


default search action
IEEE Computer, Volume 37, 2004
Volume 37, Number 1, January 2004
- Article Summaries. 4

- The Problem with AI / Defining Memory / Divisible Load-Scheduling Discovery. 6-7

- Doris L. Carver:

EIC's Message: Computer in 2004. 8-9 - Carl K. Chang:

President's Message: Evolving the World with the World's Computer Society. 10-12
- Robert P. Colwell:

Design Fragility. 13-16
- W. Neville Holmes:

January 1972 / January 1988. 17
- Steven J. Vaughan-Nichols:

Vendors Go to Extreme Lengths for New Chips. 18-20 - George Lawton:

Is Peer-to-Peer Secure Enough for Corporate Use? 22-25
- Linda Dailey Paulson:

News Briefs Topics include: E-Mail Security Gets Personal / Ceiling for Controversial US H-1B Visas Drops / Technique Speeds Data Transmission in Computers / Viewing the World through Interactive Panoramic Images. 26-28
- Jesse H. Poore:

A Tale of Three Disciplines ...and a Revolution. 30-36 - John Horgan:

The End of Science Revisited. 37-43 - Don Edenfeld, Andrew B. Kahng, Mike Rodgers, Yervant Zorian:

2003 Technology Roadmap for Semiconductors. 47-56 - Patrick Regan, Scott Hamilton:

NASA's Mission Reliable. 59-68 - Fred Niederman:

IT Employment Prospects in 2004: A Mixed Bag. 69-77 - Alex Pentland, Richard Fletcher, Amir Hasson:

DakNet: Rethinking Connectivity in Developing Nations. 78-83 - Oliver Bimber:

Combining Optical Holograms with Interactive Computer Graphics. 85-91
- Call and Calendar. 92-94

- Computer Society Connection. 95-99

- Career Opportunities. 100-112

- Products. 114

- Implementing Verification Biometrics. 115

- Thanaa M. Ghanem, Walid G. Aref:

Databases Deepen the Web. 116-117
- David Andrews

, Douglas Niehaus, Peter J. Ashenden:
Programming Models for Hybrid CPU/FPGA Chips. 118-120
- Maryam Alavi:

Distributed Learning Environments. 121-122
- Michael T. LoBue:

Best Business Practices for Standards Groups. 124-125
- Mohan Babu:

From Organization Man to Free Agent. 126-128
Volume 37, Number 2, February 2004
- Article Summaries. 4

- Improving Software Programming. 6

- Robert P. Colwell:

Computer Lessons from Pop Songs. 7-9
- Steven J. Vaughan-Nichols:

New Trends Revive Supercomputing Industry. 10-13 - David Geer:

Will New Standards Help Curb Spam? 14-16
- Linda Dailey Paulson:

News Briefs Topics include: Researcher Develops Colorful Map of the Internet / Using Plastic to Make High-Capacity Memory / Businesses Adopt Web Site's Satirical Company Names / Researchers Develop Self-Assembling Chip Technique. 17-19
- Michael R. Blaha:

A Copper Bullet for Software Quality Improvement. 21-25
- Jie Wu, Ivan Stojmenovic:

Guest Editors' Introduction: Ad Hoc Networks. 29-31 - Guohong Cao, Liangzhong Yin, Chita R. Das:

Cooperative Cache-Based Data Access in Ad Hoc Networks. 32-39 - Jean Carle, David Simplot:

Energy-Efficient Area Monitoring for Sensor Networks. 40-46 - Marco Conti

, Gaia Maselli
, Giovanni Turi, Silvia Giordano
:
Cross-Layering in Mobile Ad Hoc Network Design. 48-51 - Prasant Mohapatra, Chao Gui, Jian Li:

Group Communications in Mobile Ad Hoc Networks. 52-59 - Nikola Milanovic, Miroslaw Malek, Anthony Davidson, Veljko M. Milutinovic:

Routing and Security in Mobile Ad Hoc Networks. 61-65 - Li Xiao, Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Abdol-Hossein Esfahanian:

Prioritized Overlay Multicast in Mobile Ad Hoc Environments. 67-74
- Computer Society Connection. 75-79

- Call and Calendar. 80-82

- Career Opportunities. 84-93

- Mike Hazas

, James Scott, John Krumm:
Location-Aware Computing Comes of Age. 95-97
- Lydia Plowman

, Rosemary Luckin:
Interactivity, Interfaces, and Smart Toys. 98-100
- Peter Gutmann:

Simplifying Public Key Management. 101-103
- Luminita Vasiu, Qusay H. Mahmoud

:
Mobile Agents in Wireless Devices. 104-105
- Qusay H. Mahmoud, Wlodzimierz Dobosiewicz, David A. Swayne:

Making Computer Programming Fun and Accessible. 106-108
Volume 37, Number 3, March 2004
- Robert P. Colwell:

The Zen of Overclocking. 9-12
- Steven J. Vaughan-Nichols:

Voice Authentication Speaks to the Marketplace. 13-15 - Neal Leavitt:

Will Interoperability Problems Give IP Telephony a Busy Signal? 16-18 - Linda Dailey Paulson:

News Briefs. 19-21
- Doug Burger, James R. Goodman:

Billion-Transistor Architectures: There and Back Again. 22-28
- Peter M. Maurer:

Metamorphic Programming: Unconventional High Performance. 30-38
- Robert P. Colwell:

Theme Issue Introduction: We May Need a New Box. 40-41 - Naresh R. Shanbhag:

Reliable and Efficient System-on-Chip Design. 42-50 - Augustus K. Uht:

Going Beyond Worst-Case Specs with TEAtime. 51-56 - Todd M. Austin, David T. Blaauw, Trevor N. Mudge, Krisztián Flautner:

Making Typical Silicon Matter with Razor. 57-65 - Shih-Lien Lu:

Speeding Up Processing with Approximation Circuits. 67-73
- Gary Richardson, Blake Ives

:
Managing Systems Development. 93-94
- Franco Zambonelli

, Michael Luck
:
Agent Hell: A Scenario of Worst Practices. 96-98
- Wayne H. Wolf:

Embedded Is the New Paradigm(s). 99-101
- W. Neville Holmes:

Languages and the Computing Profession. 102-104
Volume 37, Number 4, April 2004
- Article Summaries. 4

- Letters. 6-7

- Robert P. Colwell:

Brainstorming, Influence, and Icebergs. 9-12
- George Lawton:

Will Network Processor Units Live Up to Their Promise? 13-15 - Linda Dailey Paulson:

News Briefs. 16-18
- Bo Ingvar Sandén:

Coping with Java Threads. 20-27
- Carlo Blundo

, Stelvio Cimato
:
A Software Infrastructure for Authenticated Web Metering. 28-33 - Santosh K. Rangarajan, Vir V. Phoha

, Kiran S. Balagani, Rastko R. Selmic, S. Sitharama Iyengar:
Adaptive Neural Network Clustering of Web Users. 34-40 - Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi:

XML-Based Specification for Web Services Document Security. 41-49
- Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang, Yi Qin, Michael Chau

:
Crime Data Mining: A General Framework and Some Examples. 50-56 - Nimrod Megiddo, Dharmendra S. Modha:

Outperforming LRU with an Adaptive Replacement Cache Algorithm. 58-65
- Computer Society Connection. 69-70

- Call and Calendar. 71-72

- Bookshelf. 73

- Career Opportunities. 74-75

- Products. 77

- Dipanjan Chakraborty, Hui Lei:

Extending the Reach of Business Processes. 78-80
- Mark H. Overmars:

Teaching Computer Science through Game Design. 81-83
- Roy Want:

Enabling Ubiquitous Sensing with RFID. 84-86
- Bruce Schneier:

Hacking the Business Climate for Network Security. 87-89
- Margaret L. Johnson:

Biometrics and the Threat to Civil Liberties. 90-92
Volume 37, Number 5, May 2004
- Linda Dailey Paulson:

Using MPLS to Unify Multiple Network Types. 15-17 - Steven J. Vaughan-Nichols:

Wireless Middleware: Glue for the Mobile Infrastructure. 18-20
- Anthony Finkelstein, James Hetherington, Linzhong Li, Ofer Margoninski, Peter Saffrey, Robert M. Seymour, Anne Warner:

Computational Challenges of Systems Biology. 26-33
- Eric Dishman:

Inventing Wellness Systems for Aging in Place. 34-41 - Alex Pentland:

Healthwear: Medical Technology Becomes Wearable. 42-49
- Atsushi Kara:

Private-to-Private Communications over the Internet. 53-59 - Patrick Th. Eugster, Rachid Guerraoui

, Anne-Marie Kermarrec
, Laurent Massoulié:
Epidemic Information Dissemination in Distributed Systems. 60-67
- Computer Society Connection. 68-71

- Todd M. Austin, David T. Blaauw, Scott A. Mahlke, Trevor N. Mudge, Chaitali Chakrabarti, Wayne H. Wolf:

Mobile Supercomputers. 81-83
- Gary Richardson, Blake Ives:

Systems Development Processes. 84-86
- Wojciech Cellary, Wojciech Wiza, Krzysztof Walczak

:
Visualizing Web Search Results in 3D. 87-89
- W. Neville Holmes:

Data and Information as Property. 90-92
Volume 37, Number 6, June 2004
- Bob Colwell:

Let's Hear from Those in the Back. 6-9
- Steven J. Vaughan-Nichols:

Achieving Wireless Broadband with WiMax. 10-13 - David Geer:

Just How Secure Are Security Products? 14-16 - Linda Dailey Paulson:

News Briefs. 18-20
- Diane M. Strong, Olga Volkoff:

A Roadmap for Enterprise System Implementation. 22-29
- Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap:

Guest Editors' Introduction: Securing the High-Speed Internet. 33-35 - Butler W. Lampson:

Computer Security in the Real World. 37-46 - Thomas M. Chen, Jean-Marc Robert:

Worm Epidemics in High-Speed Networks. 48-53 - Robert Friend:

Making the Gigabit IPsec VPN Architecture Secure. 54-60 - Avishai Wool

:
A Quantitative Study of Firewall Configuration Errors. 62-67
- Byung K. Yi, S. R. Subramanya:

Enhancing Personal Communications with Multimedia. 79-81
- William A. Arbaugh:

A Patch in Nine Saves Time? 82-83
- Joshua R. Smith:

Imperceptible Sensory Channels. 84-85
- Albert A. Rizzo, Todd Bowerly, Cyrus Shahabi, J. Galen Buckwalter, Dean Klimchuk, Roman Mitura:

Diagnosing Attention Disorders in a Virtual Classroom. 87-89
- Kai A. Olsen:

The Economics of International Conferences. 90-91
Volume 37, Number 7, July 2004
- Bob Colwell:

Travel Stories. 8-10
- Linda Dailey Paulson:

Open Source Databases Move into the Marketplace. 13-15 - George Lawton:

Is MIMO the Future of Wireless Communications? 20-22 - Linda Dailey Paulson:

News Briefs. 24-26
- Nancy R. Mead

:
Who Is Liable for Insecure Systems? 27-34
- Peder Jungck, Simon S. Y. Shim:

Issues in High-Speed Internet Security. 36-42
- Doug Burger, Stephen W. Keckler, Kathryn S. McKinley, Michael Dahlin, Lizy Kurian John, Calvin Lin, Charles R. Moore, James H. Burrill, Robert G. McDonald, William Yode:

Scaling to the End of Silicon with EDGE Architectures. 44-55 - Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten

, Betty H. C. Cheng
:
Composing Adaptive Software. 56-64 - Michael Kozuch, Mahadev Satyanarayanan

, Thomas C. Bressoud, Casey Helfrich, Shafeeq Sinnamohideen:
Seamless Mobile Computing on Fixed Infrastructure. 65-72
- Rebecca Montanari, Emil Lupu, Cesare Stefanelli:

Policy-Based Dynamic Reconfiguration of Mobile-Code Applications. 73-80
- Brian Fitzgerald

:
A Critical Look at Open Source. 92-94
- Philip Koopman:

Embedded System Security. 95-97
- W. Neville Holmes:

In Defense of PowerPoint. 98-99
Volume 37, Number 8, August 2004
- Bob Colwell:

The Art of the Possible. 8-10
- David Geer:

E-Micropayments Sweat the Small Stuff. 19-22
- Sixto Ortiz Jr.:

3D Searching Starts to Take Shape. 24-26 - Linda Dailey Paulson:

News Briefs. 28-30
- Hans Dybkjær, Laila Dybkjær:

Modeling Complex Spoken Dialog. 32-40
- David E. Culler, Deborah Estrin, Mani B. Srivastava:

Guest Editors' Introduction: Overview of Sensor Networks. 41-49 - Kirk Martinez

, Jane K. Hart
, Royan Ong:
Environmental Sensor Networks. 50-56 - Sean M. Brennan, Angela M. Mielke, David C. Torney, Arthur B. Maccabe

:
Radiation Detection with Distributed Sensor Networks. 57-59 - Miklos Maroti

, Gyula Simon
, Ákos Lédeczi, Janos Sztipanovits:
Shooter Localization in Urban Terrain. 60-61 - Christian C. Enz, Amre El-Hoiydi, Jean-Dominique Decotignie, Vincent Peiris:

WiseNET: An Ultralow-Power Wireless Sensor Network Solution. 62-70 - Bruce Hemingway, Waylon Brunette

, Tom Anderl, Gaetano Borriello:
The Flock: Mote Sensors Sing in Undergraduate Curriculum. 72-78
- Kenneth J. Christensen, Bruce Nordman, Richard E. Brown

:
Power Management in Networked Devices. 91-93
- Angelos D. Keromytis:

"Patch on Demand" Saves Even More Time? 94-96
- Siobhán Clarke

, Cormac Driver:
Context-Aware Trails. 97-99
- Michael R. Macedonia:

The Digital World's Midlife Crisis. 100-101
- David A. Swayne, Qusay H. Mahmoud, Wlodzimierz Dobosiewicz:

An "Offshore-Resistant" Degree Program. 102-104
Volume 37, Number 9, September 2004
- George Lawton:

Machine-to-Machine Technology Gears Up for Growth. 12-15 - Neal Leavitt:

Scob Attack: A Sign of Bad Things to Come? 16-18
- Thaddeus Kobylarz:

Beyond 3G: Compound Wireless Services. 23-28
- Runsheng Wang, Xiaorui Hu:

VoIP Development in China. 30-37
- Sarita Thakoor, John Michael Morookian, Javaan S. Chahl

, Butler Hine, Steven Zornetzer:
BEES: Exploring Mars with Bioinspired Technologies. 38-47 - Linda Dailey Paulson:

Biomimetic Robots. 48-53
- Federico Avanzini

, Davide Rocchesso
, Alberto Belussi
, Alessandro Dal Palù
, Agostino Dovier
:
Designing an Urban-Scale Auditory Alert System. 55-61 - Zeljko Obrenovic, Dusan Starcevic:

Modeling Multimodal Human-Computer Interactio. 65-72
- Chris Hofstader:

Internet Accessibility: Beyond Disability. 103-105
- Tim Hayden:

Empowering Sports Fans with Technology. 106-107
- Dimitrios N. Serpanos

:
Speeding Up High-Speed Protocol Processors. 108-111
- Jack Cole:

Raising the Bar. 112-113
- W. Neville Holmes:

Rationality and Digital Technology. 114-116
Volume 37, Number 10, October 2004
- Bob Colwell:

Trusting a Chaotic Future. 8-10
- David Geer:

Will Gesture-Recognition Technology Point the Way? 20-23 - George Lawton:

The Lowdown on High-Rise Chips. 24-27 - Linda Dailey Paulson:

News Briefs. 28-30
- Cecil Chua Eng Huang

, Jonathan Wareham:
Fighting Internet Auction Fraud: An Assessment and Proposal. 31-37
- Brian Whitworth, Elizabeth Whitworth:

Spam and the Social-Technical Gap. 38-45
- David Garlan, Shang-Wen Cheng, An-Cheng Huang, Bradley R. Schmerl, Peter Steenkiste

:
Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure. 46-54 - Hossein Saiedian

, Srikrishnan Raguraman:
Using UML-Based Rate Monotonic Analysis to Predict Schedulability. 56-63 - David Harel, Bernhard Rumpe

:
Meaningful Modeling: What's the Semantics of "Semantics"?. 64-72
- William G. Griswold

, Patricia Shanahan, Steven W. Brown, Robert T. Boyer, Matt Ratto
, R. Benjamin Shapiro, Tan Minh Truong:
ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing. 73-81
- Sean W. Smith:

Magic Boxes and Boots: Security in Hardware. 106-109
- Chris Schmandt, Natalia Marmasse:

User-Centered Location Awareness. 110-111
- Mike Goslin, Mark R. Mine:

The Panda3D Graphics Engine. 112-114
- Muthucumaru Maheswaran, Shoukat Ali:

A Taxonomy of Network Computing Systems. 115-117
- Victor J. Skowronski:

Do Agile Methods Marginalize Problem Solvers? 120
Volume 37, Number 11, November 2004
- Bob Colwell:

All Things Are Connected. 10-12
- Neal Leavitt:

Are Web Services Finally Ready to Deliver? 14-18 - Linda Dailey Paulson:

News Briefs. 20-22
- Paul S. Rosenbloom:

A New Framework for Computer Science and Engineering. 23-28 - Mike O'Neal:

Restructuring Computing Programs to Meet Employment Challenges. 29-34
- Krishna Kant, Prasant Mohapatra:

Guest Editors' Introduction: Internet Data Centers. 35-37 - Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan, David E. Lowell, Mike Wray, Tom Christian, Nigel Edwards, Chris I. Dalton, Frederic Gittler:

SoftUDC: A Software-Based Data Center for Utility Computing. 38-46 - Greg J. Regnier, Srihari Makineni, Ramesh Illikkal, Ravi R. Iyer, Dave B. Minturn, Ram Huggahalli, Donald Newell, Linda S. Cline, Annie P. Foong:

TCP Onloading for Data Center Servers. 48-58 - George Candea, Aaron B. Brown, Armando Fox, David A. Patterson:

Recovery-Oriented Computing: Building Multitier Dependability. 60-67 - Ricardo Bianchini, Ramakrishnan Rajamony:

Power and Energy Management for Server Systems. 68-74
- Products. 77

- Bookshelf. 78

- Computer Society Connection. 80-83

- Call and Calendar. Computer 37(11): 87-89 (2004)

- Career Opportunities. 90-104

- Vesna Hassler:

Online Collaboration Products. 106-109
- Jim Hughes:

IEEE Standard for Encrypted Storage. 110-112
- Wayne H. Wolf:

Applications and Architectures. 114-116
- W. Neville Holmes:

The Usefulness of Hindsight. 118-120
Volume 37, Number 12, December 2004
- Bob Colwell:

Interface Quotas and Internet-Derived Value. 10-12
- Carl K. Chang:

Transforming the World's Computer Society: Together, We Will Get It Done! 14-15
- Sixto Ortiz Jr.:

Internet Telephony Jumps off the Wires. 16-19 - David Geer:

Digital Rights Technology Sparks Interoperability Concerns. 20-22 - Linda Dailey Paulson:

News Briefs. 23-25
- Mikael Lindvall, Dirk Muthig, Aldo Dagnino, Christina Wallin, Michael Stupperich, David Kiefer, John May, Tuomo Kähkönen:

Agile Software Development in Large Organizations. 26-34
- Brad A. Myers, Jeffrey Nichols, Jacob O. Wobbrock, Robert C. Miller:

Taking Handheld Devices to the Next Level. 36-43 - Thorsten Prante, Norbert A. Streitz

, Peter Tandler
:
Roomware: Computers Disappear and Interaction Evolves. 47-54 - Bill N. Schilit, Uttam Sengupta:

Device Ensembles. 56-64 - Chandrasekhar Narayanaswami, Mandayam T. Raghunath:

Expanding the Digital Camera's Reach. 65-73
- 2004 Annual Index. 74-86

- Call and Calendar. Computer 37(12): 87-88 (2004)

- Doris L. Carver:

Reviewers Make Vital Contributions to Computer. 89-91 - Cooper Named 2005 Computer Society President-Elect. 92-93

- Bookshelf. 94

- Products. 95

- Career Opportunities. 96-114

- Upkar Varshney:

Vehicular Mobile Commerce. 116-118
- Malik Audeh:

Metropolitan-Scale Wi-Fi Mesh Networks. 119-121
- Michael R. Macedonia:

Small is Beautifu. 122-123
- William A. Arbaugh:

he Real Risk of Digital Voting? 124-125
- Simone Santini:

Determining Computing Science's Role. 126-128

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














