


Остановите войну!
for scientists:


default search action
IEEE Computer, Volume 35, 2002
Volume 35, Number 1, January 2002
- James H. Aylor:
The End of Computing Disciplines as We Know Them? 4-5
- Willis K. King:
Implementing Our Future Vision in 2002. 6-8
- Letters. 9-11
- Robert P. Colwell:
logy, Astrology, Risk, and Product Quality. 12-14
- News Briefs. 22-25
- Lee Garber:
Technology News. 26-32
- Chandrasekhar Narayanaswami, Noboru Kamijoh, Mandayam T. Raghunath, Tadanobu Inoue, Thomas M. Cipolla, James L. Sanford, Eugene S. Schlig, Sreekrishnan Venkiteswaran, Dinakar Guniguntala, Vishal Kulkarni, Kazuhiko Yamazaki:
IBM's Linux Watch: The Challenge of Miniaturization. 33-41 - Alan Allan, Don Edenfeld, William H. Joyner Jr., Andrew B. Kahng, Mike Rodgers, Yervant Zorian:
2001 Technology Roadmap for Semiconductors. 42-53 - Bruce R. Schatz:
The Interspace: Concept Navigation Across Distributed Communities. 54-62 - Barry W. Boehm:
Get Ready for Agile Methods, with Care. 64-69 - Luca Benini, Giovanni De Micheli:
Networks on Chips: A New SoC Paradigm. 70-78 - Mark Oskin, Frederic T. Chong
, Isaac L. Chuang:
A Practical Architecture for Reliable Quantum Computers. 79-87 - Gabriel Leen
, Donal Heffernan:
Expanding Automotive Electronic Systems. 88-93
- Thad Starner:
Web Technologies - Thick Clients for Personal Wireless Devices. 133-135 - Wayne H. Wolf:
Embedded Computing - What Is Embedded Computing? 136-137 - Richard G. Mathieu:
IT Systems Perspective- Top-Down Approach to Computing. 138-139 - Sam Fuller, Tom Cox:
Standards - Anatomy of a Forward-Looking Open Standard. 140-141 - W. Neville Holmes:
The Profession - To See Ourselves as Others See Us. 142-144
Volume 35, Number 2, February 2002
- Letters. 6-8
- Robert P. Colwell:
On Computers and Rock 'n' Roll. 9-11
- Article Summaries. 12-13
- Steven J. Vaughan-Nichols:
Web Services: Beyond the Hype. 18-21
- Linda Dailey Paulson:
Wanted: More Network-Security Graduates and Research. 22-24
- News Briefs. 25-27
- Kenneth L. Kraemer, Jason L. Dedrick:
Enter the Dragon: China's Computer Industry. 28-36
- Shubhendu S. Mukherjee, Sarita V. Adve, Todd M. Austin, Joel S. Emer, Peter S. Magnusson:
Performance Simulation Tools. 38-39 - Christopher J. Hughes, Vijay S. Pai, Parthasarathy Ranganathan, Sarita V. Adve:
RSIM: Simulating Shared-Memory Multiprocessors with ILP Processors. 40-49 - Peter S. Magnusson, Magnus Christensson, Jesper Eskilson, Daniel Forsgren, Gustav Hållberg, Johan Högberg, Fredrik Larsson, Andreas Moestedt, Bengt Werner:
Simics: A Full System Simulation Platform. 50-58 - Todd M. Austin, Eric Larson, Dan Ernst:
SimpleScalar: An Infrastructure for Computer System Modeling. 59-67 - Joel S. Emer, Pritpal S. Ahuja, Eric Borch, Artur Klauser
, Chi-Keung Luk, Srilatha Manne, Shubhendu S. Mukherjee, Harish Patil, Steven Wallace, Nathan L. Binkert, Roger Espasa, Toni Juan:
Asim: A Performance Model Framework. 68-76
- Norman F. Schneidewind:
Body of Knowledge for Software Quality Measurement. 77-83
- Computer Society Connection. 84-88
- Call and Calendar. 89-91
- Career Opportunities. 92-103
- Bookshelf. 105
- Products. 106-108
- William A. Arbaugh:
Security: Technical, Social, and Legal Challenges. 109-111
- Michael R. Macedonia:
Linux in Hollywood: A Star is Born. 112-114
- Upkar Varshney:
Multicast Support in Mobile Commerce Applications. 115-117
- W. Neville Holmes:
Representative Democracy and the Profession. 118-120
Volume 35, Number 3, March 2002
- Letters. 6-7
- Robert P. Colwell:
Engineering, Science, and Quantum Mechanics. 8-10
- Article Summaries. 11-12
- George Lawton:
Open Source Security: Opportunity or Oxymoron? 18-21
- David Clark:
Mobile Processors Begin to Grow Up. 22-25
- News Briefs. 27-29
- Roslin V. Hauck, Homa Atabakhsh, Pichai Ongvasith, Harsh Gupta, Hsinchun Chen:
Using Coplink to Analyze Criminal-Justice Data. 30-37 - André Guéziec:
Tracking Pitches for Broadcast Television. 38-43
- Ivan Poupyrev, Desney S. Tan, Mark Billinghurst
, Hirokazu Kato
, Holger Regenbrecht, Nobuji Tetsutani:
Developing a Generic Augmented-Reality Interface. 44-50 - Kurt D. Fenstermacher, Mark Ginsburg:
A Lightweight Framework for Cross-Application User Monitoring. 51-59 - Jennifer Allanson:
Electrophysiologically Interactive Computer Systems. 60-65
- Gary William Flake, Steve Lawrence, C. Lee Giles
, Frans Coetzee:
Self-Organization and Identification of Web Communities. 66-71 - Eduardo Miranda:
Planning and Executing Time-Bound Projects. 73-79
- Computer Society Connection. 80-84
- Call and Calendar. 85-88
- Career Opportunities. 90-95
- Bookshelf. 96
- Products. 97-99
- Grant Martin, Frank Schirrmeister:
A Design Chain for Embedded Systems. 100-103 - Charles Steinfield:
Realizing the Benefits of Virtual Teams. 104-106 - Amanda Spink, Bernard J. Jansen
, Dietmar Wolfram, Tefko Saracevic:
From E-Sex to E-Commerce: Web Search Changes. 107-109 - W. Neville Holmes:
Computers, Programming, and People. 110-112
Volume 35, Number 4, April 2002
- Letters. 6-8
- Robert P. Colwell:
Near Misses: Murphy's Law is Wrong. 9-12
- Article Summaries. 13
- Linda Dailey Paulson:
Faster RAM Tackles Data and Marketplace Bottlenecks. 17-19
- News Briefs. 20-22
- Nachiketh R. Potlapally:
Optical Fingerprinting to Protect Data: A Proposal. 23-28
- Donald J. Welch, Daniel Ragsdale, Wayne Schepens:
Training for Information Assurance. 30-37
- Savitha Srinivasan, Eric W. Brown:
Is Speech Recognition Becoming Mainstream? 38-41 - Mukund Padmanabhan, Michael Picheny:
Large-Vocabulary Speech Recognition Algorithms. 42-50 - Allen L. Gorin, Alicia Abella, Tirso Alonso, Giuseppe Riccardi, Jeremy H. Wright:
Automated Natural Spoken Dialog. 51-56 - Pedro J. Moreno, Jean-Manuel Van Thong, Beth Logan, Gareth J. F. Jones
:
From Multimedia Retrieval to Knowledge Management. 58-66
- Richard H. Thayer:
Software System Engineering: A Tutorial. 68-73
- Computer Society Connection. 74-76
- Call and Calendar. 77-79
- Career Opportunities. 80-84
- Bertrand Meyer:
Assessing a C# Text. 86-88
- Bookshelf. 89
- Products. 90-91
- Rashmi Bajaj, Samantha Ranaweera, Dharma P. Agrawal:
GPS: Location-Tracking Technology. 92-94
- James Korris, Michael R. Macedonia:
The End of Celluloid: Digital Cinema Emerges. 96-98
- Gary McGraw:
Managing Software Security Risks. 99-101
- W. Neville Holmes:
Side Effects of Digital Technology. 102-104
Volume 35, Number 5, May 2002
- Quantum Mystery Mongering. 6-10
- Robert P. Colwell:
If You Didn't Test It, It Doesn't Work. 11-13
- Article Summaries. 17
- John Edwards, Linda Dailey Paulson:
Smart Graphics: A New Approach to Meeting User Needs. 18-21
- Neal Leavitt:
Data Mining for the Corporate Masses? 22-24
- News Briefs: Will New Chip Revolutionize Digital Photography? / US Approves New Uses for Wireless Technology. 25-27
- Michael R. Blaha, Cheryl Smith:
A Pattern for Softcoded Values. 28-34
- Kyle Eischen:
Software Development: An Outsider's View. 36-44
- Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong:
The Chamois Component-Based Knowledge Engineering Framework. 46-54 - Selim Aissi, Pallavi Malu, Krishnamurthy Srinivasan:
E-Business Process Modeling: The Next Big Step. 55-62
- T. S. Raghu, Ram Ramesh, Andrew B. Whinston:
Next Steps for Mobile Entertainment Portals. 63-70 - Laura E. Jackson, George N. Rouskas
:
Deterministic Preemtive Scheduling of Real-Time Tasks. 72-79 - Fayaz A. Shaikh, Stan McClellan, Manpreet Singh, Sannedhi K. Chakravarthy:
End-to-End Testing of IP QoS Mechanisms. 80-87
- Call and Calendar. 88-91
- Computer Society Connection. 92-94
- Career Opportunities. 96-98
- Bookshelf: The Art of Evolutionary Computation. 99
- Products. 100-101
- Douglas A. Lyon, Christopher L. Huntley:
There's More Than One Way to Build a Bridge. 102-103
- Kate McMillan:
Technology Standards Pros Aid Homeland Security. 104-105
- Wayne H. Wolf:
Household Hints for Embedded Systems Designers. 106-108
- W. Neville Holmes:
Would a Digital Brain Have a Mind? 110-112
Volume 35, Number 6, June 2002
- Information System Engineering. 6-9
- Robert P. Colwell:
When the real world intervenes on well-planned experiments, the lessons you learn stick with you. 10-12
- Article Summaries. 13
- George Lawton:
Moving Java into Mobile Phones. 17-20
- Steven J. Vaughan-Nichols:
Will 10-Gigabit Ethernet Have a Bright Future? 22-24
- Little Chips Promise Big Power / Bioinformatics Experiences Important Breakthroughs / Company Unveils Holographic for 3D Storage. 25-27
- Ross J. Anderson:
Free Speech Online and Offline. 28-30 - Leonard L. Tripp:
Software Certification Debate: Benefits of Certification. 31-33 - Adam Kolawa:
Software Certification Debate: Certification Will Do More Harm than Good. 34-35
- Ian T. Foster, Carl Kesselman
, Jeffrey M. Nick, Steven Tuecke
:
Grid Services for Distributed System Integration. 37-46 - William T. C. Kramer:
SCinet: Testbed for High-Performance Networked Applications. 47-55
- Cyrus Shahabi
, Roger Zimmermann
, Kun Fu, Shu-Yuen Didi Yao:
Yima: A Second-Generation Continuous Media Server. 56-64 - Hyokyung Bahn, Kern Koh, Sang Lyul Min, Sam H. Noh:
Efficient Replacement of Nonuniform Objects in Web Caches. 65-73
- IEEE Computer Society Recognizes Achievements of Leading Computer Engineers. 74-76
- Call and Calendar. 77-80
- Recipes for Image Analysis. 81
- Products. 82-83
- Career Opportunities. 84-88
- Tom DeMarco, Barry W. Boehm:
The Agile Methods Fray. 90-92
- Erin Kenneally:
Who's Liable for Insecure Networks? 93-95
- Sasikanth Avancha, Anupam Joshi
, Timothy W. Finin:
Enhanced Service Discovery in Bluetooth. 96-99
- Donald A. Norman:
Home Theater: Not Ready for Prime Time. 100-102
- Ana Asuaga:
Using Computers in Our Daily Life. 103-104
Volume 35, Number 7, July 2002
- Robert P. Colwell:
What Technology Is Doing to Music. 6-8
- Article Summaries. 9-10