default search action
IEEE Computer, Volume 37, 2004
Volume 37, Number 1, January 2004
- Article Summaries. 4
- The Problem with AI / Defining Memory / Divisible Load-Scheduling Discovery. 6-7
- Doris L. Carver:
EIC's Message: Computer in 2004. 8-9 - Carl K. Chang:
President's Message: Evolving the World with the World's Computer Society. 10-12
- Robert P. Colwell:
Design Fragility. 13-16
- W. Neville Holmes:
January 1972 / January 1988. 17
- Steven J. Vaughan-Nichols:
Vendors Go to Extreme Lengths for New Chips. 18-20 - George Lawton:
Is Peer-to-Peer Secure Enough for Corporate Use? 22-25
- Linda Dailey Paulson:
News Briefs Topics include: E-Mail Security Gets Personal / Ceiling for Controversial US H-1B Visas Drops / Technique Speeds Data Transmission in Computers / Viewing the World through Interactive Panoramic Images. 26-28
- Jesse H. Poore:
A Tale of Three Disciplines ...and a Revolution. 30-36 - John Horgan:
The End of Science Revisited. 37-43 - Don Edenfeld, Andrew B. Kahng, Mike Rodgers, Yervant Zorian:
2003 Technology Roadmap for Semiconductors. 47-56 - Patrick Regan, Scott Hamilton:
NASA's Mission Reliable. 59-68 - Fred Niederman:
IT Employment Prospects in 2004: A Mixed Bag. 69-77 - Alex Pentland, Richard Fletcher, Amir Hasson:
DakNet: Rethinking Connectivity in Developing Nations. 78-83 - Oliver Bimber:
Combining Optical Holograms with Interactive Computer Graphics. 85-91
- Call and Calendar. 92-94
- Computer Society Connection. 95-99
- Career Opportunities. 100-112
- Products. 114
- Implementing Verification Biometrics. 115
- Thanaa M. Ghanem, Walid G. Aref:
Databases Deepen the Web. 116-117
- David Andrews, Douglas Niehaus, Peter J. Ashenden:
Programming Models for Hybrid CPU/FPGA Chips. 118-120
- Maryam Alavi:
Distributed Learning Environments. 121-122
- Michael T. LoBue:
Best Business Practices for Standards Groups. 124-125
- Mohan Babu:
From Organization Man to Free Agent. 126-128
Volume 37, Number 2, February 2004
- Article Summaries. 4
- Improving Software Programming. 6
- Robert P. Colwell:
Computer Lessons from Pop Songs. 7-9
- Steven J. Vaughan-Nichols:
New Trends Revive Supercomputing Industry. 10-13 - David Geer:
Will New Standards Help Curb Spam? 14-16
- Linda Dailey Paulson:
News Briefs Topics include: Researcher Develops Colorful Map of the Internet / Using Plastic to Make High-Capacity Memory / Businesses Adopt Web Site's Satirical Company Names / Researchers Develop Self-Assembling Chip Technique. 17-19
- Michael R. Blaha:
A Copper Bullet for Software Quality Improvement. 21-25
- Jie Wu, Ivan Stojmenovic:
Guest Editors' Introduction: Ad Hoc Networks. 29-31 - Guohong Cao, Liangzhong Yin, Chita R. Das:
Cooperative Cache-Based Data Access in Ad Hoc Networks. 32-39 - Jean Carle, David Simplot:
Energy-Efficient Area Monitoring for Sensor Networks. 40-46 - Marco Conti, Gaia Maselli, Giovanni Turi, Silvia Giordano:
Cross-Layering in Mobile Ad Hoc Network Design. 48-51 - Prasant Mohapatra, Chao Gui, Jian Li:
Group Communications in Mobile Ad Hoc Networks. 52-59 - Nikola Milanovic, Miroslaw Malek, Anthony Davidson, Veljko M. Milutinovic:
Routing and Security in Mobile Ad Hoc Networks. 61-65 - Li Xiao, Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Abdol-Hossein Esfahanian:
Prioritized Overlay Multicast in Mobile Ad Hoc Environments. 67-74
- Computer Society Connection. 75-79
- Call and Calendar. 80-82
- Career Opportunities. 84-93
- Mike Hazas, James Scott, John Krumm:
Location-Aware Computing Comes of Age. 95-97
- Lydia Plowman, Rosemary Luckin:
Interactivity, Interfaces, and Smart Toys. 98-100
- Peter Gutmann:
Simplifying Public Key Management. 101-103
- Luminita Vasiu, Qusay H. Mahmoud:
Mobile Agents in Wireless Devices. 104-105
- Qusay H. Mahmoud, Wlodzimierz Dobosiewicz, David A. Swayne:
Making Computer Programming Fun and Accessible. 106-108
Volume 37, Number 3, March 2004
- Robert P. Colwell:
The Zen of Overclocking. 9-12
- Steven J. Vaughan-Nichols:
Voice Authentication Speaks to the Marketplace. 13-15 - Neal Leavitt:
Will Interoperability Problems Give IP Telephony a Busy Signal? 16-18 - Linda Dailey Paulson:
News Briefs. 19-21
- Doug Burger, James R. Goodman:
Billion-Transistor Architectures: There and Back Again. 22-28
- Peter M. Maurer:
Metamorphic Programming: Unconventional High Performance. 30-38
- Robert P. Colwell:
Theme Issue Introduction: We May Need a New Box. 40-41 - Naresh R. Shanbhag:
Reliable and Efficient System-on-Chip Design. 42-50 - Augustus K. Uht:
Going Beyond Worst-Case Specs with TEAtime. 51-56 - Todd M. Austin, David T. Blaauw, Trevor N. Mudge, Krisztián Flautner:
Making Typical Silicon Matter with Razor. 57-65 - Shih-Lien Lu:
Speeding Up Processing with Approximation Circuits. 67-73
- Gary Richardson, Blake Ives:
Managing Systems Development. 93-94
- Franco Zambonelli, Michael Luck:
Agent Hell: A Scenario of Worst Practices. 96-98
- Wayne H. Wolf:
Embedded Is the New Paradigm(s). 99-101
- W. Neville Holmes:
Languages and the Computing Profession. 102-104
Volume 37, Number 4, April 2004
- Article Summaries. 4
- Letters. 6-7
- Robert P. Colwell:
Brainstorming, Influence, and Icebergs. 9-12
- George Lawton:
Will Network Processor Units Live Up to Their Promise? 13-15 - Linda Dailey Paulson:
News Briefs. 16-18
- Bo Ingvar Sandén:
Coping with Java Threads. 20-27
- Carlo Blundo, Stelvio Cimato:
A Software Infrastructure for Authenticated Web Metering. 28-33 - Santosh K. Rangarajan, Vir V. Phoha, Kiran S. Balagani, Rastko R. Selmic, S. Sitharama Iyengar:
Adaptive Neural Network Clustering of Web Users. 34-40 - Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi:
XML-Based Specification for Web Services Document Security. 41-49
- Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang, Yi Qin, Michael Chau:
Crime Data Mining: A General Framework and Some Examples. 50-56 - Nimrod Megiddo, Dharmendra S. Modha:
Outperforming LRU with an Adaptive Replacement Cache Algorithm. 58-65
- Computer Society Connection. 69-70
- Call and Calendar. 71-72
- Bookshelf. 73
- Career Opportunities. 74-75
- Products. 77
- Dipanjan Chakraborty, Hui Lei:
Extending the Reach of Business Processes. 78-80
- Mark H. Overmars:
Teaching Computer Science through Game Design. 81-83
- Roy Want:
Enabling Ubiquitous Sensing with RFID. 84-86
- Bruce Schneier:
Hacking the Business Climate for Network Security. 87-89
- Margaret L. Johnson:
Biometrics and the Threat to Civil Liberties. 90-92
Volume 37, Number 5, May 2004
- Linda Dailey Paulson:
Using MPLS to Unify Multiple Network Types. 15-17 - Steven J. Vaughan-Nichols:
Wireless Middleware: Glue for the Mobile Infrastructure. 18-20
- Anthony Finkelstein, James Hetherington, Linzhong Li, Ofer Margoninski, Peter Saffrey, Robert M. Seymour, Anne Warner:
Computational Challenges of Systems Biology. 26-33
- Eric Dishman:
Inventing Wellness Systems for Aging in Place. 34-41 - Alex Pentland:
Healthwear: Medical Technology Becomes Wearable. 42-49
- Atsushi Kara:
Private-to-Private Communications over the Internet. 53-59 - Patrick Th. Eugster, Rachid Guerraoui, Anne-Marie Kermarrec, Laurent Massoulié:
Epidemic Information Dissemination in Distributed Systems. 60-67
- Computer Society Connection. 68-71
- Todd M. Austin, David T. Blaauw, Scott A. Mahlke, Trevor N. Mudge, Chaitali Chakrabarti, Wayne H. Wolf:
Mobile Supercomputers. 81-83
- Gary Richardson, Blake Ives:
Systems Development Processes. 84-86
- Wojciech Cellary, Wojciech Wiza, Krzysztof Walczak:
Visualizing Web Search Results in 3D. 87-89
- W. Neville Holmes:
Data and Information as Property. 90-92
Volume 37, Number 6, June 2004
- Bob Colwell:
Let's Hear from Those in the Back. 6-9
- Steven J. Vaughan-Nichols:
Achieving Wireless Broadband with WiMax. 10-13 - David Geer:
Just How Secure Are Security Products? 14-16 - Linda Dailey Paulson:
News Briefs. 18-20
- Diane M. Strong, Olga Volkoff:
A Roadmap for Enterprise System Implementation. 22-29
- Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap:
Guest Editors' Introduction: Securing the High-Speed Internet. 33-35 - Butler W. Lampson:
Computer Security in the Real World. 37-46 - Thomas M. Chen, Jean-Marc Robert:
Worm Epidemics in High-Speed Networks. 48-53 - Robert Friend:
Making the Gigabit IPsec VPN Architecture Secure. 54-60 - Avishai Wool:
A Quantitative Study of Firewall Configuration Errors. 62-67
- Byung K. Yi, S. R. Subramanya:
Enhancing Personal Communications with Multimedia. 79-81
- William A. Arbaugh:
A Patch in Nine Saves Time? 82-83
- Joshua R. Smith:
Imperceptible Sensory Channels. 84-85
- Albert A. Rizzo, Todd Bowerly, Cyrus Shahabi, J. Galen Buckwalter, Dean Klimchuk, Roman Mitura:
Diagnosing Attention Disorders in a Virtual Classroom. 87-89
- Kai A. Olsen:
The Economics of International Conferences. 90-91
Volume 37, Number 7, July 2004
- Bob Colwell:
Travel Stories. 8-10
- Linda Dailey Paulson:
Open Source Databases Move into the Marketplace. 13-15 - George Lawton:
Is MIMO the Future of Wireless Communications? 20-22 - Linda Dailey Paulson:
News Briefs. 24-26
- Nancy R. Mead:
Who Is Liable for Insecure Systems? 27-34
- Peder Jungck, Simon S. Y. Shim:
Issues in High-Speed Internet Security. 36-42
- Doug Burger, Stephen W. Keckler, Kathryn S. McKinley, Michael Dahlin, Lizy Kurian John, Calvin Lin, Charles R. Moore, James H. Burrill, Robert G. McDonald, William Yode:
Scaling to the End of Silicon with EDGE Architectures. 44-55 - Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H. C. Cheng:
Composing Adaptive Software. 56-64 - Michael Kozuch, Mahadev Satyanarayanan, Thomas C. Bressoud, Casey Helfrich, Shafeeq Sinnamohideen:
Seamless Mobile Computing on Fixed Infrastructure. 65-72
- Rebecca Montanari, Emil Lupu, Cesare Stefanelli:
Policy-Based Dynamic Reconfiguration of Mobile-Code Applications. 73-80
- Brian Fitzgerald:
A Critical Look at Open Source. 92-94
- Philip Koopman:
Embedded System Security. 95-97
- W. Neville Holmes:
In Defense of PowerPoint. 98-99
Volume 37, Number 8, August 2004
- Bob Colwell:
The Art of the Possible. 8-10
- David Geer:
E-Micropayments Sweat the Small Stuff. 19-22
- Sixto Ortiz Jr.:
3D Searching Starts to Take Shape. 24-26