


default search action
IEEE Computer, Volume 48
Volume 48, Number 1, January 2015
- Tom Conte
:
A Time of Change. 4-6 - Sumi Helal
:
Sustaining Computer's Impact and Adapting to Change. 7-9 - Ying Xu:
Carrying out Phylogenetic Analyses through Computational Model Checking. 12 - Charles R. Severance:
Khan Academy and Computer Science. 14-15 - Brian M. Gaff:
IP Issues for Start-ups. 16-18 - Roy Want, Bill N. Schilit, Scott Jenson:
Enabling the Internet of Things. 28-35 - Fadi H. Gebara, H. Peter Hofstee, Kevin J. Nowka
:
Second-Generation Big Data Systems. 36-41 - Peter Fonash, Phyllis A. Schneck:
Cybersecurity: From Months to Milliseconds. 42-50 - Constantinos Patsakis
, Paul Laird, Michael Clear, Mélanie Bouroche
, Agusti Solanas
:
Interoperable Privacy-Aware E-Participation within Smart Cities. 52-58 - Stephen P. Crago, John Paul Walters:
Heterogeneous Cloud Computing: The Way Forward. 59-61 - Luca Caviglione
, Wojciech Mazurczyk
:
Understanding Information Hiding in iOS. 62-65 - Mitchell E. Daniels:
Measuring Great Jobs and Great Lives: The Gallup-Purdue Index. 66-69 - Ari Popper:
Transforming Business through Science Fiction Prototyping. 70-72 - Jennifer Costley:
Leveraging the Standards Life Cycle for Green IT. 73-75 - Hal Berghel:
A Paperless Gamble. 76-78 - David Alan Grier:
State Transitions. 92
Volume 48, Number 2, February 2015
- Elisa Bertino:
Denial-of-Service Attacks to UMTS. 6 - Charles R. Severance:
Guido van Rossum: The Early Years of Python. 7-9 - Brian M. Gaff:
BYOD? OMG! 10-11 - Alf Weaver
, Renée C. Bryce:
Technological Advances in Medicine: It's Personal [Guest editors' introduction]. 21-23 - Jingquan Li:
Ensuring Privacy in a Personal Health Record System. 24-31 - Marina Velikova, Peter J. F. Lucas, Maarten van der Heijden:
Intelligent Disease Self-Management with Mobile Technology. 32-39 - Kyungtae Kang, Qixin Wang
, Junbeom Hur, Kyung-Joon Park
, Lui Sha:
Medical-Grade Quality of Service for Real-Time Mobile Healthcare. 41-49 - Arshdeep Bahga
, Vijay Krishna Madisetti:
Healthcare Data Integration and Informatics in the Cloud. 50-57 - Erman Ayday, Emiliano De Cristofaro, Jean-Pierre Hubaux, Gene Tsudik:
Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare? 58-66 - Adam P. Spring:
Creating Substance from a Cloud: Low-Cost Product Generation. 67-74 - Greg Byrd
:
Spotlighting Student Innovation. 75-76 - Hal Berghel:
Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole. 77-80 - Emil Vassev, Mike Hinchey
:
KnowLang: Knowledge Representation for Self-Adaptive Systems. 81-84 - Vincent C. Hu
, D. Richard Kuhn, David F. Ferraiolo:
Attribute-Based Access Control. 85-88 - David Alan Grier:
The Tyranny of Geography. 100
Volume 48, Number 3, March 2015
- Björn W. Schuller
:
Do Computers Have Personality? 6-7 - Charles R. Severance:
Guido van Rossum: The Modern Era of Python. 8-10 - Lee Garber:
News. 13-19 - Venkat N. Gudivada, Ricardo Baeza-Yates
, Vijay V. Raghavan:
Big Data: Promises and Problems. 20-23 - Vito Giovanni Castellana, Alessandro Morari, Jesse Weaver, Antonino Tumeo
, David Haglin, Oreste Villa, John Feo:
In-Memory Graph Databases for Web-Scale Data. 24-35 - Zhenyun Zhuang, Haricharan Ramachandra, Chaoyue Xiong:
Taming Replication Latency of Big Data Events with Capacity Planning. 36-41 - Srividya K. Bansal, Sebastian Kagemann:
Integrating Big Data: A Semantic Extract-Transform-Load Framework. 42-50 - Karamjit Kaur
, Rinkle Rani:
Managing Data in Healthcare Information Systems: Many Models, One Solution. 52-59 - Martin Giese, Ahmet Soylu
, Guillermo Vega-Gorgojo
, Arild Waaler, Peter Haase, Ernesto Jiménez-Ruiz
, Davide Lanti
, Martín Rezk, Guohui Xiao
, Özgür L. Özçep, Riccardo Rosati
:
Optique: Zooming in on Big Data. 60-67 - Hasan Alkhatib, Paolo Faraboschi
, Eitan Frachtenberg
, Hironori Kasahara
, Danny B. Lange, Phillip A. Laplante, Arif Merchant
, Dejan S. Milojicic
, Karsten Schwan:
What Will 2022 Look Like? The IEEE CS 2022 Report. 68-76 - Ninad S. Thakoor, Le An, Bir Bhanu
, Santhoshkumar Sunderrajan, B. S. Manjunath:
People Tracking in Camera Networks: Three Open Questions. 78-86 - Hong Linh Truong, Schahram Dustdar
:
Programming Elasticity in the Cloud. 87-90 - Kasper Hornbæk
:
Flexible Displays, Rigid Designs? 92-96 - Tawny Schlieski
:
Virtual Dystopia. 97-98 - James Bret Michael:
Trusted Computing: An Elusive Goal. 99-101 - Hal Berghel:
Noirware. 102-107 - Christian Timmerer, Touradj Ebrahimi
, Fernando Pereira
:
Toward a New Assessment of Quality. 108-110 - Bob Aiello:
Managing the High-Performance Computer Society Standards Working Group. 111-113 - Steve Roach, Mehran Sahami:
CS2013: Computer Science Curricula 2013. 114-116 - David Alan Grier:
Building Trust. 136
Volume 48, Number 4, April 2015
- David A. Forsyth:
Representation Learning. 6 - Brian M. Gaff:
Important IP Cases in 2015, Part One. 7-9 - D. Frank Hsu, Dorothy Marinucci, Jeffrey M. Voas:
Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem. 12-14 - Ruby B. Lee:
Rethinking Computers for Cybersecurity. 16-25 - David Gillman, Yin Lin, Bruce M. Maggs, Ramesh K. Sitaraman
:
Protecting Websites from Attack with Secure Delivery Networks. 26-34 - Kristin E. Heckman, Frank J. Stech, Ben S. Schmoker, Roshan K. Thomas:
Denial and Deception in Cyber Defense. 36-44 - Tomas Vagoun, George O. Strawn:
Implementing the Federal Cybersecurity R&D Strategy. 45-55 - Sek Chai:
Enabling Smart Camera Networks with Smartphone Processors. 56-63 - Jon D. Hagar, Thomas L. Wissink, D. Richard Kuhn, Raghu Kacker:
Introducing Combinatorial Testing in a Large Organization. 64-72 - Greg Byrd
:
A Little Ingenuity Solves an Elephant-Sized Problem. 74-77 - Emily Shen, Mayank Varia, Robert K. Cunningham, W. Konrad Vesey:
Cryptographically Secure Computation. 78-81 - Hal Berghel:
Borderline Executive Disorder. 82-86 - David Alan Grier:
Accidents Will Happen. 104
Volume 48, Number 5, May 2015
- Ling Liu:
Enhancing Cloud Services through Multitier Workload Analysis. 6 - Charles R. Severance:
John Resig: Building JQuery. 7-8 - Brian M. Gaff:
Important IP Cases in 2015, Part Two. 9-11 - Ron Vetter, San Murugesan
:
The Web: The Next 25 Years. 14-17 - Vishnu S. Pendyala
, Simon S. Y. Shim, Christoph Bussler:
The Web That Extends beyond the World. 18-25 - Dave Raggett:
The Web of Things: Challenges and Opportunities. 26-32 - Jörg Heuer, Johannes Hund, Oliver Pfaff:
Toward the Web of Things: Applying Web Technologies to the Physical World. 34-42 - Ron Vetter, San Murugesan
:
Roundtable Discussion: The Web We Look Forward To. 44-50 - Dirk Riehle:
How Open Source Is Changing the Software Developer's Career. 51-57 - Jason Schlessman, Marilyn Wolf:
Tailoring Design for Embedded Computer Vision Applications. 58-62 - Alexander De Luca, Janne Lindqvist:
Is Secure and Usable Smartphone Authentication Asking Too Much? 64-68 - Alida Draudt, Jonjozuf Hadley, Ryan Hogan, Leticia Murray, Gregory Stock, Julia Rose West:
Six Insights about Science Fiction Prototyping. 69-71 - Wenqi Zhou
, Yuhong Liu:
Online Product Rating Manipulation and Market Performance. 72-75 - Susanne E. Hambrusch, Ran Libeskind-Hadas:
The PhD Pipeline. 76-79 - Marat Zhanikeev
:
A Cloud Visitation Platform to Facilitate Cloud Federation and Fog Computing. 80-83 - Hal Berghel:
What Makes a Good Column. 84-87 - George F. Hurlburt
:
Cyberhuman Security. 88-91 - Karen Gundy-Burlet:
The Use of Standards on the LADEE Mission. 92-95 - Manfred Broy:
Rethinking Nonfunctional Software Requirements. 96-99 - David Alan Grier:
The GitHub Effect. 116
Volume 48, Number 6, June 2015
- Prasant Mohapatra:
Distributed Optimal Channel Access in Cognitive Radio Networks. 6 - Charles R. Severance:
Roy T. Fielding: Understanding the REST Style. 7-9 - Thad Starner, Tom L. Martin:
Wearable Computing: The New Dress Code [Guest editors' introduction]. 12-15 - Anhong Guo, Xiaolong Wu, Zhengyang Shen, Thad Starner, Hannes Baumann, Scott M. Gilliland:
Order Picking with Head-Up Displays. 16-24 - Reuben Kirkham:
Can Disability Discrimination Law Expand the Availability of Wearable Computers? 25-33 - Jon C. Hammer, Tingxin Yan:
Inferring Mobile User Status with Usage Cues. 34-40 - Andrea Rosales
, Sergio Sayago
, Josep Blat
:
Beeping Socks and Chirping Arm Bands: Wearables That Foster Free Play. 41-48 - Najeeb Ullah
, Maurizio Morisio, Antonio Vetrò
:
Selecting the Best Reliability Model to Predict Residual Defects in Open Source Software. 50-58 - Greg Byrd
:
Tracking Cows Wirelessly. 60-63 - Hal Berghel:
A Farewell to Air Gaps, Part 1. 64-68 - Jeffrey M. Voas:
Vetting Mobile App Vendors. 69-71 - Reiner Hähnle
, Einar Broch Johnsen
:
Designing Resource-Aware Cloud Applications. 72-75 - David Alan Grier:
Disruptive Computing. 100
Volume 48, Number 7, July 2015
- Jean-Luc Gaudiot:
The Times They Are A-Changin'. 4-6 - Stephen W. Keckler:
Increasing Interconnection Network Throughput with Virtual Channels. 10 - Brian M. Gaff:
"Curiouser and Curiouser!"-The Fallout from Alice. 12-14 - Jim Tørresen, Christian Plessl
, Xin Yao
:
Self-Aware and Self-Expressive Systems. 18-20 - Bernhard Rinner, Lukas Esterle
, Jennifer Simonjan
, Georg Nebehay, Roman P. Pflugfelder, Gustavo Fernández Domínguez, Peter R. Lewis
:
Self-Aware and Self-Expressive Camera Networks. 21-28 - Michele Amoretti, Stefano Cagnoni
:
Toward Collective Self-Awareness and Self-Expression in Distributed Systems. 29-36 - Jürgo-Sören Preden, Kalle Tammemäe
, Axel Jantsch
, Mairo Leier
, Andri Riid
, Emine Calis:
The Benefits of Self-Awareness and Attention in Fog and Mist Computing. 37-45 - Vincent van Beek, Jesse Donkervliet, Tim Hegeman, Stefan Hugtenburg, Alexandru Iosup
:
Self-Expressive Management of Business-Critical Workloads in Virtualized Datacenters. 46-54 - Behrooz Parhami:
Amdahl's Reliability Law: A Simple Quantification of the Weakest-Link Phenomenon. 55-58 - Hal Berghel:
A Farewell to Air Gaps, Part 2. 59-63 - Nir Kshetri:
Recent US Cybersecurity Policy Initiatives: Challenges and Implications. 64-69 - Brian David Johnson:
Steve the Steampunk Robot. 70-72 - Soto Montalvo, Raquel Martínez-Unanue, Víctor Fresno
, Rafael Capilla
:
Multilingual Information Access on the Web. 73-75 - Dhananjai Madhava Rao:
Computing Efficiency in Education. 76-79 - Xiaofei Xu, Quan Z. Sheng
, Liang-Jie Zhang
, Yushun Fan, Schahram Dustdar
:
From Big Data to Big Service. 80-83 - Per Ola Kristensson:
Next-Generation Text Entry. 84-87 - David Alan Grier:
Do We Need a Software Czar? 104
Volume 48, Number 8, August 2015
- Shixia Liu
, Leila De Floriani:
Multivariate Network Exploration and Presentations. 6 - Charles R. Severance:
Anil Jain: 25 Years of Biometric Recognition. 8-10 - Antonino Tumeo
, John Feo:
Irregular Applications: From Architectures to Algorithms [Guest editors' introduction]. 14-16 - G. Scott Lloyd, Maya B. Gokhale:
In-Memory Data Rearrangement for Irregular, Data-Intensive Computing. 18-25 - Daniele Buono, John A. Gunnels, Xinyu Que, Fabio Checconi, Fabrizio Petrini, Tai-Ching Tuan, Chris Long:
Optimizing Sparse Linear Algebra for Large-Scale Graph Analytics. 26-34 - Andrew Lenharth, Keshav Pingali:
Scaling Runtimes for Irregular Algorithms to Large-Scale NUMA Systems. 35-44 - Hitesh Rajput, Tanmoy Som
, Soumitra Kar:
An Automated Vehicle License Plate Recognition System. 56-61 - Peter R. Lewis
, Arjun Chandra, Funmilade Faniyi, Kyrre Glette, Tao Chen
, Rami Bahsoon, Jim Tørresen, Xin Yao
:
Architectural Aspects of Self-Aware and Self-Expressive Computing Systems: From Psychology to Engineering. 62-70