer Engineers. 74-76

- Call and Calendar. 77-80

- Recipes for Image Analysis. 81

- Products. 82-83

- Career Opportunities. 84-88

- Tom DeMarco, Barry W. Boehm:

The Agile Methods Fray. 90-92
- Erin Kenneally:

Who's Liable for Insecure Networks? 93-95
- Sasikanth Avancha, Anupam Joshi

, Timothy W. Finin
:
Enhanced Service Discovery in Bluetooth. 96-99
- Donald A. Norman:

Home Theater: Not Ready for Prime Time. 100-102
- Ana Asuaga:

Using Computers in Our Daily Life. 103-104
Volume 35, Number 7, July 2002
- Robert P. Colwell:

What Technology Is Doing to Music. 6-8
- Article Summaries. 9-10

- Sixto Ortiz Jr.:

Is Business Intelligence a Smart Move? 11-14
- George Lawton:

Invasive Software: Who's Inside Your Computer? 15-18
- Taking a Graphical Approach to the Password - Improvements Stream into Multimedia Technology - Data at the Speed of Light. 19-21

- Junhyong Kim:

Computers Are from Mars, Organisms Are from Venus. 25-32 - Dror G. Feitelson

, Millet Treinin:
The Blueprint for Life? 34-40
- Lenwood S. Heath, Naren Ramakrishnan

:
The Emerging Landscape of Bioinformatics Software Systems. 41-45 - Mihai Pop

, Steven Salzberg
, Martin Shumway:
Genome Sequence Assembly: Algorithms and Issues. 47-54 - Bernard M. E. Moret

, Li-San Wang, Tandy J. Warnow:
Toward New Software for Computational Phylogenetics. 55-64 - Bahram Parvin, Qing Yang, Gerald Fontenay, Mary Helen Barcellos-Hoff:

BioSig: An Imaging Bioinformatic System for Studying Phenomic. 65-71 - Salvatore Paxia, Archisman Rudra, Yi Zhou, Bud Mishra:

A Random Walk Down the Genomes: DNA Evolution in Valis. 73-79 - Jinwook Seo, Ben Shneiderman:

Interactively Exploring Hierarchical Clustering Results. 80-86
- Computer Society Connection. 87-91

- Call and Calender. 92-94

- Putting Discrepancy Theory to Work. 95

- Products. 96-97

- Career Opportunities. 98-101

- Jonathan W. Palmer:

Designing for Web Site Usability. 102-103
- Christine Rigden:

Now You See It, Now You Don't. 104-105
- Thomas M. Conte

:
Choosing the Brain(s) of an Embedded System. 106-107
- Simon S. Y. Shim, Yen-Jen Lee:

Interactive TV: VoD Meets the Internet. 108-109
- W. Neville Holmes:

Seven Great Blunders of the Computing World. 110-112
Volume 35, Number 8, August 2002
- Letters. 6-9

- Robert P. Colwell:

Weird Books. 10-12
- Lee Garber:

Romanian Disaster-Response Project Wins Design Competition. 13-15
- Article Summaries. 19

- Linda Dailey Paulson:

Computer System, Heal Thyself. 20-22
- Linda Dailey Paulson:

Distributed Storage Challenges Data Glut - Professors Use Technology to Fight Plagiarism - Startup Wants to Automate Chip Design. 23-25
- Mary C. Lacity:

Lessons in Global Information Technology Sourcing. 26-33 - Rahul Gupta, Sumeet Talwar, Dharma P. Agrawal:

Jini Home Networking: A Step toward Pervasive Computing . 34-40
- Peter Gutmann:

PKI: It's Not Dead, Just Resting. 41-49 - George Cybenko, Annarita Giani, Paul Thompson:

Cognitive Hacking: A Battle for the Mind. 50-56 - Jeffrey B. Lotspiech, Stefan Nusser, Florian Pestoni:

Broadcast Encryption's Bright Future. 57-63
- Computer Society Connection. 64-66

- Call and Calendar. 67-69

- Career Opportunities. 70-72

- Products. 74-75

- Bookshelf. 76

- William A. Arbaugh:

Improving the TCPA Specification. 77-79
- Panagiotis Demestichas, Louisa Papadopoulou, Vera Stavroulaki

, Michael E. Theologou, Guillaume Vivier, Georges Martinez, Fabio Galliano:
Wireless Beyond 3G: Managing Services and Network Resources. 80-82
- Dean Chang:

Haptics: Gaming's New Sensation. 84-86
- Atif M. Memon:

GUI Testing: Pitfalls and Process. 87-88
- Diana Orrick:

Toward Adequate Online Privacy Safeguards. 90-92
Volume 35, Number 9, September 2002
- Article Summaries. 6

- Home Theater Strategies. 8-10

- Robert P. Colwell:

Employee Performance Reviews. 12-15
- Steven J. Vaughan-Nichols:

Developing the Distributed-Computing OS. 19-21
- News Briefs. 22-24

- Oliver Bimber, Stephen M. Gatesy, Lawrence M. Witmer, Ramesh Raskar, L. Miguel Encarnação:

Merging Fossil Specimens with Computer-Generated Information. 25-30
- Charlene Chuck Walrad, Darrel E. Strom:

The Importance of Branching Models in SCM. 31-38
- Vinod Kathail, Shail Aditya, Robert Schreiber, B. Ramakrishna Rau, Darren C. Cronquist, Mukund Sivaraman:

PICO: Automatically Designing Custom Computers. 39-47 - Wayne H. Wolf, I. Burak Özer, Tiehan Lv:

Smart Cameras as Embedded Systems. 48-53
- Jiannong Cao

, Xinyu Feng, Jian Lu, Sajal K. Das
:
Mailbox-Based Scheme for Designing Mobile Agent Communication Protocols. 54-60
- IEEE Computer Society Election. 62-68

- IEEE President-Elect Candidates Address Computer Society Concerns. 70-76

- Call and Calendar. 77-80

- Risk-Based Approach to Mission-Critical Software Testing. 81

- Products. 82-83

- Career Opportunities. 84-91

- Abdelsalam Heddaya:

An Economically Scalable Internet. 93-95
- Wayne H. Wolf:

Whither Warhol's Law? 96-97
- Clay Shirky:

Web Services and Context Horizons. 98-100
- W. Neville Holmes:

Jobs, Trades, Skills, and the Profession. 102-104
Volume 35, Number 10, October 2002
- Article Summaries. 6

- Content Protection Alternatives. 8-10

- Robert P. Colwell:

The Power of the Most Likely. 12-14
- David Clark:

Do Web Standards and Patents Mix? 19-22
- Neal Leavitt:

Let's Hear It for Audio Mining. 23-25
- Linda Dailey Paulson:

News Briefs Topics include: Project Promises Accessible Technology for the Disabled / Two Efforts Aim to Upgrade Mobile Memory / Prime Breakthrough May Improve Encryption. 26-28
- Ravi Kalakota, Pavan Gundepudi, Jonathan Wareham, Arun Rai, Richard J. Welke:

The Economics of DSL Regulation. 29-36
- Bill N. Schilit, Jonathan Trevor, David M. Hilbert, Tzu Khiau Koh:

Web Interaction Using Very Small Internet Devices. 37-45 - Suman Banerjee, Sulabh Agarwal, Kevin Kamel, Andrzej Kochut, Christopher Kommareddy, Tamer Nadeem

, Pankaj Thakkar, Bao Trinh, Adel M. Youssef, Moustafa Youssef
, Ronald L. Larsen, A. Udaya Shankar, Ashok K. Agrawala:
Rover: Scalable Location-Aware Computing. 46-53 - Anthony D. Wood, John A. Stankovic:

Denial of Service in Sensor Networks. 54-62
- Samitha Samaranayake, Nodari Sitchinava, Rohit Kapur, Minesh B. Amin, Thomas W. Williams:

Dynamic Scan: Driving Down the Cost of Test. 63-68
- Products. 70-71

- The XML Culture Clash. 72

- Computer Society Connection. 74-77

- Call and Calendar. 78-81

- Career Opportunities. 82-95

- Michael R. Macedonia:

The Computer Graphics Wars Heat Up. 97-99
- Josef F. Huber:

Toward the Mobile Internet. 100-102
- Andrew "bunnie" Huang:

The Trusted PC: Skin-Deep Security. 103-105
- Laura K. Briggs, Kari Boyd McBride:

Rethinking the Digital Divide. 106-108
Volume 35, Number 11, November 2002
- Article Summaries. 6-7

- Cognitive Hacking of a Different Sort. 8-9

- Robert P. Colwell:

The Coolest Thing on Earth. 10-12
- Steven J. Vaughan-Nichols:

Bull Market for IEEE 802.11 WLAN Chipsets. 17-19
- Linda Dailey Paulson:

Stopping Intruders Outside the Gates. 20-22
- Linda Dailey Paulson:

News Briefs Topics include: IBM Works on a Universal Virtual Computer / Battling Intrusions with a "Network Telescope" / Choreographing Web Services. 23-25
- Ning Zhong

, Jiming Liu, Yiyu Yao:
In Search of the Wisdom Web. 27-31
- Ravi Kumar, Prabhakar Raghavan

, Sridhar Rajagopalan, Andrew Tomkins:
The Web and Social Networks. 32-36 - Toyoaki Nishida:

Social Intelligence Design for the Web. 37-41 - Toru Ishida

:
Q: A Scenario Description Language for Interactive Agents. 42-47 - Joanna Bryson

, David L. Martin, Sheila A. McIlraith, Lynn Andrea Stein:
Toward Behavioral Intelligence in the Semantic Web. 48-54 - Dieter Fensel:

Ontology-Based Knowledge Management. 56-59 - Michele Missikoff, Roberto Navigli

, Paola Velardi
:
Integrated Approach to Web Ontology Learning and Engineering. 60-63 - Jiawei Han, Kevin Chen-Chuan Chang:

Data Mining for Web Intelligence. 64-70 - Nick Cercone, Lijun Hou, Vlado Keselj

, Aijun An
, Kanlaya Naruedomkul, Xiaohua Hu:
From Computational Intelligence to Web Intelligence. 72-76
- Bookshelf. 77

- Products. 78-79

- Computer Society Connection. 80-83

- Call and Calendar. 84-86

- Career Opportunities. 88-105

- Roger L. Norton:

Using Virtual Linux Servers. 106-107
- Jan Madsen

, Jørgen Steensgaard-Madsen, Lars Christensen:
A Sophomore Course in Codesign. 108-110
- Stephen Ransom, Xindong Wu:

Using Knowledge Anchors to Reduce Cognitive Overheads. 111-112
- Anita C. Ricketts:

IEEE Registration Authority. 113
- W. Neville Holmes:

The Profession and the World. 114-116
Volume 35, Number 12, December 2002
- Article Summaries. 4

- Letters. 6-8

- Willis K. King:

President's Message: Year in Review. 10-11 - James H. Aylor:

EIC's Message: It has been a Great Ride! 12
- Robert P. Colwell:

Science-Philosophy Celebrity Death Match. 13-15
- Steven J. Vaughan-Nichols:

OFDM: Back to the Wireless Future. 19-21
- George Lawton:

Virus Wars: Fewer Attacks, New Threats. 22-24
- Linda Dailey Paulson:

News Briefs Topics include: Researchers Upgrade Smart Card Technology / New Optical Clock Could Synchronize Chips. 25-27
- Chris Rowen:

Reducing SoC Simulation and Development Time. 29-34
- Gary S. Robinson:

Toward the Age of Smarter Storage. 35-41 - John P. Scheible:

A Survey of Storage Options. 42-46 - Michael T. LoBue, Harry Mason, Thomas Hammond-Doel, Eric Anderson, Mike Alexenko, Tom Clark:

Surveying Today's Most Popular Storage Interfaces. 48-55 - Robert Griswold:

Storage Topologies. 56-63 - Roger Cummings:

The Evolution of Information Assurance. 65-72
- Report to Members. 73-74

- Computer Society Connection. 75-76

- Call and Calendar. 77-79

- Career Opportunities. 92-115

- Bookshelf. 117

- Products. 118-119

- Upkar Varshney:

Mobile Payments. 120-121
- Christopher B. Stapleton, Charles E. Hughes

, J. Michael Moshell, Paulius Micikevicius, Marty Altman:
Applying Mixed Reality to Entertainment. 122-124
- O. Sami Saydjari

:
Defending Cyberspace. 125
- Simone Santini:

Using Language More Responsibly. 126-128

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














