Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/computer/computer46.bht:"
@article{DBLP:journals/computer/AlcarazL13, author = {Cristina Alcaraz and Javier L{\'{o}}pez}, title = {Wide-Area Situational Awareness for Critical Infrastructure Protection}, journal = {Computer}, volume = {46}, number = {4}, pages = {30--37}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.72}, doi = {10.1109/MC.2013.72}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AlcarazL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AlcarazZ13, author = {Cristina Alcaraz and Sherali Zeadally}, title = {Critical Control System Protection in the 21st Century}, journal = {Computer}, volume = {46}, number = {10}, pages = {74--83}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.69}, doi = {10.1109/MC.2013.69}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AlcarazZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AlhomoudADY13, author = {Adeeb M. Alhomoud and Irfan Awan and Jules Ferdinand Pagna Disso and Muhammad Younas}, title = {A Next-Generation Approach to Combating Botnets}, journal = {Computer}, volume = {46}, number = {4}, pages = {62--66}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.67}, doi = {10.1109/MC.2013.67}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AlhomoudADY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Amdahl13, author = {Gene M. Amdahl}, title = {Computer Architecture and Amdahl's Law}, journal = {Computer}, volume = {46}, number = {12}, pages = {38--46}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.418}, doi = {10.1109/MC.2013.418}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Amdahl13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AnthonysamyGR13, author = {Pauline Anthonysamy and Phil Greenwood and Awais Rashid}, title = {Social Networking Privacy: Understanding the Disconnect from Policy to Controls}, journal = {Computer}, volume = {46}, number = {6}, pages = {60--67}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.326}, doi = {10.1109/MC.2012.326}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AnthonysamyGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Anton13, author = {Annie I. Ant{\'{o}}n}, title = {Facing Challenges and Having Fun}, journal = {Computer}, volume = {46}, number = {3}, pages = {65--66}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.427}, doi = {10.1109/MC.2012.427}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Anton13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AtwoodCS13, author = {Greg Atwood and Soo{-}Ik Chae and Simon S. Y. Shim}, title = {Next-Generation Memory [Guest editors' introduction]}, journal = {Computer}, volume = {46}, number = {8}, pages = {21--22}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.285}, doi = {10.1109/MC.2013.285}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AtwoodCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Badam13, author = {Anirudh Badam}, title = {How Persistent Memory Will Change Software Systems}, journal = {Computer}, volume = {46}, number = {8}, pages = {45--51}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.189}, doi = {10.1109/MC.2013.189}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Badam13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BahgaM13, author = {Arshdeep Bahga and Vijay Krishna Madisetti}, title = {Rapid Prototyping of Multitier Cloud-Based Services and Systems}, journal = {Computer}, volume = {46}, number = {11}, pages = {76--83}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.154}, doi = {10.1109/MC.2013.154}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BahgaM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BalasubramaniamK13, author = {Sasitharan Balasubramaniam and Jussi Kangasharju}, title = {Realizing the Internet of Nano Things: Challenges, Solutions, and Applications}, journal = {Computer}, volume = {46}, number = {2}, pages = {62--68}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.389}, doi = {10.1109/MC.2012.389}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BalasubramaniamK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BasarasKT13, author = {Pavlos Basaras and Dimitrios Katsaros and Leandros Tassiulas}, title = {Detecting Influential Spreaders in Complex, Dynamic Networks}, journal = {Computer}, volume = {46}, number = {4}, pages = {24--29}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.75}, doi = {10.1109/MC.2013.75}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/BasarasKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel13, author = {Hal Berghel}, title = {RFIDiocy: It's D{\'{e}}j{\`{a}} Vu All over Again}, journal = {Computer}, volume = {46}, number = {1}, pages = {85--88}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.28}, doi = {10.1109/MC.2013.28}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel13a, author = {Hal Berghel}, title = {The {SCDOR} Hack: Great Security Theater in Five Stages}, journal = {Computer}, volume = {46}, number = {3}, pages = {97--99}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.117}, doi = {10.1109/MC.2013.117}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel13b, author = {Hal Berghel}, title = {Computing Technology and Survivable Journalism}, journal = {Computer}, volume = {46}, number = {5}, pages = {93--97}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.165}, doi = {10.1109/MC.2013.165}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel13c, author = {Hal Berghel}, title = {Through the {PRISM} Darkly}, journal = {Computer}, volume = {46}, number = {7}, pages = {86--90}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.253}, doi = {10.1109/MC.2013.253}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel13d, author = {Hal Berghel}, title = {Toxic Cookies}, journal = {Computer}, volume = {46}, number = {9}, pages = {104--107}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.330}, doi = {10.1109/MC.2013.330}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel13e, author = {Hal Berghel}, title = {The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications}, journal = {Computer}, volume = {46}, number = {12}, pages = {91--95}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.439}, doi = {10.1109/MC.2013.439}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bonhomme-BiaisR13, author = {Alice Bonhomme{-}Biais and Raquel A. Romano}, title = {Pursuing Professional Changes}, journal = {Computer}, volume = {46}, number = {3}, pages = {66--68}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.112}, doi = {10.1109/MC.2013.112}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bonhomme-BiaisR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Bosch13, author = {Jan Bosch}, title = {Achieving Simplicity with the Three-Layer Product Model}, journal = {Computer}, volume = {46}, number = {11}, pages = {34--39}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.295}, doi = {10.1109/MC.2013.295}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Bosch13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Brechner13, author = {Eric Brechner}, title = {Getting Diagonal on the Xbox One Trifecta}, journal = {Computer}, volume = {46}, number = {8}, pages = {77--78}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.276}, doi = {10.1109/MC.2013.276}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Brechner13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Brennan13, author = {Karen Brennan}, title = {Learning Computing through Creating and Connecting}, journal = {Computer}, volume = {46}, number = {9}, pages = {52--59}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.229}, doi = {10.1109/MC.2013.229}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Brennan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Cameron13, author = {Kirk W. Cameron}, title = {Energy Oddities, Part 1: Why the Energy World Is Odd}, journal = {Computer}, volume = {46}, number = {1}, pages = {83--84}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.17}, doi = {10.1109/MC.2013.17}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Cameron13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Cameron13a, author = {Kirk W. Cameron}, title = {Energy Oddities, Part 2: Why Green Computing Is Odd}, journal = {Computer}, volume = {46}, number = {3}, pages = {90--93}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.94}, doi = {10.1109/MC.2013.94}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Cameron13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChienK13, author = {Andrew A. Chien and Vijay Karamcheti}, title = {Moore's Law: The First Ending and a New Beginning}, journal = {Computer}, volume = {46}, number = {12}, pages = {48--53}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.431}, doi = {10.1109/MC.2013.431}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChienK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChildsGSMMSKB13, author = {Hank Childs and Berk Geveci and William J. Schroeder and Jeremy S. Meredith and Kenneth Moreland and Christopher M. Sewell and Torsten W. Kuhlen and E. Wes Bethel}, title = {Research Challenges for Visualization Software}, journal = {Computer}, volume = {46}, number = {5}, pages = {34--42}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.179}, doi = {10.1109/MC.2013.179}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChildsGSMMSKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Cohen13, author = {Beth Cohen}, title = {PaaS: New Opportunities for Cloud Application Development}, journal = {Computer}, volume = {46}, number = {9}, pages = {97--100}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.323}, doi = {10.1109/MC.2013.323}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Cohen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CohoonCS13, author = {James P. Cohoon and Joanne McGrath Cohoon and Mary Lou Soffa}, title = {Educating Diverse Computing Students at the University of Virginia}, journal = {Computer}, volume = {46}, number = {3}, pages = {52--55}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.39}, doi = {10.1109/MC.2013.39}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CohoonCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CookCTK13, author = {Diane J. Cook and Aaron S. Crandall and Brian L. Thomas and Narayanan Chatapuram Krishnan}, title = {{CASAS:} {A} Smart Home in a Box}, journal = {Computer}, volume = {46}, number = {7}, pages = {62--69}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.328}, doi = {10.1109/MC.2012.328}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CookCTK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CostaF13, author = {Rog{\'{e}}rio Lu{\'{\i}}s de Carvalho Costa and Pedro Furtado}, title = {Providing Quality of Experience for Users: The Next {DBMS} Challenge}, journal = {Computer}, volume = {46}, number = {9}, pages = {86--93}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.425}, doi = {10.1109/MC.2012.425}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CostaF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DefrawyF13, author = {Karim El Defrawy and Sky Faber}, title = {Blindfolded Data Search via Secure Pattern Matching}, journal = {Computer}, volume = {46}, number = {12}, pages = {68--75}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.73}, doi = {10.1109/MC.2013.73}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DefrawyF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Devadas13, author = {Srinivas Devadas}, title = {Toward a Coherent Multicore Memory Model}, journal = {Computer}, volume = {46}, number = {10}, pages = {30--31}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.373}, doi = {10.1109/MC.2013.373}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Devadas13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DewriT13, author = {Rinku Dewri and Ramakrishna Thurimella}, title = {Can a Phone's {GPS} "Lie" Intelligently?}, journal = {Computer}, volume = {46}, number = {2}, pages = {91--93}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.44}, doi = {10.1109/MC.2013.44}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DewriT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DuBow13, author = {Wendy M. DuBow}, title = {Diversity in Computing: Why It Matters and How Organizations Can Achieve It}, journal = {Computer}, volume = {46}, number = {3}, pages = {24--29}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.6}, doi = {10.1109/MC.2013.6}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DuBow13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ElmqvistI13, author = {Niklas Elmqvist and Pourang Irani}, title = {Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime}, journal = {Computer}, volume = {46}, number = {4}, pages = {86--89}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.147}, doi = {10.1109/MC.2013.147}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/ElmqvistI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/EneyLMR13, author = {Crystal Eney and Ed Lazowska and H{\'{e}}l{\`{e}}ne Martin and Stuart Reges}, title = {Broadening Participation: The Why and the How}, journal = {Computer}, volume = {46}, number = {3}, pages = {48--51}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.83}, doi = {10.1109/MC.2013.83}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/EneyLMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/EwingGR13, author = {E. Thomas Ewing and Samah Gad and Naren Ramakrishnan}, title = {Gaining Insights into Epidemics by Mining Historical Newspapers}, journal = {Computer}, volume = {46}, number = {6}, pages = {68--72}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.205}, doi = {10.1109/MC.2013.205}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/EwingGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Fekete13, author = {Jean{-}Daniel Fekete}, title = {Visual Analytics Infrastructures: From Data Management to Exploration}, journal = {Computer}, volume = {46}, number = {7}, pages = {22--29}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.120}, doi = {10.1109/MC.2013.120}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Fekete13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FekiKBT13, author = {Mohamed Ali Feki and Fahim Kawsar and Mathieu Boussard and Lieven Trappeniers}, title = {The Internet of Things: The Next Technological Revolution}, journal = {Computer}, volume = {46}, number = {2}, pages = {24--25}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.63}, doi = {10.1109/MC.2013.63}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/FekiKBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Fernandez13, author = {Mary Fernandez}, title = {A Path Between: Mentoring the Next Generation of Computing Professionals}, journal = {Computer}, volume = {46}, number = {3}, pages = {38--41}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.396}, doi = {10.1109/MC.2012.396}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Fernandez13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FerraioloGJ13, author = {David F. Ferraiolo and Serban I. Gavrila and Wayne A. Jansen}, title = {Enabling an Enterprise-Wide, Data-Centric Operating Environment}, journal = {Computer}, volume = {46}, number = {4}, pages = {94--96}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.130}, doi = {10.1109/MC.2013.130}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/FerraioloGJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FiauxSBNRE13, author = {Patrick Fiaux and Maoyuan Sun and Lauren Bradel and Chris North and Naren Ramakrishnan and Alex Endert}, title = {Bixplorer: Visual Analytics with Biclusters}, journal = {Computer}, volume = {46}, number = {8}, pages = {90--94}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.269}, doi = {10.1109/MC.2013.269}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/FiauxSBNRE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FincherK13, author = {Sally Fincher and Daniel Knox}, title = {The Porous Classroom: Professional Practices in the Computing Curriculum}, journal = {Computer}, volume = {46}, number = {9}, pages = {44--51}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.261}, doi = {10.1109/MC.2013.261}, timestamp = {Sat, 31 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/FincherK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FloydB13, author = {Barry D. Floyd and Steve Bo{\ss}elmann}, title = {ITSy-Simplicity Research in Information and Communication Technology}, journal = {Computer}, volume = {46}, number = {11}, pages = {26--32}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.332}, doi = {10.1109/MC.2013.332}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/FloydB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff13, author = {Brian M. Gaff}, title = {Who Invents What}, journal = {Computer}, volume = {46}, number = {5}, pages = {10--12}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.184}, doi = {10.1109/MC.2013.184}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff13a, author = {Brian M. Gaff}, title = {Are You Exhausted by Your First Sale?}, journal = {Computer}, volume = {46}, number = {6}, pages = {9--11}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.194}, doi = {10.1109/MC.2013.194}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gaff13b, author = {Brian M. Gaff}, title = {The Troll under the Bridge}, journal = {Computer}, volume = {46}, number = {7}, pages = {17--19}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.252}, doi = {10.1109/MC.2013.252}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gaff13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffC13, author = {Brian M. Gaff and Peter J. Cuomo}, title = {Design Patents}, journal = {Computer}, volume = {46}, number = {3}, pages = {8--10}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.91}, doi = {10.1109/MC.2013.91}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffD13, author = {Brian M. Gaff and Joanna M. Dombrowski}, title = {Ten Things to Know about Applying for Non-US Patents}, journal = {Computer}, volume = {46}, number = {8}, pages = {9--11}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.289}, doi = {10.1109/MC.2013.289}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffD13a, author = {Brian M. Gaff and Alyssa Harvey Dawson}, title = {Working with Your Legal Department}, journal = {Computer}, volume = {46}, number = {9}, pages = {17--19}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.331}, doi = {10.1109/MC.2013.331}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffD13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffH13, author = {Brian M. Gaff and Greg Hendershott}, title = {So, You Want to Start a Software Company?}, journal = {Computer}, volume = {46}, number = {10}, pages = {17--19}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.371}, doi = {10.1109/MC.2013.371}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffHC13, author = {Brian M. Gaff and Stephen G. Huggard and Gregory W. Carey}, title = {Paying Bribes Abroad Will Get You in Hot Water in the {US}}, journal = {Computer}, volume = {46}, number = {2}, pages = {11--13}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.60}, doi = {10.1109/MC.2013.60}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffJ13, author = {Brian M. Gaff and Judy St. John}, title = {Legal Careers for Engineers}, journal = {Computer}, volume = {46}, number = {12}, pages = {11--13}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.428}, doi = {10.1109/MC.2013.428}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffL13, author = {Brian M. Gaff and Ralph A. Loren}, title = {Patent Monetization}, journal = {Computer}, volume = {46}, number = {4}, pages = {9--11}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.143}, doi = {10.1109/MC.2013.143}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffLD13, author = {Brian M. Gaff and Ralph A. Loren and Gareth Dickson}, title = {Protecting Bioinformatics as Intellectual Property}, journal = {Computer}, volume = {46}, number = {1}, pages = {15--17}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.27}, doi = {10.1109/MC.2013.27}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffLD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffLG13, author = {Brian M. Gaff and David J. Levine and Raymond Gabriel}, title = {Understanding {US} Trade Controls}, journal = {Computer}, volume = {46}, number = {11}, pages = {10--13}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.401}, doi = {10.1109/MC.2013.401}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {46}, number = {1}, pages = {24--26}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.26}, doi = {10.1109/MC.2013.26}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13a, author = {Lee Garber}, title = {Letters}, journal = {Computer}, volume = {46}, number = {2}, pages = {6}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.56}, doi = {10.1109/MC.2013.56}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13b, author = {Lee Garber}, title = {GPUs Go Mobile}, journal = {Computer}, volume = {46}, number = {2}, pages = {16--19}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.52}, doi = {10.1109/MC.2013.52}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13c, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {46}, number = {2}, pages = {20--23}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.59}, doi = {10.1109/MC.2013.59}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13d, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {46}, number = {3}, pages = {18--20}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.108}, doi = {10.1109/MC.2013.108}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13e, author = {Lee Garber}, title = {Analytics Goes on Location with New Approaches}, journal = {Computer}, volume = {46}, number = {4}, pages = {14--17}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.123}, doi = {10.1109/MC.2013.123}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13f, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {46}, number = {4}, pages = {18--20}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.142}, doi = {10.1109/MC.2013.142}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13g, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {46}, number = {5}, pages = {19--21}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.176}, doi = {10.1109/MC.2013.176}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13h, author = {Lee Garber}, title = {Game Accessibility: Enabling Everyone to Play}, journal = {Computer}, volume = {46}, number = {6}, pages = {14--18}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.206}, doi = {10.1109/MC.2013.206}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13i, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {46}, number = {6}, pages = {19--21}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.216}, doi = {10.1109/MC.2013.216}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13j, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {46}, number = {7}, pages = {13--15}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.244}, doi = {10.1109/MC.2013.244}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13k, author = {Lee Garber}, title = {The Lowly {API} Is Ready to Step Front and Center}, journal = {Computer}, volume = {46}, number = {8}, pages = {14--17}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.290}, doi = {10.1109/MC.2013.290}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13l, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {46}, number = {8}, pages = {18--20}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.284}, doi = {10.1109/MC.2013.284}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13m, author = {Lee Garber}, title = {Gestural Technology: Moving Interfaces in a New Direction}, journal = {Computer}, volume = {46}, number = {10}, pages = {22--25}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.352}, doi = {10.1109/MC.2013.352}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13n, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {46}, number = {11}, pages = {20--22}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.395}, doi = {10.1109/MC.2013.395}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber13o, author = {Lee Garber}, title = {Robot {OS:} {A} New Day for Robot Design}, journal = {Computer}, volume = {46}, number = {12}, pages = {16--20}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.434}, doi = {10.1109/MC.2013.434}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber13o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GenuchtenH13, author = {Michiel van Genuchten and Les Hatton}, title = {Quantifying Software's Impact}, journal = {Computer}, volume = {46}, number = {10}, pages = {66--72}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.7}, doi = {10.1109/MC.2013.7}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GenuchtenH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Getov13, author = {Vladimir Getov}, title = {Computing Laws: Origins, Standing, and Impact [Guest editors' introduction]}, journal = {Computer}, volume = {46}, number = {12}, pages = {24--25}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.421}, doi = {10.1109/MC.2013.421}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Getov13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GorgKLS13, author = {Carsten G{\"{o}}rg and Youn ah Kang and Zhicheng Liu and John T. Stasko}, title = {Visual Analytics Support for Intelligence Analysis}, journal = {Computer}, volume = {46}, number = {7}, pages = {30--38}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.76}, doi = {10.1109/MC.2013.76}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/GorgKLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13, author = {David Alan Grier}, title = {The Unseen and the Seen}, journal = {Computer}, volume = {46}, number = {1}, pages = {6--7}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.33}, doi = {10.1109/MC.2013.33}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13a, author = {David Alan Grier}, title = {The Here and Now}, journal = {Computer}, volume = {46}, number = {1}, pages = {108}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.32}, doi = {10.1109/MC.2013.32}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13b, author = {David Alan Grier}, title = {The Ethical Dimension}, journal = {Computer}, volume = {46}, number = {2}, pages = {112}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.62}, doi = {10.1109/MC.2013.62}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13c, author = {David Alan Grier}, title = {Attention to Context}, journal = {Computer}, volume = {46}, number = {3}, pages = {124}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.81}, doi = {10.1109/MC.2013.81}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13d, author = {David Alan Grier}, title = {Equal before the Bar}, journal = {Computer}, volume = {46}, number = {4}, pages = {116}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.131}, doi = {10.1109/MC.2013.131}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13e, author = {David Alan Grier}, title = {Working in Conference}, journal = {Computer}, volume = {46}, number = {5}, pages = {124}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.185}, doi = {10.1109/MC.2013.185}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13f, author = {David Alan Grier}, title = {The Comfort Zone}, journal = {Computer}, volume = {46}, number = {6}, pages = {104}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.219}, doi = {10.1109/MC.2013.219}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13g, author = {David Alan Grier}, title = {Short-Term Loan}, journal = {Computer}, volume = {46}, number = {7}, pages = {112}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.246}, doi = {10.1109/MC.2013.246}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13h, author = {David Alan Grier}, title = {The Tenor of Our Times}, journal = {Computer}, volume = {46}, number = {8}, pages = {128}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.291}, doi = {10.1109/MC.2013.291}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13i, author = {David Alan Grier}, title = {For the Common Good}, journal = {Computer}, volume = {46}, number = {9}, pages = {124}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.307}, doi = {10.1109/MC.2013.307}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13j, author = {David Alan Grier}, title = {Not Part of the Plan}, journal = {Computer}, volume = {46}, number = {10}, pages = {136}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.369}, doi = {10.1109/MC.2013.369}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13k, author = {David Alan Grier}, title = {The Trappings of Power}, journal = {Computer}, volume = {46}, number = {11}, pages = {120}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.399}, doi = {10.1109/MC.2013.399}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13l, author = {David Alan Grier}, title = {The Cycles of Continuous Improvement}, journal = {Computer}, volume = {46}, number = {12}, pages = {6--8}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.437}, doi = {10.1109/MC.2013.437}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Grier13m, author = {David Alan Grier}, title = {The Way We Organize Ourselves}, journal = {Computer}, volume = {46}, number = {12}, pages = {124}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.440}, doi = {10.1109/MC.2013.440}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Grier13m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GuzdialS13, author = {Mark Guzdial and Betsy James DiSalvo}, title = {Computing Education: Beyond the Classroom}, journal = {Computer}, volume = {46}, number = {9}, pages = {30--31}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.306}, doi = {10.1109/MC.2013.306}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/GuzdialS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HallR13, author = {Jon G. Hall and Lucia Rapanotti}, title = {Beauty in Software Engineering}, journal = {Computer}, volume = {46}, number = {2}, pages = {85--87}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.42}, doi = {10.1109/MC.2013.42}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HallR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HanXO13, author = {Hao Han and Yinxing Xue and Keizo Oyama}, title = {Mashup Technology: Beyond Open Programming Interfaces}, journal = {Computer}, volume = {46}, number = {12}, pages = {96--99}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.429}, doi = {10.1109/MC.2013.429}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HanXO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HangZS13, author = {Chung{-}Wei Hang and Zhe Zhang and Munindar P. Singh}, title = {Shin: Generalized Trust Propagation with Limited Evidence}, journal = {Computer}, volume = {46}, number = {3}, pages = {78--85}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.116}, doi = {10.1109/MC.2012.116}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HangZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HartmannW13, author = {Bj{\"{o}}rn Hartmann and Paul K. Wright}, title = {Designing Bespoke Interactive Devices}, journal = {Computer}, volume = {46}, number = {8}, pages = {85--89}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.274}, doi = {10.1109/MC.2013.274}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HartmannW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hemerly13, author = {Jess Hemerly}, title = {Public Policy Considerations for Data-Driven Innovation}, journal = {Computer}, volume = {46}, number = {6}, pages = {25--31}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.186}, doi = {10.1109/MC.2013.186}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Hemerly13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HenzeSSPM13, author = {Niels Henze and Alireza Sahami Shirazi and Albrecht Schmidt and Martin Pielot and Florian Michahelles}, title = {Empirical Research through Ubiquitous Data Collection}, journal = {Computer}, volume = {46}, number = {6}, pages = {74--76}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.202}, doi = {10.1109/MC.2013.202}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HenzeSSPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HerzlingerSG13, author = {Regina Herzlinger and Margo I. Seltzer and Mark Gaynor}, title = {Applying {KISS} to Healthcare Information Technology}, journal = {Computer}, volume = {46}, number = {11}, pages = {72--74}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.298}, doi = {10.1109/MC.2013.298}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HerzlingerSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hodges13, author = {Steve Hodges}, title = {Batteries Not Included: Powering the Ubiquitous Computing Dream}, journal = {Computer}, volume = {46}, number = {4}, pages = {90--93}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.125}, doi = {10.1109/MC.2013.125}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Hodges13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HodgesTVSBF13, author = {Steve Hodges and Stuart Taylor and Nicolas Villar and James Scott and Dominik Bial and Patrick Tobias Fischer}, title = {Prototyping Connected Devices for the Internet of Things}, journal = {Computer}, volume = {46}, number = {2}, pages = {26--34}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.394}, doi = {10.1109/MC.2012.394}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/HodgesTVSBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hole13, author = {Kjell J{\o}rgen Hole}, title = {Management of Hidden Risks}, journal = {Computer}, volume = {46}, number = {1}, pages = {65--70}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.397}, doi = {10.1109/MC.2012.397}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Hole13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes13, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {46}, number = {3}, pages = {12--13}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.78}, doi = {10.1109/MC.2013.78}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes13a, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {46}, number = {4}, pages = {12--13}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.122}, doi = {10.1109/MC.2013.122}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes13b, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {46}, number = {5}, pages = {13--14}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.158}, doi = {10.1109/MC.2013.158}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes13c, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {46}, number = {6}, pages = {12--13}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.191}, doi = {10.1109/MC.2013.191}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes13d, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {46}, number = {7}, pages = {8--9}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.230}, doi = {10.1109/MC.2013.230}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes13e, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {46}, number = {8}, pages = {12--13}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.266}, doi = {10.1109/MC.2013.266}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes13f, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {46}, number = {9}, pages = {20--21}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.300}, doi = {10.1109/MC.2013.300}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes13g, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {46}, number = {10}, pages = {20--21}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.338}, doi = {10.1109/MC.2013.338}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes13h, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {46}, number = {11}, pages = {14--15}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.376}, doi = {10.1109/MC.2013.376}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holmes13i, author = {W. Neville Holmes}, title = {32 {\&} 16 Years Ago}, journal = {Computer}, volume = {46}, number = {12}, pages = {14--15}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.441}, doi = {10.1109/MC.2013.441}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holmes13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Holzmann13, author = {Gerard J. Holzmann}, title = {A Three-Step Program for Recovering Hackers}, journal = {Computer}, volume = {46}, number = {6}, pages = {86--88}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.192}, doi = {10.1109/MC.2013.192}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Holzmann13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HovenGOBL13, author = {Elise van den Hoven and Evelien van de Garde{-}Perik and Serge Offermans and Koen van Boerdonk and Kars{-}Michiel H. Lenssen}, title = {Moving Tangible Interaction Systems to the Next Level}, journal = {Computer}, volume = {46}, number = {8}, pages = {70--76}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.360}, doi = {10.1109/MC.2012.360}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HovenGOBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuaLRCAMS13, author = {Ting Hua and Chang{-}Tien Lu and Naren Ramakrishnan and Feng Chen and Jaime Arredondo and David Mares and Kristen Maria Summers}, title = {Analyzing Civil Unrest through Social Media}, journal = {Computer}, volume = {46}, number = {12}, pages = {80--84}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.442}, doi = {10.1109/MC.2013.442}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuaLRCAMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuffmanJ13, author = {Amber Huffman and Dale Juenemann}, title = {The Nonvolatile Memory Transformation of Client Storage}, journal = {Computer}, volume = {46}, number = {8}, pages = {38--44}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.223}, doi = {10.1109/MC.2013.223}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuffmanJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Johnson13, author = {Brian David Johnson}, title = {When Science Fiction and Science Fact Meet}, journal = {Computer}, volume = {46}, number = {1}, pages = {80--82}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.35}, doi = {10.1109/MC.2013.35}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Johnson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Johnson13a, author = {Brian David Johnson}, title = {Jimmy: The Robot That Changed It All}, journal = {Computer}, volume = {46}, number = {3}, pages = {104--107}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.105}, doi = {10.1109/MC.2013.105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Johnson13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Johnson13b, author = {Brian David Johnson}, title = {Secret Science Fiction}, journal = {Computer}, volume = {46}, number = {5}, pages = {105--107}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.180}, doi = {10.1109/MC.2013.180}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Johnson13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Johnson13c, author = {Brian David Johnson}, title = {From {NASA}}, journal = {Computer}, volume = {46}, number = {7}, pages = {78--81}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.236}, doi = {10.1109/MC.2013.236}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Johnson13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Johnson13d, author = {Brian David Johnson}, title = {That Copernican Moment}, journal = {Computer}, volume = {46}, number = {9}, pages = {101--103}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.328}, doi = {10.1109/MC.2013.328}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Johnson13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Johnson13e, author = {Brian David Johnson}, title = {Jimmy Takes Manhattan}, journal = {Computer}, volume = {46}, number = {11}, pages = {95--98}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.392}, doi = {10.1109/MC.2013.392}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Johnson13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JohnsonPC13, author = {Keri Johnson and Jebediah Pavleas and Jack Chang}, title = {Kinecting to Mathematics through Embodied Interactions}, journal = {Computer}, volume = {46}, number = {10}, pages = {101--104}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.363}, doi = {10.1109/MC.2013.363}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/JohnsonPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KeefeI13, author = {Daniel F. Keefe and Tobias Isenberg}, title = {Reimagining the Scientific Visualization Interaction Paradigm}, journal = {Computer}, volume = {46}, number = {5}, pages = {51--57}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.178}, doi = {10.1109/MC.2013.178}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KeefeI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KeimKRS13, author = {Daniel A. Keim and Milos Krstajic and Christian Rohrdantz and Tobias Schreck}, title = {Real-Time Visual Analytics for Text Streams}, journal = {Computer}, volume = {46}, number = {7}, pages = {47--55}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.152}, doi = {10.1109/MC.2013.152}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KeimKRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KhanM13, author = {Khaled M. Khan and Qutaibah M. Malluhi}, title = {Trust in Cloud Services: Providing More Controls to Clients}, journal = {Computer}, volume = {46}, number = {7}, pages = {94--96}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.254}, doi = {10.1109/MC.2013.254}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KhanM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Klawe13, author = {Maria M. Klawe}, title = {Increasing Female Participation in Computing: The Harvey Mudd College Story}, journal = {Computer}, volume = {46}, number = {3}, pages = {56--58}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.4}, doi = {10.1109/MC.2013.4}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Klawe13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KlontzJ13, author = {Joshua C. Klontz and Anil K. Jain}, title = {A Case Study of Automated Face Recognition: The Boston Marathon Bombings Suspects}, journal = {Computer}, volume = {46}, number = {11}, pages = {91--94}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.377}, doi = {10.1109/MC.2013.377}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KlontzJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KnobelsdorfV13, author = {Maria Knobelsdorf and Jan Vahrenhold}, title = {Addressing the Full Range of Students: Challenges in {K-12} Computer Science Education}, journal = {Computer}, volume = {46}, number = {9}, pages = {32--37}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.263}, doi = {10.1109/MC.2013.263}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KnobelsdorfV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KortuemBSRP13, author = {Gerd Kortuem and Arosha K. Bandara and Neil Smith and Mike Richards and Marian Petre}, title = {Educating the Internet-of-Things Generation}, journal = {Computer}, volume = {46}, number = {2}, pages = {53--61}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.390}, doi = {10.1109/MC.2012.390}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KortuemBSRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KosaraM13, author = {Robert Kosara and Jock D. Mackinlay}, title = {Storytelling: The Next Step for Visualization}, journal = {Computer}, volume = {46}, number = {5}, pages = {44--50}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.36}, doi = {10.1109/MC.2013.36}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KosaraM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KrishnaCPKSCP13, author = {Tushar Krishna and Chia{-}Hsin Owen Chen and Sunghyun Park and Woo{-}Cheol Kwon and Suvinay Subramanian and Anantha P. Chandrakasan and Li{-}Shiuan Peh}, title = {Single-Cycle Multihop Asynchronous Repeated Traversal: {A} {SMART} Future for Reconfigurable On-Chip Networks}, journal = {Computer}, volume = {46}, number = {10}, pages = {48--55}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.260}, doi = {10.1109/MC.2013.260}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KrishnaCPKSCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KshetriM13, author = {Nir Kshetri and San Murugesan}, title = {Cloud Computing and {EU} Data Privacy Regulations}, journal = {Computer}, volume = {46}, number = {3}, pages = {86--89}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.86}, doi = {10.1109/MC.2013.86}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KshetriM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KshetriM13a, author = {Nir Kshetri and San Murugesan}, title = {{EU} and {US} Cybersecurity Strategies and Their Impact on Businesses and Consumers}, journal = {Computer}, volume = {46}, number = {10}, pages = {84--88}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.350}, doi = {10.1109/MC.2013.350}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KshetriM13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kumar13, author = {Deepak Kumar}, title = {Serving Women with a Purposeful Vision}, journal = {Computer}, volume = {46}, number = {3}, pages = {60--61}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.114}, doi = {10.1109/MC.2013.114}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Kumar13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KumarNPS13, author = {Santosh Kumar and Wendy Nilsen and Misha Pavel and Mani B. Srivastava}, title = {Mobile Health: Revolutionizing Healthcare Through Transdisciplinary Research}, journal = {Computer}, volume = {46}, number = {1}, pages = {28--35}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.392}, doi = {10.1109/MC.2012.392}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/KumarNPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KunzeIKUO13, author = {Kai Kunze and Masakazu Iwamura and Koichi Kise and Seiichi Uchida and Shinichiro Omachi}, title = {Activity Recognition for the Mind: Toward a Cognitive "Quantified Self"}, journal = {Computer}, volume = {46}, number = {10}, pages = {105--108}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.339}, doi = {10.1109/MC.2013.339}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KunzeIKUO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LamprechtNS13, author = {Anna{-}Lena Lamprecht and Stefan Naujokat and Ina Schaefer}, title = {Variability Management beyond Feature Models}, journal = {Computer}, volume = {46}, number = {11}, pages = {48--54}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.299}, doi = {10.1109/MC.2013.299}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/LamprechtNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Leavitt13, author = {Neal Leavitt}, title = {Bringing Big Analytics to the Masses}, journal = {Computer}, volume = {46}, number = {1}, pages = {20--23}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.9}, doi = {10.1109/MC.2013.9}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Leavitt13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Leavitt13a, author = {Neal Leavitt}, title = {A Technology that Comes Highly Recommended}, journal = {Computer}, volume = {46}, number = {3}, pages = {14--17}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.80}, doi = {10.1109/MC.2013.80}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Leavitt13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Leavitt13b, author = {Neal Leavitt}, title = {Hybrid Clouds Move to the Forefront}, journal = {Computer}, volume = {46}, number = {5}, pages = {15--18}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.168}, doi = {10.1109/MC.2013.168}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Leavitt13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Leavitt13c, author = {Neal Leavitt}, title = {Storage Challenge: Where Will All That Big Data Go?}, journal = {Computer}, volume = {46}, number = {9}, pages = {22--25}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.326}, doi = {10.1109/MC.2013.326}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Leavitt13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Leavitt13d, author = {Neal Leavitt}, title = {Today's Mobile Security Requires a New Approach}, journal = {Computer}, volume = {46}, number = {11}, pages = {16--19}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.400}, doi = {10.1109/MC.2013.400}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Leavitt13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LeePB13, author = {Sang Wan Lee and Oliver Prenzel and Zeungnam Bien}, title = {Applying Human Learning Principles to User-Centered IoT Systems}, journal = {Computer}, volume = {46}, number = {2}, pages = {46--52}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.426}, doi = {10.1109/MC.2012.426}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LeePB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LiLH13, author = {Qing Li and Chris Larsen and Tim van der Horst}, title = {IPv6: {A} Catalyst and Evasion Tool for Botnets and Malware Delivery Networks}, journal = {Computer}, volume = {46}, number = {5}, pages = {76--82}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.296}, doi = {10.1109/MC.2012.296}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/LiLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LiQ13, author = {Yan Li and Khandker Quader}, title = {{NAND} Flash Memory: Challenges and Opportunities}, journal = {Computer}, volume = {46}, number = {8}, pages = {23--29}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.190}, doi = {10.1109/MC.2013.190}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LiQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LiuSC13, author = {Jane W.{-}S. Liu and Chi{-}Sheng Shih and Edward T.{-}H. Chu}, title = {Cyberphysical Elements of Disaster-Prepared Smart Environments}, journal = {Computer}, volume = {46}, number = {2}, pages = {69--75}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.149}, doi = {10.1109/MC.2012.149}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LiuSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LiuTC13, author = {Kaiping Liu and Hee Beng Kuan Tan and Xu Chen}, title = {Binary Code Analysis}, journal = {Computer}, volume = {46}, number = {8}, pages = {60--68}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.268}, doi = {10.1109/MC.2013.268}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LiuTC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Lutz13, author = {Michael Lutz}, title = {Undergraduate Software Engineering at {RIT:} Past, Present, and Future}, journal = {Computer}, volume = {46}, number = {2}, pages = {88--90}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.65}, doi = {10.1109/MC.2013.65}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Lutz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MaDDZ13, author = {Xiaohan Ma and Zhigang Deng and Mian Dong and Lin Zhong}, title = {Characterizing the Performance and Power Consumption of 3D Mobile Games}, journal = {Computer}, volume = {46}, number = {4}, pages = {76--82}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.190}, doi = {10.1109/MC.2012.190}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/MaDDZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MaM13, author = {Kwan{-}Liu Ma and Chris Muelder}, title = {Large-Scale Graph Visualization and Analytics}, journal = {Computer}, volume = {46}, number = {7}, pages = {39--46}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.242}, doi = {10.1109/MC.2013.242}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MaM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MajumderS13, author = {Aditi Majumder and Behzad Sajadi}, title = {Large Area Displays: The Changing Face of Visualization}, journal = {Computer}, volume = {46}, number = {5}, pages = {26--33}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.429}, doi = {10.1109/MC.2012.429}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MajumderS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Makimoto13, author = {Tsugio Makimoto}, title = {Implications of Makimoto's Wave}, journal = {Computer}, volume = {46}, number = {12}, pages = {32--37}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.294}, doi = {10.1109/MC.2013.294}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Makimoto13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MargariaH13, author = {Tiziana Margaria and Mike Hinchey}, title = {Simplicity in {IT:} The Power of Less}, journal = {Computer}, volume = {46}, number = {11}, pages = {23--25}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.397}, doi = {10.1109/MC.2013.397}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MargariaH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/McGregor13, author = {Carolyn McGregor}, title = {Big Data in Neonatal Intensive Care}, journal = {Computer}, volume = {46}, number = {6}, pages = {54--59}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.157}, doi = {10.1109/MC.2013.157}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/McGregor13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Metcalfe13, author = {Bob Metcalfe}, title = {Metcalfe's Law after 40 Years of Ethernet}, journal = {Computer}, volume = {46}, number = {12}, pages = {26--31}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.374}, doi = {10.1109/MC.2013.374}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Metcalfe13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MetriSIA13, author = {Grace Metri and Manuj Sabharwal and Sundar Iyer and Abhishek Agrawal}, title = {Hardware/Software Codesign to Optimize SoC Device Battery Life}, journal = {Computer}, volume = {46}, number = {10}, pages = {89--92}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.353}, doi = {10.1109/MC.2013.353}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MetriSIA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Michael13, author = {James Bret Michael}, title = {Empowering Users through Secure On-Demand Data Provisioning}, journal = {Computer}, volume = {46}, number = {6}, pages = {84--85}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.203}, doi = {10.1109/MC.2013.203}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Michael13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MichaelLPBV13, author = {James Bret Michael and Phillip A. Laplante and Jeffery E. Payne and Paul E. Black and Jeffrey M. Voas}, title = {Does Security Trump Reliability?}, journal = {Computer}, volume = {46}, number = {11}, pages = {84--86}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.383}, doi = {10.1109/MC.2013.383}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MichaelLPBV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MichaelM13, author = {Katina Michael and Keith W. Miller}, title = {Big Data: New Opportunities and New Challenges [Guest editors' introduction]}, journal = {Computer}, volume = {46}, number = {6}, pages = {22--24}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.196}, doi = {10.1109/MC.2013.196}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/MichaelM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MorenoSCS13, author = {Ana Mar{\'{\i}}a Moreno and Ahmed Seffah and Rafael Capilla and Maria Isabel {S\'{a}nchez Segura}}, title = {{HCI} Practices for Building Usable Software}, journal = {Computer}, volume = {46}, number = {4}, pages = {100--102}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.133}, doi = {10.1109/MC.2013.133}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MorenoSCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MorganC13, author = {Lorraine Morgan and Kieran Conboy}, title = {Key Factors Impacting Cloud Computing Adoption}, journal = {Computer}, volume = {46}, number = {10}, pages = {97--99}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.362}, doi = {10.1109/MC.2013.362}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MorganC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Murugesan13, author = {San Murugesan}, title = {Cloud Computing: The New Normal?}, journal = {Computer}, volume = {46}, number = {1}, pages = {77--79}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.12}, doi = {10.1109/MC.2013.12}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Murugesan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NeubauerS13, author = {Johannes Neubauer and Bernhard Steffen}, title = {Plug-and-Play Higher-Order Process Integration}, journal = {Computer}, volume = {46}, number = {11}, pages = {56--62}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.296}, doi = {10.1109/MC.2013.296}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NeubauerS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NingLY13, author = {Huansheng Ning and Hong Liu and Laurence T. Yang}, title = {Cyberentity Security in the Internet of Things}, journal = {Computer}, volume = {46}, number = {4}, pages = {46--53}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.74}, doi = {10.1109/MC.2013.74}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NingLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NiuPSTL13, author = {Jianwei Niu and Jing Peng and Lei Shu and Chao Tong and Wanjiun Liao}, title = {An Empirical Study of a Chinese Online Social Network-Renren}, journal = {Computer}, volume = {46}, number = {9}, pages = {78--84}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.1}, doi = {10.1109/MC.2013.1}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NiuPSTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OGorman13, author = {Lawrence O'Gorman}, title = {Putting a Kinder Face on Public Cameras}, journal = {Computer}, volume = {46}, number = {8}, pages = {79--81}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.286}, doi = {10.1109/MC.2013.286}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/OGorman13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Ortiz13, author = {Sixto Ortiz}, title = {Software-Defined Networking: On the Verge of a Breakthrough?}, journal = {Computer}, volume = {46}, number = {7}, pages = {10--12}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.249}, doi = {10.1109/MC.2013.249}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Ortiz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Pace13, author = {Jason Pace}, title = {The Ways We Play, Part 1: From PCs to Consoles to Mobile Phones}, journal = {Computer}, volume = {46}, number = {2}, pages = {94--96}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.64}, doi = {10.1109/MC.2013.64}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Pace13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Pace13a, author = {Jason Pace}, title = {The Ways We Play, Part 2: Mobile Game Changers}, journal = {Computer}, volume = {46}, number = {4}, pages = {97--99}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.146}, doi = {10.1109/MC.2013.146}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Pace13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Paredes-OlivaBS13, author = {Ignasi Paredes{-}Oliva and Pere Barlet{-}Ros and Josep Sol{\'{e}}{-}Pareta}, title = {Scan Detection under Sampling: {A} New Perspective}, journal = {Computer}, volume = {46}, number = {4}, pages = {38--44}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.70}, doi = {10.1109/MC.2013.70}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Paredes-OlivaBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PeltV13, author = {Roy van Pelt and Anna Vilanova}, title = {Understanding Blood-Flow Dynamics: New Challenges for Visualization}, journal = {Computer}, volume = {46}, number = {12}, pages = {60--67}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.121}, doi = {10.1109/MC.2013.121}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PeltV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Peppler13, author = {Kylie A. Peppler}, title = {STEAM-Powered Computing Education: Using E-Textiles to Integrate the Arts and {STEM}}, journal = {Computer}, volume = {46}, number = {9}, pages = {38--43}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.257}, doi = {10.1109/MC.2013.257}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Peppler13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PittBNRRSLFS13, author = {Jeremy Pitt and Aikaterini Bourazeri and Andrzej Nowak and Magdalena Roszczynska{-}Kurasinska and Agnieszka Rychwalska and Inmaculada Rodr{\'{\i}}guez Santiago and Maite L{\'{o}}pez{-}S{\'{a}}nchez and Monica Florea and Mihai Sanduleac}, title = {Transforming Big Data into Collective Awareness}, journal = {Computer}, volume = {46}, number = {6}, pages = {40--45}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.153}, doi = {10.1109/MC.2013.153}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PittBNRRSLFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PoursaberiYGSW13, author = {Ahmad Poursaberi and Svetlana N. Yanushkevich and Marina L. Gavrilova and Vlad P. Shmerko and Patrick S. P. Wang}, title = {Situational Awareness through Biometrics}, journal = {Computer}, volume = {46}, number = {5}, pages = {102--104}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.181}, doi = {10.1109/MC.2013.181}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PoursaberiYGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PrasadS13, author = {Chandra Prasad and Wolfram Schulte}, title = {Taking Control of Your Engineering Tools}, journal = {Computer}, volume = {46}, number = {11}, pages = {63--66}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.337}, doi = {10.1109/MC.2013.337}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PrasadS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PreyW13, author = {Jane Chu Prey and Alfred C. Weaver}, title = {Fostering Gender Diversity in Computing}, journal = {Computer}, volume = {46}, number = {3}, pages = {22--23}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.97}, doi = {10.1109/MC.2013.97}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PreyW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RahwanDRNMVJC13, author = {Iyad Rahwan and Sohan Dsouza and Alex Rutherford and Victor Naroditskiy and James McInerney and Matteo Venanzi and Nicholas R. Jennings and Manuel Cebri{\'{a}}n}, title = {Global Manhunt Pushes the Limits of Social Mobilization}, journal = {Computer}, volume = {46}, number = {4}, pages = {68--75}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.295}, doi = {10.1109/MC.2012.295}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RahwanDRNMVJC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RashidBRMGW13, author = {Awais Rashid and Alistair Baron and Paul Rayson and Corinne May{-}Chahal and Phil Greenwood and James Walkerdine}, title = {Who Am I? Analyzing Digital Personas in Cybercrime Investigations}, journal = {Computer}, volume = {46}, number = {4}, pages = {54--61}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.68}, doi = {10.1109/MC.2013.68}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RashidBRMGW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Repenning13, author = {Alexander Repenning}, title = {Making Programming Accessible and Exciting}, journal = {Computer}, volume = {46}, number = {6}, pages = {78--81}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.214}, doi = {10.1109/MC.2013.214}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Repenning13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Resnick13, author = {Hy Resnick}, title = {Busted: {A} Digital Group Game to Help At-Risk Youth Stay out of Jail}, journal = {Computer}, volume = {46}, number = {12}, pages = {88--90}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.414}, doi = {10.1109/MC.2013.414}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Resnick13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RhyneC13, author = {Theresa{-}Marie Rhyne and Min Chen}, title = {Cutting-Edge Research in Visualization}, journal = {Computer}, volume = {46}, number = {5}, pages = {22--24}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.166}, doi = {10.1109/MC.2013.166}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RhyneC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Ricanek13, author = {Karl Ricanek}, title = {The Next Biometric Challenge: Medical Alterations}, journal = {Computer}, volume = {46}, number = {9}, pages = {94--96}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.329}, doi = {10.1109/MC.2013.329}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Ricanek13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RicanekM13, author = {Karl Ricanek Jr. and Gayathri Mahalingam}, title = {Biometrically, How Identical Are Identical Twins?}, journal = {Computer}, volume = {46}, number = {3}, pages = {94--96}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.82}, doi = {10.1109/MC.2013.82}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RicanekM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Riedl13, author = {John Riedl}, title = {Crowdfunding Technology Innovation}, journal = {Computer}, volume = {46}, number = {3}, pages = {100--103}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.89}, doi = {10.1109/MC.2013.89}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Riedl13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RiedlR13, author = {John Riedl and Eric Riedl}, title = {Crowdsourcing Medical Research}, journal = {Computer}, volume = {46}, number = {1}, pages = {89--92}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.15}, doi = {10.1109/MC.2013.15}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RiedlR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RikakisKL13, author = {Thanassis Rikakis and Aisling Kelliher and Nicole Lehrer}, title = {Experiential Media and Digital Culture}, journal = {Computer}, volume = {46}, number = {1}, pages = {46--54}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.391}, doi = {10.1109/MC.2012.391}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RikakisKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RoggenTLFMC13, author = {Daniel Roggen and Gerhard Tr{\"{o}}ster and Paul Lukowicz and Alois Ferscha and Jos{\'{e}} del R. Mill{\'{a}}n and Ricardo Chavarriaga}, title = {Opportunistic Human Activity and Context Recognition}, journal = {Computer}, volume = {46}, number = {2}, pages = {36--45}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.393}, doi = {10.1109/MC.2012.393}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RoggenTLFMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RyanFM13, author = {Patrick S. Ryan and Sarah Falvey and Ronak Merchant}, title = {When the Cloud Goes Local: The Global Problem with Data Localization}, journal = {Computer}, volume = {46}, number = {12}, pages = {54--59}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.402}, doi = {10.1109/MC.2013.402}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RyanFM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Sanders13, author = {Ruth H. Sanders}, title = {Why Learn a Foreign Language?}, journal = {Computer}, volume = {46}, number = {4}, pages = {83--85}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.148}, doi = {10.1109/MC.2013.148}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Sanders13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Schaffer13, author = {Kim Schaffer}, title = {Passwords, Privacy, and Policies: Can They Do Business Together?}, journal = {Computer}, volume = {46}, number = {12}, pages = {76--79}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.433}, doi = {10.1109/MC.2013.433}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Schaffer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SchirnerECP13, author = {Gunar Schirner and Deniz Erdogmus and Kaushik R. Chowdhury and Taskin Padir}, title = {The Future of Human-in-the-Loop Cyber-Physical Systems}, journal = {Computer}, volume = {46}, number = {1}, pages = {36--45}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.31}, doi = {10.1109/MC.2013.31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SchirnerECP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Schnabel13, author = {Robert B. Schnabel}, title = {Personal Reflections on Gender Diversity in Computing}, journal = {Computer}, volume = {46}, number = {3}, pages = {62--63}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.5}, doi = {10.1109/MC.2013.5}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Schnabel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SchreckK13, author = {Tobias Schreck and Daniel A. Keim}, title = {Visual Analysis of Social Media Data}, journal = {Computer}, volume = {46}, number = {5}, pages = {68--75}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.430}, doi = {10.1109/MC.2012.430}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SchreckK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SchuchhardtDHMC13, author = {Matthew Schuchhardt and Abhishek Das and Nikos Hardavellas and Gokhan Memik and Alok N. Choudhary}, title = {The Impact of Dynamic Directories on Multicore Interconnects}, journal = {Computer}, volume = {46}, number = {10}, pages = {32--39}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.334}, doi = {10.1109/MC.2013.334}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SchuchhardtDHMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SeceleanuC13, author = {Cristina Cerschi Seceleanu and Ivica Crnkovic}, title = {Component Models for Reasoning}, journal = {Computer}, volume = {46}, number = {11}, pages = {40--47}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.335}, doi = {10.1109/MC.2013.335}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/SeceleanuC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SeceleanuS13, author = {Tiberiu Seceleanu and Gaetana Sapienza}, title = {A Tool Integration Framework for Sustainable Embedded Systems Development}, journal = {Computer}, volume = {46}, number = {11}, pages = {68--71}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.297}, doi = {10.1109/MC.2013.297}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SeceleanuS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13, author = {Charles R. Severance}, title = {Van Jacobson: Content-Centric Networking}, journal = {Computer}, volume = {46}, number = {1}, pages = {11--13}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.34}, doi = {10.1109/MC.2013.34}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13a, author = {Charles R. Severance}, title = {Mitchell Baker: The Mozilla Foundation}, journal = {Computer}, volume = {46}, number = {2}, pages = {7--9}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.58}, doi = {10.1109/MC.2013.58}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13b, author = {Charles R. Severance}, title = {Pooja Sankar: Building the Piazza Collaboration System}, journal = {Computer}, volume = {46}, number = {3}, pages = {6--7}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.110}, doi = {10.1109/MC.2013.110}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13c, author = {Charles R. Severance}, title = {Larry Smarr: Building Mosaic}, journal = {Computer}, volume = {46}, number = {4}, pages = {6--8}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.140}, doi = {10.1109/MC.2013.140}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13d, author = {Charles R. Severance}, title = {Bob Metcalfe: Ethernet at Forty}, journal = {Computer}, volume = {46}, number = {5}, pages = {6--9}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.159}, doi = {10.1109/MC.2013.159}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13e, author = {Charles R. Severance}, title = {Gordon Bell: Building Blocks of Computing}, journal = {Computer}, volume = {46}, number = {6}, pages = {6--7}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.207}, doi = {10.1109/MC.2013.207}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13f, author = {Charles R. Severance}, title = {Katie Hafner: The Origins of the Internet}, journal = {Computer}, volume = {46}, number = {7}, pages = {6--7}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.241}, doi = {10.1109/MC.2013.241}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13g, author = {Charles R. Severance}, title = {Len Kleinrock: The Theory of Packets [Computing Conversations]}, journal = {Computer}, volume = {46}, number = {8}, pages = {6--8}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.282}, doi = {10.1109/MC.2013.282}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13h, author = {Charles R. Severance}, title = {John C. Hollar: History of Computing}, journal = {Computer}, volume = {46}, number = {9}, pages = {13--14}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.318}, doi = {10.1109/MC.2013.318}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13i, author = {Charles R. Severance}, title = {Eben Upton: Raspberry Pi}, journal = {Computer}, volume = {46}, number = {10}, pages = {14--16}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.349}, doi = {10.1109/MC.2013.349}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13j, author = {Charles R. Severance}, title = {MOOCs: An Insider's View}, journal = {Computer}, volume = {46}, number = {10}, pages = {93--96}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.366}, doi = {10.1109/MC.2013.366}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13k, author = {Charles R. Severance}, title = {Ian Horrocks: Standardizing {OWL}}, journal = {Computer}, volume = {46}, number = {11}, pages = {8--9}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.386}, doi = {10.1109/MC.2013.386}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance13l, author = {Charles R. Severance}, title = {Andrew Tanenbaum: Writing the Book on Networks}, journal = {Computer}, volume = {46}, number = {12}, pages = {9--10}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.443}, doi = {10.1109/MC.2013.443}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance13l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SharT13, author = {Lwin Khin Shar and Hee Beng Kuan Tan}, title = {Defeating {SQL} Injection}, journal = {Computer}, volume = {46}, number = {3}, pages = {69--77}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.283}, doi = {10.1109/MC.2012.283}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SharT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SharkeyS13, author = {Noel E. Sharkey and Amanda J. C. Sharkey}, title = {Robotic Surgery: On the Cutting Edge of Ethics}, journal = {Computer}, volume = {46}, number = {1}, pages = {56--64}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.424}, doi = {10.1109/MC.2012.424}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SharkeyS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShiK13, author = {Qingchuan Shi and Omer Khan}, title = {Toward Holistic Soft-Error-Resilient Shared-Memory Multicores}, journal = {Computer}, volume = {46}, number = {10}, pages = {56--64}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.262}, doi = {10.1109/MC.2013.262}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShneidermanPH13, author = {Ben Shneiderman and Catherine Plaisant and Bradford W. Hesse}, title = {Improving Healthcare with Interactive Visualization}, journal = {Computer}, volume = {46}, number = {5}, pages = {58--66}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.38}, doi = {10.1109/MC.2013.38}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShneidermanPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShriramanZD13, author = {Arrvindh Shriraman and Hongzhou Zhao and Sandhya Dwarkadas}, title = {An Application-Tailored Approach to Hardware Cache Coherence}, journal = {Computer}, volume = {46}, number = {10}, pages = {40--47}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.258}, doi = {10.1109/MC.2013.258}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/ShriramanZD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SinghalCGSKAB13, author = {Mukesh Singhal and Santosh Chandrasekhar and Tingjian Ge and Ravi S. Sandhu and Ram Krishnan and Gail{-}Joon Ahn and Elisa Bertino}, title = {Collaboration in Multicloud Computing Environments: Framework and Security Issues}, journal = {Computer}, volume = {46}, number = {2}, pages = {76--84}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.46}, doi = {10.1109/MC.2013.46}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SinghalCGSKAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Sobel13, author = {Ann E. K. Sobel}, title = {The Modern Educator}, journal = {Computer}, volume = {46}, number = {6}, pages = {82--83}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.220}, doi = {10.1109/MC.2013.220}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Sobel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Sobel13a, author = {Ann E. K. Sobel}, title = {The Escalating Cost of College}, journal = {Computer}, volume = {46}, number = {12}, pages = {85--87}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.438}, doi = {10.1109/MC.2013.438}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Sobel13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SongJBC13, author = {Yoon{-}Jong Song and Gitae Jeong and In{-}Gyu Baek and Jungdal Choi}, title = {What Lies Ahead for Resistance-Based Memory Technologies?}, journal = {Computer}, volume = {46}, number = {8}, pages = {30--36}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.221}, doi = {10.1109/MC.2013.221}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SongJBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Stansberry13, author = {Matt Stansberry}, title = {The Future of Green {IT:} Solving the Accountability Issue}, journal = {Computer}, volume = {46}, number = {7}, pages = {91--93}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.251}, doi = {10.1109/MC.2013.251}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Stansberry13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Starbird13, author = {Kate Starbird}, title = {Returning to My Inner Nerd: Following the "Social" Disruption of Computing}, journal = {Computer}, volume = {46}, number = {3}, pages = {63--65}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.395}, doi = {10.1109/MC.2012.395}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Starbird13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StephensonD13, author = {Chris Stephenson and Rebecca Dovi}, title = {More than Gender: Taking a Systemic Approach to Improving {K-12} Computer Science Education}, journal = {Computer}, volume = {46}, number = {3}, pages = {42--46}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.2}, doi = {10.1109/MC.2013.2}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/StephensonD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StreitB13, author = {Marc Streit and Oliver Bimber}, title = {Visual Analytics: Seeking the Unknown}, journal = {Computer}, volume = {46}, number = {7}, pages = {20--21}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.255}, doi = {10.1109/MC.2013.255}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/StreitB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SwansonC13, author = {Steven Swanson and Adrian M. Caulfield}, title = {Refactor, Reduce, Recycle: Restructuring the {I/O} Stack for the Future of Storage}, journal = {Computer}, volume = {46}, number = {8}, pages = {52--59}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.222}, doi = {10.1109/MC.2013.222}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/SwansonC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SzczepanskiHBMA13, author = {Amy F. Szczepanski and Jian Huang and Troy Baer and Yashema C. Mack and Sean Ahern}, title = {Data Analysis and Visualization in High-Performance Computing}, journal = {Computer}, volume = {46}, number = {5}, pages = {84--92}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.192}, doi = {10.1109/MC.2012.192}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SzczepanskiHBMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Talia13, author = {Domenico Talia}, title = {Clouds for Scalable Big Data Analytics}, journal = {Computer}, volume = {46}, number = {5}, pages = {98--101}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.162}, doi = {10.1109/MC.2013.162}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Talia13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Tallon13, author = {Paul P. Tallon}, title = {Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost}, journal = {Computer}, volume = {46}, number = {6}, pages = {32--38}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.155}, doi = {10.1109/MC.2013.155}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Tallon13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TewD13, author = {Allison Elliott Tew and Brian Dorn}, title = {The Case for Validated Tools in Computer Science Education Research}, journal = {Computer}, volume = {46}, number = {9}, pages = {60--66}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.259}, doi = {10.1109/MC.2013.259}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TewD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Turner13, author = {Joseph Turner}, title = {Power Management as Choice Architecture}, journal = {Computer}, volume = {46}, number = {5}, pages = {108--111}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.177}, doi = {10.1109/MC.2013.177}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Turner13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Varshney13, author = {Upkar Varshney}, title = {A Smart Approach to Medication Management}, journal = {Computer}, volume = {46}, number = {1}, pages = {71--76}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.70}, doi = {10.1109/MC.2012.70}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Varshney13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VassevH13, author = {Emil Vassev and Mike Hinchey}, title = {Autonomy Requirements Engineering}, journal = {Computer}, volume = {46}, number = {8}, pages = {82--84}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.267}, doi = {10.1109/MC.2013.267}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VassevH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Vetter13, author = {Ron Vetter}, title = {Embracing Digital Publishing}, journal = {Computer}, volume = {46}, number = {1}, pages = {8--10}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.16}, doi = {10.1109/MC.2013.16}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Vetter13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WeiMKNK13, author = {David S. L. Wei and San Murugesan and Sy{-}Yen Kuo and Kshirasagar Naik and Danny Krizanc}, title = {Enhancing Data Integrity and Privacy in the Cloud: An Agenda}, journal = {Computer}, volume = {46}, number = {11}, pages = {87--90}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.384}, doi = {10.1109/MC.2013.384}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WeiMKNK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WhitneyGGMS13, author = {Telle Whitney and Denise Gammal and Barbara Gee and Jody Mahoney and Caroline Simard}, title = {Priming the Pipeline: Addressing Gender-Based Barriers in Computing}, journal = {Computer}, volume = {46}, number = {3}, pages = {30--36}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.40}, doi = {10.1109/MC.2013.40}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WhitneyGGMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WiganC13, author = {Marcus R. Wigan and Roger Clarke}, title = {Big Data's Big Unintended Consequences}, journal = {Computer}, volume = {46}, number = {6}, pages = {46--53}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.195}, doi = {10.1109/MC.2013.195}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WiganC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Wijk13, author = {Jarke J. van Wijk}, title = {Evaluation: {A} Challenge for Visual Analytics}, journal = {Computer}, volume = {46}, number = {7}, pages = {56--60}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.151}, doi = {10.1109/MC.2013.151}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Wijk13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WilliamsBDPWSMPSSBCKPWSSKEPGCBPKPM13, author = {Dean N. Williams and Peer{-}Timo Bremer and Charles M. Doutriaux and John Patchett and Sean Williams and Galen M. Shipman and Ross Miller and David Pugmire and Brian E. Smith and Chad A. Steed and E. Wes Bethel and Hank Childs and Harinarayan Krishnan and Prabhat and Michael F. Wehner and Cl{\'{a}}udio T. Silva and Emanuele Santos and David Koop and Tommy Ellqvist and Jorge Poco and Berk Geveci and Aashish Chaudhary and Andy Bauer and Alexander Pletzer and Dave Kindig and Gerald Potter and Thomas P. Maxwell}, title = {Ultrascale Visualization of Climate Data}, journal = {Computer}, volume = {46}, number = {9}, pages = {68--76}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.119}, doi = {10.1109/MC.2013.119}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WilliamsBDPWSMPSSBCKPWSSKEPGCBPKPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Wilson13, author = {Cameron Wilson}, title = {What's Up Next for Code.org?}, journal = {Computer}, volume = {46}, number = {8}, pages = {95--97}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.292}, doi = {10.1109/MC.2013.292}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Wilson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Witman13, author = {Paul Witman}, title = {Social Media for Social Value}, journal = {Computer}, volume = {46}, number = {7}, pages = {82--85}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.247}, doi = {10.1109/MC.2013.247}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Witman13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZeadallyPC13, author = {Sherali Zeadally and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Han{-}Chieh Chao}, title = {Securing Cyberspace in the 21st Century}, journal = {Computer}, volume = {46}, number = {4}, pages = {22--23}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.144}, doi = {10.1109/MC.2013.144}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZeadallyPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZidenbergKW13, author = {Tsahee Zidenberg and Isaac Keslassy and Uri C. Weiser}, title = {Optimal Resource Allocation with MultiAmdahl}, journal = {Computer}, volume = {46}, number = {7}, pages = {70--77}, year = {2013}, url = {https://doi.org/10.1109/MC.2012.359}, doi = {10.1109/MC.2012.359}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZidenbergKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.