default search action
IEEE Computer, Volume 35, 2002
Volume 35, Number 1, January 2002
- James H. Aylor:
The End of Computing Disciplines as We Know Them? 4-5
- Willis K. King:
Implementing Our Future Vision in 2002. 6-8
- Letters. 9-11
- Robert P. Colwell:
logy, Astrology, Risk, and Product Quality. 12-14
- News Briefs. 22-25
- Lee Garber:
Technology News. 26-32
- Chandrasekhar Narayanaswami, Noboru Kamijoh, Mandayam T. Raghunath, Tadanobu Inoue, Thomas M. Cipolla, James L. Sanford, Eugene S. Schlig, Sreekrishnan Venkiteswaran, Dinakar Guniguntala, Vishal Kulkarni, Kazuhiko Yamazaki:
IBM's Linux Watch: The Challenge of Miniaturization. 33-41 - Alan Allan, Don Edenfeld, William H. Joyner Jr., Andrew B. Kahng, Mike Rodgers, Yervant Zorian:
2001 Technology Roadmap for Semiconductors. 42-53 - Bruce R. Schatz:
The Interspace: Concept Navigation Across Distributed Communities. 54-62 - Barry W. Boehm:
Get Ready for Agile Methods, with Care. 64-69 - Luca Benini, Giovanni De Micheli:
Networks on Chips: A New SoC Paradigm. 70-78 - Mark Oskin, Frederic T. Chong, Isaac L. Chuang:
A Practical Architecture for Reliable Quantum Computers. 79-87 - Gabriel Leen, Donal Heffernan:
Expanding Automotive Electronic Systems. 88-93
- Thad Starner:
Web Technologies - Thick Clients for Personal Wireless Devices. 133-135 - Wayne H. Wolf:
Embedded Computing - What Is Embedded Computing? 136-137 - Richard G. Mathieu:
IT Systems Perspective- Top-Down Approach to Computing. 138-139 - Sam Fuller, Tom Cox:
Standards - Anatomy of a Forward-Looking Open Standard. 140-141 - W. Neville Holmes:
The Profession - To See Ourselves as Others See Us. 142-144
Volume 35, Number 2, February 2002
- Letters. 6-8
- Robert P. Colwell:
On Computers and Rock 'n' Roll. 9-11
- Article Summaries. 12-13
- Steven J. Vaughan-Nichols:
Web Services: Beyond the Hype. 18-21
- Linda Dailey Paulson:
Wanted: More Network-Security Graduates and Research. 22-24
- News Briefs. 25-27
- Kenneth L. Kraemer, Jason L. Dedrick:
Enter the Dragon: China's Computer Industry. 28-36
- Shubhendu S. Mukherjee, Sarita V. Adve, Todd M. Austin, Joel S. Emer, Peter S. Magnusson:
Performance Simulation Tools. 38-39 - Christopher J. Hughes, Vijay S. Pai, Parthasarathy Ranganathan, Sarita V. Adve:
RSIM: Simulating Shared-Memory Multiprocessors with ILP Processors. 40-49 - Peter S. Magnusson, Magnus Christensson, Jesper Eskilson, Daniel Forsgren, Gustav Hållberg, Johan Högberg, Fredrik Larsson, Andreas Moestedt, Bengt Werner:
Simics: A Full System Simulation Platform. 50-58 - Todd M. Austin, Eric Larson, Dan Ernst:
SimpleScalar: An Infrastructure for Computer System Modeling. 59-67 - Joel S. Emer, Pritpal S. Ahuja, Eric Borch, Artur Klauser, Chi-Keung Luk, Srilatha Manne, Shubhendu S. Mukherjee, Harish Patil, Steven Wallace, Nathan L. Binkert, Roger Espasa, Toni Juan:
Asim: A Performance Model Framework. 68-76
- Norman F. Schneidewind:
Body of Knowledge for Software Quality Measurement. 77-83
- Computer Society Connection. 84-88
- Call and Calendar. 89-91
- Career Opportunities. 92-103
- Bookshelf. 105
- Products. 106-108
- William A. Arbaugh:
Security: Technical, Social, and Legal Challenges. 109-111
- Michael R. Macedonia:
Linux in Hollywood: A Star is Born. 112-114
- Upkar Varshney:
Multicast Support in Mobile Commerce Applications. 115-117
- W. Neville Holmes:
Representative Democracy and the Profession. 118-120
Volume 35, Number 3, March 2002
- Letters. 6-7
- Robert P. Colwell:
Engineering, Science, and Quantum Mechanics. 8-10
- Article Summaries. 11-12
- George Lawton:
Open Source Security: Opportunity or Oxymoron? 18-21
- David Clark:
Mobile Processors Begin to Grow Up. 22-25
- News Briefs. 27-29
- Roslin V. Hauck, Homa Atabakhsh, Pichai Ongvasith, Harsh Gupta, Hsinchun Chen:
Using Coplink to Analyze Criminal-Justice Data. 30-37 - André Guéziec:
Tracking Pitches for Broadcast Television. 38-43
- Ivan Poupyrev, Desney S. Tan, Mark Billinghurst, Hirokazu Kato, Holger Regenbrecht, Nobuji Tetsutani:
Developing a Generic Augmented-Reality Interface. 44-50 - Kurt D. Fenstermacher, Mark Ginsburg:
A Lightweight Framework for Cross-Application User Monitoring. 51-59 - Jennifer Allanson:
Electrophysiologically Interactive Computer Systems. 60-65
- Gary William Flake, Steve Lawrence, C. Lee Giles, Frans Coetzee:
Self-Organization and Identification of Web Communities. 66-71 - Eduardo Miranda:
Planning and Executing Time-Bound Projects. 73-79
- Computer Society Connection. 80-84
- Call and Calendar. 85-88
- Career Opportunities. 90-95
- Bookshelf. 96
- Products. 97-99
- Grant Martin, Frank Schirrmeister:
A Design Chain for Embedded Systems. 100-103 - Charles Steinfield:
Realizing the Benefits of Virtual Teams. 104-106 - Amanda Spink, Bernard J. Jansen, Dietmar Wolfram, Tefko Saracevic:
From E-Sex to E-Commerce: Web Search Changes. 107-109 - W. Neville Holmes:
Computers, Programming, and People. 110-112
Volume 35, Number 4, April 2002
- Letters. 6-8
- Robert P. Colwell:
Near Misses: Murphy's Law is Wrong. 9-12
- Article Summaries. 13
- Linda Dailey Paulson:
Faster RAM Tackles Data and Marketplace Bottlenecks. 17-19
- News Briefs. 20-22
- Nachiketh R. Potlapally:
Optical Fingerprinting to Protect Data: A Proposal. 23-28
- Donald J. Welch, Daniel Ragsdale, Wayne Schepens:
Training for Information Assurance. 30-37
- Savitha Srinivasan, Eric W. Brown:
Is Speech Recognition Becoming Mainstream? 38-41 - Mukund Padmanabhan, Michael Picheny:
Large-Vocabulary Speech Recognition Algorithms. 42-50 - Allen L. Gorin, Alicia Abella, Tirso Alonso, Giuseppe Riccardi, Jeremy H. Wright:
Automated Natural Spoken Dialog. 51-56 - Pedro J. Moreno, Jean-Manuel Van Thong, Beth Logan, Gareth J. F. Jones:
From Multimedia Retrieval to Knowledge Management. 58-66
- Richard H. Thayer:
Software System Engineering: A Tutorial. 68-73
- Computer Society Connection. 74-76
- Call and Calendar. 77-79
- Career Opportunities. 80-84
- Bertrand Meyer:
Assessing a C# Text. 86-88
- Bookshelf. 89
- Products. 90-91
- Rashmi Bajaj, Samantha Ranaweera, Dharma P. Agrawal:
GPS: Location-Tracking Technology. 92-94
- James Korris, Michael R. Macedonia:
The End of Celluloid: Digital Cinema Emerges. 96-98
- Gary McGraw:
Managing Software Security Risks. 99-101
- W. Neville Holmes:
Side Effects of Digital Technology. 102-104
Volume 35, Number 5, May 2002
- Quantum Mystery Mongering. 6-10
- Robert P. Colwell:
If You Didn't Test It, It Doesn't Work. 11-13
- Article Summaries. 17
- John Edwards, Linda Dailey Paulson:
Smart Graphics: A New Approach to Meeting User Needs. 18-21
- Neal Leavitt:
Data Mining for the Corporate Masses? 22-24
- News Briefs: Will New Chip Revolutionize Digital Photography? / US Approves New Uses for Wireless Technology. 25-27
- Michael R. Blaha, Cheryl Smith:
A Pattern for Softcoded Values. 28-34
- Kyle Eischen:
Software Development: An Outsider's View. 36-44
- Won Kim, Ki-Joon Chae, Dong-Sub Cho, Byoungju Choi, Anmo Jeong, Myung Kim, Kiho Lee, Meejeong Lee, Sang-Ho Lee, Seung-Soo Park, Hwan-Seung Yong:
The Chamois Component-Based Knowledge Engineering Framework. 46-54 - Selim Aissi, Pallavi Malu, Krishnamurthy Srinivasan:
E-Business Process Modeling: The Next Big Step. 55-62
- T. S. Raghu, Ram Ramesh, Andrew B. Whinston:
Next Steps for Mobile Entertainment Portals. 63-70 - Laura E. Jackson, George N. Rouskas:
Deterministic Preemtive Scheduling of Real-Time Tasks. 72-79 - Fayaz A. Shaikh, Stan McClellan, Manpreet Singh, Sannedhi K. Chakravarthy:
End-to-End Testing of IP QoS Mechanisms. 80-87
- Call and Calendar. 88-91
- Computer Society Connection. 92-94
- Career Opportunities. 96-98
- Bookshelf: The Art of Evolutionary Computation. 99
- Products. 100-101
- Douglas A. Lyon, Christopher L. Huntley:
There's More Than One Way to Build a Bridge. 102-103
- Kate McMillan:
Technology Standards Pros Aid Homeland Security. 104-105
- Wayne H. Wolf:
Household Hints for Embedded Systems Designers. 106-108
- W. Neville Holmes:
Would a Digital Brain Have a Mind? 110-112
Volume 35, Number 6, June 2002
- Information System Engineering. 6-9
- Robert P. Colwell:
When the real world intervenes on well-planned experiments, the lessons you learn stick with you. 10-12
- Article Summaries. 13
- George Lawton:
Moving Java into Mobile Phones. 17-20
- Steven J. Vaughan-Nichols:
Will 10-Gigabit Ethernet Have a Bright Future? 22-24
- Little Chips Promise Big Power / Bioinformatics Experiences Important Breakthroughs / Company Unveils Holographic for 3D Storage. 25-27
- Ross J. Anderson:
Free Speech Online and Offline. 28-30 - Leonard L. Tripp:
Software Certification Debate: Benefits of Certification. 31-33 - Adam Kolawa:
Software Certification Debate: Certification Will Do More Harm than Good. 34-35
- Ian T. Foster, Carl Kesselman, Jeffrey M. Nick, Steven Tuecke:
Grid Services for Distributed System Integration. 37-46 - William T. C. Kramer:
SCinet: Testbed for High-Performance Networked Applications. 47-55
- Cyrus Shahabi, Roger Zimmermann, Kun Fu, Shu-Yuen Didi Yao:
Yima: A Second-Generation Continuous Media Server. 56-64 - Hyokyung Bahn, Kern Koh, Sang Lyul Min, Sam H. Noh:
Efficient Replacement of Nonuniform Objects in Web Caches. 65-73
- IEEE Computer Society Recognizes Achievements of Leading Computer Engineers. 74-76
- Call and Calendar. 77-80
- Recipes for Image Analysis. 81
- Products. 82-83
- Career Opportunities. 84-88
- Tom DeMarco, Barry W. Boehm:
The Agile Methods Fray. 90-92
- Erin Kenneally:
Who's Liable for Insecure Networks? 93-95
- Sasikanth Avancha, Anupam Joshi, Timothy W. Finin:
Enhanced Service Discovery in Bluetooth. 96-99
- Donald A. Norman:
Home Theater: Not Ready for Prime Time. 100-102
- Ana Asuaga:
Using Computers in Our Daily Life. 103-104
Volume 35, Number 7, July 2002
- Robert P. Colwell:
What Technology Is Doing to Music. 6-8
- Article Summaries. 9-10
- Sixto Ortiz Jr.:
Is Business Intelligence a Smart Move? 11-14
- George Lawton:
Invasive Software: Who's Inside Your Computer? 15-18
- Taking a Graphical Approach to the Password - Improvements Stream into Multimedia Technology - Data at the Speed of Light. 19-21
- Junhyong Kim:
Computers Are from Mars, Organisms Are from Venus. 25-32 - Dror G. Feitelson, Millet Treinin:
The Blueprint for Life? 34-40
- Lenwood S. Heath, Naren Ramakrishnan:
The Emerging Landscape of Bioinformatics Software Systems. 41-45 - Mihai Pop, Steven Salzberg, Martin Shumway:
Genome Sequence Assembly: Algorithms and Issues. 47-54 - Bernard M. E. Moret, Li-San Wang, Tandy J. Warnow:
Toward New Software for Computational Phylogenetics. 55-64 - Bahram Parvin, Qing Yang, Gerald Fontenay, Mary Helen Barcellos-Hoff:
BioSig: An Imaging Bioinformatic System for Studying Phenomic. 65-71 - Salvatore Paxia, Archisman Rudra, Yi Zhou, Bud Mishra:
A Random Walk Down the Genomes: DNA Evolution in Valis. 73-79 - Jinwook Seo, Ben Shneiderman:
Interactively Exploring Hierarchical Clustering Results. 80-86
- Computer Society Connection. 87-91
- Call and Calender. 92-94
- Putting Discrepancy Theory to Work. 95
- Products. 96-97
- Career Opportunities. 98-101
- Jonathan W. Palmer:
Designing for Web Site Usability. 102-103
- Christine Rigden:
Now You See It, Now You Don't. 104-105
- Thomas M. Conte:
Choosing the Brain(s) of an Embedded System. 106-107
- Simon S. Y. Shim, Yen-Jen Lee:
Interactive TV: VoD Meets the Internet. 108-109
- W. Neville Holmes:
Seven Great Blunders of the Computing World. 110-112
Volume 35, Number 8, August 2002
- Letters. 6-9
- Robert P. Colwell:
Weird Books. 10-12
- Lee Garber:
Romanian Disaster-Response Project Wins Design Competition. 13-15
- Article Summaries. 19
- Linda Dailey Paulson:
Computer System, Heal Thyself. 20-22
- Linda Dailey Paulson:
Distributed Storage Challenges Data Glut - Professors Use Technology to Fight Plagiarism - Startup Wants to Automate Chip Design. 23-25
- Mary C. Lacity:
Lessons in Global Information Technology Sourcing. 26-33 - Rahul Gupta, Sumeet Talwar, Dharma P. Agrawal:
Jini Home Networking: A Step toward Pervasive Computing . 34-40
- Peter Gutmann:
PKI: It's Not Dead, Just Resting. 41-49 - George Cybenko, Annarita Giani, Paul Thompson:
Cognitive Hacking: A Battle for the Mind. 50-56 - Jeffrey B. Lotspiech, Stefan Nusser, Florian Pestoni:
Broadcast Encryption's Bright Future. 57-63
- Computer Society Connection. 64-66
- Call and Calendar. 67-69
- Career Opportunities. 70-72
- Products. 74-75
- Bookshelf. 76
- William A. Arbaugh:
Improving the TCPA Specification. 77-79
- Panagiotis Demestichas, Louisa Papadopoulou, Vera Stavroulaki, Michael E. Theologou, Guillaume Vivier, Georges Martinez, Fabio Galliano:
Wireless Beyond 3G: Managing Services and Network Resources. 80-82
- Dean Chang:
Haptics: Gaming's New Sensation. 84-86
- Atif M. Memon:
GUI Testing: Pitfalls and Process. 87-88
- Diana Orrick:
Toward Adequate Online Privacy Safeguards. 90-92
Volume 35, Number 9, September 2002
- Article Summaries. 6
- Home Theater Strategies. 8-10
- Robert P. Colwell:
Employee Performance Reviews. 12-15
- Steven J. Vaughan-Nichols:
Developing the Distributed-Computing OS. 19-21
- News Briefs. 22-24
- Oliver Bimber, Stephen M. Gatesy, Lawrence M. Witmer, Ramesh Raskar, L. Miguel Encarnação:
Merging Fossil Specimens with Computer-Generated Information. 25-30
- Charlene Chuck Walrad, Darrel E. Strom:
The Importance of Branching Models in SCM. 31-38
- Vinod Kathail, Shail Aditya, Robert Schreiber, B. Ramakrishna Rau, Darren C. Cronquist, Mukund Sivaraman:
PICO: Automatically Designing Custom Computers. 39-47 - Wayne H. Wolf, I. Burak Özer, Tiehan Lv:
Smart Cameras as Embedded Systems. 48-53
- Jiannong Cao, Xinyu Feng, Jian Lu, Sajal K. Das:
Mailbox-Based Scheme for Designing Mobile Agent Communication Protocols. 54-60
- IEEE Computer Society Election. 62-68
- IEEE President-Elect Candidates Address Computer Society Concerns. 70-76
- Call and Calendar. 77-80
- Risk-Based Approach to Mission-Critical Software Testing. 81
- Products. 82-83
- Career Opportunities. 84-91
- Abdelsalam Heddaya:
An Economically Scalable Internet. 93-95
- Wayne H. Wolf:
Whither Warhol's Law? 96-97
- Clay Shirky:
Web Services and Context Horizons. 98-100
- W. Neville Holmes:
Jobs, Trades, Skills, and the Profession. 102-104
Volume 35, Number 10, October 2002
- Article Summaries. 6
- Content Protection Alternatives. 8-10
- Robert P. Colwell:
The Power of the Most Likely. 12-14
- David Clark:
Do Web Standards and Patents Mix? 19-22
- Neal Leavitt:
Let's Hear It for Audio Mining. 23-25
- Linda Dailey Paulson:
News Briefs Topics include: Project Promises Accessible Technology for the Disabled / Two Efforts Aim to Upgrade Mobile Memory / Prime Breakthrough May Improve Encryption. 26-28
- Ravi Kalakota, Pavan Gundepudi, Jonathan Wareham, Arun Rai, Richard J. Welke:
The Economics of DSL Regulation. 29-36
- Bill N. Schilit, Jonathan Trevor, David M. Hilbert, Tzu Khiau Koh:
Web Interaction Using Very Small Internet Devices. 37-45 - Suman Banerjee, Sulabh Agarwal, Kevin Kamel, Andrzej Kochut, Christopher Kommareddy, Tamer Nadeem, Pankaj Thakkar, Bao Trinh, Adel M. Youssef, Moustafa Youssef, Ronald L. Larsen, A. Udaya Shankar, Ashok K. Agrawala:
Rover: Scalable Location-Aware Computing. 46-53 - Anthony D. Wood, John A. Stankovic:
Denial of Service in Sensor Networks. 54-62
- Samitha Samaranayake, Nodari Sitchinava, Rohit Kapur, Minesh B. Amin, Thomas W. Williams:
Dynamic Scan: Driving Down the Cost of Test. 63-68
- Products. 70-71
- The XML Culture Clash. 72
- Computer Society Connection. 74-77
- Call and Calendar. 78-81
- Career Opportunities. 82-95
- Michael R. Macedonia:
The Computer Graphics Wars Heat Up. 97-99
- Josef F. Huber:
Toward the Mobile Internet. 100-102
- Andrew "bunnie" Huang:
The Trusted PC: Skin-Deep Security. 103-105
- Laura K. Briggs, Kari Boyd McBride:
Rethinking the Digital Divide. 106-108
Volume 35, Number 11, November 2002
- Article Summaries. 6-7
- Cognitive Hacking of a Different Sort. 8-9
- Robert P. Colwell:
The Coolest Thing on Earth. 10-12
- Steven J. Vaughan-Nichols:
Bull Market for IEEE 802.11 WLAN Chipsets. 17-19
- Linda Dailey Paulson:
Stopping Intruders Outside the Gates. 20-22
- Linda Dailey Paulson:
News Briefs Topics include: IBM Works on a Universal Virtual Computer / Battling Intrusions with a "Network Telescope" / Choreographing Web Services. 23-25
- Ning Zhong, Jiming Liu, Yiyu Yao:
In Search of the Wisdom Web. 27-31
- Ravi Kumar, Prabhakar Raghavan, Sridhar Rajagopalan, Andrew Tomkins:
The Web and Social Networks. 32-36 - Toyoaki Nishida:
Social Intelligence Design for the Web. 37-41 - Toru Ishida:
Q: A Scenario Description Language for Interactive Agents. 42-47 - Joanna Bryson, David L. Martin, Sheila A. McIlraith, Lynn Andrea Stein:
Toward Behavioral Intelligence in the Semantic Web. 48-54 - Dieter Fensel:
Ontology-Based Knowledge Management. 56-59 - Michele Missikoff, Roberto Navigli, Paola Velardi:
Integrated Approach to Web Ontology Learning and Engineering. 60-63 - Jiawei Han, Kevin Chen-Chuan Chang:
Data Mining for Web Intelligence. 64-70 - Nick Cercone, Lijun Hou, Vlado Keselj, Aijun An, Kanlaya Naruedomkul, Xiaohua Hu:
From Computational Intelligence to Web Intelligence. 72-76
- Bookshelf. 77
- Products. 78-79
- Computer Society Connection. 80-83
- Call and Calendar. 84-86
- Career Opportunities. 88-105
- Roger L. Norton:
Using Virtual Linux Servers. 106-107
- Jan Madsen, Jørgen Steensgaard-Madsen, Lars Christensen:
A Sophomore Course in Codesign. 108-110
- Stephen Ransom, Xindong Wu:
Using Knowledge Anchors to Reduce Cognitive Overheads. 111-112
- Anita C. Ricketts:
IEEE Registration Authority. 113
- W. Neville Holmes:
The Profession and the World. 114-116
Volume 35, Number 12, December 2002
- Article Summaries. 4
- Letters. 6-8
- Willis K. King:
President's Message: Year in Review. 10-11 - James H. Aylor:
EIC's Message: It has been a Great Ride! 12
- Robert P. Colwell:
Science-Philosophy Celebrity Death Match. 13-15
- Steven J. Vaughan-Nichols:
OFDM: Back to the Wireless Future. 19-21
- George Lawton:
Virus Wars: Fewer Attacks, New Threats. 22-24
- Linda Dailey Paulson:
News Briefs Topics include: Researchers Upgrade Smart Card Technology / New Optical Clock Could Synchronize Chips. 25-27
- Chris Rowen:
Reducing SoC Simulation and Development Time. 29-34
- Gary S. Robinson:
Toward the Age of Smarter Storage. 35-41 - John P. Scheible:
A Survey of Storage Options. 42-46 - Michael T. LoBue, Harry Mason, Thomas Hammond-Doel, Eric Anderson, Mike Alexenko, Tom Clark:
Surveying Today's Most Popular Storage Interfaces. 48-55 - Robert Griswold:
Storage Topologies. 56-63 - Roger Cummings:
The Evolution of Information Assurance. 65-72
- Report to Members. 73-74
- Computer Society Connection. 75-76
- Call and Calendar. 77-79
- Career Opportunities. 92-115
- Bookshelf. 117
- Products. 118-119
- Upkar Varshney:
Mobile Payments. 120-121
- Christopher B. Stapleton, Charles E. Hughes, J. Michael Moshell, Paulius Micikevicius, Marty Altman:
Applying Mixed Reality to Entertainment. 122-124
- O. Sami Saydjari:
Defending Cyberspace. 125
- Simone Santini:
Using Language More Responsibly. 126-128
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.