


Остановите войну!
for scientists:


default search action
IEEE Computer, Volume 47
Volume 47, Number 1, January 2014
- Dejan S. Milojicic
:
Reinventing Relevance. 6-8 - Raghu Machiraju:
Fixing the Mercator Projection for the Internet Age. 9 - Charles R. Severance:
Massimo Banzi: Building Arduino. 11-12 - Brian M. Gaff:
Corporate Risks from Social Media. 13-15 - Ron Vetter:
Digital Magazines: The Future of Publishing Is Here. 22-23 - Karin Strauss, Doug Burger:
What the Future Holds for Solid-State Memory. 24-31 - Shyamnath Gollakota, Matthew S. Reynolds, Joshua R. Smith, David Wetherall:
The Emergence of RF-Powered Computing. 32-39 - Anuj Kumar, Florian Metze
, Matthew Kam:
Enabling the Rapid Development and Adoption of Speech-User Interfaces. 40-47 - Emerson R. Murphy-Hill:
The Future of Social Learning in Software Engineering. 48-54 - Hye-Chung Kum, Ashok Kumar Krishnamurthy, Ashwin Machanavajjhala, Stanley C. Ahalt:
Social Genome: Putting Big Data to Work for Population Informatics. 56-63 - Paolo Montuschi
, Alfredo Benso:
Augmented Reading: The Present and Future of Electronic Scientific Publications. 64-74 - Eli Tilevich
, Young-Woo Kwon
:
Cloud-Based Execution to Improve Mobile Application Energy Efficiency. 75-77 - Hal Berghel:
Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege. 78-82 - Nir Kshetri:
Japan's Changing Cybersecurity Landscape. 83-86 - Brian David Johnson:
Utopia Rising. 87-89 - David Alan Grier:
Just Out of It. 104
Volume 47, Number 2, February 2014
- David A. Forsyth:
Object Detection with Discriminatively Trained Part-Based Models. 6-7 - Charles R. Severance:
Joseph Hardin: NCSA Mosaic. 8-10 - Brian M. Gaff:
IP 2013-2014: Looking Forward and Looking Back. 11-13 - W. Neville Holmes:
32 & 16 Years Ago. 14-15 - Lee Garber:
News Briefs. 16-20 - Renée C. Bryce, Rick Kuhn:
Software Testing. 21-22 - Midhat Ali, Francesco De Angelis, Daniele Fanì, Antonia Bertolino
, Guglielmo De Angelis, Andrea Polini
:
An Extensible Framework for Online Testing of Choreographed Services. 23-29 - Nuno Antunes
, Marco Vieira
:
Penetration Testing for Web Services. 30-36 - Cemal Yilmaz
, Sandro Fouché, Myra B. Cohen, Adam A. Porter, Gülsen Demiröz
, Ugur Koc:
Moving Forward with Combinatorial Interaction Testing. 37-45 - Jerry Gao, Xiaoying Bai, Wei-Tek Tsai, Tadahiro Uehara:
Mobile Application Testing: A Tutorial. 46-55 - Andreas Dähn, Clemens H. Cap
:
Application Transparency and Manipulation. 56-61 - William J. Chimiak, Samuel T. Patton, Stephen Janansky:
Enhanced IP: IPv4 with 64-Bit Addresses. 62-69 - Manfred Broy, Albrecht Schmidt
:
Challenges in Engineering Cyber-Physical Systems. 70-72 - Hal Berghel:
Moral Hazards, Negative Externalities, and the Surveillance Economy. 73-77 - Apostol Vassilev, Timothy A. Hall:
The Importance of Entropy to Information Security. 78-81 - Peter Gruenbaum:
Undergraduates Teach Game Programming Using Scratch. 82-84 - Rafael Capilla
, Óscar Ortiz, Mike Hinchey
:
Context Variability for Context-Aware Systems. 85-87 - Jeffrey E. Froyd:
The Nature of Scholarship in Computing Education: An Approach from IEEE Transactions on Education. 88-90 - David Alan Grier:
Practice and Theory. 104
Volume 47, Number 3, March 2014
- Peter Brusilovsky
:
Collective Class Wisdom: Collaborative Lecture Annotation. 6 - Charles R. Severance:
Len Kleinrock: The First Two Packets on the Internet. 10-11 - Brian M. Gaff:
Contracts 101. 12-15 - Lee Garber:
News Briefs. 18-21 - Chirag Shah
, Robert Capra
, Preben Hansen
:
Collaborative Information Seeking. 22-25 - Zhe Xu, Jay Ramanathan, Rajiv Ramnath:
Identifying Knowledge Brokers and Their Role in Enterprise Research through Social Media. 26-31 - Thilo Böhm, Claus-Peter Klas, Matthias L. Hemmje:
ezDL: Collaborative Information Seeking and Retrieval in a Heterogeneous Environment. 32-37 - Yihan Tao, Anastasios Tombros:
Investigating Collaborative Sensemaking Behavior in Collaborative Information Seeking. 38-45 - Zhen Yue, Shuguang Han, Daqing He
, Jiepu Jiang
:
Influences on Query Reformulation in Collaborative Web Search. 46-53 - Jaime Teevan, Meredith Ringel Morris, Shiri Azenkot:
Supporting Interpersonal Interaction during Collaborative Mobile Search. 54-57 - Marti A. Hearst:
What's Missing from Collaborative Search? 58-61 - Zheng Chen, Jian-Tao Sun, Xuedong Huang:
Web Information at Your Fingertips: Paper as an Interaction Metaphor. 62-66 - Christian Timmerer, Benjamin Rainer:
The Social Multimedia Experience. 67-69 - Hal Berghel:
STEM, Revisited. 70-73 - Hugo Plácido da Silva
, Ana L. N. Fred
:
Harnessing the Power of Biosignals. 74-77 - Kirk W. Cameron
:
The Evolution of Power Measurement. 78-80 - Gary McGraw:
Security Fatigue? Shift Your Paradigm. 81-83 - Brian David Johnson:
The Darwin App. 84-86 - David Alan Grier:
Assets to the Table. 100
Volume 47, Number 4, April 2014
- Ling Liu:
Service Selection and Recommendation through Collective Intelligence. 6 - Charles R. Severance:
Doug Van Houweling: Building the NSFNet. 7-9 - Brian M. Gaff:
Readers' Choice [Intellectual Property laws]. 10-12 - Carl K. Chang, Bill N. Schilit:
Aware Computing [Guest editors' introduction]. 20-21 - Sarah Vieweg, Adam Hodges
:
Rethinking Context: Leveraging Human and Machine Computation in Disaster Response. 22-27 - Mohammed (Ehsan) Hoque, Rosalind W. Picard:
Rich Nonverbal Sensing Technology for Automated Social Skills Training. 28-35 - Mark Matthews
, Saeed Abdullah
, Geri Gay, Tanzeem Choudhury:
Tracking Mental Well-Being: Balancing Rich Sensing and Patient Needs. 36-43 - Giampiero E. G. Beroggi:
Internet Voting: An Empirical Evaluation. 44-50 - Juan R. Terven, Joaquín Salas
, Bogdan Raducanu:
New Opportunities for Computer Vision-Based Assistive Technology Systems for the Visually Impaired. 52-58 - Ying-Dar Lin, Chia-Yin Lee, Yu-Sung Wu, Pei-Hsiu Ho, Fu-Yu Wang, Yi-Lang Tsai:
Active versus Passive Malware Collection. 59-65 - Hal Berghel:
Mr. Snowden's Legacy. 66-70 - Katia Vega, Hugo Fuks:
Beauty Technology: Body Surface Computing. 71-75 - Young Lae Moon, Kazuomi Sugamoto, Alberto Paoluzzi, Antonio DiCarlo, Jaekeun Kwak, Dong Sun Shin, Dae Ok Kim, Dae Hyun Lee, Jooyoung Kim:
Standardizing 3D Medical Imaging. 76-79 - Sarah Beecham, Pádraig O'Leary, Seán Baker, Ita Richardson
, John Noll:
Making Software Engineering Research Relevant. 80-83 - George F. Hurlburt, Jeffrey M. Voas:
Big Data, Networked Worlds. 84-87 - Fernando Arnez, Jason Pace, Kelvin Sung:
Learning while Building Games for Teaching. 88-91 - Sorel Reisman:
The Future of Online Instruction, Part 1. 92-93 - Patrick Butler, Naren Ramakrishnan
, Elaine O. Nsoesie, John S. Brownstein:
Satellite Imagery Analysis: What Can Hospital Parking Lots Tell Us about a Disease Outbreak? 94-97 - Gopal Pingali, T. S. Mohan:
The Cloud Ascends in Emerging Markets: Highlights of IEEE CCEM 2013. 98-101 - David Alan Grier:
All That Glitters Is Not Gold. 116
Volume 47, Number 5, May 2014
- Albert Y. Zomaya
:
Power-Performance Tradeoff in a Federated Cloud. 6-7 - Charles R. Severance:
Nathaniel Borenstein: Multipurpose Internet Mail Extensions (MIME). 9-11 - Martin Reisslein
, Bernhard Rinner, Amit K. Roy-Chowdhury:
Smart Camera Networks [Guest editors' introduction]. 23-25 - Ching-Hui Chen, Julien Favre, Gregorij Kurillo, Thomas P. Andriacchi, Ruzena Bajcsy, Rama Chellappa:
Camera Networks for Healthcare, Teleimmersion, and Surveillance. 26-36 - Kevin Abas, Caio Porto, Katia Obraczka:
Wireless Smart Camera Networks for the Surveillance of Public Spaces. 37-44 - Andrea Prati
, Faisal Z. Qureshi:
Integrating Consumer Smart Cameras into Camera Networks: Opportunities and Obstacles. 45-51 - Kaushik Mitra
, Ashok Veeraraghavan, Aswin C. Sankaranarayanan, Richard G. Baraniuk:
Toward Compressive Camera Networks. 52-59 - Zhangyu Guan, Tommaso Melodia:
Cloud-Assisted Smart Camera Networks for Energy-Efficient 3D Video Streaming. 60-66 - Juan C. SanMiguel
, Christian Micheloni
, Karen Shoop, Gian Luca Foresti, Andrea Cavallaro:
Self-Reconfigurable Smart Camera Networks. 67-73 - Xian-He Sun, Dawei Wang:
Concurrent Average Memory Access Time. 74-80 - Wen Gao, Tiejun Huang, Cliff Reader, Weibei Dou, Xilin Chen:
IEEE Standards for Advanced Audio and Video Coding in Emerging Applications. 81-83 - Symeon Papadopoulos, Yiannis Kompatsiaris:
Social Multimedia Crawling for Mining and Search. 84-87 - Michael Cheng Yi Cho, Pokai Chen, Shiuhpyng Winston Shieh:
Dmail: A Globally Authenticated Email Service. 88-91 - Chris Preist
, Daniel Schien, Paul Shabajee, Stephen G. Wood, Christopher Hodgson:
Analyzing End-to-End Energy Consumption for Digital Services. 92-95 - Kevin W. Bowyer
, James S. Doyle Jr.:
Cosmetic Contact Lenses and Iris Recognition Spoofing. 96-98 - Brian David Johnson:
A New Doorway into Time. 99-101 - Hal Berghel:
PII, the FTC, Car Dealers, and You. 102-106 - David Alan Grier:
The Real Change [The Errant Hashtag]. 120
Volume 47, Number 6, June 2014
- Song Guo:
On-Time Warning Delivery for Vehicular Ad Hoc Networks. 6 - Brian M. Gaff, Heather Egan Sussman, Jennifer Geetter:
Privacy and Big Data. 7-9 - Lee Garber:
News Briefs. 12-17 - Ying-Dar Lin, Chun-Ying Huang
, Matthew K. Wright
, Georgios Kambourakis:
Mobile Application Security. 21-23 - Guillermo Suarez-Tangil
, Juan E. Tapiador
, Flavio Lombardi
, Roberto Di Pietro
:
Thwarting Obfuscated Malware via Differential Fault Analysis. 24-31 - Yuru Shao, Xiapu Luo
, Chenxiong Qian:
RootGuard: Protecting Rooted Android Phones. 32-40 - Félix Gómez Mármol
, Gregor Rozinaj
, Sebastian Schumann, Ondrej Labaj, Juraj Kacur:
Smart AppStore: Expanding the Frontiers of Smartphone Ecosystems. 42-47 - Alessandro Armando
, Gabriele Costa
, Luca Verderame
, Alessio Merlo:
Securing the "Bring Your Own Device" Paradigm. 48-56 - Olga Gadyatskaya, Fabio Massacci
, Yury Zhauniarovich:
Security in the Firefox OS and Tizen Mobile Platforms. 57-63 - Hal Berghel:
Leadership Failures in the National Security Complex. 64-67 - Benoît Combemale, Julien DeAntoni
, Benoit Baudry, Robert B. France, Jean-Marc Jézéquel, Jeff Gray:
Globalizing Modeling Languages. 68-71 - Irena Bojanova, George F. Hurlburt, Jeffrey M. Voas:
Imagineering an Internet of Anything. 72-77 - Jason Pace:
Working with Students Where Theory and Practice Intersect. 78-80 - Sorel Reisman
:
The Future of Online Instruction, Part 2. 82-84 - Edwin Sturrus, Olga Kulikova:
Orchestrating Hybrid Cloud Deployment: An Overview. 85-87 - David Alan Grier:
Peace in Our Time. 104
Volume 47, Number 7, July 2014
- Jian Pei:
Managing Data-Intensive Applications in the Cloud. 6 - Charles R. Severance:
Andrew S. Tanenbaum: The Impact of MINIX. 7-8 - Brian M. Gaff:
Supreme Court IP Update. 9-12 - Oliver Bimber:
Thinking Virtual. 22-23 - Mel Slater
, Maria V. Sanchez-Vives:
Transcending the Self in Immersive Virtual Reality. 24-30 - Albert A. Rizzo, Arno Hartholt, Mario Grimani, Andrew Leeds, Matt Liewer:
Virtual Reality Exposure Therapy for Combat-Related Posttraumatic Stress Disorder. 31-37 - John R. Stowers, Anton L. Fuhrmann, Maximilian Hofbauer, Martin Streinzer
, Axel Schmid, Michael H. Dickinson, Andrew D. Straw
:
Reverse Engineering Animal Vision with Virtual Reality and Genetics. 38-45 - Henry Fuchs, Andrei State, Jean-Charles Bazin:
Immersive 3D Telepresence. 46-52 - Xia Yang, Nan Sang, Jim Alves-Foss:
Shortening the Boot Time of Android OS. 53-58 - Minyong Kim, Young Geun Kim, Sung Woo Chung, Cheol Hong Kim:
Measuring Variance between Smartphone Energy Consumption and Battery Life. 59-65 - Youngjung Ahn, Yongsuk Lee, Jin-Young Choi, Gyungho Lee, Dongkyun Ahn:
Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks. 66-72 - Brian David Johnson:
Talking to the Future. 73-75 - Hal Berghel:
Robert David Steele on OSINT. 76-81 - Dimitrios S. Nikolopoulos
, Hans Vandierendonck, Nikolaos Bellas
, Christos D. Antonopoulos
, Spyros Lalis, Georgios Karakonstantis, Andreas Burg, Uwe Naumann:
Energy Efficiency through Significance-Based Computing. 82-85 - Pablo César
, Rene Kaiser
, Marian Florin Ursu:
Toward Connected Shared Experiences. 86-89 - Chi-Wei Wang, Chia-Wei Wang, Chu-An Hsieh, Shiuhpyng Winston Shieh:
Cloudebug: A Programmable Online Malware Testbed. 90-92