Search dblp for Publications

export results for "toc:db/journals/computer/computer46.bht:"

 download as .bib file

@article{DBLP:journals/computer/AlcarazL13,
  author       = {Cristina Alcaraz and
                  Javier L{\'{o}}pez},
  title        = {Wide-Area Situational Awareness for Critical Infrastructure Protection},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {30--37},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.72},
  doi          = {10.1109/MC.2013.72},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AlcarazL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AlcarazZ13,
  author       = {Cristina Alcaraz and
                  Sherali Zeadally},
  title        = {Critical Control System Protection in the 21st Century},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {74--83},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.69},
  doi          = {10.1109/MC.2013.69},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AlcarazZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AlhomoudADY13,
  author       = {Adeeb M. Alhomoud and
                  Irfan Awan and
                  Jules Ferdinand Pagna Disso and
                  Muhammad Younas},
  title        = {A Next-Generation Approach to Combating Botnets},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {62--66},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.67},
  doi          = {10.1109/MC.2013.67},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AlhomoudADY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Amdahl13,
  author       = {Gene M. Amdahl},
  title        = {Computer Architecture and Amdahl's Law},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {38--46},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.418},
  doi          = {10.1109/MC.2013.418},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Amdahl13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AnthonysamyGR13,
  author       = {Pauline Anthonysamy and
                  Phil Greenwood and
                  Awais Rashid},
  title        = {Social Networking Privacy: Understanding the Disconnect from Policy
                  to Controls},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {60--67},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.326},
  doi          = {10.1109/MC.2012.326},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AnthonysamyGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Anton13,
  author       = {Annie I. Ant{\'{o}}n},
  title        = {Facing Challenges and Having Fun},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {65--66},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.427},
  doi          = {10.1109/MC.2012.427},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Anton13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AtwoodCS13,
  author       = {Greg Atwood and
                  Soo{-}Ik Chae and
                  Simon S. Y. Shim},
  title        = {Next-Generation Memory [Guest editors' introduction]},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {21--22},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.285},
  doi          = {10.1109/MC.2013.285},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AtwoodCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Badam13,
  author       = {Anirudh Badam},
  title        = {How Persistent Memory Will Change Software Systems},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {45--51},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.189},
  doi          = {10.1109/MC.2013.189},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Badam13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BahgaM13,
  author       = {Arshdeep Bahga and
                  Vijay Krishna Madisetti},
  title        = {Rapid Prototyping of Multitier Cloud-Based Services and Systems},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {76--83},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.154},
  doi          = {10.1109/MC.2013.154},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BahgaM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BalasubramaniamK13,
  author       = {Sasitharan Balasubramaniam and
                  Jussi Kangasharju},
  title        = {Realizing the Internet of Nano Things: Challenges, Solutions, and
                  Applications},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {62--68},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.389},
  doi          = {10.1109/MC.2012.389},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BalasubramaniamK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BasarasKT13,
  author       = {Pavlos Basaras and
                  Dimitrios Katsaros and
                  Leandros Tassiulas},
  title        = {Detecting Influential Spreaders in Complex, Dynamic Networks},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {24--29},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.75},
  doi          = {10.1109/MC.2013.75},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/BasarasKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel13,
  author       = {Hal Berghel},
  title        = {RFIDiocy: It's D{\'{e}}j{\`{a}} Vu All over Again},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {85--88},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.28},
  doi          = {10.1109/MC.2013.28},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel13a,
  author       = {Hal Berghel},
  title        = {The {SCDOR} Hack: Great Security Theater in Five Stages},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {97--99},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.117},
  doi          = {10.1109/MC.2013.117},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel13b,
  author       = {Hal Berghel},
  title        = {Computing Technology and Survivable Journalism},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {93--97},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.165},
  doi          = {10.1109/MC.2013.165},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel13c,
  author       = {Hal Berghel},
  title        = {Through the {PRISM} Darkly},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {86--90},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.253},
  doi          = {10.1109/MC.2013.253},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel13d,
  author       = {Hal Berghel},
  title        = {Toxic Cookies},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {104--107},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.330},
  doi          = {10.1109/MC.2013.330},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Berghel13e,
  author       = {Hal Berghel},
  title        = {The Intimidation Factor: How a Surveillance State Can Affect What
                  You Read in Professional Publications},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {91--95},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.439},
  doi          = {10.1109/MC.2013.439},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Berghel13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bonhomme-BiaisR13,
  author       = {Alice Bonhomme{-}Biais and
                  Raquel A. Romano},
  title        = {Pursuing Professional Changes},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {66--68},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.112},
  doi          = {10.1109/MC.2013.112},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bonhomme-BiaisR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Bosch13,
  author       = {Jan Bosch},
  title        = {Achieving Simplicity with the Three-Layer Product Model},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {34--39},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.295},
  doi          = {10.1109/MC.2013.295},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Bosch13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Brechner13,
  author       = {Eric Brechner},
  title        = {Getting Diagonal on the Xbox One Trifecta},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {77--78},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.276},
  doi          = {10.1109/MC.2013.276},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Brechner13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Brennan13,
  author       = {Karen Brennan},
  title        = {Learning Computing through Creating and Connecting},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {52--59},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.229},
  doi          = {10.1109/MC.2013.229},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Brennan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Cameron13,
  author       = {Kirk W. Cameron},
  title        = {Energy Oddities, Part 1: Why the Energy World Is Odd},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {83--84},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.17},
  doi          = {10.1109/MC.2013.17},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Cameron13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Cameron13a,
  author       = {Kirk W. Cameron},
  title        = {Energy Oddities, Part 2: Why Green Computing Is Odd},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {90--93},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.94},
  doi          = {10.1109/MC.2013.94},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Cameron13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChienK13,
  author       = {Andrew A. Chien and
                  Vijay Karamcheti},
  title        = {Moore's Law: The First Ending and a New Beginning},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {48--53},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.431},
  doi          = {10.1109/MC.2013.431},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChienK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChildsGSMMSKB13,
  author       = {Hank Childs and
                  Berk Geveci and
                  William J. Schroeder and
                  Jeremy S. Meredith and
                  Kenneth Moreland and
                  Christopher M. Sewell and
                  Torsten W. Kuhlen and
                  E. Wes Bethel},
  title        = {Research Challenges for Visualization Software},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {34--42},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.179},
  doi          = {10.1109/MC.2013.179},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChildsGSMMSKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Cohen13,
  author       = {Beth Cohen},
  title        = {PaaS: New Opportunities for Cloud Application Development},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {97--100},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.323},
  doi          = {10.1109/MC.2013.323},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Cohen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CohoonCS13,
  author       = {James P. Cohoon and
                  Joanne McGrath Cohoon and
                  Mary Lou Soffa},
  title        = {Educating Diverse Computing Students at the University of Virginia},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {52--55},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.39},
  doi          = {10.1109/MC.2013.39},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CohoonCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CookCTK13,
  author       = {Diane J. Cook and
                  Aaron S. Crandall and
                  Brian L. Thomas and
                  Narayanan Chatapuram Krishnan},
  title        = {{CASAS:} {A} Smart Home in a Box},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {62--69},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.328},
  doi          = {10.1109/MC.2012.328},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CookCTK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CostaF13,
  author       = {Rog{\'{e}}rio Lu{\'{\i}}s de Carvalho Costa and
                  Pedro Furtado},
  title        = {Providing Quality of Experience for Users: The Next {DBMS} Challenge},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {86--93},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.425},
  doi          = {10.1109/MC.2012.425},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CostaF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DefrawyF13,
  author       = {Karim El Defrawy and
                  Sky Faber},
  title        = {Blindfolded Data Search via Secure Pattern Matching},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {68--75},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.73},
  doi          = {10.1109/MC.2013.73},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DefrawyF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Devadas13,
  author       = {Srinivas Devadas},
  title        = {Toward a Coherent Multicore Memory Model},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {30--31},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.373},
  doi          = {10.1109/MC.2013.373},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Devadas13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DewriT13,
  author       = {Rinku Dewri and
                  Ramakrishna Thurimella},
  title        = {Can a Phone's {GPS} "Lie" Intelligently?},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {91--93},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.44},
  doi          = {10.1109/MC.2013.44},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DewriT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/DuBow13,
  author       = {Wendy M. DuBow},
  title        = {Diversity in Computing: Why It Matters and How Organizations Can Achieve
                  It},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {24--29},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.6},
  doi          = {10.1109/MC.2013.6},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/DuBow13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ElmqvistI13,
  author       = {Niklas Elmqvist and
                  Pourang Irani},
  title        = {Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {86--89},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.147},
  doi          = {10.1109/MC.2013.147},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/ElmqvistI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/EneyLMR13,
  author       = {Crystal Eney and
                  Ed Lazowska and
                  H{\'{e}}l{\`{e}}ne Martin and
                  Stuart Reges},
  title        = {Broadening Participation: The Why and the How},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {48--51},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.83},
  doi          = {10.1109/MC.2013.83},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/EneyLMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/EwingGR13,
  author       = {E. Thomas Ewing and
                  Samah Gad and
                  Naren Ramakrishnan},
  title        = {Gaining Insights into Epidemics by Mining Historical Newspapers},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {68--72},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.205},
  doi          = {10.1109/MC.2013.205},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/EwingGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Fekete13,
  author       = {Jean{-}Daniel Fekete},
  title        = {Visual Analytics Infrastructures: From Data Management to Exploration},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {22--29},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.120},
  doi          = {10.1109/MC.2013.120},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Fekete13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/FekiKBT13,
  author       = {Mohamed Ali Feki and
                  Fahim Kawsar and
                  Mathieu Boussard and
                  Lieven Trappeniers},
  title        = {The Internet of Things: The Next Technological Revolution},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {24--25},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.63},
  doi          = {10.1109/MC.2013.63},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/FekiKBT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Fernandez13,
  author       = {Mary Fernandez},
  title        = {A Path Between: Mentoring the Next Generation of Computing Professionals},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {38--41},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.396},
  doi          = {10.1109/MC.2012.396},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Fernandez13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/FerraioloGJ13,
  author       = {David F. Ferraiolo and
                  Serban I. Gavrila and
                  Wayne A. Jansen},
  title        = {Enabling an Enterprise-Wide, Data-Centric Operating Environment},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {94--96},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.130},
  doi          = {10.1109/MC.2013.130},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/FerraioloGJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/FiauxSBNRE13,
  author       = {Patrick Fiaux and
                  Maoyuan Sun and
                  Lauren Bradel and
                  Chris North and
                  Naren Ramakrishnan and
                  Alex Endert},
  title        = {Bixplorer: Visual Analytics with Biclusters},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {90--94},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.269},
  doi          = {10.1109/MC.2013.269},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/FiauxSBNRE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/FincherK13,
  author       = {Sally Fincher and
                  Daniel Knox},
  title        = {The Porous Classroom: Professional Practices in the Computing Curriculum},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {44--51},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.261},
  doi          = {10.1109/MC.2013.261},
  timestamp    = {Sat, 31 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/FincherK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/FloydB13,
  author       = {Barry D. Floyd and
                  Steve Bo{\ss}elmann},
  title        = {ITSy-Simplicity Research in Information and Communication Technology},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {26--32},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.332},
  doi          = {10.1109/MC.2013.332},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/FloydB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff13,
  author       = {Brian M. Gaff},
  title        = {Who Invents What},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {10--12},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.184},
  doi          = {10.1109/MC.2013.184},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff13a,
  author       = {Brian M. Gaff},
  title        = {Are You Exhausted by Your First Sale?},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {9--11},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.194},
  doi          = {10.1109/MC.2013.194},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Gaff13b,
  author       = {Brian M. Gaff},
  title        = {The Troll under the Bridge},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {17--19},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.252},
  doi          = {10.1109/MC.2013.252},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Gaff13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GaffC13,
  author       = {Brian M. Gaff and
                  Peter J. Cuomo},
  title        = {Design Patents},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {8--10},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.91},
  doi          = {10.1109/MC.2013.91},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GaffC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GaffD13,
  author       = {Brian M. Gaff and
                  Joanna M. Dombrowski},
  title        = {Ten Things to Know about Applying for Non-US Patents},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {9--11},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.289},
  doi          = {10.1109/MC.2013.289},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GaffD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GaffD13a,
  author       = {Brian M. Gaff and
                  Alyssa Harvey Dawson},
  title        = {Working with Your Legal Department},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {17--19},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.331},
  doi          = {10.1109/MC.2013.331},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GaffD13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GaffH13,
  author       = {Brian M. Gaff and
                  Greg Hendershott},
  title        = {So, You Want to Start a Software Company?},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {17--19},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.371},
  doi          = {10.1109/MC.2013.371},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GaffH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GaffHC13,
  author       = {Brian M. Gaff and
                  Stephen G. Huggard and
                  Gregory W. Carey},
  title        = {Paying Bribes Abroad Will Get You in Hot Water in the {US}},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {11--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.60},
  doi          = {10.1109/MC.2013.60},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GaffHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GaffJ13,
  author       = {Brian M. Gaff and
                  Judy St. John},
  title        = {Legal Careers for Engineers},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {11--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.428},
  doi          = {10.1109/MC.2013.428},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GaffJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GaffL13,
  author       = {Brian M. Gaff and
                  Ralph A. Loren},
  title        = {Patent Monetization},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {9--11},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.143},
  doi          = {10.1109/MC.2013.143},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GaffL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GaffLD13,
  author       = {Brian M. Gaff and
                  Ralph A. Loren and
                  Gareth Dickson},
  title        = {Protecting Bioinformatics as Intellectual Property},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {15--17},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.27},
  doi          = {10.1109/MC.2013.27},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GaffLD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GaffLG13,
  author       = {Brian M. Gaff and
                  David J. Levine and
                  Raymond Gabriel},
  title        = {Understanding {US} Trade Controls},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {10--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.401},
  doi          = {10.1109/MC.2013.401},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GaffLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13,
  author       = {Lee Garber},
  title        = {News Briefs},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {24--26},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.26},
  doi          = {10.1109/MC.2013.26},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13a,
  author       = {Lee Garber},
  title        = {Letters},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {6},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.56},
  doi          = {10.1109/MC.2013.56},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13b,
  author       = {Lee Garber},
  title        = {GPUs Go Mobile},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {16--19},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.52},
  doi          = {10.1109/MC.2013.52},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13c,
  author       = {Lee Garber},
  title        = {News Briefs},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {20--23},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.59},
  doi          = {10.1109/MC.2013.59},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13d,
  author       = {Lee Garber},
  title        = {News Briefs},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {18--20},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.108},
  doi          = {10.1109/MC.2013.108},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13e,
  author       = {Lee Garber},
  title        = {Analytics Goes on Location with New Approaches},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {14--17},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.123},
  doi          = {10.1109/MC.2013.123},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13f,
  author       = {Lee Garber},
  title        = {News Briefs},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {18--20},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.142},
  doi          = {10.1109/MC.2013.142},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13g,
  author       = {Lee Garber},
  title        = {News Briefs},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {19--21},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.176},
  doi          = {10.1109/MC.2013.176},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13h,
  author       = {Lee Garber},
  title        = {Game Accessibility: Enabling Everyone to Play},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {14--18},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.206},
  doi          = {10.1109/MC.2013.206},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13i,
  author       = {Lee Garber},
  title        = {News Briefs},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {19--21},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.216},
  doi          = {10.1109/MC.2013.216},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13j,
  author       = {Lee Garber},
  title        = {News Briefs},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {13--15},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.244},
  doi          = {10.1109/MC.2013.244},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13k,
  author       = {Lee Garber},
  title        = {The Lowly {API} Is Ready to Step Front and Center},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {14--17},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.290},
  doi          = {10.1109/MC.2013.290},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13l,
  author       = {Lee Garber},
  title        = {News Briefs},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {18--20},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.284},
  doi          = {10.1109/MC.2013.284},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13m,
  author       = {Lee Garber},
  title        = {Gestural Technology: Moving Interfaces in a New Direction},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {22--25},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.352},
  doi          = {10.1109/MC.2013.352},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13n,
  author       = {Lee Garber},
  title        = {News Briefs},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {20--22},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.395},
  doi          = {10.1109/MC.2013.395},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Garber13o,
  author       = {Lee Garber},
  title        = {Robot {OS:} {A} New Day for Robot Design},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {16--20},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.434},
  doi          = {10.1109/MC.2013.434},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Garber13o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GenuchtenH13,
  author       = {Michiel van Genuchten and
                  Les Hatton},
  title        = {Quantifying Software's Impact},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {66--72},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.7},
  doi          = {10.1109/MC.2013.7},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GenuchtenH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Getov13,
  author       = {Vladimir Getov},
  title        = {Computing Laws: Origins, Standing, and Impact [Guest editors' introduction]},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {24--25},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.421},
  doi          = {10.1109/MC.2013.421},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Getov13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GorgKLS13,
  author       = {Carsten G{\"{o}}rg and
                  Youn ah Kang and
                  Zhicheng Liu and
                  John T. Stasko},
  title        = {Visual Analytics Support for Intelligence Analysis},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {30--38},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.76},
  doi          = {10.1109/MC.2013.76},
  timestamp    = {Thu, 28 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/GorgKLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13,
  author       = {David Alan Grier},
  title        = {The Unseen and the Seen},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {6--7},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.33},
  doi          = {10.1109/MC.2013.33},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13a,
  author       = {David Alan Grier},
  title        = {The Here and Now},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {108},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.32},
  doi          = {10.1109/MC.2013.32},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13b,
  author       = {David Alan Grier},
  title        = {The Ethical Dimension},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {112},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.62},
  doi          = {10.1109/MC.2013.62},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13c,
  author       = {David Alan Grier},
  title        = {Attention to Context},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {124},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.81},
  doi          = {10.1109/MC.2013.81},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13d,
  author       = {David Alan Grier},
  title        = {Equal before the Bar},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {116},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.131},
  doi          = {10.1109/MC.2013.131},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13e,
  author       = {David Alan Grier},
  title        = {Working in Conference},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {124},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.185},
  doi          = {10.1109/MC.2013.185},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13f,
  author       = {David Alan Grier},
  title        = {The Comfort Zone},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {104},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.219},
  doi          = {10.1109/MC.2013.219},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13g,
  author       = {David Alan Grier},
  title        = {Short-Term Loan},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {112},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.246},
  doi          = {10.1109/MC.2013.246},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13h,
  author       = {David Alan Grier},
  title        = {The Tenor of Our Times},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {128},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.291},
  doi          = {10.1109/MC.2013.291},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13i,
  author       = {David Alan Grier},
  title        = {For the Common Good},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {124},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.307},
  doi          = {10.1109/MC.2013.307},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13j,
  author       = {David Alan Grier},
  title        = {Not Part of the Plan},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {136},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.369},
  doi          = {10.1109/MC.2013.369},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13k,
  author       = {David Alan Grier},
  title        = {The Trappings of Power},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {120},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.399},
  doi          = {10.1109/MC.2013.399},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13l,
  author       = {David Alan Grier},
  title        = {The Cycles of Continuous Improvement},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {6--8},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.437},
  doi          = {10.1109/MC.2013.437},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Grier13m,
  author       = {David Alan Grier},
  title        = {The Way We Organize Ourselves},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {124},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.440},
  doi          = {10.1109/MC.2013.440},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Grier13m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GuzdialS13,
  author       = {Mark Guzdial and
                  Betsy James DiSalvo},
  title        = {Computing Education: Beyond the Classroom},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {30--31},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.306},
  doi          = {10.1109/MC.2013.306},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/GuzdialS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HallR13,
  author       = {Jon G. Hall and
                  Lucia Rapanotti},
  title        = {Beauty in Software Engineering},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {85--87},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.42},
  doi          = {10.1109/MC.2013.42},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HallR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HanXO13,
  author       = {Hao Han and
                  Yinxing Xue and
                  Keizo Oyama},
  title        = {Mashup Technology: Beyond Open Programming Interfaces},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {96--99},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.429},
  doi          = {10.1109/MC.2013.429},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HanXO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HangZS13,
  author       = {Chung{-}Wei Hang and
                  Zhe Zhang and
                  Munindar P. Singh},
  title        = {Shin: Generalized Trust Propagation with Limited Evidence},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {78--85},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.116},
  doi          = {10.1109/MC.2012.116},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HangZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HartmannW13,
  author       = {Bj{\"{o}}rn Hartmann and
                  Paul K. Wright},
  title        = {Designing Bespoke Interactive Devices},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {85--89},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.274},
  doi          = {10.1109/MC.2013.274},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HartmannW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hemerly13,
  author       = {Jess Hemerly},
  title        = {Public Policy Considerations for Data-Driven Innovation},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {25--31},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.186},
  doi          = {10.1109/MC.2013.186},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Hemerly13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HenzeSSPM13,
  author       = {Niels Henze and
                  Alireza Sahami Shirazi and
                  Albrecht Schmidt and
                  Martin Pielot and
                  Florian Michahelles},
  title        = {Empirical Research through Ubiquitous Data Collection},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {74--76},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.202},
  doi          = {10.1109/MC.2013.202},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HenzeSSPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HerzlingerSG13,
  author       = {Regina Herzlinger and
                  Margo I. Seltzer and
                  Mark Gaynor},
  title        = {Applying {KISS} to Healthcare Information Technology},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {72--74},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.298},
  doi          = {10.1109/MC.2013.298},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HerzlingerSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hodges13,
  author       = {Steve Hodges},
  title        = {Batteries Not Included: Powering the Ubiquitous Computing Dream},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {90--93},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.125},
  doi          = {10.1109/MC.2013.125},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Hodges13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HodgesTVSBF13,
  author       = {Steve Hodges and
                  Stuart Taylor and
                  Nicolas Villar and
                  James Scott and
                  Dominik Bial and
                  Patrick Tobias Fischer},
  title        = {Prototyping Connected Devices for the Internet of Things},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {26--34},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.394},
  doi          = {10.1109/MC.2012.394},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/HodgesTVSBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Hole13,
  author       = {Kjell J{\o}rgen Hole},
  title        = {Management of Hidden Risks},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {65--70},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.397},
  doi          = {10.1109/MC.2012.397},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Hole13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes13,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {12--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.78},
  doi          = {10.1109/MC.2013.78},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes13a,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {12--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.122},
  doi          = {10.1109/MC.2013.122},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes13b,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {13--14},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.158},
  doi          = {10.1109/MC.2013.158},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes13c,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {12--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.191},
  doi          = {10.1109/MC.2013.191},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes13d,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {8--9},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.230},
  doi          = {10.1109/MC.2013.230},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes13e,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {12--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.266},
  doi          = {10.1109/MC.2013.266},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes13f,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {20--21},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.300},
  doi          = {10.1109/MC.2013.300},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes13g,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {20--21},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.338},
  doi          = {10.1109/MC.2013.338},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes13h,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {14--15},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.376},
  doi          = {10.1109/MC.2013.376},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holmes13i,
  author       = {W. Neville Holmes},
  title        = {32 {\&} 16 Years Ago},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {14--15},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.441},
  doi          = {10.1109/MC.2013.441},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holmes13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Holzmann13,
  author       = {Gerard J. Holzmann},
  title        = {A Three-Step Program for Recovering Hackers},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {86--88},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.192},
  doi          = {10.1109/MC.2013.192},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Holzmann13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HovenGOBL13,
  author       = {Elise van den Hoven and
                  Evelien van de Garde{-}Perik and
                  Serge Offermans and
                  Koen van Boerdonk and
                  Kars{-}Michiel H. Lenssen},
  title        = {Moving Tangible Interaction Systems to the Next Level},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {70--76},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.360},
  doi          = {10.1109/MC.2012.360},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HovenGOBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HuaLRCAMS13,
  author       = {Ting Hua and
                  Chang{-}Tien Lu and
                  Naren Ramakrishnan and
                  Feng Chen and
                  Jaime Arredondo and
                  David Mares and
                  Kristen Maria Summers},
  title        = {Analyzing Civil Unrest through Social Media},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {80--84},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.442},
  doi          = {10.1109/MC.2013.442},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HuaLRCAMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HuffmanJ13,
  author       = {Amber Huffman and
                  Dale Juenemann},
  title        = {The Nonvolatile Memory Transformation of Client Storage},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {38--44},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.223},
  doi          = {10.1109/MC.2013.223},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HuffmanJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Johnson13,
  author       = {Brian David Johnson},
  title        = {When Science Fiction and Science Fact Meet},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {80--82},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.35},
  doi          = {10.1109/MC.2013.35},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Johnson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Johnson13a,
  author       = {Brian David Johnson},
  title        = {Jimmy: The Robot That Changed It All},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {104--107},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.105},
  doi          = {10.1109/MC.2013.105},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Johnson13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Johnson13b,
  author       = {Brian David Johnson},
  title        = {Secret Science Fiction},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {105--107},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.180},
  doi          = {10.1109/MC.2013.180},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Johnson13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Johnson13c,
  author       = {Brian David Johnson},
  title        = {From {NASA}},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {78--81},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.236},
  doi          = {10.1109/MC.2013.236},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Johnson13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Johnson13d,
  author       = {Brian David Johnson},
  title        = {That Copernican Moment},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {101--103},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.328},
  doi          = {10.1109/MC.2013.328},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Johnson13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Johnson13e,
  author       = {Brian David Johnson},
  title        = {Jimmy Takes Manhattan},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {95--98},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.392},
  doi          = {10.1109/MC.2013.392},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Johnson13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/JohnsonPC13,
  author       = {Keri Johnson and
                  Jebediah Pavleas and
                  Jack Chang},
  title        = {Kinecting to Mathematics through Embodied Interactions},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {101--104},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.363},
  doi          = {10.1109/MC.2013.363},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/JohnsonPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KeefeI13,
  author       = {Daniel F. Keefe and
                  Tobias Isenberg},
  title        = {Reimagining the Scientific Visualization Interaction Paradigm},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {51--57},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.178},
  doi          = {10.1109/MC.2013.178},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KeefeI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KeimKRS13,
  author       = {Daniel A. Keim and
                  Milos Krstajic and
                  Christian Rohrdantz and
                  Tobias Schreck},
  title        = {Real-Time Visual Analytics for Text Streams},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {47--55},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.152},
  doi          = {10.1109/MC.2013.152},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KeimKRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KhanM13,
  author       = {Khaled M. Khan and
                  Qutaibah M. Malluhi},
  title        = {Trust in Cloud Services: Providing More Controls to Clients},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {94--96},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.254},
  doi          = {10.1109/MC.2013.254},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KhanM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Klawe13,
  author       = {Maria M. Klawe},
  title        = {Increasing Female Participation in Computing: The Harvey Mudd College
                  Story},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {56--58},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.4},
  doi          = {10.1109/MC.2013.4},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Klawe13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KlontzJ13,
  author       = {Joshua C. Klontz and
                  Anil K. Jain},
  title        = {A Case Study of Automated Face Recognition: The Boston Marathon Bombings
                  Suspects},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {91--94},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.377},
  doi          = {10.1109/MC.2013.377},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KlontzJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KnobelsdorfV13,
  author       = {Maria Knobelsdorf and
                  Jan Vahrenhold},
  title        = {Addressing the Full Range of Students: Challenges in {K-12} Computer
                  Science Education},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {32--37},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.263},
  doi          = {10.1109/MC.2013.263},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KnobelsdorfV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KortuemBSRP13,
  author       = {Gerd Kortuem and
                  Arosha K. Bandara and
                  Neil Smith and
                  Mike Richards and
                  Marian Petre},
  title        = {Educating the Internet-of-Things Generation},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {53--61},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.390},
  doi          = {10.1109/MC.2012.390},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KortuemBSRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KosaraM13,
  author       = {Robert Kosara and
                  Jock D. Mackinlay},
  title        = {Storytelling: The Next Step for Visualization},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {44--50},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.36},
  doi          = {10.1109/MC.2013.36},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KosaraM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KrishnaCPKSCP13,
  author       = {Tushar Krishna and
                  Chia{-}Hsin Owen Chen and
                  Sunghyun Park and
                  Woo{-}Cheol Kwon and
                  Suvinay Subramanian and
                  Anantha P. Chandrakasan and
                  Li{-}Shiuan Peh},
  title        = {Single-Cycle Multihop Asynchronous Repeated Traversal: {A} {SMART}
                  Future for Reconfigurable On-Chip Networks},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {48--55},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.260},
  doi          = {10.1109/MC.2013.260},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KrishnaCPKSCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KshetriM13,
  author       = {Nir Kshetri and
                  San Murugesan},
  title        = {Cloud Computing and {EU} Data Privacy Regulations},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {86--89},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.86},
  doi          = {10.1109/MC.2013.86},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KshetriM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KshetriM13a,
  author       = {Nir Kshetri and
                  San Murugesan},
  title        = {{EU} and {US} Cybersecurity Strategies and Their Impact on Businesses
                  and Consumers},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {84--88},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.350},
  doi          = {10.1109/MC.2013.350},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KshetriM13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Kumar13,
  author       = {Deepak Kumar},
  title        = {Serving Women with a Purposeful Vision},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {60--61},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.114},
  doi          = {10.1109/MC.2013.114},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Kumar13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KumarNPS13,
  author       = {Santosh Kumar and
                  Wendy Nilsen and
                  Misha Pavel and
                  Mani B. Srivastava},
  title        = {Mobile Health: Revolutionizing Healthcare Through Transdisciplinary
                  Research},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {28--35},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.392},
  doi          = {10.1109/MC.2012.392},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/KumarNPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KunzeIKUO13,
  author       = {Kai Kunze and
                  Masakazu Iwamura and
                  Koichi Kise and
                  Seiichi Uchida and
                  Shinichiro Omachi},
  title        = {Activity Recognition for the Mind: Toward a Cognitive "Quantified
                  Self"},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {105--108},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.339},
  doi          = {10.1109/MC.2013.339},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KunzeIKUO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LamprechtNS13,
  author       = {Anna{-}Lena Lamprecht and
                  Stefan Naujokat and
                  Ina Schaefer},
  title        = {Variability Management beyond Feature Models},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {48--54},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.299},
  doi          = {10.1109/MC.2013.299},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/LamprechtNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Leavitt13,
  author       = {Neal Leavitt},
  title        = {Bringing Big Analytics to the Masses},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {20--23},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.9},
  doi          = {10.1109/MC.2013.9},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Leavitt13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Leavitt13a,
  author       = {Neal Leavitt},
  title        = {A Technology that Comes Highly Recommended},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {14--17},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.80},
  doi          = {10.1109/MC.2013.80},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Leavitt13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Leavitt13b,
  author       = {Neal Leavitt},
  title        = {Hybrid Clouds Move to the Forefront},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {15--18},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.168},
  doi          = {10.1109/MC.2013.168},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Leavitt13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Leavitt13c,
  author       = {Neal Leavitt},
  title        = {Storage Challenge: Where Will All That Big Data Go?},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {22--25},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.326},
  doi          = {10.1109/MC.2013.326},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Leavitt13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Leavitt13d,
  author       = {Neal Leavitt},
  title        = {Today's Mobile Security Requires a New Approach},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {16--19},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.400},
  doi          = {10.1109/MC.2013.400},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Leavitt13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LeePB13,
  author       = {Sang Wan Lee and
                  Oliver Prenzel and
                  Zeungnam Bien},
  title        = {Applying Human Learning Principles to User-Centered IoT Systems},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {46--52},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.426},
  doi          = {10.1109/MC.2012.426},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LeePB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LiLH13,
  author       = {Qing Li and
                  Chris Larsen and
                  Tim van der Horst},
  title        = {IPv6: {A} Catalyst and Evasion Tool for Botnets and Malware Delivery
                  Networks},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {76--82},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.296},
  doi          = {10.1109/MC.2012.296},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/LiLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LiQ13,
  author       = {Yan Li and
                  Khandker Quader},
  title        = {{NAND} Flash Memory: Challenges and Opportunities},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {23--29},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.190},
  doi          = {10.1109/MC.2013.190},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LiQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LiuSC13,
  author       = {Jane W.{-}S. Liu and
                  Chi{-}Sheng Shih and
                  Edward T.{-}H. Chu},
  title        = {Cyberphysical Elements of Disaster-Prepared Smart Environments},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {69--75},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.149},
  doi          = {10.1109/MC.2012.149},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LiuSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LiuTC13,
  author       = {Kaiping Liu and
                  Hee Beng Kuan Tan and
                  Xu Chen},
  title        = {Binary Code Analysis},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {60--68},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.268},
  doi          = {10.1109/MC.2013.268},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LiuTC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Lutz13,
  author       = {Michael Lutz},
  title        = {Undergraduate Software Engineering at {RIT:} Past, Present, and Future},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {88--90},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.65},
  doi          = {10.1109/MC.2013.65},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Lutz13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MaDDZ13,
  author       = {Xiaohan Ma and
                  Zhigang Deng and
                  Mian Dong and
                  Lin Zhong},
  title        = {Characterizing the Performance and Power Consumption of 3D Mobile
                  Games},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {76--82},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.190},
  doi          = {10.1109/MC.2012.190},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/MaDDZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MaM13,
  author       = {Kwan{-}Liu Ma and
                  Chris Muelder},
  title        = {Large-Scale Graph Visualization and Analytics},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {39--46},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.242},
  doi          = {10.1109/MC.2013.242},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MaM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MajumderS13,
  author       = {Aditi Majumder and
                  Behzad Sajadi},
  title        = {Large Area Displays: The Changing Face of Visualization},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {26--33},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.429},
  doi          = {10.1109/MC.2012.429},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MajumderS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Makimoto13,
  author       = {Tsugio Makimoto},
  title        = {Implications of Makimoto's Wave},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {32--37},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.294},
  doi          = {10.1109/MC.2013.294},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Makimoto13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MargariaH13,
  author       = {Tiziana Margaria and
                  Mike Hinchey},
  title        = {Simplicity in {IT:} The Power of Less},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {23--25},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.397},
  doi          = {10.1109/MC.2013.397},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MargariaH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/McGregor13,
  author       = {Carolyn McGregor},
  title        = {Big Data in Neonatal Intensive Care},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {54--59},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.157},
  doi          = {10.1109/MC.2013.157},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/McGregor13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Metcalfe13,
  author       = {Bob Metcalfe},
  title        = {Metcalfe's Law after 40 Years of Ethernet},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {26--31},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.374},
  doi          = {10.1109/MC.2013.374},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Metcalfe13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MetriSIA13,
  author       = {Grace Metri and
                  Manuj Sabharwal and
                  Sundar Iyer and
                  Abhishek Agrawal},
  title        = {Hardware/Software Codesign to Optimize SoC Device Battery Life},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {89--92},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.353},
  doi          = {10.1109/MC.2013.353},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MetriSIA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Michael13,
  author       = {James Bret Michael},
  title        = {Empowering Users through Secure On-Demand Data Provisioning},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {84--85},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.203},
  doi          = {10.1109/MC.2013.203},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Michael13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MichaelLPBV13,
  author       = {James Bret Michael and
                  Phillip A. Laplante and
                  Jeffery E. Payne and
                  Paul E. Black and
                  Jeffrey M. Voas},
  title        = {Does Security Trump Reliability?},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {84--86},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.383},
  doi          = {10.1109/MC.2013.383},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MichaelLPBV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MichaelM13,
  author       = {Katina Michael and
                  Keith W. Miller},
  title        = {Big Data: New Opportunities and New Challenges [Guest editors' introduction]},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {22--24},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.196},
  doi          = {10.1109/MC.2013.196},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/MichaelM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MorenoSCS13,
  author       = {Ana Mar{\'{\i}}a Moreno and
                  Ahmed Seffah and
                  Rafael Capilla and
                  Maria Isabel {S\'{a}nchez Segura}},
  title        = {{HCI} Practices for Building Usable Software},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {100--102},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.133},
  doi          = {10.1109/MC.2013.133},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MorenoSCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/MorganC13,
  author       = {Lorraine Morgan and
                  Kieran Conboy},
  title        = {Key Factors Impacting Cloud Computing Adoption},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {97--99},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.362},
  doi          = {10.1109/MC.2013.362},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/MorganC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Murugesan13,
  author       = {San Murugesan},
  title        = {Cloud Computing: The New Normal?},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {77--79},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.12},
  doi          = {10.1109/MC.2013.12},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Murugesan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NeubauerS13,
  author       = {Johannes Neubauer and
                  Bernhard Steffen},
  title        = {Plug-and-Play Higher-Order Process Integration},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {56--62},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.296},
  doi          = {10.1109/MC.2013.296},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/NeubauerS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NingLY13,
  author       = {Huansheng Ning and
                  Hong Liu and
                  Laurence T. Yang},
  title        = {Cyberentity Security in the Internet of Things},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {46--53},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.74},
  doi          = {10.1109/MC.2013.74},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/NingLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NiuPSTL13,
  author       = {Jianwei Niu and
                  Jing Peng and
                  Lei Shu and
                  Chao Tong and
                  Wanjiun Liao},
  title        = {An Empirical Study of a Chinese Online Social Network-Renren},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {78--84},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.1},
  doi          = {10.1109/MC.2013.1},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/NiuPSTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/OGorman13,
  author       = {Lawrence O'Gorman},
  title        = {Putting a Kinder Face on Public Cameras},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {79--81},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.286},
  doi          = {10.1109/MC.2013.286},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/OGorman13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Ortiz13,
  author       = {Sixto Ortiz},
  title        = {Software-Defined Networking: On the Verge of a Breakthrough?},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {10--12},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.249},
  doi          = {10.1109/MC.2013.249},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Ortiz13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Pace13,
  author       = {Jason Pace},
  title        = {The Ways We Play, Part 1: From PCs to Consoles to Mobile Phones},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {94--96},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.64},
  doi          = {10.1109/MC.2013.64},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Pace13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Pace13a,
  author       = {Jason Pace},
  title        = {The Ways We Play, Part 2: Mobile Game Changers},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {97--99},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.146},
  doi          = {10.1109/MC.2013.146},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Pace13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Paredes-OlivaBS13,
  author       = {Ignasi Paredes{-}Oliva and
                  Pere Barlet{-}Ros and
                  Josep Sol{\'{e}}{-}Pareta},
  title        = {Scan Detection under Sampling: {A} New Perspective},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {38--44},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.70},
  doi          = {10.1109/MC.2013.70},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Paredes-OlivaBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PeltV13,
  author       = {Roy van Pelt and
                  Anna Vilanova},
  title        = {Understanding Blood-Flow Dynamics: New Challenges for Visualization},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {60--67},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.121},
  doi          = {10.1109/MC.2013.121},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PeltV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Peppler13,
  author       = {Kylie A. Peppler},
  title        = {STEAM-Powered Computing Education: Using E-Textiles to Integrate the
                  Arts and {STEM}},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {38--43},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.257},
  doi          = {10.1109/MC.2013.257},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Peppler13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PittBNRRSLFS13,
  author       = {Jeremy Pitt and
                  Aikaterini Bourazeri and
                  Andrzej Nowak and
                  Magdalena Roszczynska{-}Kurasinska and
                  Agnieszka Rychwalska and
                  Inmaculada Rodr{\'{\i}}guez Santiago and
                  Maite L{\'{o}}pez{-}S{\'{a}}nchez and
                  Monica Florea and
                  Mihai Sanduleac},
  title        = {Transforming Big Data into Collective Awareness},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {40--45},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.153},
  doi          = {10.1109/MC.2013.153},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PittBNRRSLFS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PoursaberiYGSW13,
  author       = {Ahmad Poursaberi and
                  Svetlana N. Yanushkevich and
                  Marina L. Gavrilova and
                  Vlad P. Shmerko and
                  Patrick S. P. Wang},
  title        = {Situational Awareness through Biometrics},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {102--104},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.181},
  doi          = {10.1109/MC.2013.181},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PoursaberiYGSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PrasadS13,
  author       = {Chandra Prasad and
                  Wolfram Schulte},
  title        = {Taking Control of Your Engineering Tools},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {63--66},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.337},
  doi          = {10.1109/MC.2013.337},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PrasadS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PreyW13,
  author       = {Jane Chu Prey and
                  Alfred C. Weaver},
  title        = {Fostering Gender Diversity in Computing},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {22--23},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.97},
  doi          = {10.1109/MC.2013.97},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PreyW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RahwanDRNMVJC13,
  author       = {Iyad Rahwan and
                  Sohan Dsouza and
                  Alex Rutherford and
                  Victor Naroditskiy and
                  James McInerney and
                  Matteo Venanzi and
                  Nicholas R. Jennings and
                  Manuel Cebri{\'{a}}n},
  title        = {Global Manhunt Pushes the Limits of Social Mobilization},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {68--75},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.295},
  doi          = {10.1109/MC.2012.295},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RahwanDRNMVJC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RashidBRMGW13,
  author       = {Awais Rashid and
                  Alistair Baron and
                  Paul Rayson and
                  Corinne May{-}Chahal and
                  Phil Greenwood and
                  James Walkerdine},
  title        = {Who Am I? Analyzing Digital Personas in Cybercrime Investigations},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {54--61},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.68},
  doi          = {10.1109/MC.2013.68},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RashidBRMGW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Repenning13,
  author       = {Alexander Repenning},
  title        = {Making Programming Accessible and Exciting},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {78--81},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.214},
  doi          = {10.1109/MC.2013.214},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Repenning13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Resnick13,
  author       = {Hy Resnick},
  title        = {Busted: {A} Digital Group Game to Help At-Risk Youth Stay out of Jail},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {88--90},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.414},
  doi          = {10.1109/MC.2013.414},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Resnick13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RhyneC13,
  author       = {Theresa{-}Marie Rhyne and
                  Min Chen},
  title        = {Cutting-Edge Research in Visualization},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {22--24},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.166},
  doi          = {10.1109/MC.2013.166},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RhyneC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Ricanek13,
  author       = {Karl Ricanek},
  title        = {The Next Biometric Challenge: Medical Alterations},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {94--96},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.329},
  doi          = {10.1109/MC.2013.329},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Ricanek13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RicanekM13,
  author       = {Karl Ricanek Jr. and
                  Gayathri Mahalingam},
  title        = {Biometrically, How Identical Are Identical Twins?},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {94--96},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.82},
  doi          = {10.1109/MC.2013.82},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RicanekM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Riedl13,
  author       = {John Riedl},
  title        = {Crowdfunding Technology Innovation},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {100--103},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.89},
  doi          = {10.1109/MC.2013.89},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Riedl13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RiedlR13,
  author       = {John Riedl and
                  Eric Riedl},
  title        = {Crowdsourcing Medical Research},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {89--92},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.15},
  doi          = {10.1109/MC.2013.15},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RiedlR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RikakisKL13,
  author       = {Thanassis Rikakis and
                  Aisling Kelliher and
                  Nicole Lehrer},
  title        = {Experiential Media and Digital Culture},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {46--54},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.391},
  doi          = {10.1109/MC.2012.391},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RikakisKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RoggenTLFMC13,
  author       = {Daniel Roggen and
                  Gerhard Tr{\"{o}}ster and
                  Paul Lukowicz and
                  Alois Ferscha and
                  Jos{\'{e}} del R. Mill{\'{a}}n and
                  Ricardo Chavarriaga},
  title        = {Opportunistic Human Activity and Context Recognition},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {36--45},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.393},
  doi          = {10.1109/MC.2012.393},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RoggenTLFMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/RyanFM13,
  author       = {Patrick S. Ryan and
                  Sarah Falvey and
                  Ronak Merchant},
  title        = {When the Cloud Goes Local: The Global Problem with Data Localization},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {54--59},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.402},
  doi          = {10.1109/MC.2013.402},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/RyanFM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Sanders13,
  author       = {Ruth H. Sanders},
  title        = {Why Learn a Foreign Language?},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {83--85},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.148},
  doi          = {10.1109/MC.2013.148},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Sanders13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Schaffer13,
  author       = {Kim Schaffer},
  title        = {Passwords, Privacy, and Policies: Can They Do Business Together?},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {76--79},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.433},
  doi          = {10.1109/MC.2013.433},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Schaffer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SchirnerECP13,
  author       = {Gunar Schirner and
                  Deniz Erdogmus and
                  Kaushik R. Chowdhury and
                  Taskin Padir},
  title        = {The Future of Human-in-the-Loop Cyber-Physical Systems},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {36--45},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.31},
  doi          = {10.1109/MC.2013.31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SchirnerECP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Schnabel13,
  author       = {Robert B. Schnabel},
  title        = {Personal Reflections on Gender Diversity in Computing},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {62--63},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.5},
  doi          = {10.1109/MC.2013.5},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Schnabel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SchreckK13,
  author       = {Tobias Schreck and
                  Daniel A. Keim},
  title        = {Visual Analysis of Social Media Data},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {68--75},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.430},
  doi          = {10.1109/MC.2012.430},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SchreckK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SchuchhardtDHMC13,
  author       = {Matthew Schuchhardt and
                  Abhishek Das and
                  Nikos Hardavellas and
                  Gokhan Memik and
                  Alok N. Choudhary},
  title        = {The Impact of Dynamic Directories on Multicore Interconnects},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {32--39},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.334},
  doi          = {10.1109/MC.2013.334},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SchuchhardtDHMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SeceleanuC13,
  author       = {Cristina Cerschi Seceleanu and
                  Ivica Crnkovic},
  title        = {Component Models for Reasoning},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {40--47},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.335},
  doi          = {10.1109/MC.2013.335},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/SeceleanuC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SeceleanuS13,
  author       = {Tiberiu Seceleanu and
                  Gaetana Sapienza},
  title        = {A Tool Integration Framework for Sustainable Embedded Systems Development},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {68--71},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.297},
  doi          = {10.1109/MC.2013.297},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SeceleanuS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13,
  author       = {Charles R. Severance},
  title        = {Van Jacobson: Content-Centric Networking},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {11--13},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.34},
  doi          = {10.1109/MC.2013.34},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13a,
  author       = {Charles R. Severance},
  title        = {Mitchell Baker: The Mozilla Foundation},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {7--9},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.58},
  doi          = {10.1109/MC.2013.58},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13b,
  author       = {Charles R. Severance},
  title        = {Pooja Sankar: Building the Piazza Collaboration System},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {6--7},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.110},
  doi          = {10.1109/MC.2013.110},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13c,
  author       = {Charles R. Severance},
  title        = {Larry Smarr: Building Mosaic},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {6--8},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.140},
  doi          = {10.1109/MC.2013.140},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13d,
  author       = {Charles R. Severance},
  title        = {Bob Metcalfe: Ethernet at Forty},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {6--9},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.159},
  doi          = {10.1109/MC.2013.159},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13e,
  author       = {Charles R. Severance},
  title        = {Gordon Bell: Building Blocks of Computing},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {6--7},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.207},
  doi          = {10.1109/MC.2013.207},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13f,
  author       = {Charles R. Severance},
  title        = {Katie Hafner: The Origins of the Internet},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {6--7},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.241},
  doi          = {10.1109/MC.2013.241},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13g,
  author       = {Charles R. Severance},
  title        = {Len Kleinrock: The Theory of Packets [Computing Conversations]},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {6--8},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.282},
  doi          = {10.1109/MC.2013.282},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13h,
  author       = {Charles R. Severance},
  title        = {John C. Hollar: History of Computing},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {13--14},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.318},
  doi          = {10.1109/MC.2013.318},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13i,
  author       = {Charles R. Severance},
  title        = {Eben Upton: Raspberry Pi},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {14--16},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.349},
  doi          = {10.1109/MC.2013.349},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13j,
  author       = {Charles R. Severance},
  title        = {MOOCs: An Insider's View},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {93--96},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.366},
  doi          = {10.1109/MC.2013.366},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13k,
  author       = {Charles R. Severance},
  title        = {Ian Horrocks: Standardizing {OWL}},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {8--9},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.386},
  doi          = {10.1109/MC.2013.386},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Severance13l,
  author       = {Charles R. Severance},
  title        = {Andrew Tanenbaum: Writing the Book on Networks},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {9--10},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.443},
  doi          = {10.1109/MC.2013.443},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Severance13l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SharT13,
  author       = {Lwin Khin Shar and
                  Hee Beng Kuan Tan},
  title        = {Defeating {SQL} Injection},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {69--77},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.283},
  doi          = {10.1109/MC.2012.283},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SharT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SharkeyS13,
  author       = {Noel E. Sharkey and
                  Amanda J. C. Sharkey},
  title        = {Robotic Surgery: On the Cutting Edge of Ethics},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {56--64},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.424},
  doi          = {10.1109/MC.2012.424},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SharkeyS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShiK13,
  author       = {Qingchuan Shi and
                  Omer Khan},
  title        = {Toward Holistic Soft-Error-Resilient Shared-Memory Multicores},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {56--64},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.262},
  doi          = {10.1109/MC.2013.262},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShneidermanPH13,
  author       = {Ben Shneiderman and
                  Catherine Plaisant and
                  Bradford W. Hesse},
  title        = {Improving Healthcare with Interactive Visualization},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {58--66},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.38},
  doi          = {10.1109/MC.2013.38},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShneidermanPH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShriramanZD13,
  author       = {Arrvindh Shriraman and
                  Hongzhou Zhao and
                  Sandhya Dwarkadas},
  title        = {An Application-Tailored Approach to Hardware Cache Coherence},
  journal      = {Computer},
  volume       = {46},
  number       = {10},
  pages        = {40--47},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.258},
  doi          = {10.1109/MC.2013.258},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/ShriramanZD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SinghalCGSKAB13,
  author       = {Mukesh Singhal and
                  Santosh Chandrasekhar and
                  Tingjian Ge and
                  Ravi S. Sandhu and
                  Ram Krishnan and
                  Gail{-}Joon Ahn and
                  Elisa Bertino},
  title        = {Collaboration in Multicloud Computing Environments: Framework and
                  Security Issues},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {76--84},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.46},
  doi          = {10.1109/MC.2013.46},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SinghalCGSKAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Sobel13,
  author       = {Ann E. K. Sobel},
  title        = {The Modern Educator},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {82--83},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.220},
  doi          = {10.1109/MC.2013.220},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Sobel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Sobel13a,
  author       = {Ann E. K. Sobel},
  title        = {The Escalating Cost of College},
  journal      = {Computer},
  volume       = {46},
  number       = {12},
  pages        = {85--87},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.438},
  doi          = {10.1109/MC.2013.438},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Sobel13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SongJBC13,
  author       = {Yoon{-}Jong Song and
                  Gitae Jeong and
                  In{-}Gyu Baek and
                  Jungdal Choi},
  title        = {What Lies Ahead for Resistance-Based Memory Technologies?},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {30--36},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.221},
  doi          = {10.1109/MC.2013.221},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SongJBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Stansberry13,
  author       = {Matt Stansberry},
  title        = {The Future of Green {IT:} Solving the Accountability Issue},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {91--93},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.251},
  doi          = {10.1109/MC.2013.251},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Stansberry13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Starbird13,
  author       = {Kate Starbird},
  title        = {Returning to My Inner Nerd: Following the "Social" Disruption of Computing},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {63--65},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.395},
  doi          = {10.1109/MC.2012.395},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Starbird13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/StephensonD13,
  author       = {Chris Stephenson and
                  Rebecca Dovi},
  title        = {More than Gender: Taking a Systemic Approach to Improving {K-12} Computer
                  Science Education},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {42--46},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.2},
  doi          = {10.1109/MC.2013.2},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/StephensonD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/StreitB13,
  author       = {Marc Streit and
                  Oliver Bimber},
  title        = {Visual Analytics: Seeking the Unknown},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {20--21},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.255},
  doi          = {10.1109/MC.2013.255},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/StreitB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SwansonC13,
  author       = {Steven Swanson and
                  Adrian M. Caulfield},
  title        = {Refactor, Reduce, Recycle: Restructuring the {I/O} Stack for the Future
                  of Storage},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {52--59},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.222},
  doi          = {10.1109/MC.2013.222},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/SwansonC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SzczepanskiHBMA13,
  author       = {Amy F. Szczepanski and
                  Jian Huang and
                  Troy Baer and
                  Yashema C. Mack and
                  Sean Ahern},
  title        = {Data Analysis and Visualization in High-Performance Computing},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {84--92},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.192},
  doi          = {10.1109/MC.2012.192},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SzczepanskiHBMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Talia13,
  author       = {Domenico Talia},
  title        = {Clouds for Scalable Big Data Analytics},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {98--101},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.162},
  doi          = {10.1109/MC.2013.162},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Talia13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Tallon13,
  author       = {Paul P. Tallon},
  title        = {Corporate Governance of Big Data: Perspectives on Value, Risk, and
                  Cost},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {32--38},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.155},
  doi          = {10.1109/MC.2013.155},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Tallon13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/TewD13,
  author       = {Allison Elliott Tew and
                  Brian Dorn},
  title        = {The Case for Validated Tools in Computer Science Education Research},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {60--66},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.259},
  doi          = {10.1109/MC.2013.259},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/TewD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Turner13,
  author       = {Joseph Turner},
  title        = {Power Management as Choice Architecture},
  journal      = {Computer},
  volume       = {46},
  number       = {5},
  pages        = {108--111},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.177},
  doi          = {10.1109/MC.2013.177},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Turner13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Varshney13,
  author       = {Upkar Varshney},
  title        = {A Smart Approach to Medication Management},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {71--76},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.70},
  doi          = {10.1109/MC.2012.70},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Varshney13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/VassevH13,
  author       = {Emil Vassev and
                  Mike Hinchey},
  title        = {Autonomy Requirements Engineering},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {82--84},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.267},
  doi          = {10.1109/MC.2013.267},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/VassevH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Vetter13,
  author       = {Ron Vetter},
  title        = {Embracing Digital Publishing},
  journal      = {Computer},
  volume       = {46},
  number       = {1},
  pages        = {8--10},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.16},
  doi          = {10.1109/MC.2013.16},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Vetter13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WeiMKNK13,
  author       = {David S. L. Wei and
                  San Murugesan and
                  Sy{-}Yen Kuo and
                  Kshirasagar Naik and
                  Danny Krizanc},
  title        = {Enhancing Data Integrity and Privacy in the Cloud: An Agenda},
  journal      = {Computer},
  volume       = {46},
  number       = {11},
  pages        = {87--90},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.384},
  doi          = {10.1109/MC.2013.384},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WeiMKNK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WhitneyGGMS13,
  author       = {Telle Whitney and
                  Denise Gammal and
                  Barbara Gee and
                  Jody Mahoney and
                  Caroline Simard},
  title        = {Priming the Pipeline: Addressing Gender-Based Barriers in Computing},
  journal      = {Computer},
  volume       = {46},
  number       = {3},
  pages        = {30--36},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.40},
  doi          = {10.1109/MC.2013.40},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WhitneyGGMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WiganC13,
  author       = {Marcus R. Wigan and
                  Roger Clarke},
  title        = {Big Data's Big Unintended Consequences},
  journal      = {Computer},
  volume       = {46},
  number       = {6},
  pages        = {46--53},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.195},
  doi          = {10.1109/MC.2013.195},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WiganC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Wijk13,
  author       = {Jarke J. van Wijk},
  title        = {Evaluation: {A} Challenge for Visual Analytics},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {56--60},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.151},
  doi          = {10.1109/MC.2013.151},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Wijk13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WilliamsBDPWSMPSSBCKPWSSKEPGCBPKPM13,
  author       = {Dean N. Williams and
                  Peer{-}Timo Bremer and
                  Charles M. Doutriaux and
                  John Patchett and
                  Sean Williams and
                  Galen M. Shipman and
                  Ross Miller and
                  David Pugmire and
                  Brian E. Smith and
                  Chad A. Steed and
                  E. Wes Bethel and
                  Hank Childs and
                  Harinarayan Krishnan and
                  Prabhat and
                  Michael F. Wehner and
                  Cl{\'{a}}udio T. Silva and
                  Emanuele Santos and
                  David Koop and
                  Tommy Ellqvist and
                  Jorge Poco and
                  Berk Geveci and
                  Aashish Chaudhary and
                  Andy Bauer and
                  Alexander Pletzer and
                  Dave Kindig and
                  Gerald Potter and
                  Thomas P. Maxwell},
  title        = {Ultrascale Visualization of Climate Data},
  journal      = {Computer},
  volume       = {46},
  number       = {9},
  pages        = {68--76},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.119},
  doi          = {10.1109/MC.2013.119},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WilliamsBDPWSMPSSBCKPWSSKEPGCBPKPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Wilson13,
  author       = {Cameron Wilson},
  title        = {What's Up Next for Code.org?},
  journal      = {Computer},
  volume       = {46},
  number       = {8},
  pages        = {95--97},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.292},
  doi          = {10.1109/MC.2013.292},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Wilson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Witman13,
  author       = {Paul Witman},
  title        = {Social Media for Social Value},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {82--85},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.247},
  doi          = {10.1109/MC.2013.247},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Witman13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZeadallyPC13,
  author       = {Sherali Zeadally and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Han{-}Chieh Chao},
  title        = {Securing Cyberspace in the 21st Century},
  journal      = {Computer},
  volume       = {46},
  number       = {4},
  pages        = {22--23},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.144},
  doi          = {10.1109/MC.2013.144},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ZeadallyPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZidenbergKW13,
  author       = {Tsahee Zidenberg and
                  Isaac Keslassy and
                  Uri C. Weiser},
  title        = {Optimal Resource Allocation with MultiAmdahl},
  journal      = {Computer},
  volume       = {46},
  number       = {7},
  pages        = {70--77},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2012.359},
  doi          = {10.1109/MC.2012.359},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ZidenbergKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics