default search action
IEEE Computer, Volume 33, 2000
Volume 33, Number 1, January 2000
- John Edwards:
Redefining IT Career Paths for the New Millennium. 16-20
- Sixto Ortiz Jr.:
E-mail Protection Advances with New Technologies. 21-23
- Jonathan Vos Post, Kirk L. Kroeker:
Writing the Future: Computers in Science Fiction. 29-37 - Andrew M. Steane, Eleanor Gilbert Rieffel:
Beyond Bits: The Future of Quantum Information Processing. 38-45 - Christine Peterson:
Taking Technology to the Molecular Level. 46-53 - Lucas D. Introna, Helen Nissenbaum:
Defining the Web: The Politics of Search Engines. 54-62 - Daniel E. Cooke, Scott Hamilton:
New Directions at NASA Ames Research Center. 63-71 - Janet Wilson:
Toward Things That Think. 72-76
- Lawrence G. Roberts:
Beyond Moore's Law: Internet Growth Trends. 117-119
- Moshe Sipper, Eduardo Sanchez:
Configurable Chips Meld Software and Hardware. 120-121
- Barry W. Boehm:
The Art of Expectations Management. 122-124
- Ted G. Lewis:
Service: The Next Inflection Point. 126-128
Volume 33, Number 2, February 2000
- George Lawton:
Intellectual-Property Protection Opens Path for E-commerce. 14-17
- David Clark:
Shopbots Become Agents for Business Change. 18-21
- Emilie O'Connell, Hossein Saiedian:
Can You Trust Software Capability Evaluations? 28-35
- Michael S. Schlansker, B. Ramakrishna Rau:
EPIC: Explicititly Parallel Instruction Computing. 37-45
- Sharath Pankanti, Ruud M. Bolle, Anil K. Jain:
Biometrics: The Future of Identification - Guest Editors' Introduction. 46-49 - Alex Pentland, Tanzeem Choudhury:
Face Recognition for Smart Environments. 50-55 - P. Jonathon Phillips, Alvin F. Martin, Charles L. Wilson, Mark A. Przybocki:
An Introduction to Evaluating Biometric Systems. 56-63 - Robert Frischholz, Ulrich Dieckmann:
BioID: A Multimodal Biometric Identification System. 64-68 - Michael Negin, Thomas A. Chmielewski Jr., Theodure A. Camus, Ulf M. Cahn von Seelen, Péter L. Venetianer, Guanghua G. Zhang:
An Iris Biometric System for Public and Personal Use. 70-75 - James L. Wayman:
Federal Biometric Technology Legislation. 76-80
- Giacomo Cabri, Letizia Leonardi, Franco Zambonelli:
Mobile-Agent Coordination Models for Internet Applications. 82-89
- Michael R. Macedonia:
Why Digital Entertainment Drives the Need for Speed. 124-127
- Lee W. McKnight, Jahangir Boroumand:
Pricing Internet Services: Approaches and Challenges. 128-129
- Catherine J. Tilton:
An Emerging Biometric API Industry Standard. 130-132
- Ted G. Lewis:
Tracking the 'Anywhere, Anytime' Inflection Point. 134-136
Volume 33, Number 3, March 2000
- James H. Aylor:
New Computer Departments Reflect our Changing Industry. 4-6
- Sixto Ortiz Jr.:
Embedded Databases Come out of Hiding. 16-19
- John Edwards:
Buidling the Optical-Networking Infrastructure. 20-23
- W. Neville Holmes:
The Evitability of Software Patents. 30-34
- Roy Ladner, Mahdi Abdelguerfi, Kevin Shaw:
3D Mapping of an Interactive Synthetic Environment. 35-39
- Erik R. Altman, David R. Kaeli, Yaron Sheffer:
Welcome to the Opportunities of Binary Translation. 40-45 - Cindy Zheng, Carol L. Thompson:
PA-RISC to IA-64: Transparent Execution, No Recompilation. 47-52 - Michael Gschwind, Erik R. Altman, Sumedh W. Sathaye, Paul Ledak, David Appenzeller:
Dynamic and Transparent Binary Translation. 54-59 - Cristina Cifuentes, Mike Van Emmerik:
UQBT: Adaptive Binary Translation at Low Cost. 60-66
- Jean Bacon, Ken Moody, John Bates, Richard Hayton, Chaoying Ma, Andrew McNeil, Oliver Seidel, Mark D. Spiteri:
Generic Support for Distributed Applications. 68-76 - Rob C. van Ommering, Frank van der Linden, Jeff Kramer, Jeff Magee:
The Koala Component Model for Consumer Electronics Software. 78-85
- Lee W. McKnight, Jahangir Boroumand:
Pricing Internet Services: Proposed Improvements. 108-109
- Hessam S. Sarjoughian, Bernard P. Zeigler, Daryl R. Hild:
A Codesign Approach for Distributed Systems. 110-113
- Barry W. Boehm:
Unifying Software Engineering and Systems Engineering. 114-116
- Ted G. Lewis:
AOL, Time Warner, and the Crash of 2000. 118-120
Volume 33, Number 4, April 2000
- Lee Garber:
Denial-of-Service Attacks Rip the Internet. 12-17
- Bashar Nuseibeh, Steve M. Easterbrook, Alessandra Russo:
Leveraging Inconsistency in Software Development. 24-29
- Roger T. Alexander, James M. Bieman, John Viega:
Coping with Java Programming Stress. 30-38
- Ranga Vemuri, Randolph E. Harr:
Configurable Computing: Technology and Applications - Guest Editors' Introduction. 39-40 - André DeHon:
The Density Advantage of Configurable Computing. 41-49 - Simon D. Haynes, John Stone, Peter Y. K. Cheung, Wayne Luk:
Video Image Processing with the Sonic Architecture. 50-57 - Marco Platzner:
Reconfigurable Accelerators for Combinatorial Problems. 58-60 - Timothy J. Callahan, John R. Hauser, John Wawrzynek:
The Garp Architecture and C Compiler. 62-69 - Seth Copen Goldstein, Herman Schmit, Mihai Budiu, Srihari Cadambi, Matthew Moe, R. Reed Taylor:
PipeRench: A Reconfigurable Architecture and Compiler. 70-77
- Upkar Varshney:
Recent Advances in Wired Networking. 107-109
- Michael R. Macedonia:
Using Technology and Innovations to Simulate Daily Life. 110-112
- Peter Flynn, Richard Wiggins:
XML: An Interview with Peter Flynn. 113-114
- Michael J. Lutz:
Fundamental Ideas and Change. 115-116
- Ted G. Lewis:
When Atoms and Bit Collide: Detroit Goes Digital. 118-120
Volume 33, Number 5, May 2000
- Reed Hellman:
The Future of the OS for Internet Applications. 12-15
- Neal Leavitt:
Will WAP Deliver the Wireless Internet? 16-20
- Barry W. Boehm, Victor R. Basili:
Gaining Intellectual Control of Software Development. 27-33
- Gilda Pour, Martin L. Griss, Michael J. Lutz:
The Push to Make Software Engineering Respectable. 35-43 - Timothy Lethbridge:
What Knowledge Is Important to a Software Professional? 44-50
- Brian E. Brewington, George Cybenko:
Keeping Up with the Changing Web. 52-58 - Lee Breslau, Deborah Estrin, Kevin R. Fall, Sally Floyd, John S. Heidemann, Ahmed Helmy, Polly Huang, Steven McCanne, Kannan Varadhan, Ya Xu, Haobo Yu:
Advances in Network Simulation. 59-67 - Jørgen Staunstrup, Henrik Reif Andersen, Henrik Hulgaard, Jørn Lind-Nielsen, Kim Guldstrand Larsen, Gerd Behrmann, Kåre J. Kristoffersen, Arne Skou, Henrik Leerberg, Niels Bo Theilgaard:
Practical Verification of Embedded Software. 68-75
- Anitesh Barua, Andrew B. Whinston, Fang Yin:
Value and Productivity in the Internet Economy. 102-105
- Jonathan R. Agre, Loren P. Clare:
An Integrated Architecture for Cooperative Sensing Networks. 106-108
- Ted G. Lewis:
Why Funny Money Will Have the Last Laugh. 110-112
Volume 33, Number 6, June 2000
- David Clark:
Are Too Many Programmers Too Narrowly Trained? 12-15
- George Lawton:
Distributed Net Applications Create Virtual Supercomputers. 16-20
- Peter M. Maurer:
Components: What If They Gave a Revolution and Nobody Came? 28-34
- Robert S. Oshana:
Winning Teams: Performance Engineering during Development. 36-44
- Eltefaat Shokri, Phillip C.-Y. Sheu:
Guest Editors' Introduction - Real-Time Distributed Object Computing: An Emerging Field. 45-46 - Gregory Bollella, James Gosling:
The Real-Time Specification for Java. 47-54 - Douglas C. Schmidt, Fred Kuhns:
An Overview of the Real-Time CORBA Specification. 56-63 - Bran Selic:
A Generic Framework for Modeling Resources with UML. 64-69 - K. H. Kim:
APIs for Real-Time Distributed Object Programming. 72-80
- Upkar Varshney:
Recent Advances in Wireless Networking. 100-103
- Michael R. Macedonia:
The Empire Strikes Back ... with the X-Box. 104-106
- Jim Waldo:
Alive and Well: Jini Technology Today. 107-109
- Ted G. Lewis:
The End of Research as We Know It? 110-112
Volume 33, Number 7, July 2000
- George Lawton:
Video Streams into the Mainstream. 12-17
- Sixto Ortiz Jr.:
Broadband Fixed Wireless Travels the Last Mile. 18-21
- John L. Henning:
SPEC CPU2000: Measuring CPU Performance in the New Millennium. 28-35
- David J. Goodman:
The Wireless Internet: Promises and Challenges. 36-41
- Jan M. Rabaey, M. Josie Ammer, Julio Leao da Silva Jr., Danny Patel, Shad Roundy:
PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking. 42-48 - Andrew P. Snow, Upkar Varshney, Alisha D. Malloy:
Reliability and Survivability of Wireless and Mobile Networks. 49-55
- Thomas Ball, James R. Larus:
Using Paths to Measure, Explain, and Enhance Program Behavior. 57-65 - Václav Rajlich, Keith H. Bennett:
A Staged Model for the Software Life Cycle. 66-71 - Forrest Shull, Ioana Rus, Victor R. Basili:
How Perspective-Based Reading Can Improve Requirements Inspections. 73-79
- W. Neville Holmes:
Fashioning a Foundation for the Computing Profession. 97-98
- Barry W. Boehm:
Requirements that Handle IKIWISI, COTS, and Rapid Change. 99-102
- Veljko M. Milutinovic, Predrag Knezevic, Bozidar Radunovic, Steve Casselman, John Schewel:
Obelix Searches Internet Using Customer Data. 104-107
- John R. Michener, Tolga Acar:
Managing System and Active-Content Integrity. 108-110
- Ted G. Lewis:
The Web Fosters a Rust-Belt Renaissance. 110-112
Volume 33, Number 8, August 2000
- Neal Leavitt:
Whatever Happened to Object-Oriented Databases? 16-19
- David Clark:
Encryption Advances to Meet Internet Challenges. 20-24
- Jeffrey M. Voas:
Developing a Usage-Based Software Certification Process. 32-37
- Anita K. Jones:
The Challenge of Building Survivable Information-Intensive Systems - Guest Editor's Introduction. 39-43 - Massoud Amin:
Toward Self-Healing Infrastructure Systems. 44-53 - Kenneth P. Birman:
The Next-Generation Internet: Unsafe at Any Speed? 54-60 - Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliççöte, Pradeep K. Khosla:
Survivable Information Storage Systems. 61-68 - Donald E. Brown, Louise F. Gunderson, Marc H. Evans:
Interactive Analysis of Computer Crimes. 69-77
- Michael R. Macedonia:
Distributed File Sharing: Barbarians at the Gates? 99-101
- Richard Hay:
Comparing POS and ATM Interfaces. 102-103
- Peter J. Danielsen:
The Promise of a Voice-Enabled Web. 104-106
- David Chadwick:
Windows 2000: A Threat to Internet Diversity and Open Standards? 107-109
- Ted G. Lewis:
Why WAP May Never Get off the Ground. 110-112
Volume 33, Number 9, September 2000
- George Lawton:
The Wild World of 3D Graphics Chips. 12-16
- Edward A. Lee:
What's Ahead for Embedded Software? 18-26
- Michael A. Olson:
Selecting and Implementing an Embedded Database System. 27-34 - Rodger Lea, Simon Gibbs, Alec Dara-Abrams, Edward Eytchison:
Networking Home Entertainment Devices with HAVi. 35-43
- Domenico Talia:
Cellular Processing Tools for High-Performance Simulation. 44-52
- W. Neville Holmes:
Olympic Games Reform: A Study in System Engineering. 91-93
- Barry W. Boehm:
Termination Doesn't Equal Project Failure. 94-96
- Edmund M. A. Ronald, Moshe Sipper:
The Challenge of Tamperproof Internet Computing. 98-99
- Ted G. Lewis:
XM and Sirius Get Serious about Broadcast Satellite Radio. 102-104
Volume 33, Number 10, October 2000
- Linda Dailey Paulson:
Exploring the Wireless LANscape. 12-16
- Lutz Prechelt:
An Empirical Comparison of Seven Programming Languages. 23-29
- Alfred C. Weaver, Ronald J. Vetter, Andrew B. Whinston, Kathleen M. Swigger:
Guest Editors' Introduction: The Future of E-Commerce. 30-31 - Upkar Varshney, Ronald J. Vetter, Ravi Kalakota:
Mobile Commerce: A New Frontier. 32-38 - Simon S. Y. Shim, Vishnu S. Pendyala, Meera Sundaram, Jerry Z. Gao:
Business-to-Business E-Commerce Frameworks. 40-47 - Wenli Wang, Zoltán Hidvégi, Andrew D. Bailey Jr., Andrew B. Whinston:
E-Process Design and Assurance Using Model Checking. 48-53 - Tim Ebringer, Peter Thorne, Yuliang Zheng:
Parasitic Authentication To Protect Your E-Wallet. 54-60
- Gerald Lui-Kwan:
In-Flight Entertainment: The Sky's the Limit. 98-101
- Jim Isaak:
New Laws and Technologies Morph Web Page Best Practices. 102-103
- David G. Stork:
Using Open Data Collection for Intelligent Software. 104-106
- Joseph Samaha, Ayman I. Kayssi, Ralph Achkar, Mark Azar:
G3 Integrates Three System Technologies. 107-110
- Ted G. Lewis:
Innovation Equals Risk Reduction. 111-112
Volume 33, Number 11, November 2000
- David Clark:
Handhelds Drive Mixed-Signal Chip Development. 12-15
- Nisha Talagala, Satoshi Asami, David A. Patterson, Bob Futernick, Dakin Hart:
The Art of Massive Storage: A Web Image Archive. 22-28
- Udo Hahn, Inderjeet Mani:
The Challenges of Automatic Summarization. 29-36 - Nivio Ziviani, Edleno Silva de Moura, Gonzalo Navarro, Ricardo A. Baeza-Yates:
Compression: A Key for Next-Generation Text Retrieval Systems. 37-44 - Michael S. Lew:
Next-Generation Web Searches for Visual Content. 46-53
- Pearl Brereton, David Budgen:
Component-Based Systems: A Classification of Issues. 54-62 - Deborah Estrin, Mark Handley, John S. Heidemann, Steven McCanne, Ya Xu, Haobo Yu:
Network Visualization with Nam, the VINT Network Animator. 63-68
- Veljko M. Milutinovic, Dragana Cvetkovic, Jelena Mirkovic:
Genetic Search Based on Multiple Mutations. 118-119
- Barry W. Boehm, Daniel Port, Mohammed Al-Said:
Avoiding the Software Model-Clash Spiderweb. 120-122
- Gaetano Borriello:
The Challenges to Invisible Computing. 123-125
- W. Neville Holmes:
Some Comments on the Coding of Programs. 126-128
Volume 33, Number 12, December 2000
- Sixto Ortiz Jr.:
Will PKI Become a Key to Online Security? 13-15
- Neal Leavitt:
Malicious Code Moves to Mobile Devices. 16-19
- T. Michael Elliott:
Reflections on 18 Years of Change at the Computer Society. 26-29
- Morgan Björkander:
Graphical Programming Using UML and SDL. 30-35
- James A. Whittaker, Jeffrey M. Voas:
Toward a More Reliable Theory of Software Reliability. 36-42
- Thomas A. Longstaff, Clyde Chittister, Rich Pethia, Yacov Y. Haimes:
Are We Forgetting the Risks of Information Technology? 43-51 - William A. Arbaugh, William L. Fithen, John McHugh:
Windows of Vulnerability: A Case Study Analysis. 52-59
- Randy Butler, Von Welch, Douglas Engert, Ian T. Foster, Steven Tuecke, John Volmer, Carl Kesselman:
A National-Scale Authentication Infrastructur. 60-66 - Trishul M. Chilimbi, Mark D. Hill, James R. Larus:
Making Pointer-Based Data Structures Cache Conscious. 67-74
- James A. Senn:
The Emergence of M-Commerce. 148-150
- Harry Mason:
SCSI, the Industry Workhorse, Is Still Working Hard. 152-153
- Theresa-Marie Rhyne:
Computer Games' Influence on Scientific and Information Visualization. 154-156
- W. Neville Holmes:
Why Johnny Can't Program. 158-160
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.