default search action
IEEE Computer, Volume 46
Volume 46, Number 1, January 2013
- David Alan Grier:
The Unseen and the Seen. 6-7 - Ron Vetter:
Embracing Digital Publishing. 8-10 - Charles R. Severance:
Van Jacobson: Content-Centric Networking. 11-13 - Brian M. Gaff, Ralph A. Loren, Gareth Dickson:
Protecting Bioinformatics as Intellectual Property. 15-17 - Neal Leavitt:
Bringing Big Analytics to the Masses. 20-23 - Lee Garber:
News Briefs. 24-26 - Santosh Kumar, Wendy Nilsen, Misha Pavel, Mani B. Srivastava:
Mobile Health: Revolutionizing Healthcare Through Transdisciplinary Research. 28-35 - Gunar Schirner, Deniz Erdogmus, Kaushik R. Chowdhury, Taskin Padir:
The Future of Human-in-the-Loop Cyber-Physical Systems. 36-45 - Thanassis Rikakis, Aisling Kelliher, Nicole Lehrer:
Experiential Media and Digital Culture. 46-54 - Noel E. Sharkey, Amanda J. C. Sharkey:
Robotic Surgery: On the Cutting Edge of Ethics. 56-64 - Kjell Jørgen Hole:
Management of Hidden Risks. 65-70 - Upkar Varshney:
A Smart Approach to Medication Management. 71-76 - San Murugesan:
Cloud Computing: The New Normal? 77-79 - Brian David Johnson:
When Science Fiction and Science Fact Meet. 80-82 - Kirk W. Cameron:
Energy Oddities, Part 1: Why the Energy World Is Odd. 83-84 - Hal Berghel:
RFIDiocy: It's Déjà Vu All over Again. 85-88 - John Riedl, Eric Riedl:
Crowdsourcing Medical Research. 89-92 - David Alan Grier:
The Here and Now. 108
Volume 46, Number 2, February 2013
- Lee Garber:
Letters. 6 - Charles R. Severance:
Mitchell Baker: The Mozilla Foundation. 7-9 - Brian M. Gaff, Stephen G. Huggard, Gregory W. Carey:
Paying Bribes Abroad Will Get You in Hot Water in the US. 11-13 - Lee Garber:
GPUs Go Mobile. 16-19 - Lee Garber:
News Briefs. 20-23 - Mohamed Ali Feki, Fahim Kawsar, Mathieu Boussard, Lieven Trappeniers:
The Internet of Things: The Next Technological Revolution. 24-25 - Steve Hodges, Stuart Taylor, Nicolas Villar, James Scott, Dominik Bial, Patrick Tobias Fischer:
Prototyping Connected Devices for the Internet of Things. 26-34 - Daniel Roggen, Gerhard Tröster, Paul Lukowicz, Alois Ferscha, José del R. Millán, Ricardo Chavarriaga:
Opportunistic Human Activity and Context Recognition. 36-45 - Sang Wan Lee, Oliver Prenzel, Zeungnam Bien:
Applying Human Learning Principles to User-Centered IoT Systems. 46-52 - Gerd Kortuem, Arosha K. Bandara, Neil Smith, Mike Richards, Marian Petre:
Educating the Internet-of-Things Generation. 53-61 - Sasitharan Balasubramaniam, Jussi Kangasharju:
Realizing the Internet of Nano Things: Challenges, Solutions, and Applications. 62-68 - Jane W.-S. Liu, Chi-Sheng Shih, Edward T.-H. Chu:
Cyberphysical Elements of Disaster-Prepared Smart Environments. 69-75 - Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi S. Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino:
Collaboration in Multicloud Computing Environments: Framework and Security Issues. 76-84 - Jon G. Hall, Lucia Rapanotti:
Beauty in Software Engineering. 85-87 - Michael Lutz:
Undergraduate Software Engineering at RIT: Past, Present, and Future. 88-90 - Rinku Dewri, Ramakrishna Thurimella:
Can a Phone's GPS "Lie" Intelligently? 91-93 - Jason Pace:
The Ways We Play, Part 1: From PCs to Consoles to Mobile Phones. 94-96 - David Alan Grier:
The Ethical Dimension. 112
Volume 46, Number 3, March 2013
- Charles R. Severance:
Pooja Sankar: Building the Piazza Collaboration System. 6-7 - Brian M. Gaff, Peter J. Cuomo:
Design Patents. 8-10 - W. Neville Holmes:
32 & 16 Years Ago. 12-13 - Neal Leavitt:
A Technology that Comes Highly Recommended. 14-17 - Lee Garber:
News Briefs. 18-20 - Jane Chu Prey, Alfred C. Weaver:
Fostering Gender Diversity in Computing. 22-23 - Wendy M. DuBow:
Diversity in Computing: Why It Matters and How Organizations Can Achieve It. 24-29 - Telle Whitney, Denise Gammal, Barbara Gee, Jody Mahoney, Caroline Simard:
Priming the Pipeline: Addressing Gender-Based Barriers in Computing. 30-36 - Mary Fernandez:
A Path Between: Mentoring the Next Generation of Computing Professionals. 38-41 - Chris Stephenson, Rebecca Dovi:
More than Gender: Taking a Systemic Approach to Improving K-12 Computer Science Education. 42-46 - Crystal Eney, Ed Lazowska, Hélène Martin, Stuart Reges:
Broadening Participation: The Why and the How. 48-51 - James P. Cohoon, Joanne McGrath Cohoon, Mary Lou Soffa:
Educating Diverse Computing Students at the University of Virginia. 52-55 - Maria M. Klawe:
Increasing Female Participation in Computing: The Harvey Mudd College Story. 56-58 - Deepak Kumar:
Serving Women with a Purposeful Vision. 60-61 - Robert B. Schnabel:
Personal Reflections on Gender Diversity in Computing. 62-63 - Kate Starbird:
Returning to My Inner Nerd: Following the "Social" Disruption of Computing. 63-65 - Annie I. Antón:
Facing Challenges and Having Fun. 65-66 - Alice Bonhomme-Biais, Raquel A. Romano:
Pursuing Professional Changes. 66-68 - Lwin Khin Shar, Hee Beng Kuan Tan:
Defeating SQL Injection. 69-77 - Chung-Wei Hang, Zhe Zhang, Munindar P. Singh:
Shin: Generalized Trust Propagation with Limited Evidence. 78-85 - Nir Kshetri, San Murugesan:
Cloud Computing and EU Data Privacy Regulations. 86-89 - Kirk W. Cameron:
Energy Oddities, Part 2: Why Green Computing Is Odd. 90-93 - Karl Ricanek Jr., Gayathri Mahalingam:
Biometrically, How Identical Are Identical Twins? 94-96 - Hal Berghel:
The SCDOR Hack: Great Security Theater in Five Stages. 97-99 - John Riedl:
Crowdfunding Technology Innovation. 100-103 - Brian David Johnson:
Jimmy: The Robot That Changed It All. 104-107 - David Alan Grier:
Attention to Context. 124
Volume 46, Number 4, April 2013
- Charles R. Severance:
Larry Smarr: Building Mosaic. 6-8 - Brian M. Gaff, Ralph A. Loren:
Patent Monetization. 9-11 - W. Neville Holmes:
32 & 16 Years Ago. 12-13 - Lee Garber:
Analytics Goes on Location with New Approaches. 14-17 - Lee Garber:
News Briefs. 18-20 - Sherali Zeadally, Gregorio Martínez Pérez, Han-Chieh Chao:
Securing Cyberspace in the 21st Century. 22-23 - Pavlos Basaras, Dimitrios Katsaros, Leandros Tassiulas:
Detecting Influential Spreaders in Complex, Dynamic Networks. 24-29 - Cristina Alcaraz, Javier López:
Wide-Area Situational Awareness for Critical Infrastructure Protection. 30-37 - Ignasi Paredes-Oliva, Pere Barlet-Ros, Josep Solé-Pareta:
Scan Detection under Sampling: A New Perspective. 38-44 - Huansheng Ning, Hong Liu, Laurence T. Yang:
Cyberentity Security in the Internet of Things. 46-53 - Awais Rashid, Alistair Baron, Paul Rayson, Corinne May-Chahal, Phil Greenwood, James Walkerdine:
Who Am I? Analyzing Digital Personas in Cybercrime Investigations. 54-61 - Adeeb M. Alhomoud, Irfan Awan, Jules Ferdinand Pagna Disso, Muhammad Younas:
A Next-Generation Approach to Combating Botnets. 62-66 - Iyad Rahwan, Sohan Dsouza, Alex Rutherford, Victor Naroditskiy, James McInerney, Matteo Venanzi, Nicholas R. Jennings, Manuel Cebrián:
Global Manhunt Pushes the Limits of Social Mobilization. 68-75 - Xiaohan Ma, Zhigang Deng, Mian Dong, Lin Zhong:
Characterizing the Performance and Power Consumption of 3D Mobile Games. 76-82 - Ruth H. Sanders:
Why Learn a Foreign Language? 83-85 - Niklas Elmqvist, Pourang Irani:
Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime. 86-89 - Steve Hodges:
Batteries Not Included: Powering the Ubiquitous Computing Dream. 90-93 - David F. Ferraiolo, Serban I. Gavrila, Wayne A. Jansen:
Enabling an Enterprise-Wide, Data-Centric Operating Environment. 94-96 - Jason Pace:
The Ways We Play, Part 2: Mobile Game Changers. 97-99 - Ana María Moreno, Ahmed Seffah, Rafael Capilla, María Isabel Sánchez Segura:
HCI Practices for Building Usable Software. 100-102 - David Alan Grier:
Equal before the Bar. 116
Volume 46, Number 5, May 2013
- Charles R. Severance:
Bob Metcalfe: Ethernet at Forty. 6-9 - Brian M. Gaff:
Who Invents What. 10-12 - W. Neville Holmes:
32 & 16 Years Ago. 13-14 - Neal Leavitt:
Hybrid Clouds Move to the Forefront. 15-18 - Lee Garber:
News Briefs. 19-21 - Theresa-Marie Rhyne, Min Chen:
Cutting-Edge Research in Visualization. 22-24 - Aditi Majumder, Behzad Sajadi:
Large Area Displays: The Changing Face of Visualization. 26-33 - Hank Childs, Berk Geveci, William J. Schroeder, Jeremy S. Meredith, Kenneth Moreland, Christopher M. Sewell, Torsten W. Kuhlen, E. Wes Bethel:
Research Challenges for Visualization Software. 34-42 - Robert Kosara, Jock D. Mackinlay:
Storytelling: The Next Step for Visualization. 44-50 - Daniel F. Keefe, Tobias Isenberg:
Reimagining the Scientific Visualization Interaction Paradigm. 51-57 - Ben Shneiderman, Catherine Plaisant, Bradford W. Hesse:
Improving Healthcare with Interactive Visualization. 58-66 - Tobias Schreck, Daniel A. Keim:
Visual Analysis of Social Media Data. 68-75 - Qing Li, Chris Larsen, Tim van der Horst:
IPv6: A Catalyst and Evasion Tool for Botnets and Malware Delivery Networks. 76-82 - Amy F. Szczepanski, Jian Huang, Troy Baer, Yashema C. Mack, Sean Ahern:
Data Analysis and Visualization in High-Performance Computing. 84-92 - Hal Berghel:
Computing Technology and Survivable Journalism. 93-97 - Domenico Talia:
Clouds for Scalable Big Data Analytics. 98-101 - Ahmad Poursaberi, Svetlana N. Yanushkevich, Marina L. Gavrilova, Vlad P. Shmerko, Patrick S. P. Wang:
Situational Awareness through Biometrics. 102-104 - Brian David Johnson:
Secret Science Fiction. 105-107 - Joseph Turner:
Power Management as Choice Architecture. 108-111 - David Alan Grier:
Working in Conference. 124
Volume 46, Number 6, June 2013
- Charles R. Severance:
Gordon Bell: Building Blocks of Computing. 6-7 - Brian M. Gaff:
Are You Exhausted by Your First Sale? 9-11 - W. Neville Holmes:
32 & 16 Years Ago. 12-13 - Lee Garber:
Game Accessibility: Enabling Everyone to Play. 14-18 - Lee Garber:
News Briefs. 19-21 - Katina Michael, Keith W. Miller:
Big Data: New Opportunities and New Challenges [Guest editors' introduction]. 22-24 - Jess Hemerly:
Public Policy Considerations for Data-Driven Innovation. 25-31 - Paul P. Tallon:
Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost. 32-38 - Jeremy Pitt, Aikaterini Bourazeri, Andrzej Nowak, Magdalena Roszczynska-Kurasinska, Agnieszka Rychwalska, Inmaculada Rodríguez Santiago, Maite López-Sánchez, Monica Florea, Mihai Sanduleac:
Transforming Big Data into Collective Awareness. 40-45 - Marcus R. Wigan, Roger Clarke:
Big Data's Big Unintended Consequences. 46-53 - Carolyn McGregor:
Big Data in Neonatal Intensive Care. 54-59 - Pauline Anthonysamy, Phil Greenwood, Awais Rashid:
Social Networking Privacy: Understanding the Disconnect from Policy to Controls. 60-67 - E. Thomas Ewing, Samah Gad, Naren Ramakrishnan:
Gaining Insights into Epidemics by Mining Historical Newspapers. 68-72 - Niels Henze, Alireza Sahami Shirazi, Albrecht Schmidt, Martin Pielot, Florian Michahelles:
Empirical Research through Ubiquitous Data Collection. 74-76 - Alexander Repenning:
Making Programming Accessible and Exciting. 78-81 - Ann E. K. Sobel:
The Modern Educator. 82-83 - James Bret Michael:
Empowering Users through Secure On-Demand Data Provisioning. 84-85 - Gerard J. Holzmann:
A Three-Step Program for Recovering Hackers. 86-88 - David Alan Grier:
The Comfort Zone. 104
Volume 46, Number 7, July 2013
- Charles R. Severance:
Katie Hafner: The Origins of the Internet. 6-7