


default search action
IEEE Computer, Volume 34, 2001
Volume 34, Number 1, January 2001
- James H. Aylor:

Can We Work Together? 4
- Benjamin W. Wah:

Pushing Forward into the Third Millenium. 6-8
- David Clark:

Face-to-Face with Peer-to-Peer Networking. 18-21
- Lee Garber:

Computer Forensics: High-Tech Law Enforcement. 22-27
- Victor V. Zhirnov, Daniel J. C. Herr:

New Frontiers: Self-Assembly and Nanoelectronics. 34-43 - Brett Warneke, Matt Last, Brian Liebowitz, Kristofer S. J. Pister

:
Smart Dust: Communicating with a Cubic-Millimeter Computer. 44-51 - David Harel:

From Play-In Scenarios to Code: An Achievable Dream. 53-60 - Scott Hamilton:

Thinking Outside the Box at IHMC. 61-71 - Richard Lindheim, William R. Swartout

:
Forging a New Simulation Technology at the ICT. 72-79 - Maribeth Back, Rich Gold, Anne Balsamo, Mark Chow, Matthew G. Gorbet

, Steve R. Harrison, Dale MacDonald, Scott L. Minneman:
Designing Innovative Reading Experiences for a Museum Exhibition. 80-87
- Hal Berghel:

Cyberprivacy in the New Millennium. 132-134
- Barry W. Boehm, Victor R. Basili:

Software Defect Reduction Top 10 List. 135-137
- Miroslav Svéda, Radimir Vrba

:
Executable Specifications for Embedded Distributed Systems. 138-140
- W. Neville Holmes:

The KWIC and the Dead: A Lesson in Computing History. 142-144
Volume 34, Number 2, February 2001
- George Lawton:

Knowledge Management: Ready for Prime Time? 12-14
- Sandra Kay Miller:

The Trusted OS Makes a Comeback. 16-19
- Steve Lawrence, David M. Pennock, Gary William Flake, Robert Krovetz, Frans Coetzee, Eric J. Glover, Finn Årup Nielsen

, Andries Kruger, C. Lee Giles
:
Persistence of Web References in Scientific Research. 26-31
- Ahmed K. Elmagarmid, William J. McIver Jr.:

The Ongoing March Toward Digital Government - Guest Editors' Introduction. 32-38 - Massimo Mecella

, Carlo Batini:
Enabling Italian E-Government through a Cooperative Architecture. 40-45 - José Luis Ambite

, Yigal Arens, Eduard H. Hovy
, Andrew Philpot, Luis Gravano, Vasileios Hatzivassiloglou, Judith Klavans:
Simplifying Data Access: The Energy Data Collection Project. 47-54 - Athman Bouguettaya

, Mourad Ouzzani, Brahim Medjahed, Jerry Cameron:
Managing Government Databases. 56-64 - James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford

:
Digital Government Security Infrastructure Design Challenges. 66-72
- Gediminas Adomavicius, Alexander Tuzhilin

:
Using Data Mining Methods to Build Customer Profiles. 74-82
- Michael R. Macedonia:

Innovative Computing Powers Theme Park Adventures. 115-117
- Jim Haungs:

Pair Programming on the C3 Project. 118-119
- Michael B. Spring:

The Courtship Dance of Bulldogs and Turtles. 120-122
- Goran M. Djuknic, Robert E. Richton:

Geolocation and Assisted GPS. 123-125
- W. Neville Holmes:

US Electoral Reform: The Obvious Obligation. 126-128
Volume 34, Nunmber 3, March 2001
- Sixto Ortiz Jr.:

Instant Messaging: No Longer Just Chat. 12-15
- David Clark:

Speech Recognition: The Wireless Interface Revolution. 16-18
- Su-Shing Chen:

The Paradox of Digital Preservation. 24-28
- Jonathan J. Hull, Peter E. Hart:

Toward Zero-Effort Personal Document Management. 30-35
- Ravin Balakrishnan, George W. Fitzmaurice, Gordon Kurtenbach:

User Interfaces for Volumetric Displays. 37-45 - David L. Hecht:

Printed Embedded Data Graphical User Interfaces. 47-55 - James A. Landay, Brad A. Myers:

Sketching Interfaces: Toward More Human Interface Design. 56-64
- Chaomei Chen

, Ray J. Paul:
Visualizing a Knowledge Domain's Intellectual Structure. 65-71 - Paolo Bellavista

, Antonio Corradi
, Cesare Stefanelli:
Mobile Agent Middleware for Mobile Computing. 73-81
- Paul G. Shotsberger, Ronald J. Vetter:

Teaching and Learning in the Wireless Classroom. 110-111
- Frank Vahid, Tony Givargis:

Platform Tuning for Embedded Systems Design. 112-114
- Bashar Nuseibeh

:
Weaving Together Requirements and Architectures. 115-117
- Helen Nissenbaum:

How Computer Systems Embody Values. 118-120
Volume 34, Number 4, April 2001
- George Lawton:

New Technologies Place Video in Your Hand. 14-17
- Sandra Kay Miller:

Aspect-Oriented Programming Takes Aim at Software Complexity. 18-21
- William R. Hamburgen, Deborah A. Wallach, Marc A. Viredaz, Lawrence S. Brakmo, Carl A. Waldspurger

, Joel F. Bartlett, Timothy Mann, Keith I. Farkas:
Itsy: Stretching the Bounds of Mobile Computing. 28-36
- Tsugio Makimoto, Kazuhiko Eguchi, Mitsugu Yoneyama:

The Cooler the Better: New Directions in the Nomadic Age. 38-42 - Shang-yi Chiang:

Foundries and the Dawn of an Open IP Era. 43-46
- Sriram Vajapeyam, Mateo Valero

:
Early 21st Century Processors - Guest Editors' Introduction. 47-50 - Trevor N. Mudge:

Power: A First-Class Architectural Design Constraint. 52-58 - James E. Smith:

Instruction-Level Distributed Processing. 59-65 - Gurindar S. Sohi, Amir Roth:

Speculative Multithreaded Processors. 66-71 - B. Ramakrishna Rau, Michael S. Schlansker:

Embedded Computer Architecture and Automation. 75-83
- James F. Dunnigan:

The Curse of Fast Iron. 100-103
- Itamar Elhanany, Michael Kahane, Dan Sadot

:
Packet Scheduling in Next-Generation Multiterabit Networks. 104-106
- Mark W. Maier

, David E. Emery, Rich Hilliard:
Software Architecture: Introducing IEEE Standard 1471. 107-109
- Abbe Mowshowitz:

Virtual Organization: The New Feudalism. 110-112
Volume 34, Number 5, May 2001
- Don Kiely:

Wanted: Programmers for Handheld Devices. 12-14
- John Edwards:

Next-Generation Viruses Present New Challenges. 16-18
- Atsushi Kara:

Protecting Privacy in Remote-Patient Monitoring. 24-27
- Bertrand Meyer

:
Software Engineering in the Academy. 28-35
- Michael J. Lutz:

Guest Editor's Introduction: Software Engineering on Internet Time. 36 - Martin L. Griss, Gilda Pour:

Accelerating Development with Agent Components. 37-43 - Sahra Sedigh-Ali

, Arif Ghafoor, Raymond A. Paul:
Software Engineering Metrics for COTS-Based Systems. 44-50 - Richard L. Baskerville

, Linda Levine, Jan Pries-Heje, Balasubramaniam Ramesh
, Sandra Slaughter:
How Internet Software Companies Negotiate Quality. 51-57
- Patricia K. Lawlis, Kathryn E. Mark, Deborah A. Thomas, Terry Courtheyn:

A Formal Process for Evaluating COTS Software Products. 58-63 - William E. Wright:

An Efficient Video-on-Demand Model. 64-70
- David Sobel:

Will Carnivore Devour Online Privacy? 87-88
- Stanislaw Deniziak

, Krzysztof Sapiecha:
Developing a High-Level Fault Simulation Standard. 89-90
- Victor R. Basili, Barry W. Boehm:

COTS-Based Systems Top 10 List. 91-93
- W. Neville Holmes:

The Great Term Robbery. 94-96
Volume 34, Number 6, June 2001
- Neal Leavitt:

Linux: At a Turning Point? 12-15
- George Lawton:

New I/O Technologies Seek to End Bottlenecks. 16-18
- Kurt Geihs

:
Middleware Challenges Ahead. 24-31
- Ming-Wei Wu, Ying-Dar Jason Lin:

Open Source Software Development: An Overview. 33-38
- David G. Leeper:

A Long-Term View of Short-Range Wireless. 39-44 - Yu-Chee Tseng, Shih-Lin Wu, Wen-Hwa Liao

, Chih-Min Chao:
Location Awareness in Ad Hoc Wireless Mobile Networks. 46-52 - Subhasis Saha, Mark Jamtgaard, John D. Villasenor:

Bringing the Wireless Internet to Mobile Devices. 54-58
- Leonard J. Seligman, Arnon Rosenthal:

XML's Impact on Databases and Data Sharing. 59-67 - Erik Riedel, Christos Faloutsos

, Garth A. Gibson
, David Nagle:
Active Disks for Large-Scale Data Processing. 68-74
- Upkar Varshney, Radhika Jain:

Issues in Emerging 4G Wireless Networks. 94-96
- Mark Ollis, Todd Williamson:

The Future of 3D Video. 97-99
- Ken Krechmer:

The Need for Openness in Standards. 100-101
- Ana Asuaga:

Engineering a New Society. 102-104
Volume 34, Number 7, July 2001
- George Lawton:

Internet Appliances Struggle for Acceptance. 12-15
- Sandra Kay Miller:

Facing the Challenge of Wireless Security. 16-18
- Giorgio C. Buttazzo:

Artificial Consciousness: Utopia or Real Possibility? 24-30
- Manoj Parameswaran, Anjana Susarla

, Andrew B. Whinston:
P2P Networking: An Information-Sharing Alternative. 31-38
- Edmund H. Durfee

:
Scaling Up Agent Coordination Strategies. 39-46 - Jeffrey M. Bradshaw

, Niranjan Suri, Alberto J. Cañas, Robert Davis, Kenneth M. Ford, Robert R. Hoffman, Renia Jeffers, Thomas Reichherzer:
Terraforming Cyberspace. 48-56 - Henry Lieberman, Elizabeth Rosenzweig

, Push Singh:
Aria: An Agent for Annotating and Retrieving Images. 57-62 - Simon Case, Nader Azarmi, Marcus Thint, Takeshi Ohtani:

Enhancing E-Communities with Agent-Based Systems. 64-69 - John E. Laird

:
Using a Computer Game to Develop Advanced AI. 70-75
- Alan L. Montgomery, Christos Faloutsos

:
Identifying Web Browsing Trends and Patterns. 94-95
- Sarah A. Sheard:

Evolution of the Framework's Quagmire. 96-98
- Allalaghatta Pavan, Rakesh Jha, Lee Graba, Saul Cooper, Ionut Cardei, Vipin Gopal, Sanjay Parthasarathy, Saad Bedros:

Real-Time Adaptive Resource Management. 99-101
- W. Neville Holmes:

Vanity and Guilt, Humility and Pride. 102-104
Volume 34, Number 8, August 2001
- James H. Aylor:

Keep on Keepin' on. 6-7
- George Lawton:

Is IPv6 Finally Gaining Ground? 11-15
- David Clark:

Visual Basic and the Future of Web-Application Development. 16-18
- Timothy A. Budd:

Protecting and Managing Electronic Content with a Digital Battery. 24-30
- Roy Want, Bill N. Schilit:

Guest Editors' Introduction: Expanding the Horizons of Location-Aware Computing. 31-34 - Nigel Davies

, Keith Cheverst
, Keith Mitchell, Alon Efrat
:
Using and Determining Location in a Context-Sensitive Tour Guide. 35-41 - Salil Pradhan, Cyril Brignone, Jun-Hong Cui, Alan A. McReynolds, Mark T. Smith:

Websigns: Hyperlinking Physical Locations to the Web. 42-48 - Mike Addlesee, Rupert W. Curwen, Steve Hodges, Joseph Newman, Pete Steggles, Andy Ward, Andy Hopper:

Implementing a Sentient Computing System. 50-56 - Jeffrey Hightower, Gaetano Borriello:

Location Systems for Ubiquitous Computing. 57-66
- Xianjun Geng, Andrew B. Whinston:

Profiting from Value-Added Wireless Services. 87-89
- Michael R. Macedonia:

E3 2001: The Birth of Ubiquitous Gaming? 90-91
- Bertrand Meyer

:
.NET Is Coming. 92-97
- Diomidis Spinellis

:
Fear of Coding, and How to Reduce It. 98-100
Volume 34, Number 9, September 2001
- Linda Dailey Paulson:

Translation Technology Tries to Hurdle the Language Barrier. 12-15
- George Lawton:

Is Technology Meeting the Privacy Challenge?. 16-18
- Václav Rajlich, Norman Wilde, Michelle Buckellew, Henry Page:

Software Cultures and Evolution. 24-28
- John Morris

, Gareth Lee, Kris Parker, Gary A. Bundell, Chiou Peng Lam:
Software Component Certification. 30-36
- Jonathan C. L. Liu, David Hung-Chang Du:

Guest Editors' Introduction: Continuous Media on Demand. 37-39 - Gavin B. Horn, Per Knudsgaard, Søren B. Lassen, Michael Luby, Jens Eilstrup Rasmussen:

A Scalable and Reliable Paradigm for Media on Demand. 40-45 - Ingo Elsen, Frank Hartung, Uwe Horn, Markus Kampmann, Liliane Peters:

Streaming Technology in 3G Mobile Communication Systems. 46-52 - Andreas Girgensohn, John S. Boreczky, Lynn Wilcox:

Keyframe-Based User Interfaces for Digital Video. 61-67 - Jan Pieper, Savitha Srinivasan, Byron Dom:

Streaming-Media Knowledge Discovery. 68-74
- John R. Michener, Steven D. Mohan:

Clothing the E-Emperor. 116-118
- Jim Highsmith, Alistair Cockburn:

Agile Software Development: The Business of Innovation. 120-122
- W. Neville Holmes:

Crouching Error, Hidden Markup. 126-128
Volume 34, Number 10, October 2001
- Steven J. Vaughan-Nichols:

Tempest over Web-Authoring Tools. 12-14
- Maria-Angeles Grado-Caffaro, Martin Grado-Caffaro:

The Challenges that XML Faces. 15-18
- Julio César Hernández Castro

, José María Sierra
, Arturo Ribagorda, Benjamín Ramos:
Search Engines as a Security Threat. 25-30
- Lixin Tao:

Shifting Paradigms with the Application Service Provider Model. 32-39
- William A. Arbaugh, Leendert van Doorn:

Guest Editors' Introduction: Embedded Security: Challenges and Concerns. 40-41 - C. Brendan S. Traw:

Protecting Digital Content within the Home. 42-47 - Dan S. Wallach:

Copy Protection Technology is Doomed. 48-49 - Peter Bergstrom, Kevin Driscoll, John Kimball:

Making Home Automation Communications Secure. 50-56 - Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, Steve H. Weingart:

Building the IBM 4758 Secure Coprocessor. 57-66 - Mike Bond, Ross J. Anderson:

API-Level Attacks on Embedded Systems. 67-75
- Sergei Gerasenko, Abhijit Joshi, Srinivas Rayaprolu, Kovendhan Ponnavaikko, Dharma P. Agrawal:

Beacon Signals: What, Why, How, and Where? 108-110
- Grantley Day:

Online Games: Crafting Persistent-State Worlds. 111-112
- Leonard J. Bass, Bonnie E. John:

Supporting Usability Through Software Architecture. 113-115
- Carl Cargill:

Why Are We Doing This? 116-117
- W. Neville Holmes:

The Profession's Future Lies in Its Past. 118-120
Volume 34, Number 11, November 2001
- Sixto Ortiz Jr.:

Embedded Oss Gain the Inside Track. 14-16
- Neal Leavitt:

3D Technology: Ready for the PC?. 17-20
- Andreas Zeller

:
Automated Debugging: Are We Close. 26-31
- Robert A. Martin:

Managing Vulnerabilities in Networked Systems. 32-38
- Ákos Lédeczi, Arpad Bakay, Miklos Maroti

, Péter Völgyesi, Greg Nordstrom, Jonathan Sprinkle
, Gabor Karsai:
Composing Domain-Specific Design Environments. 44-51 - Tommi Mikkonen, Peeter Pruuden:

Flexibility as a Design Driver. 52-56 - Andy D. Pimentel, Louis O. Hertzberger, Paul Lieverse, Pieter van der Wolf, Ed F. Deprettere:

Exploring Embedded-Systems Architectures with Artemis. 57-63 - Perry Alexander, Cindy Kong:

Rosetta: Semantic Support for Model-Centered Systems-Level Design. 64-70 - Mikko Kerttula, Timo Tokkonen:

Virtual Design of Multiengineering Electronics Systems. 71-79
- Chris Kenyon

:
The Evolution of Web-Caching Markets. 128-130
- Alistair Cockburn, Jim Highsmith:

Agile Software Development: The People Factor. 131-133
- W. Neville Holmes:

Terrorism, Technology, and the Profession. 134-136
Volume 34, Number 12, December 2001
- Letters. 4

- Benjamin W. Wah:

Reviewing Our 2001 Strategic Accomplishments. 8-9 - Report to Members. 11-12

- George Lawton:

Browsing the Mobil Internet. 18-21 - Steven J. Vaughan-Nichols:

Will Vector Graphics Finally Make It on the Web? 22-24 - News Briefs. 25-27

- Mazen Zari, Hossein Saiedian

, Muhammad Naeem:
Understanding and Reducing Web Delays. 30-37
- Michael R. Blaha:

Data Warehouses and Decision Support Systems. 38-39 - Torben Bach Pedersen, Christian S. Jensen

:
Multidimensional Database Technology. 40-46 - Surajit Chaudhuri, Umeshwar Dayal, Venkatesh Ganti:

Database Technology for Decision Support Systems. 48-55 - Donald J. Berndt

, John W. Fisher, Alan R. Hevner, James Studnicki:
Healthcare Data Warehousing and Quality Assurance. 56-65 - Juan Trujillo

, Manuel Palomar
, Jaime Gómez, Il-Yeol Song:
Designing Data Warehouses with OO Conceptual Models. 66-75 - Robert Armstrong:

Seven Steps to Optimizing Data Warehouse Performance. 76-79
- Fernando Pedone

:
Boosting System Performance with Optimistic Distributed Protocols. 80-86 - Carl K. Chang, Jane Cleland-Huang, Shiyan Hua, Annie Kuntzmann-Combelles:

Function-Class Decomposition: A Hybrid Software Engineering Method. 87-93
- Lalana Kagal, Timothy W. Finin

, Anupam Joshi
:
Communications - Trust-Based Security in Pervasive Computing Environments. 154-157 - David A. E. Wall:

Software Technologies - Using Open Source for a Profitable Startup. 158-160 - Michael R. Macedonia:

Entertainment Computing - Will Linux Be Computer Games' Dark Horse OS? 161-162 - Jerzy W. Rozenblit, Sanjaya Kumar:

Integrated Engineering - Looking Back, Moving Forward. 164-165 - Cristina Cifuentes:

The Profession - Reverse Engineering and the Computing Profession. 166-168

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














