Last update:
Thu Dec 21 07:14:09 MST 2023
Anonymous Computer Highlights Society Magazines 4--5
James D. Isaak Computer Society 2010: Innovation,
Leadership, Community, and Careers . . . 6--8
David Alan Grier Designing the Future . . . . . . . . . . 9--11
Anonymous 32 and 16 Years Ago . . . . . . . . . . 12--13
Sixto Ortiz Jr. Is $3$D Finally Ready for the Web? . . . 14--16
Linda Dailey Paulson New Lithography Approach Promises
Powerful Chips . . . . . . . . . . . . . 17--20
Larry Smarr Project GreenLight: Optimizing
Cyber-infrastructure for a
Carbon-Constrained World . . . . . . . . 22--27
David Lorge Parnas Really Rethinking `Formal Methods' . . . 28--34
Simon Dobson and
Roy Sterritt and
Paddy Nixon and
Mike Hinchey Fulfilling the Vision of Autonomic
Computing . . . . . . . . . . . . . . . 35--41
Marco Conti and
Mohan Kumar Opportunities in Opportunistic Computing 42--50
Robert P. Schumaker and
Hsinchun Chen A Discrete Stock Price Prediction Engine
Based on Financial News . . . . . . . . 51--56
Thomas F. Stafford and
Robin Poston Online Security Threats and Computer
User Intentions . . . . . . . . . . . . 58--64
Bob Ward Computer Society Programs Serve Members 65--69
Bob Ward Call and Calendar . . . . . . . . . . . 70--71
James Hendler Web 3.0: The Dawn of Semantic Search . . 77--80
Mark Woh and
Scott Mahlke and
Trevor Mudge and
Chaitali Chakrabarti Mobile Supercomputers for the
Next-Generation Cell Phone . . . . . . . 81--85
Dirk Riehle The Economic Case for Open Source
Foundations . . . . . . . . . . . . . . 86--90
Bruce Nordman and
Ken Christensen Proxying: The Next Step in Reducing IT
Energy Use . . . . . . . . . . . . . . . 91--93
Neville Holmes The Profession . . . . . . . . . . . . . 96, 94--95
David Alan Grier Raising Barns . . . . . . . . . . . . . 7--9
Anonymous 32 and 16 Years Ago . . . . . . . . . . 10--11
Neal Leavitt Will NoSQL Databases Live Up to Their
Promise? . . . . . . . . . . . . . . . . 12--14
Linda Dailey Paulson Onboard Cooler Keeps Chips Comfortable 15--18
Awais Rashid and
Thomas Cottenier and
Phil Greenwood and
Ruzanna Chitchyan and
Regine Meunier and
Roberta Coelho and
Mario Sudholt and
Wouter Joosen Aspect-Oriented Software Development in
Practice: Tales from AOSD--Europe . . . 19--26
Ron Vetter Authentication by Biometric Verification 28--29
Arun Ross Iris Recognition: The Path Forward . . . 30--35
Anil K. Jain and
Jianjiang Feng and
Karthik Nandakumar Fingerprint Matching . . . . . . . . . . 36--44
Rama Chellappa and
Pawan Sinha and
P. Jonathon Phillips Face Recognition by Computers and Humans 46--55
Marios Savvides and
Karl Ricanek, Jr. and
Damon L. Woodard and
Gerry Dozier Unconstrained Biometric Identification:
Emerging Technologies . . . . . . . . . 56--62
Mikko Siponen and
Seppo Pahnila and
M. Adam Mahmood Compliance with Information Security
Policies: An Empirical Investigation . . 64--71
Anonymous Bookshelf . . . . . . . . . . . . . . . 78
Bob Ward Moore Wins Karlsson Award . . . . . . . 79--84
Anonymous Call and Calendar . . . . . . . . . . . 85--86
Jay Liebowitz Strategic Intelligence, Social
Networking, and Knowledge Retention . . 87--89
Patricia O'Hagan and
Edward Hanna and
Roy Sterritt Addressing the Corrections Crisis with
Software Technology . . . . . . . . . . 90--93
Albrecht Schmidt Ubiquitous Computing: Are We There Yet? 95--97
Ann Q. Gates Discovery, Innovation, and Creativity:
The Core of Computing . . . . . . . . . 98--100
William W. Agresti The Four Forces Shaping Cybersecurity 101--104
Swen Kiesewetter-Köbinger Programmers' Capital . . . . . . . . . . 108, 106--107
Anonymous Letters to the Editor . . . . . . . . . 6--9
David Alan Grier Someday, You Will Understand . . . . . . 11--13
Anonymous 32 and16 Years Ago . . . . . . . . . . . 14--15
David Geer Is It Really Time for Real-Time Search? 16--19
Linda Dailey Paulson Scientists Develop Camera Made of Fabric 20--22
Angela C. Sodan and
Jacob Machina and
Arash Deshmeh and
Kevin Macnaughton and
Bryan Esbaugh Parallelism via Multithreaded and
Multicore CPUs . . . . . . . . . . . . . 24--32
Moshe (Maury) Bach and
Mark Charney and
Robert Cohn and
Elena Demikhovsky and
Tevi Devor and
Kim Hazelwood and
Aamer Jaleel and
Chi-Keung Luk and
Gail Lyons and
Harish Patil and
Ady Tal Analyzing Parallel Programs with Pin . . 34--41
Roger D. Chamberlain and
Mark A. Franklin and
Eric J. Tyson and
James H. Buckley and
Jeremy Buhler and
Greg Galloway and
Saurabh Gayen and
Michael Hall and
E. F. Berkley Shands and
Naveen Singla Auto-Pipe: Streaming Applications on
Architecturally Diverse Systems . . . . 42--49
Davide Pasetto and
Fabrizio Petrini and
Virat Agarwal Tools for Very Fast Regular Expression
Matching . . . . . . . . . . . . . . . . 50--58
Sylvain Hall and
Tevfik Bultan and
Graham Hughes and
Muath Alkhalaf and
Roger Villemaire Runtime Verification of Web Service
Interface Contracts . . . . . . . . . . 59--66
Suman K. Mandal and
Rabi N. Mahapatra and
Praveen S. Bhojwani and
Saraju P. Mohanty IntellBatt: Toward a Smarter Battery . . 67--71
Bob Ward Computer Society Names Award Recipients 77--80
Bob Ward Call and Calendar . . . . . . . . . . . 81--82
Kirk W. Cameron Trading in Green IT . . . . . . . . . . 83--85
Nicholas Bowen and
Jim Spohrer Viewpoint: The Future of Computing
Practice and Education . . . . . . . . . 86--89
Wil M. P. van Aalst and
Kees M. van Hee and
Jan Martijn van Werf and
Marc Verdonk Auditing 2.0: Using Process Mining to
Support Tomorrow's Auditor . . . . . . . 90--93
Thomas M. Chen and
Victoria Wang Web Filtering and Censoring . . . . . . 94--97
Neville Holmes The Digital Climate of English Change 100, 98--99
David Alan Grier Utter Chaos . . . . . . . . . . . . . . 6--9
Anonymous 32 and 16 years ago . . . . . . . . . . 10--11
Steven J. Vaughan-Nichols Will HTML 5 Restandardize the Web? . . . 13--15
Linda Dailey Paulson New Technique Provides Energy Wirelessly 16--19
Nickolas Falkner and
Raja Sooriamurthi and
Zbigniew Michalewicz Puzzle-Based Learning for Engineering
and Computer Science . . . . . . . . . . 20--28
Peter Aiken and
Robert M. Stanley and
Juanita Billings and
Luke Anderson Using Codes of Conduct to Resolve Legal
Disputes . . . . . . . . . . . . . . . . 29--34
Arutyun I. Avetisyan and
Roy Campbell and
Indranil Gupta and
Michael T. Heath and
Steven Y. Ko and
Gregory R. Ganger and
Michael A. Kozuch and
David O'Hallaron and
Marcel Kunze and
Thomas T. Kwan and
Kevin Lai and
Martha Lyons and
Dejan S. Milojicic and
Hing Yan Lee and
Yeng Chai Soh and
Ng Kwang Ming and
Jing-Yuan Luke and
Han Namgoong Open Cirrus: a Global Cloud Computing
Testbed . . . . . . . . . . . . . . . . 35--43
Edward Walker and
Walter Brisken and
Jonathan Romney To Lease or Not to Lease from Storage
Clouds . . . . . . . . . . . . . . . . . 44--50
Karthik Kumar and
Yung-Hsiang Lu Cloud Computing for Mobile Users: Can
Offloading Computation Save Energy? . . 51--56
Victor R. Basili and
Mikael Lindvall and
Myrna Regardie and
Carolyn Seaman and
Jens Heidrich and
Jürgen Münch and
Dieter Rombach and
Adam Trendowicz Linking Software Development and
Business Strategy Through Measurement 57--65
Bob Ward Ken Birman Wins Kanai Award . . . . . . 66--68
Rajesh P. N. Rao Probabilistic Analysis of an Ancient
Undeciphered Script . . . . . . . . . . 76--80
Karin Breitman and
Markus Endler and
Rafael Pereira and
Marcello Azambuja When TV Dies, Will It Go to the Cloud? 81--83
Leah Buechley Questioning Invisibility . . . . . . . . 84--86
Jim Vallino Cutting Across the Disciplines . . . . . 87--89
James Bret Michael and
John F. Sarkesain and
Thomas C. Wingfield and
Georgios Dementis and
Gonzalo Nuno Baptista Sousa Integrating Legal and Policy Factors in
Cyberpreparedness . . . . . . . . . . . 90--92
Anonymous Bookshelf . . . . . . . . . . . . . . . 93
Kai A. Olsen Computing a Better World . . . . . . . . 96, 94--95
David Alan Grier The Age of Accountability . . . . . . . 6--8
Anonymous 32 and 16 Years Ago . . . . . . . . . . 10--11
George Lawton Fighting Intrusions into Wireless
Networks . . . . . . . . . . . . . . . . 12--15
Linda Dailey Paulson Libraries Face the Challenge of
Archiving Digital Material . . . . . . . 16--19
Yun Wan and
Gang Peng What's Next for Shopbots? . . . . . . . 20--26
Lorcan Coyle and
Mike Hinchey and
Bashar Nuseibeh and
José Luiz Fiadeiro Guest Editors' Introduction: Evolving
Critical Systems . . . . . . . . . . . . 28--33
Gabor Karsai and
Fabio Massacci and
Leon Osterweil and
Ina Schieferdecker Evolving Embedded Systems . . . . . . . 34--40
Tom Mens and
Jeff Magee and
Bernhard Rumpe Evolving Software Architecture
Descriptions of Critical Systems . . . . 42--48
Mass Soldal Lund and
Bjòrnar Solhaug and
Ketil Stòlen Evolution in Relation to Risk and Trust
Management . . . . . . . . . . . . . . . 49--55
Bernard Cohen and
Philip Boxer Why Critical Systems Need Help to Evolve 56--63
William Robinson A Roadmap for Comprehensive Requirements
Modeling . . . . . . . . . . . . . . . . 64--72
Anonymous Bookshelf . . . . . . . . . . . . . . . 73
Bob Ward Bertrand Meyer Receives 2010 Mills Award 77--79
Kirk W. Cameron The Challenges of Energy-Proportional
Computing . . . . . . . . . . . . . . . 82--83
Yoshiaki Kushiki The Future of Embedded Software:
Adapting to Drastic Change . . . . . . . 84--86
Vishnu Vinekar and
Christopher L. Huntley Agility versus Maturity: Is There Really
a Trade-Off? . . . . . . . . . . . . . . 87--89
David De Roure e-Science and the Web . . . . . . . . . 90--93
Neville Holmes The Rise and Rise of Digital Gluttony 96, 94--95
Anonymous Computer Highlights Society Magazines 4--5
David Alan Grier The Value of a Good Name . . . . . . . . 7--9
Anonymous 32 and 16 Years Ago . . . . . . . . . . 10--11
David Geer Are Companies Actually Using Secure
Development Life Cycles? . . . . . . . . 12--16
Linda Dailey Paulson Steganography Development Offers Promise 18--21
Oliver Bimber Capturing the World . . . . . . . . . . 22--23
Franz Leberl and
Horst Bischof and
Thomas Pock and
Arnold Irschara and
Stefan Kluckner Aerial Computer Vision for a $3$D
Virtual Habitat . . . . . . . . . . . . 24--31
Dragomir Anguelov and
Carole Dulong and
Daniel Filip and
Christian Frueh and
Stéphane Lafon and
Richard Lyon and
Abhijit Ogale and
Luc Vincent and
Josh Weaver Google Street View: Capturing the World
at Street Level . . . . . . . . . . . . 32--38
Sameer Agarwal and
Yasutaka Furukawa and
Noah Snavely and
Brian Curless and
Steven M. Seitz and
Richard Szeliski Reconstructing Rome . . . . . . . . . . 40--47
Michael Goesele and
Jens Ackermann and
Simon Fuhrmann and
Ronny Klowsky and
Fabian Langguth and
Patrick Mücke and
Martin Ritz Scene Reconstruction from Community
Photo Collections . . . . . . . . . . . 48--53
Jaak Tepandi and
Ilja T\vsahhirov and
Stanislav Vassiljev Wireless PKI Security and Mobile Voting 54--60
Anita Sarma and
David Redmiles and
André van der Hoek Categorizing the Spectrum of
Coordination Technology . . . . . . . . 61--67
Bob Ward Computer Society Announces Award Winners 72--73
Cees G. M. Snoek and
Arnold W. M. Smeulders Visual-Concept Search Solved? . . . . . 76--78
D. Richard Kuhn and
Edward J. Coyne and
Timothy R. Weil Adding Attributes to Role-Based Access
Control . . . . . . . . . . . . . . . . 79--81
Lecia Barker and
Joanne McGrath Cohoon and
Lucy Sanders Strategy Trumps Money: Recruiting
Undergraduate Women into Computing . . . 82--85
Chris Harrison Appropriated Interaction Surfaces . . . 86--89
Tiziana Margaria and
Bernhard Steffen Simplicity as a Driver for Agile
Innovation . . . . . . . . . . . . . . . 90--92
Anne-F. Rutkowski and
Carol S. Saunders Growing Pains with Information Overload 96, 94--95
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier The Spirit of Combination . . . . . . . 6--9
Anonymous 32 and 16 Years Ago . . . . . . . . . . 10--11
Sixto Ortiz Jr. Taking Business Intelligence to the
Masses . . . . . . . . . . . . . . . . . 12--15
Linda Dailey Paulson New Approach Combines TV and Social
Networking . . . . . . . . . . . . . . . 16--19
Mari Carmen Domingo Managing Healthcare through Social
Networks . . . . . . . . . . . . . . . . 20--25
Brigitte Piniewski and
Johan Muskens and
Leonardo Estevez and
Randy Carroll and
Rick Cnossen Empowering Healthcare Patients with
Smart Technology . . . . . . . . . . . . 27--34
Jatinder R. Palta and
Vincent A. Frouhar and
Robert A. Zlotecki Leveraging Pervasive Technologies to
Improve Collection of Prostate Cancer
Outcome Data . . . . . . . . . . . . . . 35--42
Mark Weitzel and
Andy Smith and
Scott de Deugd and
Robert Yates A Web 2.0 Model for Patient-Centered
Health Informatics Applications . . . . 43--50
Kenneth Fleischmann and
William Wallace Value Conflicts in Computational
Modeling . . . . . . . . . . . . . . . . 57--63
Eduardo Huedo and
Ruben Montero and
Ignacio Llorente Grid Architecture from a Metascheduling
Perspective . . . . . . . . . . . . . . 51--56
Anonymous Bookshelf . . . . . . . . . . . . . . . 75
John Carter and
Karthick Rajamani Designing Energy-Efficient Servers and
Data Centers . . . . . . . . . . . . . . 76--78
Art Gowan and
Han Reichgelt Emergence of the Information Technology
Discipline . . . . . . . . . . . . . . . 79--81
Daniel Schall and
Schahram Dustdar and
M. Brian Blake Programming Human and Software-Based Web
Services . . . . . . . . . . . . . . . . 82--85
Neville Holmes The Future of the Computing Profession 88, 86--87
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier Mental Discipline . . . . . . . . . . . 6--8
Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10
Neal Leavitt Researchers Fight to Keep Implanted
Medical Devices Safe from Hackers . . . 11--14
Linda Dailey Paulson Project Converts Arms and Hands into
Input Devices . . . . . . . . . . . . . 15--18
Jacek Izydorczyk and
Michal Izydorczyk Microprocessor Scaling: What Limits Will
Hold? . . . . . . . . . . . . . . . . . 20--26
Yonghong Tian and
Jaideep Srivastava and
Tiejun Huang and
Noshir Contractor Social Multimedia Computing . . . . . . 27--36
Moo Nam Ko and
Gorrell P. Cheek and
Mohamed Shehab and
Ravi Sandhu Social-Networks Connect Services . . . . 37--43
Fei-Yue Wang and
Daniel Zeng and
James A. Hendler and
Qingpeng Zhang and
Zhuo Feng and
Yanqing Gao and
Hui Wang and
Guanpi Lai A Study of the Human Flesh Search
Engine: Crowd-Powered Expansion of
Online Knowledge . . . . . . . . . . . . 45--53
Henri E. Bal and
Jason Maassen and
Rob V. van Nieuwpoort and
Niels Drost and
Roelof Kemp and
Nick Palmer and
Thilo Kielmann and
Frank Seinstra and
Ceriel Jacobs Real-World Distributed Computer with
Ibis . . . . . . . . . . . . . . . . . . 54--62
Simon Portegies Zwart and
Derek Groen and
Tomoaki Ishiyama and
Keigo Nitadori and
Junichiro Makino and
Cees de Laat and
Steve McMillan and
Kei Hiraki and
Stefan Harfst and
Paola Grosso Simulating the Universe on an
Intercontinental Grid . . . . . . . . . 63--70
Anonymous IEEE Computer Society Election . . . . . 71--78
Anonymous IEEE President-Elect Candidates Address
Computer Society Concerns . . . . . . . 79--83
Anonymous Bookshelf . . . . . . . . . . . . . . . 90
James Bret Michael and
Eneken Tikk and
Peter Wahlgren and
Thomas C. Wingfield From Chaos to Collective Defense . . . . 91--94
S. S. Iyengar and
Supratik Mukhopadhyay and
Christopher Steinmuller and
Xin Li Preventing Future Oil Spills with
Software-Based Event Detection . . . . . 95--97
Stephen T. Frezza Computer Science: Is It Really the
Scientific Foundation for Software
Engineering? . . . . . . . . . . . . . . 98--101
James C. Spohrer IBM's University Programs . . . . . . . 102--104
Steve Hodges and
Nicolas Villar The Hardware Is Not a Given . . . . . . 106--109
Anthony Cleve and
Tom Mens and
Jean-Luc Hainaut Data-Intensive System Evolution . . . . 110--112
Noel Sharkey and
Marc Goodman and
Nick Ross The Coming Robot Crime Wave . . . . . . 116, 114--115
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier Finding What You Want . . . . . . . . . 8--10
Anonymous 32 and 16 Years Ago . . . . . . . . . . 11--12
David Geer Whatever Happened to
Network-Access-Control Technology? . . . 13--16
Linda Dailey Paulson New Service Promises to Improve Online
Search . . . . . . . . . . . . . . . . . 17--20
Nancy R. Mead and
Joe Jarzombek Advancing Software Assurance with
Public-Private Collaboration . . . . . . 21--30
Frederick T. Sheldon and
Claire Vishik Moving Toward Trustworthy Systems: R&D
Essentials . . . . . . . . . . . . . . . 31--40
Samuel T. Redwine, Jr. Fitting Software Assurance into Higher
Education . . . . . . . . . . . . . . . 41--46
Ann E. K. Sobel and
Gary McGraw Interview: Software Security in the Real
World . . . . . . . . . . . . . . . . . 47--53
Wei Tan and
Jia Zhang and
Ian Foster Network Analysis of Scientific
Workflows: a Gateway to Reuse . . . . . 54--61
Todd Mytkowicz and
Amer Diwan and
Matthias Hauswirth and
Peter Sweeney The Effect of Omitted-Variable Bias on
the Evaluation of Compiler Optimizations 62--67
Bob Ward Society Honors Five Top Computing
Professionals . . . . . . . . . . . . . 74--76
Bob Ward Call and Calendar . . . . . . . . . . . 77--78
George P. Schell IT Value: From Moore's Law to a Flat
World . . . . . . . . . . . . . . . . . 79--81
Ron Kohavi and
Roger Longbotham and
Toby Walker Online Experiments: Practical Lessons 82--85
Kirk W. Cameron A Tale of Two Green Lists . . . . . . . 86--88
Neville Holmes Seven Digital Steps to Avoid Utter Hell 92, 90--91
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous Letters . . . . . . . . . . . . . . . . 6
Anonymous In Memoriam: Scott Hamilton . . . . . . 7
David Alan Grier The Curious and the Confident . . . . . 8--10
Anonymous 32 and 16 Years Ago . . . . . . . . . . 11--12
Neal Leavitt Network-Usage Changes Push Internet
Traffic to the Edge . . . . . . . . . . 13--15
Linda Dailey Paulson How Safe Are Secure Websites? . . . . . 17--20
Sergio Toral Marin and
Maria del Rocio Martinez-Torres and
Federico Barrero Reforming ICT Graduate Programs to Meet
Professional Needs . . . . . . . . . . . 22--29
Jarrod A. Roy and
Farinaz Koushanfar and
Igor L. Markov Ending Piracy of Integrated Circuits . . 30--38
Ramesh Karri and
Jeyavijayan Rajendran and
Kurt Rosenfeld and
Mohammad Tehranipoor Trustworthy Hardware: Identifying and
Classifying Hardware Trojans . . . . . . 39--46
Nir Kshetri Cloud Computing in Developing Economies 47--55
Juan Hamers and
Lieven Eeckhout Scenario-Based Resource Prediction for
QoS-Aware Media Processing . . . . . . . 56--63
Bob Ward Society Forms New Technical Committee on
Semantic Computing . . . . . . . . . . . 64--65
Anonymous Bookshelf . . . . . . . . . . . . . . . 76--76
Naren Ramakrishnan and
David Hanauer and
Benjamin Keller Mining Electronic Health Records . . . . 77--81
Richard J. LeBlanc What Should All CS Graduates Know? . . . 82--84
Keith W. Miller and
Jeffrey Voas and
Phil Laplante In Trust We Trust . . . . . . . . . . . 85--87
Manfred Broy and
Ralf Reussner Architectural Concepts in Programming
Languages . . . . . . . . . . . . . . . 88--91
Paul Lukowicz and
Oliver Amft and
Daniel Roggen and
Jingyuan Cheng On-Body Sensing: From Gesture-Based
Input to Activity-Driven Interaction . . 92--96
Neville Holmes The Future of the Computing Profession:
Readers' E-mails . . . . . . . . . . . . 100, 98--99
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier Sabotage! . . . . . . . . . . . . . . . 6--8
Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10
Steven J. Vaughan-Nichols Gigabit Wi-Fi Is on Its Way . . . . . . 11--14
Anonymous Worm Targets Industrial-Plant Operations 15--18
Peter Pirolli and
Jenny Preece and
Ben Shneiderman Cyberinfrastructure for Social Action on
National Priorities . . . . . . . . . . 20--21
Robert Kraut and
Mary Lou Maher and
Judith Olson and
Thomas W. Malone and
Peter Pirolli and
John C. Thomas Scientific Foundations: a Case for
Technology-Mediated Social-Participation
Theory . . . . . . . . . . . . . . . . . 22--28
Ed H. Chi and
Sean Munson and
Gerhard Fischer and
Sarah Vieweg and
Cynthia Parr Advancing the Design of
Technology-Mediated Social Participation
Systems . . . . . . . . . . . . . . . . 29--35
Gary Olson and
Gloria Mark and
Elizabeth Churchill and
Dana Rotman New Missions for a Sociotechnical
Infrastructure . . . . . . . . . . . . . 37--43
Bradford W. Hesse and
Derek Hansen and
Thomas Finholt and
Sean Munson and
Wendy Kellogg and
John C. Thomas Social Participation in Health 2.0 . . . 45--52
John Carlo Bertot and
Paul T. Jaeger and
Sean Munson and
Tom Glaisyer Social Media Technology and Government
Transparency . . . . . . . . . . . . . . 53--59
Cliff Lampe and
Paul Resnick and
Andrea Forte and
Sarita Yardi and
Dana Rotman and
Todd Marshall and
Wayne Lutters Educational Priorities for
Technology-Mediated Social Participation 60--67
Bob Ward Blue Gene Architect Gara Receives 2010
Cray Award . . . . . . . . . . . . . . . 78--80
Anonymous Call and Calendar . . . . . . . . . . . 81--82
Anonymous Bookshelf . . . . . . . . . . . . . . . 83
Timo Hannay What Can the Web Do for Science? . . . . 84--87
Prith Banerjee and
Rich Friedrich and
Lueny Morell Open Innovation at HP Labs . . . . . . . 88--90
Karthikeyan Umapathy and
Sandeep Purao Systems Integration and Web Services . . 91--94
Kirk W. Cameron Green with Envy . . . . . . . . . . . . 95--96
Neville Holmes Some Social Aspects of Computers and
Numbers . . . . . . . . . . . . . . . . 100, 98--99
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous Letters to the Editor . . . . . . . . . 6--8
Carl K. Chang It Has Been a Long Journey --- From the
Heart of a Loyal Computer Society
Volunteer . . . . . . . . . . . . . . . 9--10
James D. Isaak 2010 to 2020 --- Looking Forward . . . . 11--13
David A. Grier Investing in Ignorance . . . . . . . . . 14--16
Anonymous 32 and 16 Years Ago . . . . . . . . . . 17--18
Neal Leavitt Payment Applications Make E-Commerce
Mobile . . . . . . . . . . . . . . . . . 19--22
Linda Dailey Paulson Energy-Saving PCs Work while Sleeping 23--26
Tiejun Huang and
Yonghong Tian and
Wen Gao and
Jian Lu Mediaprinting: Identifying Multimedia
Content for Digital Rights Management 28--35
Chaiyakorn Yingsaeree and
Giuseppe Nuti and
Philip Treleaven Computational Finance . . . . . . . . . 36--43
Badrish Chandramouli and
Mohamed Ali and
Jonathan Goldstein and
Beysim Sezgin and
Balan Sethu Raman Data Stream Management Systems for
Computational Finance . . . . . . . . . 45--52
Brad Spiers and
Denis Wallez High-Performance Computing on Wall
Street . . . . . . . . . . . . . . . . . 53--59
Antonio Coronato and
Giuseppe De Pietro Formal Design of Ambient Intelligence
Applications . . . . . . . . . . . . . . 60--68
Anonymous Bookshelf . . . . . . . . . . . . . . . 85
Evan M. Peck and
Erin Treacy Solovey and
Krysta Chauncey and
Angelo Sassaroli and
Sergio Fantini and
Robert J. K. Jacob and
Audrey Girouard and
Leanne M. Hirshfield Your Brain, Your Computer, and You . . . 86--89
George Hurlburt and
Jeffrey Voas and
Keith Miller and
Phil Laplante and
Bret Michael A Nonlinear Perspective on Higher
Education . . . . . . . . . . . . . . . 90--92
Emil Vassev and
Mike Hinchey The Challenge of Developing Autonomic
Systems . . . . . . . . . . . . . . . . 93--96
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Sorel Reisman Planning for an Inevitable Future . . . 6--8
Ron Vetter Print, Mobile, and Online . . . . . . . 9--11
David Alan Grier The Migration to the Middle . . . . . . 12--14
Anonymous 32 and 16 Years Ago . . . . . . . . . . 15--16
George Lawton $3$D Displays without Glasses: Coming to
a Screen near You . . . . . . . . . . . 17--19
Linda Dailey Paulson Scanning the Future with New Barcodes 20--23
Geetha Thiagarajan and
Venkatesh Sarangan and
Ramasubramanian Suriyanarayanan and
Pragathichitra Sethuraman and
Anand Sivasubramaniam and
Avinash Yegyanarayanan Automating a Building's Carbon
Management . . . . . . . . . . . . . . . 24--30
Samuel H. Fuller and
Lynette I. Millett Computing Performance: Game Over or Next
Level? . . . . . . . . . . . . . . . . . 31--38
Parthasarathy Ranganathan From Microprocessors to Nanostores:
Rethinking Data-Centric Systems . . . . 39--48
Daniel S. Stevenson and
Robert O. Conn Bridging the Interconnection Density Gap
for Exascale Computation . . . . . . . . 49--57
Roy Sterritt Apoptotic Computing: Programmed Death by
Default for Computer-Based Systems . . . 59--65
Anna Squicciarini and
Sathya Dev Rajasekaran and
Marco Casassa Mont Using Modeling and Simulation to
Evaluate Enterprises' Risk Exposure to
Social Networks . . . . . . . . . . . . 66--73
Anonymous Bookshelf . . . . . . . . . . . . . . . 81
Anonymous Computer Society Winner Nets \$50,000
Prize . . . . . . . . . . . . . . . . . 82--84
Anonymous Call and Calendar . . . . . . . . . . . 85--86
Bill Tomlinson and
M. Six Silberman and
Jim White Can More Efficient IT Be Worse for the
Environment? . . . . . . . . . . . . . . 87--89
Neil Ferguson Achieving Synergy in the
Industry-Academia Relationship . . . . . 90--92
John Riedl The Promise and Peril of Social
Computing . . . . . . . . . . . . . . . 93--95
Karl Ricanek, Jr. Dissecting the Human Identity . . . . . 96--97
Neville Holmes Computers and Their Users . . . . . . . 100, 98--99
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier A Very Bad Idea . . . . . . . . . . . . 6--8
Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10
Sixto Ortiz Jr. Is Peer-to-Peer on the Decline? . . . . 11--13
Linda Dailey Paulson IBM Project Proposes Using Light to Make
Chips Faster . . . . . . . . . . . . . . 14--17
Vivek Menon and
Shamik Das and
Bharat Jayaraman and
Venu Govindaraju Transitioning from Microelectronics to
Nanoelectronics . . . . . . . . . . . . 18--19
Greg Snider and
Rick Amerson and
Dick Carter and
Hisham Abdalla and
Muhammad Shakeel Qureshi and
Jasmin Leveille and
Massimiliano Versace and
Heather Ames and
Sean Patrick and
Benjamin Chandler and
Anatoli Gorchetchnikov and
Ennio Mingolla From Synapses to Circuitry: Using
Memristive Memory to Explore the
Electronic Brain . . . . . . . . . . . . 21--28
Daniel Schinke and
Neil Di Spigna and
Mihir Shiveshwarkar and
Paul Franzon Computing with Novel Floating-Gate
Devices . . . . . . . . . . . . . . . . 29--36
Andre DeHon and
Benjamin Gojman Crystals and Snowflakes: Building
Computation from Nanowire Crossbars . . 37--45
Wenjing Rao and
Chengmo Yang and
Ramesh Karri and
Alex Orailoglu Toward Future Systems with Nanoscale
Devices: Overcoming the Reliability
Challenge . . . . . . . . . . . . . . . 46--53
Jeff Yan and
Ahmad Salah El Ahmad Captcha Robustness: a Security
Engineering Perspective . . . . . . . . 54--60
Richard Welke and
Rudy Hirschheim and
Andrew Schwarz Service-Oriented Architecture Maturity 61--67
Bob Ward Tom Williams Wins TTTC Award . . . . . . 74--76
Phil Laplante and
George Hurlburt and
Keith Miller and
Jeffrey Voas Certainty through Uncertainty? . . . . . 79--81
Ina Schaefer and
Reiner Hahnle Formal Methods in Software Product Line
Engineering . . . . . . . . . . . . . . 82--85
Albrecht Schmidt and
Marc Langheinrich and
Kritian Kersting Perception beyond the Here and Now . . . 86--88
Ann E. K. Sobel Academic Misconduct in the Early 21st
Century . . . . . . . . . . . . . . . . 89--90
Kelvin Sung Recent Videogame Console Technologies 91--93
Robert Fabian Computing Professionals . . . . . . . . 96, 94--95
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous Letters to the Editor . . . . . . . . . 6
David Alan Grier The Voice of Wisdom . . . . . . . . . . 8--10
Anonymous 32 and 16 Years Ago . . . . . . . . . . 11--12
George Lawton 4G: Engineering versus Marketing . . . . 14--16
Linda Dailey Paulson Accessing the Internet via Overhead
Lights . . . . . . . . . . . . . . . . . 18--21
Savitha Srinivasan and
Vladimir Getov Navigating the Cloud Computing Landscape
--- Technologies, Services, and Adopters 22--23
Balakrishna Narasimhan and
Ryan Nichols State of Cloud Applications and
Platforms: The Cloud Adopters' View . . 24--28
Yousef Khalidi Building a Cloud Computing Platform for
New Possibilities . . . . . . . . . . . 29--34
Prith Banerjee and
Richard Friedrich and
Cullen Bash and
Patrick Goldsack and
Bernardo Huberman and
John Manley and
Chandrakant Patel and
Parthasarathy Ranganathan and
Alistair Veitch Everything as a Service: Powering the
New Information Economy . . . . . . . . 36--43
Benny Rochwerger and
David Breitgand and
Amir Epstein and
David Hadas and
Irit Loy and
Kenneth Nagin and
Johan Tordsson and
Carmelo Ragusa and
Massimo Villari and
Stuart Clayman and
Eliezer Levy and
Alessandro Maraschini and
Philippe Massonet and
Henar Munoz and
Giovanni Toffetti Reservoir --- When One Cloud Is Not
Enough . . . . . . . . . . . . . . . . . 44--51
Eric Olden Architecting a Cloud-Scale Identity
Fabric . . . . . . . . . . . . . . . . . 52--59
Robin Vasan A Venture Perspective on Cloud Computing 60--62
Orathai Sukwong and
Hyong Kim and
James Hoe Commercial Antivirus Software
Effectiveness: An Empirical Study . . . 63--70
Bob Ward Chen, Hescott Win Society Education
Awards . . . . . . . . . . . . . . . . . 71--73
Anonymous Bookshelf . . . . . . . . . . . . . . . 83
P. Jonathon Phillips Improving Face Recognition Technology 84--86
Shyong (Tony) K. Lam and
John Riedl The Past, Present, and Future of
Wikipedia . . . . . . . . . . . . . . . 87--90
Kirk W. Cameron Computing's Role in Resource Accounting 91--92
Peter J. Denning and
Neville Holmes Computer Science: An Interview . . . . . 96, 94--95
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous Letters to the Editor . . . . . . . . . 6--7
David Alan Grier and
Erin Dian Dumbacher Where Are You From? . . . . . . . . . . 8--10
Anonymous 32 and 16 Years Ago . . . . . . . . . . 11--12
Sixto Ortiz Jr. Chipmakers ARM for Battle in Traditional
Computing Market . . . . . . . . . . . . 14--17
Linda Dailey Paulson Some Users Find the Speed of Light Too
Slow for Their Networks . . . . . . . . 18--21
Sasu Tarkoma and
Eemil Lagerspetz Arching over the Mobile Computing Chasm:
Platforms and Runtimes . . . . . . . . . 22--28
Steven Fontana Technology Development as an Alternative
to Traditional Technology Transfer
Models . . . . . . . . . . . . . . . . . 30--36
Thomas Miller III and
Stephen Walsh and
Seth Hollar and
Elaine Rideout and
Beryl Pittman Engineering and Innovation: An Immersive
Start-up Experience . . . . . . . . . . 38--46
Ann Gates and
Rodrigo Romero and
Miguel Alonso, Jr. and
Fanny Klett and
J. Fernando Naveda and
Dina Requena Cultivating Entrepreneurial Thinking
through IEEE-CS Student Chapters . . . . 48--55
Alberto Savoia and
Patrick Copeland Entrepreneurial Innovation at Google . . 56--61
Toby Myers and
R. Geoff Dromey and
Peter Fritzson Comodeling: From Requirements to an
Integrated Software/Hardware Model . . . 62--70
Bob Ward Akyildiz Wins W. Wallace McDowell Award 71--73
Antonio Kruger and
Johannes Schoning and
Patrick Olivier How Computing Will Change the Face of
Retail . . . . . . . . . . . . . . . . . 84--87
Hans Vandierendonck and
Tom Mens Averting the Next Software Crisis . . . 88--90
Thomas M. Chen and
Saeed Abu-Nimeh Lessons from Stuxnet . . . . . . . . . . 91--93
Tommer Leyvand and
Casey Meekhof and
Yi-Chen Wei and
Jian Sun and
Baining Guo Kinect Identity: Technology and
Experience . . . . . . . . . . . . . . . 94--96
James J. Sluss, Jr. Engineering Education Activities in
Electric Energy Systems . . . . . . . . 97--98
Jieping Ye and
Teresa Wu and
Jing Li and
Kewei Chen Machine Learning Approaches for the
Neuroimaging Study of Alzheimer's
Disease . . . . . . . . . . . . . . . . 99--101
Dejan Milojicic and
Rich Wolski Eucalyptus: Delivering a Private Cloud 102--104
Chris Morris and
Kai A. Olsen Democracy and Technology . . . . . . . . 108, 106--107
Bob Ward \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier Not for All Markets . . . . . . . . . . 6--8
Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10
Linda World Forecasting in Geologic Time: The Tohoku
Quake and Tsunami . . . . . . . . . . . 11--13
Anonymous Flying Robots Designed to Form Emergency
Network . . . . . . . . . . . . . . . . 14--16
Lourdes Moreno and
Paloma Martinez and
Belen Ruiz and
Ana Iglesias Toward an Equal Opportunity Web:
Applications, Standards, and Tools that
Increase Accessibility . . . . . . . . . 18--26
Bill N. Schilit Mobile Computing: Looking to the Future 28--29
Tommi Mikkonen and
Antero Taivalsaari Reports of the Web's Death Are Greatly
Exaggerated . . . . . . . . . . . . . . 30--36
Anna Spagnolli and
Nicola Corradi and
Luciano Gamberini and
Eve Hoggan and
Giulio Jacucci and
Cecilia Katzeff and
Loove Broms and
Li Jonsson Eco-Feedback on the Go: Motivating
Energy Awareness . . . . . . . . . . . . 38--45
J. Antonio Garcia-Macias and
Jorge Alvarez-Lozano and
Paul Estrada-Martinez and
Edgardo Aviles-Lopez Browsing the Internet of Things with
Sentient Visors . . . . . . . . . . . . 46--52
Raja Bose and
Jorg Brakensiek and
Keun-Young Park and
Jonathan Lester Morphing Smartphones into Automotive
Application Platforms . . . . . . . . . 53--61
Nenad Medvidovic and
Hossein Tajalli and
Joshua Garcia and
Ivo Krka and
Yuriy Brun and
George Edwards Engineering Heterogeneous Robotics
Systems: a Software Architecture-Based
Approach . . . . . . . . . . . . . . . . 62--71
Bob Ward Grid Pioneer Foster Named 2011 Kanai
Award Winner . . . . . . . . . . . . . . 83--85
Christopher L. Huntley The Developer's Perspective . . . . . . 88--90
Parthasarathy Ranganathan and
Jichuan Chang Saving the World, One Server at a Time,
Together . . . . . . . . . . . . . . . . 91--93
Anil K. Jain and
Brendan Klare Matching Forensic Sketches and Mug Shots
to Apprehend Criminals . . . . . . . . . 94--96
Shilad Sen and
John Riedl Folksonomy Formation . . . . . . . . . . 97--101
Neville Holmes Aspects of Data Obesity . . . . . . . . 104, 102--103
Bob Ward \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier Dumb Grids and Smart Markets . . . . . . 6--8
Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10
Neal Leavitt Mobile Security: Finally a Serious
Problem? . . . . . . . . . . . . . . . . 11--14
Anonymous News Briefs . . . . . . . . . . . . . . 18--20
R. J. Honicky Understanding and Using Rendezvous to
Enhance Mobile Crowdsourcing
Applications . . . . . . . . . . . . . . 22--28
Sumi Helal IT Footprinting --- Groundwork for
Future Smart Cities . . . . . . . . . . 30--31
Milind Naphade and
Guruduth Banavar and
Colin Harrison and
Jurij Paraszczak and
Robert Morris Smarter Cities and Their Innovation
Challenges . . . . . . . . . . . . . . . 32--39
Kai Kuikkaniemi and
Giulio Jacucci and
Marko Turpeinen and
Eve Hoggan and
Jorg Muller From Space to Stage: How Interactive
Screens Will Change Urban Life . . . . . 40--47
Felipe Gil-Castineira and
Enrique Costa-Montenegro and
Francisco J. Gonzalez-Castano and
Cristina Lopez-Bravo and
Timo Ojala and
Raja Bose Experiences inside the Ubiquitous Oulu
Smart City . . . . . . . . . . . . . . . 48--55
Jungwoo Lee and
Songhoon Baik and
Choonhwa Lee Building an Integrated Service
Management Platform for Ubiquitous
Cities . . . . . . . . . . . . . . . . . 56--63
Nilanjan Mukherjee and
Janusz Rajski and
Grzegorz Mrugalski and
Artur Pogiel and
Jerzy Tyszer Ring Generator: An Ultimate Linear
Feedback Shift Register . . . . . . . . 64--71
Dejan Milojicic and
Phil Laplante Special Technical Communities . . . . . 84--88
Bob Ward Kuck Receives Computer Pioneer Award;
VMware's Greene and Rosenblum Win
Computer Entrepreneur Award; Dozens of
New CSDP and CSDA Holders Named . . . . 89--91
Bob Ward Call and Calendar . . . . . . . . . . . 92--93
Cesar Pardo and
Francisco J. Pino and
Felix Garcia and
Mario Piattini Harmonizing Quality Assurance Processes
and Product Characteristics . . . . . . 94--96
John Solaro The Kinect Digital Out-of-Box Experience 97--99
Dan Breznitz and
Michael Murphree and
Seymour Goodman Ubiquitous Data Collection: Rethinking
Privacy Debates . . . . . . . . . . . . 100--102
Cynthia Rudin and
Rebecca J. Passonneau and
Axinia Radeva and
Steve Ierome and
Delfina F. Isaac 21st-Century Data Miners Meet
19th-Century Electrical Cables . . . . . 103--105
Jan Cuny Transforming Computer Science Education
in High Schools . . . . . . . . . . . . 107--109
Neville Holmes Computing and the Step Function . . . . 112, 110--111
David Alan Grier Experienced Hands . . . . . . . . . . . 6--8
Brian M. Gaff and
Catherine J. Toppin Ten Things to Know When Applying for a
Patent . . . . . . . . . . . . . . . . . 11--12
Sixto Ortiz Jr. The Problem with Cloud-Computing
Standardization . . . . . . . . . . . . 13--16
Lee Garber News Briefs . . . . . . . . . . . . . . 17--19
Daqing Zhang and
Bin Guo and
Zhiwen Yu The Emergence of Social and Community
Intelligence . . . . . . . . . . . . . . 21--28
Oliver Bimber and
Carl K. Chang Computational Archaeology: Reviving the
Past with Present-Day Tools . . . . . . 30--31
Michael Edmunds and
Tony Freeth Using Computation to Decode the First
Known Computer . . . . . . . . . . . . . 32--39
Eugene Ch'ng and
Henry Chapman and
Vincent Gaffney and
Phil Murgatroyd and
Chris Gaffney and
Wolfgang Neubauer From Sites to Landscapes: How Computing
Technology Is Shaping Archaeological
Practice . . . . . . . . . . . . . . . . 40--46
Roberto Scopigno and
Marco Callieri and
Paolo Cignoni and
Massimiliano Corsini and
Matteo Dellepiane and
Federico Ponchio and
Guido Ranzuglia $3$D Models for Cultural Heritage:
Beyond Plain Visualization . . . . . . . 48--55
Vid Petrovic and
Aaron Gidding and
Tom Wypych and
Falko Kuester and
Thomas A. DeFanti and
Thomas E. Levy Dealing with Archaeology's Data
Avalanche . . . . . . . . . . . . . . . 56--60
Renju Li and
Tao Luo and
Hongbin Zha and
Wei Lu Computer-Assisted Archaeological Line
Drawing . . . . . . . . . . . . . . . . 62--65
Mohammad Tehranipoor and
Hassan Salmani and
Xuehui Zhang and
Xiaoxiao Wang and
Ramesh Karri and
Jeyavijayan Rajendran and
Kurt Rosenfeld Trustworthy Hardware: Trojan Detection
and Design-for-Trust Challenges . . . . 66--74
Dirk Riehle Controlling and Steering Open Source
Projects . . . . . . . . . . . . . . . . 93--96
Richard P. Larrick and
Kirk W. Cameron Consumption-Based Metrics: From Autos to
IT . . . . . . . . . . . . . . . . . . . 97--99
Kevin W. Bowyer What Surprises Do Identical Twins Have
for Identity Science? . . . . . . . . . 100--102
Shyong (Tony) K. Lam and
John Riedl Expressing My Inner Gnome: Appearance
and Behavior in Virtual Worlds . . . . . 103--105
Kai A. Olsen Programmed Politeness . . . . . . . . . 108, 106--107
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier The Chicken Bus . . . . . . . . . . . . 6--8
Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10
Brian M. Gaff and
Catherine J. Toppin Ten Things to Know When Your Patent
Application Is Pending . . . . . . . . . 11--12
Steven J. Vaughan-Nichols OpenFlow: The Next Generation of the
Network? . . . . . . . . . . . . . . . . 13--15
Anonymous News Briefs . . . . . . . . . . . . . . 16--18
Greg Goth IBM PC Retrospective: There Was Enough
Right to Make It Work . . . . . . . . . 26--33
David Bradley A Personal History of the IBM PC . . . . 19--25
Edward Bride The IBM Personal Computer: a
Software-Driven Market . . . . . . . . . 34--39
Gurbir Singh The IBM PC: The Silicon Story . . . . . 40--45
Pieter Simoens and
Filip De Turck and
Bart Dhoedt and
Piet Demeester Remote Display Solutions for Mobile
Cloud Computing . . . . . . . . . . . . 46--53
Sungkap Yeo and
Hsien-Hsin Lee Using Mathematical Modeling in
Provisioning a Heterogeneous Cloud
Computing Environment . . . . . . . . . 55--62
Alain Chesnais and
Sorel Reisman From the Presidents of the IEEE Computer
Society and ACM . . . . . . . . . . . . 63--64
Anonymous IEEE Computer Society Election . . . . . 65--73
Anonymous IEEE President-Elect Candidates Address
Computer Society Concerns . . . . . . . 75--80
Anonymous Call and Calendar . . . . . . . . . . . 81--82
John Bryant and
Jason Bay Stereoscopic Technologies and Effects 93--95
Emil Vassev and
Mike Hinchey Knowledge Representation and Reasoning
for Intelligent Software Systems . . . . 96--99
Manfred Tscheligi and
Alexander Meschtscherjakov and
David Wilfinger Interactive Computing on Wheels . . . . 100--102
Manish Marwah and
Amip Shah and
Cullen Bash and
Chandrakant Patel and
Naren Ramakrishnan Using Data Mining to Help Design
Sustainable Products . . . . . . . . . . 103--106
Charles Severance Toward Developing an Education App Store 107--109
Neville Holmes The Cultural Potential of Keyboards . . 112, 110--111
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier Leisure Science . . . . . . . . . . . . 6--8
Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10
Brian M. Gaff and
Catherine J. Toppin Ten Things to Know When Your Patent
Application Is Allowed . . . . . . . . . 11--13
Neal Leavitt IPv6: Any Closer to Adoption? . . . . . 14--16
Anonymous News Briefs . . . . . . . . . . . . . . 18--20
Rolf Oppliger Security and Privacy in an Online World 21--22
Saeed Abu-Nimeh and
Thomas M. Chen and
Omar Alzubi Malicious and Spam Posts in Online
Social Networks . . . . . . . . . . . . 23--28
Hossein Saiedian and
Dan S. Broyles Security Vulnerabilities in the
Same-Origin Policy: Implications and
Alternatives . . . . . . . . . . . . . . 29--36
Florian Kerschbaum and
Axel Schropfer and
Antonio Zilli and
Richard Pibernik and
Octavian Catrina and
Sebastiaan de Hoogh and
Berry Schoenmakers and
Stelvio Cimato and
Ernesto Damiani Secure Collaborative Supply-Chain
Management . . . . . . . . . . . . . . . 38--43
Francisco Rocha and
Salvador Abreu and
Miguel Correia The Final Frontier: Confidentiality and
Privacy in the Cloud . . . . . . . . . . 44--50
Rodrigo Roman and
Pablo Najera and
Javier Lopez Securing the Internet of Things . . . . 51--58
Siani Pearson and
Marco Casassa Mont Sticky Policies: An Approach for
Managing Privacy across Multiple Parties 60--68
Frederick Ryckbosch and
Stijn Polfliet and
Lieven Eeckhout Trends in Server Energy Proportionality 69--72
Vivek Menon and
Bharat Jayaraman and
Venu Govindaraju The Three Rs of Cyberphysical Spaces . . 73--79
Anonymous Bookshelf . . . . . . . . . . . . . . . 87
Anonymous Barrett Wins Pre-College Education Award 88--90
Anonymous Call and Calendar . . . . . . . . . . . 91--92
Henry Lieberman and
Karthik Dinakar and
Birago Jones Let's Gang Up on Cyberbullying . . . . . 93--96
Suparna Bhattacharya and
K. Gopinath and
Karthick Rajamani and
Manish Gupta Software Bloat and Wasted Joules: Is
Modularity a Hurdle to Green Software? 97--101
Christopher L. Huntley Onshore Mobile App Development:
Successes and Challenges . . . . . . . . 102--104
Karl Ricanek, Jr. and
Benjamin Barbour What Are Soft Biometrics and How Can
They Be Used? . . . . . . . . . . . . . 106--108
Alessio Malizia and
Kai A. Olsen Has Everything Been Invented? On
Software Development and the Future of
Apps . . . . . . . . . . . . . . . . . . 112, 110--111
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier The Habit of Change . . . . . . . . . . 6--8
Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10
Sixto Ortiz Jr. Bringing $3$D to the Small Screen . . . 11--13
Anonymous News Briefs . . . . . . . . . . . . . . 14--16
Carl K. Chang and
David M. Weiss and
Mike Hinchey Where Software Engineering Meets \ldots 17--18
Manfred Broy Can Practitioners Neglect Theory and
Theoreticians Neglect Practice? . . . . 19--24
Brian Fitzgerald Open Source Software: Lessons from and
for Software Engineering . . . . . . . . 25--30
Mark Harman Software Engineering Meets Evolutionary
Computation . . . . . . . . . . . . . . 31--39
Robyn Lutz Software Engineering for Space
Exploration . . . . . . . . . . . . . . 41--46
Stephen Yau and
Ho An Software Engineering Meets Services and
Cloud Computing . . . . . . . . . . . . 47--53
David Parnas Software Engineering --- Missing in
Action: a Personal Perspective . . . . . 54--58
Jae Min Kim and
Minyong Kim and
Joonho Kong and
Hyung Beom Jang and
Sung Woo Chung Display Power Management That Detects
User Intent . . . . . . . . . . . . . . 60--66
Anonymous UTA's Yale Patt Wins First IEEE CS Rau
Award . . . . . . . . . . . . . . . . . 67--69
Justin Clark Object Digitization for Everyone . . . . 81--83
Min Chen and
Anne Trefethen and
Rene Banares-Alcantara and
Marina Jirotka and
Bob Coecke and
Thomas Ertl and
Albrecht Schmidt From Data Analysis and Visualization to
Causality Discovery . . . . . . . . . . 84--87
Dirk Basten and
Ali Sunyaev Guidelines for Software Development
Effort Estimation . . . . . . . . . . . 88--90
Johan Bollen and
Huina Mao Twitter Mood as a Stock Market Predictor 91--94
Mark Guzdial Learning How to Prepare Computer Science
High School Teachers . . . . . . . . . . 95--97
Neville Holmes Digital Machinery and Analog Brains . . 100, 98--99
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier The Honest Give-and-Take . . . . . . . . 6--8
Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10
Lee Garber Turning on the Lights for Wireless
Communications . . . . . . . . . . . . . 11--14
Anonymous System Identifies User Location without
GPS or Wi-Fi . . . . . . . . . . . . . . 15--17
Vladimir Getov and
Adolfy Hoisie and
Harvey J. Wasserman Codesign for Systems and Applications:
Charting the Path to Exascale Computing 19--21
John Shalf and
Dan Quinlan and
Curtis Janssen Rethinking Hardware--Software Codesign
for Exascale Systems . . . . . . . . . . 22--30
Sayantan Sur and
Sreeram Potluri and
Krishna Kandalla and
Hari Subramoni and
Dhabaleswar K. Panda and
Karen Tomko Codesign for InfiniBand Clusters . . . . 31--36
Darren Kerbyson and
Abhinav Vishnu and
Kevin Barker and
Adolfy Hoisie Codesign Challenges for Exascale
Systems: Performance, Power, and
Reliability . . . . . . . . . . . . . . 37--43
Dan Stanzione The iPlant Collaborative:
Cyberinfrastructure to Feed the World 44--52
Bindu Madhavi Padmanabhuni and
Hee Beng Kuan Tan Defending against Buffer-Overflow
Vulnerabilities . . . . . . . . . . . . 53--60
Giuseppe Nuti and
Mahnoosh Mirghaemi and
Philip Treleaven and
Chaiyakorn Yingsaeree Algorithmic Trading . . . . . . . . . . 61--69
Anonymous Chuck Seitz Wins Cray Award . . . . . . 70--70
Anonymous Cleve Moler Wins Fernbach Award . . . . 71--71
David Walden Fiftieth Anniversary of MIT's Compatible
Time-Sharing System . . . . . . . . . . 71--71
Anonymous Susan Graham receives Kennedy Award . . 72--72
Anonymous Call and Calendar . . . . . . . . . . . 73--74
Yung-Hsiang Lu and
Qinru Qiu and
Ali R. Butt and
Kirk W. Cameron End-to-End Energy Management . . . . . . 75--77
Arun Ross and
Ayman Abaza Human Ear Recognition . . . . . . . . . 79--81
Jose Luis Gomez-Barroso and
Claudio Feijoo and
Ramon Compano Opportunities in the Mobile Search
Market . . . . . . . . . . . . . . . . . 83--85
Shubu Mukherjee If Anything in This Life Is Certain,
It's That You Can Kill Any ISA . . . . . 87--88
Mikhil Masli Crowdsourcing Maps . . . . . . . . . . . 90--93
Kai A. Olsen and
Alessio Malizia Automated Personal Assistants . . . . . 112, 110--111
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Sorel Reisman Looking Back, Looking Forward . . . . . 8--10
David Alan Grier Uncharted Territory . . . . . . . . . . 12--14
Anonymous 32 and 16 Years Ago . . . . . . . . . . 15--16
Neal Leavitt Internet Security under Attack: The
Undermining of Digital Certificates . . 17--20
Anonymous Serious Security Flaws Identified in
Cloud Systems . . . . . . . . . . . . . 21--23
Jesse M. Heines and
Gena R. Greher and
S. Alex Ruthmann and
Brendan L. Reilly Two Approaches to Interdisciplinary
Computing $+$ Music Courses . . . . . . 25--32
Joe Geigel and
Marla Schweppe and
David Huynh and
Brian Johnstone Adapting a Virtual World for Theatrical
Performance . . . . . . . . . . . . . . 33--38
So Yamaoka and
Lev Manovich and
Jeremy Douglass and
Falko Kuester Cultural Analytics in Large-Scale
Visualization Environments . . . . . . . 39--48
Ami Marowka Back to Thin-Core Massively Parallel
Processors . . . . . . . . . . . . . . . 49--54
Mary Lacity and
Erran Carmel and
Joseph Rottman Rural Outsourcing: Delivering ITO and
BPO Services from Remote Domestic
Locations . . . . . . . . . . . . . . . 55--62
Laura Ferrari and
Marco Mamei Discovering City Dynamics through Sports
Tracking Applications . . . . . . . . . 63--68
Anonymous Grier Voted 2012 Computer Society
President-Elect . . . . . . . . . . . . 69--70
Anonymous North America New PhD Numbers Hold
Steady . . . . . . . . . . . . . . . . . 71--73
Anonymous Call and Calendar . . . . . . . . . . . 74--76
Wil van der Aalst Using Process Mining to Bridge the Gap
between BI and BPM . . . . . . . . . . . 77--80
Douglas Baldwin Is Computer Science a Relevant Academic
Discipline for the 21st Century? . . . . 81--83
Emi Tamaki and
Jun Rekimoto PossessedHand: Controlling Hand
Movements with Computer Output . . . . . 84--86
Alexander Hills Museums at Your Fingertips . . . . . . . 87--89
Kim Schaffer Are Password Requirements too Difficult? 90--92
Rafael Capilla and
Jan Bosch The Promise and Challenge of Runtime
Variability . . . . . . . . . . . . . . 93--95
Neville Holmes The Profession and Digital Technology 116, 114--115
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
John W. Walz Creating Our Future . . . . . . . . . . 6--7
Ron Vetter Digital Computer: The Next-Generation
Flagship Publication . . . . . . . . . . 8--9
Charles Severance The Second-Order Effects of Steve Jobs 10--11
Anonymous 32 & 16 years ago . . . . . . . . . . . . 12--13
Brian M. Gaff and
Ralph A. Loren and
Gabriel J. McCool Intellectual Property, Part I . . . . . 14--16
Lee Garber The Challenges of Securing the
Virtualized Environment . . . . . . . . 17--20
Anonymous News Briefs . . . . . . . . . . . . . . 21--23
Daniel A. Reed and
Dennis B. Gannon and
James R. Larus Imagining the Future: Thoughts on
Computing . . . . . . . . . . . . . . . 25--30
Dawn Song and
Elaine Shi and
Ian Fischer and
Umesh Shankar Cloud Data Protection for the Masses . . 39--45
Bjarne Stroustrup Software Development for Infrastructure 47--58
S. S. Iyengar and
Xin Li and
Huanhuan Xu and
Supratik Mukhopadhyay and
N. Balakrishnan and
Amit Sawant and
Puneeth Iyengar Toward More Precise Radiotherapy
Treatment of Lung Tumors . . . . . . . . 59--65
Antonia Bertolino and
Guglielmo De Angelis and
Sampo Kellomaki and
Andrea Polini Enhancing Service Federation
Trustworthiness through Online Testing 66--72
Anonymous Two CS Members Win US Presidential
Honors . . . . . . . . . . . . . . . . . 73--76
Anonymous Call and Calendar . . . . . . . . . . . 77--78
Anil K. Jain and
Soweon Yoon Automatic Detection of Altered
Fingerprints . . . . . . . . . . . . . . 79--82
Doug Lyon The Java Tree Withers . . . . . . . . . 83--85
Hal Berghel Identity Theft and Financial Fraud: Some
Strangeness in the Proportions . . . . . 86--89
Shyong (Tony) K. Lam and
John Riedl Are Our Online ``Friends'' Really
Friends? . . . . . . . . . . . . . . . . 91--93
Matthew Tolentino and
Kirk W. Cameron The Optimist, the Pessimist, and the
Global Race to Exascale in 20 Megawatts 95--97
David Alan Grier and
Erin Dian Dumbacher The Common Future . . . . . . . . . . . 108
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous Letters . . . . . . . . . . . . . . . . 6
Charles Severance JavaScript: Designing a Language in 10
Days . . . . . . . . . . . . . . . . . . 7--8
Brian M. Gaff and
Ralph A. Loren and
Elizabeth A. Spinney Intellectual Property, Part II . . . . . 9--11
Anonymous 32 & 16 years ago . . . . . . . . . . . . 12--13
George Lawton Cloud Streaming Brings Video to Mobile
Devices . . . . . . . . . . . . . . . . 14--16
Lee Garber News Briefs . . . . . . . . . . . . . . 17--19
Simon S. Y. Shim Guest Editor's Introduction: The CAP
Theorem's Growing Impact . . . . . . . . 21--22
Eric Brewer Pushing the CAP: Strategies for
Consistency and Availability . . . . . . 23--29
Seth Gilbert and
Nancy A. Lynch Perspectives on the CAP Theorem . . . . 30--36
Daniel J. Abadi Consistency Tradeoffs in Modern
Distributed Database System Design: CAP
is Only Part of the Story . . . . . . . 37--42
Raghu Ramakrishnan CAP and Cloud Data Management . . . . . 43--49
Kenneth P. Birman and
Daniel A. Freedman and
Qi Huang and
Patrick Dowell Overcoming CAP with Consistent
Soft-State Replication . . . . . . . . . 50--58
Gary C. Kessler Information Security: New Threats or
Familiar Problems? . . . . . . . . . . . 59--65
Nuno Antunes and
Marco Vieira Defending against Web Application
Vulnerabilities . . . . . . . . . . . . 66--72
Justin Jee and
Lee Case Klippel and
M. Shahriar Hossain and
Naren Ramakrishnan and
Bud Mishra Discovering the Ebb and Flow of Ideas
from Text Corpora . . . . . . . . . . . 73--77
Christian Muller-Tomfelde and
Morten Fjeld Tabletops: Interactive Horizontal
Displays for Ubiquitous Computing . . . 78--81
Angelos Stavrou and
Jeffrey Voas and
Tom Karygiannis and
Steve Quirolgico Building Security into Off-the-Shelf
Smartphones . . . . . . . . . . . . . . 82--84
Jimmy Gambier An Independent Social Game Company's
Perspective . . . . . . . . . . . . . . 85--87
Bo Brinkman The Next Step for Ethics Education Is
Enforcing the Code . . . . . . . . . . . 88--90
Francis Hsu The Impossible and the Possible . . . . 91--92
Bob Ward Computer Society Names Winners of Three
Key Awards . . . . . . . . . . . . . . . 93--95
Anonymous Call and Calendar . . . . . . . . . . . 97--98
David Alan Grier and
Erin Dian Dumbacher The New Internationalists . . . . . . . 112
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Monash Museum of Computing History . . . 6--7
Brian M. Gaff and
Thomas J. Smedinghoff and
Socheth Sor Privacy and Data Security . . . . . . . 8--10
Anonymous 32 & 16 years ago . . . . . . . . . . . . 11--12
Lee Garber Wi-Fi Races into a Faster Future . . . . 13--16
Lee Garber News Briefs . . . . . . . . . . . . . . 18--20
T. M. Murali Guest Editor's Introduction:
Computationally Driven Experimental
Biology . . . . . . . . . . . . . . . . 22--23
Michael B. Mayhew and
Xin Guo and
Steven B. Haase and
Alexander J. Hartemink Close Encounters of the Collaborative
Kind . . . . . . . . . . . . . . . . . . 24--30
Mehmet Koyuturk Using Protein Interaction Networks to
Understand Complex Diseases . . . . . . 31--38
Fabio Vandin and
Eli Upfal and
Benjamin J. Raphael Algorithms and Genome Sequencing:
Identifying Driver Pathways in Cancer 39--46
Steven S. Skiena Redesigning Viral Genomes . . . . . . . 47--53
Lwin Khin Shar and
Hee Beng Kuan Tan Defending against Cross-Site Scripting
Attacks . . . . . . . . . . . . . . . . 55--62
Xiaojun Quan and
Liu Wenyin and
Wenyu Dou and
Hui Xiong and
Yong Ge Link Graph Analysis for Business Site
Selection . . . . . . . . . . . . . . . 64--69
Hal Berghel WikiLeaks and the Matter of Private
Manning . . . . . . . . . . . . . . . . 70--73
Kirk W. Cameron and
Rong Ge Generalizing Amdahl's Law for Power and
Energy . . . . . . . . . . . . . . . . . 75--77
Aaron Halfaker and
John Riedl Bots and Cyborgs: Wikipedia's Immune
System . . . . . . . . . . . . . . . . . 79--82
Cornelius Held and
Julia Krumm and
Petra Markel and
Ralf P. Schenke Intelligent Video Surveillance . . . . . 83--84
Anonymous Computer Society Connection . . . . . . 85--87
Bob Ward Call and Calendar . . . . . . . . . . . 88--89
David Alan Grier and
Erin Dian Dumbacher Free Agency . . . . . . . . . . . . . . 104
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Discovering JavaScript Object Notation 6--8
Brian M. Gaff and
Brian P. Murphy and
Peter J. Cuomo Defending Against Patent Infringement 9--12
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 13--14
Sixto Ortiz Jr. New Approach Keeps Security in Context 15--17
Anonymous News Briefs . . . . . . . . . . . . . . 18--20
Albrecht Schmidt and
Elizabeth Churchill Interaction Beyond the Keyboard . . . . 21--24
Jan B. F. van Erp and
Fabien Lotte and
Michael Tangermann Brain-Computer Interfaces: Beyond
Medical Applications . . . . . . . . . . 26--34
Hans Gellersen and
Florian Block Novel Interactions on the Keyboard . . . 36--40
Andreas Riener Gestural Interaction in Vehicular
Applications . . . . . . . . . . . . . . 42--47
Michel Beaudouin-Lafon and
Stephane Huot and
Mathieu Nancel and
Wendy Mackay and
Emmanuel Pietriga and
Romain Primet and
Julie Wagner and
Olivier Chapuis and
Clement Pillias and
James R. Eagan and
Tony Gjerlufsen and
Clemens Klokmose Multisurface Interaction in the WILD
Room . . . . . . . . . . . . . . . . . . 48--56
Andrea Bianchi and
Ian Oakley and
Dong-Soo Kwon Open Sesame: Design Guidelines for
Invisible Passwords . . . . . . . . . . 58--65
Kai-hui Chang and
Chris Browy Parallel Logic Simulation: Myth or
Reality? . . . . . . . . . . . . . . . . 67--73
Daniel Yellin and
Yifat Yulevich and
Alexander Pyasic and
Avshalom Houri Optimized Interactive Processes . . . . 74--81
Gary Marsden and
Edward Cutrell and
Matt Jones and
Amit A. Nanavati and
Nitendra Rajput Making Technology Invisible in the
Developing World . . . . . . . . . . . . 82--85
David C. Hodge Increasing Tuition's Affordability . . . 86--88
Brian Fitzgerald Software Crisis 2.0 . . . . . . . . . . 89--91
Anthony Patrick Melaragno and
Damindra Bandara and
Duminda Wijesekera and
James Bret Michael Securing the ZigBee Protocol in the
Smart Grid . . . . . . . . . . . . . . . 92--94
Henry Tsai and
Kelvin Sung Mobile Applications and Museum
Visitation . . . . . . . . . . . . . . . 95--98
Anonymous Computer Society Recognizes Outstanding
Professionals . . . . . . . . . . . . . 99--101
Anonymous Call and Calendar . . . . . . . . . . . 102--103
David Alan Grier and
Erin Dian Dumbacher Learning from the Best . . . . . . . . . 116
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Van Jacobson: Getting NSFNet off the
Ground . . . . . . . . . . . . . . . . . 6--9
Brian M. Gaff and
Stephen G. Huggard and
Gregory W. Carey Do I Need A Lawyer? If You Have to Ask,
You Probably Do . . . . . . . . . . . . 10--12
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 13--14
Neal Leavitt Will Power Problems Curtail Processor
Progress? . . . . . . . . . . . . . . . 15--17
Lee Garber News Briefs . . . . . . . . . . . . . . 18--20
Roy Want and
Bill N. Schilit Interactive Digital Signage . . . . . . 21--24
Nick Taylor and
Keith Cheverst Supporting Community Awareness with
Interactive Displays . . . . . . . . . . 26--32
Adrian Friday and
Nigel Davies and
Christos Efstratiou Reflections on Long-Term Experiments
with Public Displays . . . . . . . . . . 34--41
Timo Ojala and
Vassilis Kostakos and
Hannu Kukka and
Tommi Heikkinen and
Tomas Linden and
Marko Jurmu and
Simo Hosio and
Fabio Kruger and
Daniele Zanni Multipurpose Interactive Public Displays
in the Wild: Three Years Later . . . . . 42--49
Florian Alt and
Jorg Muller and
Albrecht Schmidt Advertising on Public Display Networks 50--56
Nigel Davies and
Marc Langheinrich and
Rui Jose and
Albrecht Schmidt Open Display Networks: a Communications
Medium for the 21st Century . . . . . . 58--64
Jamie Erbes and
Hamid R. Motahari-Nezhad and
Sven Graupner The Future of Enterprise IT in the Cloud 66--72
Lars Hopland Nestas and
Kjell J. Hole Building and Maintaining Trust in
Internet Voting . . . . . . . . . . . . 74--80
Tony Hey and
Dennis Gannon and
Jim Pinkelman The Future of Data-Intensive Science . . 81--82
Zhiwei Xu Measuring Green IT in Society . . . . . 83--85
Hal Berghel Breaking the Fourth Wall of Electronic
Crime: Blame It on the Thespians . . . . 86--88
Alessio Malizia and
Kai A. Olsen Toward a New Search Paradigm --- Can We
Learn from Ants? . . . . . . . . . . . . 89--91
Anil K. Jain and
Rong Jin and
Jung-Eun Lee Tattoo Image Matching and Retrieval . . 93--96
Anonymous Computer Society Honors Top Scientists 97--99
Anonymous Call and Calendar . . . . . . . . . . . 100--102
David Alan Grier and
Erin Dian Dumbacher Teaching the Intangible . . . . . . . . 116
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Alan Turing and Bletchley Park . . . . . 6--8
Brian M. Gaff and
Gregory J. Ploussios Open Source Software . . . . . . . . . . 9--11
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Lee Garber Tangible User Interfaces: Technology You
Can Touch . . . . . . . . . . . . . . . 15--18
Anonymous News Briefs . . . . . . . . . . . . . . 19--21
Carl Chang and
Vladimir Getov and
Kelvin Sung Computing in Asia: a Sampling of Recent
Success Stories . . . . . . . . . . . . 23--25
Hong Mei and
Gang Huang and
Tao Xie Internetware: a Software Paradigm for
Internet Computing . . . . . . . . . . . 26--31
Mikio Aoyama Computing for the Next-Generation
Automobile . . . . . . . . . . . . . . . 32--37
Lijuan Wang and
Yao Qian and
Matthew Scott and
Gang Chen and
Frank Soong Computer-Assisted Audiovisual Language
Learning . . . . . . . . . . . . . . . . 38--47
Wing-Kin Sung Bioinformatics Applications in Genomics 57--63
Zhenyu Zhang and
W. K. Chan and
T. H. Tse Fault Localization Based Only on Failed
Runs . . . . . . . . . . . . . . . . . . 64--71
Jerome Israel Why the FBI Can't Build a Case
Management System . . . . . . . . . . . 73--80
Virginia N. L. Franqueira and
Roel J. Wieringa Role-Based Access Control in Retrospect 81--88
Jeff Munson and
Phillip Pasqual Using Technology in Autism Research: The
Promise and the Perils . . . . . . . . . 89--91
Devon M. Simmonds The Programming Paradigm Evolution . . . 93--95
Richard J. Lipton Might Turing Have Won a Turing Award? 96--97
Robert Harle and
Andy Hopper Sports Sensing: An Olympic Challenge for
Computing . . . . . . . . . . . . . . . 98--101
Rolf Oppliger and
Bruno Wildhaber Common Misconceptions in Computer and
Information Security . . . . . . . . . . 102--104
Anonymous Society Honors Fagin for Work on
Databases . . . . . . . . . . . . . . . 105--106
Anonymous Call and Calendar . . . . . . . . . . . 107--109
David Alan Grier and
Erin Dian Dumbacher Controlling Share . . . . . . . . . . . 128
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous Letters . . . . . . . . . . . . . . . . 6--7
Charles Severance The Art of Teaching Computer Science:
Niklaus Wirth . . . . . . . . . . . . . 8--10
Brian M. Gaff and
Richard N. Kimball and
Jill M. Hanson Raising Capital: Where to Find It, How
to Secure It, and Tips on What to Avoid 11--13
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 14--15
Sixto Ortiz Jr. Computing Trends Lead to New Programming
Languages . . . . . . . . . . . . . . . 17--20
Anonymous News Briefs . . . . . . . . . . . . . . 21--23
Oliver Bimber What's Real About Augmented Reality? . . 24--25
Michael Gervautz and
Dieter Schmalstieg Anywhere Interfaces Using Handheld
Augmented Reality . . . . . . . . . . . 26--31
Mark Mine and
David Rose and
Bei Yang and
Jeroen van Baar and
Anselm Grundhöfer Projection-Based Augmented Reality in
Disney Theme Parks . . . . . . . . . . . 32--40
Ailsa Barry and
Jonathan Trout and
Paul Debenham and
Graham Thomas Augmented Reality in a Public Space: The
Natural History Museum, London . . . . . 42--47
Nassir Navab and
Tobias Blum and
Lejing Wang and
Aslì and
Okur and
Thomas Wendler First Deployments of Augmented Reality
in Operating Rooms . . . . . . . . . . . 48--55
Mark Billinghurst and
Andreas Dünser Augmented Reality in the Classroom . . . 56--63
Daniel E. O'Leary Computer-Based Political Action: The
Battle and Internet Blackout over PIPA 64--72
Jianyong Chen and
Yang Wang and
Xiaomin Wang On-Demand Security Architecture for
Cloud Computing . . . . . . . . . . . . 73--78
Hal Berghel The OuijAmazon Desktop Metaphor . . . . 80--82
Eitan Frachtenberg Holistic Datacenter Design in the Open
Compute Project . . . . . . . . . . . . 83--85
Patrizio Campisi and
Daria La Rocca and
Gaetano Scarano EEG for Automatic Person Recognition . . 87--89
Anuradha Uduwage and
Joseph A. Konstan The Answer Is Out There: Online Q&A Sites 90--92
Anonymous Avi\vzienis Wins Eckert--Mauchly Award 93--95
Anonymous Call and Calendar . . . . . . . . . . . 96--98
David Alan Grier and
Erin Dian Dumbacher Repurposers . . . . . . . . . . . . . . 116
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous Letters . . . . . . . . . . . . . . . . 6--7
Charles Severance Teaching the World: Daphne Koller and
Coursera . . . . . . . . . . . . . . . . 8--9
Brian M. Gaff and
Kenneth Choy and
Jamie Chan Doing Business in China . . . . . . . . 11--13
Anonymous 32 & 16 years ago . . . . . . . . . . . . 14--15
Lee Garber Converged Infrastructure: Addressing the
Efficiency Challenge . . . . . . . . . . 17--20
Anonymous News Briefs . . . . . . . . . . . . . . 21--23
Stephen W. Keckler and
Steven K. Reinhardt Massively Multithreaded Computing
Systems . . . . . . . . . . . . . . . . 24--25
John A. Stratton and
Christopher Rodrigues and
I-Jui Sung and
Li-Wen Chang and
Nasser Anssari and
Geng Liu and
Wen-mei W. Hwu and
Nady Obeid Algorithm and Data Optimization
Techniques for Scaling to Massively
Threaded Systems . . . . . . . . . . . . 26--32
Stanley Tzeng and
Brandon Lloyd and
John D. Owens A GPU Task-Parallel Model with
Dependency Resolution . . . . . . . . . 34--41
Benedict R. Gaster and
Lee Howes Can GPGPU Programming Be Liberated from
the Data-Parallel Bottleneck? . . . . . 42--52
Antonino Tumeo and
Simone Secchi and
Oreste Villa Designing Next-Generation Massively
Multithreaded Architectures for
Irregular Applications . . . . . . . . . 53--61
Stephen Davies and
Stacey Aylor Seal and
Jesse Hatfield Cinefile: a Category-Based Analytic
Browser . . . . . . . . . . . . . . . . 62--69
Lorraine J. Haricombe and
L. Ada Emmett and
Perry Alexander Open Access: An Evolving Alternative . . 70--72
Victor Ng-Thow-Hing and
Sandra Okita Playdates with Robots . . . . . . . . . 73--75
Franco Zambonelli Toward Sociotechnical Urban
Superorganisms . . . . . . . . . . . . . 76--78
Tom Mens On the Complexity of Software Systems 79--81
William H. Boothby and
Wolff Heintschel von Heinegg and
James Bret Michael and
Michael N. Schmitt and
Thomas C. Wingfield When Is a Cyberattack a Use of Force or
an Armed Attack? . . . . . . . . . . . . 82--84
Anonymous IEEE Computer Society Election . . . . . 85--93
Anonymous IEEE President-Elect Candidates Address
Computer Society Concerns . . . . . . . 94--99
Anonymous Call and Calendar . . . . . . . . . . . 100--103
David Alan Grier and
Erin Dian Dumbacher The Winner Takes It All . . . . . . . . 120
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Bertrand Meyer: Software Engineering and
the Eiffel Programming Language . . . . 6--8
Brian M. Gaff and
Brian P. Murphy and
Ralph A. Loren and
Christine A. Dudzik and
Lisa Swiszcz Patent Reform: New Tools for Challenging
Patent Validity as of September 2012 . . 9--11
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Neal Leavitt Are Mobile Payments Ready to Cash in
Yet? . . . . . . . . . . . . . . . . . . 15--18
Anonymous News Briefs . . . . . . . . . . . . . . 19--20
Kaushik R. Chowdhury and
Dave Cavalcanti and
Mostafa El-Said and
Tommaso Mazza and
Chittabrata Ghosh Modeling and Simulation of Smart and
Green Computing Systems . . . . . . . . 22--23
Swades De and
Riya Singhal Toward Uninterrupted Operation of
Wireless Sensor Networks . . . . . . . . 24--30
Prabhakar T. Venkata and
S. N. Akshay Uttama Nambi and
R. Venkatesha Prasad and
Ignas Niemegeers Bond Graph Modeling for
Energy-Harvesting Wireless Sensor
Networks . . . . . . . . . . . . . . . . 31--38
Murat Kocaoglu and
Derya Malak and
Ozgur B. Akan Fundamentals of Green Communications and
Computing: Modeling and Simulation . . . 40--46
Sungkap Yeo and
Hsien-Hsin S. Lee SimWare: a Holistic Warehouse-Scale
Computer Simulator . . . . . . . . . . . 48--55
Baris Aksanli and
Jagannathan Venkatesh and
Tajana Simunic Rosing Using Datacenter Simulation to Evaluate
Green Energy Integration . . . . . . . . 56--64
Mahinthan Chandramohan and
Hee Beng Kuan Tan Detection of Mobile Malware in the Wild 65--71
Julian Ohrt and
Volker Turau Cross-Platform Development Tools for
Smartphone Applications . . . . . . . . 72--79
Xiaoqi Yan and
Chi-Wing Fu and
Andrew J. Hanson Multitouching the Fourth Dimension . . . 80--88
Bruce Nordman and
Ken Christensen and
Alan Meier Think Globally, Distribute Power
Locally: The Promise of Nanogrids . . . 89--91
Hal Berghel The Dumbing Down of SportPhishing . . . 92--94
Karl Ricanek, Jr. and
Chris Boehnen Facial Analytics: From Big Data to Law
Enforcement . . . . . . . . . . . . . . 95--97
Cliff Lampe and
Nicole Ellison Understanding Facebook: Social Computing
Isn't `Just' Social . . . . . . . . . . 98--100
Dejan S. Milojicic and
Martin Arlitt and
Doree Duncan Seligmann and
George K. Thiruvathukal and
Christian Timmerer Innovation Mashups: Academic Rigor Meets
Social Networking Buzz . . . . . . . . . 101--105
Anonymous Call and Calendar . . . . . . . . . . . 106--108
David Alan Grier and
Erin Dian Dumbacher It's Complicated . . . . . . . . . . . . 124
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous Letters . . . . . . . . . . . . . . . . 6--7
Charles Severance The Apache Software Foundation: Brian
Behlendorf . . . . . . . . . . . . . . . 8--9
Brian M. Gaff and
Karl P. Fryzel Starting a Business: Which Entity
Structure Is Best for You? . . . . . . . 10--12
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 14--15
Lee Garber Using In-Memory Analytics to Quickly
Crunch Big Data . . . . . . . . . . . . 16--18
Anonymous News Briefs . . . . . . . . . . . . . . 19--21
Mike Hinchey and
Sooyong Park and
Klaus Schmid Building Dynamic Software Product Lines 22--26
Jan Bosch and
Rafael Capilla Dynamic Variability in
Software-Intensive Embedded System
Families . . . . . . . . . . . . . . . . 28--35
Nelly Bencomo and
Svein Hallsteinsen and
Eduardo Santana de Almeida A View of the Dynamic Software Product
Line Landscape . . . . . . . . . . . . . 36--41
Luciano Baresi and
Sam Guinea and
Liliana Pasquale Service-Oriented Dynamic Software
Product Lines . . . . . . . . . . . . . 42--48
Jaejoon Lee and
Gerald Kotonya and
Daniel Robinson Engineering Service-Based Dynamic
Software Product Lines . . . . . . . . . 49--55
Pete Sawyer and
Raúl Mazo and
Daniel Diaz and
Camille Salinesi and
Danny Hughes Using Constraint Programming to Manage
Configurations in Self-Adaptive Systems 56--63
Mark Hedley and
Jian Zhang Accurate Wireless Localization in Sports 64--70
Moustafa AbdelBaky and
Manish Parashar and
Hyunjoo Kim and
Kirk E. Jordan and
Vipin Sachdeva and
James Sexton and
Hani Jamjoom and
Zon-Yin Shae and
Gergina Pencheva and
Reza Tavakoli and
Mary F. Wheeler Enabling High-Performance Computing as a
Service . . . . . . . . . . . . . . . . 72--80
Ann E. K. Sobel Should Everyone Go to College? . . . . . 82--83
James D. Hollan Activity-Enriched Computing: Capturing
and Mining Activity Histories . . . . . 84--87
Tim Boland and
Paul E. Black Juliet 1.1 C/C++ and Java Test Suite . . 88--90
Peter Gruenbaum Underrepresented Youth Creating
Culturally Relevant Games . . . . . . . 91--93
Krishna P. C. Madhavan and
Mihaela Vorvoreanu and
Niklas Elmqvist and
Aditya Johri and
Naren Ramakrishnan and
G. Alan Wang and
Ann McKenna Portfolio Mining . . . . . . . . . . . . 95--99
Bryan Reinicke It's 2012, So Why Am I Driving a 1972
Bug? . . . . . . . . . . . . . . . . . . 100--103
Anonymous New EICs Named for IEEE Computer Society
Publications . . . . . . . . . . . . . . 104--106
Anonymous Call and Calendar . . . . . . . . . . . 107--109
David Alan Grier and
Erin Dian Dumbacher The Computer in the Mirror . . . . . . . 128
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Inventing PHP: Rasmus Lerdorf . . . . . 6--7
Brian M. Gaff and
Ralph A. Loren and
Amy M. DeCloux A Brief Overview of the America Invents
Act . . . . . . . . . . . . . . . . . . 8--10
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Neal Leavitt Big Iron Moves Toward Exascale Computing 14--17
Anonymous News Briefs . . . . . . . . . . . . . . 18--20
Ann E. K. Sobel The Move Toward Electronic Health
Records . . . . . . . . . . . . . . . . 22--23
Doug Fridsma Electronic Health Records: The HHS
Perspective . . . . . . . . . . . . . . 24--26
Inmaculada Carrión Señor and
José Luis Fernández Alemán and
Ambrosio Toval Personal Health Records: New Means to
Safely Handle Health Data? . . . . . . . 27--33
Raik Kuhlisch and
Ben Kraufmann and
Hannes Restel Electronic Case Records in a Box:
Integrating Patient Data in Healthcare
Networks . . . . . . . . . . . . . . . . 34--40
Sujoy Basu and
Alan H. Karp and
Jun Li and
James Pruyne and
Jerry Rolia and
Sharad Singhal and
Jaap Suermondt and
Ram Swaminathan Fusion: Managing Healthcare Records at
Cloud Scale . . . . . . . . . . . . . . 42--49
Kevin Brady and
Ram D. Sriram and
Bettijoyce Lide and
Kathleen Roberts Testing the Nation's Healthcare
Information Infrastructure: NIST
Perspective . . . . . . . . . . . . . . 50--57
Barry Fagin and
Dale Skrien Debugging on the Shoulders of Giants:
von Neumann's Programs 65 Years Later 59--68
Jason Dedrick and
Jian Tang and
Kenneth L. Kraemer China's Indigenous Innovation Policy:
Impact on Multi-national R&D . . . . . . 70--78
Edward Curry and
Bill Guyon and
Charles Sheridan and
Brian Donnellan Sustainable IT: Challenges, Postures,
and Outcomes . . . . . . . . . . . . . . 79--81
Hal Berghel Stratfor or Stratagainst . . . . . . . . 82--85
Anil K. Jain and
Karthik Nandakumar Biometric Authentication: System
Security and User Privacy . . . . . . . 87--92
Frank Bi and
Joseph A. Konstan Customer Service 2.0: Where Social
Computing Meets Customer Relations . . . 93--95
Anonymous Computer Society Connection . . . . . . 96--98
Anonymous Call and Calendar . . . . . . . . . . . 99--101
David Alan Grier and
Erin Dian Dumbacher Love the Show! . . . . . . . . . . . . . 120
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
John W. Walz Implementing SP7: a Review of Progress
in 2012 . . . . . . . . . . . . . . . . 6--9
Charles Severance Vint Cerf: a Brief History of Packets 10--12
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 16--17
Anonymous News Briefs . . . . . . . . . . . . . . 22--24
Gary C. Kessler Advancing the Science of Digital
Forensics . . . . . . . . . . . . . . . 25--27
Joel Young and
Kristina Foster and
Simson Garfinkel and
Kevin Fairbanks Distinct Sector Hashes for Target File
Detection . . . . . . . . . . . . . . . 28--35
Ray Hunt and
Sherali Zeadally Network Forensics: An Analysis of
Techniques, Tools, and Trends . . . . . 36--43
Irfan Ahmed and
Sebastian Obermeier and
Martin Naedele and
Golden G. Richard III SCADA Systems: Challenges for Forensic
Investigators . . . . . . . . . . . . . 44--51
Yong Wang and
Kevin Streff and
Sonell Raman Smartphone Security Challenges . . . . . 52--58
Aaron Spear and
Markus Levy and
Mathieu Desnoyers Using Tracing to Solve the Multicore
System Debug Problem . . . . . . . . . . 60--64
Rafael Moreno-Vozmediano and
Ruben S. Montero and
Ignacio M. Llorente IaaS Cloud Architecture: From
Virtualized Datacenters to Federated
Cloud Infrastructures . . . . . . . . . 65--72
Naren Sundaravaradan and
Naren Ramakrishnan and
David A. Hanauer Factorizing Event Sequences . . . . . . 73--75
Manfred Lau and
Jun Mitani and
Takeo Igarashi Digital Fabrication . . . . . . . . . . 76--79
Arnold Brown and
Benjamin Apple and
James Bret Michael and
Michael Schumann Atomic-Level Security for Web
Applications in a Cloud Environment . . 80--83
Emil Vassev and
Mike Hinchey Awareness in Software-Intensive Systems 84--87
Brad Hallisey Building a Virtual World: The Pipeline
and Process . . . . . . . . . . . . . . 90--92
Anonymous Milojicic Voted 2013 Computer Society
President-Elect . . . . . . . . . . . . 93--95
Anonymous CS Announces 2012 Winners of Kennedy and
Rau Awards . . . . . . . . . . . . . . . 96--98
Anonymous Call and Calendar . . . . . . . . . . . 99--101
David Alan Grier and
Erin Dian Dumbacher Work/Play . . . . . . . . . . . . . . . 116
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier The Unseen and the Seen . . . . . . . . 6--7
Ron Vetter Embracing Digital Publishing . . . . . . 8--10
Charles Severance Van Jacobson: Content-Centric Networking 11--13
Brian M. Gaff and
Ralph A. Loren and
Gareth Dickson Protecting Bioinformatics as
Intellectual Property . . . . . . . . . 15--17
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 18--19
Neal Leavitt Bringing Big Analytics to the Masses . . 20--23
Lee Garber News Briefs . . . . . . . . . . . . . . 24--26
Santosh Kumar and
Wendy Nilsen and
Misha Pavel and
Mani Srivastava Mobile Health: Revolutionizing
Healthcare Through Transdisciplinary
Research . . . . . . . . . . . . . . . . 28--35
Gunar Schirner and
Deniz Erdogmus and
Kaushik Chowdhury and
Taskin Padir The Future of Human-in-the-Loop
Cyber-Physical Systems . . . . . . . . . 36--45
Thanassis Rikakis and
Aisling Kelliher and
Nicole Lehrer Experiential Media and Digital Culture 46--54
Noel Sharkey and
Amanda Sharkey Robotic Surgery: On the Cutting Edge of
Ethics . . . . . . . . . . . . . . . . . 56--64
Kjell Jòrgen Hole Management of Hidden Risks . . . . . . . 65--70
Upkar Varshney A Smart Approach to Medication
Management . . . . . . . . . . . . . . . 71--76
San Murugesan Cloud Computing: The New Normal? . . . . 77--79
Brian David Johnson When Science Fiction and Science Fact
Meet . . . . . . . . . . . . . . . . . . 80--82
Kirk W. Cameron Energy Oddities, Part 1: Why the Energy
World Is Odd . . . . . . . . . . . . . . 83--84
Hal Berghel RFIDiocy: It's Déj\`a Vu All over Again 85--88
John Riedl and
Eric Riedl Crowdsourcing Medical Research . . . . . 89--92
David Alan Grier The Here and Now . . . . . . . . . . . . 108
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Lee Garber Letters . . . . . . . . . . . . . . . . 6
Charles Severance Mitchell Baker: The Mozilla Foundation 7--9
Brian M. Gaff and
Stephen G. Huggard and
Gregory W. Carey Paying Bribes Abroad Will Get You in Hot
Water in the US . . . . . . . . . . . . 11--13
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 14--15
Lee Garber GPUs Go Mobile . . . . . . . . . . . . . 16--19
Lee Garber News Briefs . . . . . . . . . . . . . . 20--23
Mohamed Ali Feki and
Fahim Kawsar and
Mathieu Boussard and
Lieven Trappeniers The Internet of Things: The Next
Technological Revolution . . . . . . . . 24--25
Steve Hodges and
Stuart Taylor and
Nicolas Villar and
James Scott and
Dominik Bial and
Patrick Tobias Fischer Prototyping Connected Devices for the
Internet of Things . . . . . . . . . . . 26--34
Daniel Roggen and
Gerhard Tröster and
Paul Lukowicz and
Alois Ferscha and
José del R. Millán and
Ricardo Chavarriaga Opportunistic Human Activity and Context
Recognition . . . . . . . . . . . . . . 36--45
Sang Wan Lee and
Oliver Prenzel and
Zeungnam Bien Applying Human Learning Principles to
User-Centered IoT Systems . . . . . . . 46--52
Gerd Kortuem and
Arosha K. Bandara and
Neil Smith and
Mike Richards and
Marian Petre Educating the Internet-of-Things
Generation . . . . . . . . . . . . . . . 53--61
Sasitharan Balasubramaniam and
Jussi Kangasharju Realizing the Internet of Nano Things:
Challenges, Solutions, and Applications 62--68
Jane W. S. Liu and
Chi-Sheng Shih and
Edward T.-H. Chu Cyberphysical Elements of
Disaster-Prepared Smart Environments . . 69--75
Mukesh Singhal and
Santosh Chandrasekhar and
Tingjian Ge and
Ravi Sandhu and
Ram Krishnan and
Gail-Joon Ahn and
Elisa Bertino Collaboration in Multicloud Computing
Environments: Framework and Security
Issues . . . . . . . . . . . . . . . . . 76--84
Jon G. Hall and
Lucia Rapanotti Beauty in Software Engineering . . . . . 85--87
Michael Lutz Undergraduate Software Engineering at
RIT: Past, Present, and Future . . . . . 88--90
Rinku Dewri and
Ramakrishna Thurimella Can a Phone's GPS `Lie' Intelligently? 91--93
Jason Pace The Ways We Play, Part 1: From PCs to
Consoles to Mobile Phones . . . . . . . 94--96
Anonymous EIC Applicants Sought for CS
Periodicals, 2014--2015 Terms . . . . . 106--108
Anonymous Call and Calendar . . . . . . . . . . . 109--111
David Alan Grier The Ethical Dimension . . . . . . . . . 112
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Pooja Sankar: Building the Piazza
Collaboration System . . . . . . . . . . 6--7
Brian M. Gaff and
Peter J. Cuomo Design Patents . . . . . . . . . . . . . 8--10
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Neal Leavitt A Technology that Comes Highly
Recommended . . . . . . . . . . . . . . 14--17
Lee Garber News Briefs . . . . . . . . . . . . . . 18--20
Jane Chu Prey and
Alfred C. Weaver Fostering Gender Diversity in Computing 22--23
Wendy M. DuBow Diversity in Computing: Why It Matters
and How Organizations Can Achieve It . . 24--29
Telle Whitney and
Denise Gammal and
Barbara Gee and
Jody Mahoney and
Caroline Simard Priming the Pipeline: Addressing
Gender-Based Barriers in Computing . . . 30--36
Mary Fernandez A Path Between: Mentoring the Next
Generation of Computing Professionals 38--41
Chris Stephenson and
Rebecca Dovi More than Gender: Taking a Systemic
Approach to Improving K-12 Computer
Science Education . . . . . . . . . . . 42--46
Crystal Eney and
Ed Lazowska and
Helene Martin and
Stuart Reges Broadening Participation: The Why and
the How . . . . . . . . . . . . . . . . 48--51
James P. Cohoon and
J. McGrath Cohoon and
Mary Lou Soffa Educating Diverse Computing Students at
the University of Virginia . . . . . . . 52--55
Maria Klawe Increasing Female Participation in
Computing: The Harvey Mudd College Story 56--58
Deepak Kumar Serving Women with a Purposeful Vision 60--61
Robert B. Schnabel Personal Reflections on Gender Diversity
in Computing . . . . . . . . . . . . . . 62--63
Kate Starbird Returning to My Inner Nerd: Following
the `Social' Disruption of Computing . . 63--65
Annie I. Anton Facing Challenges and Having Fun . . . . 65--66
Alice Bonhomme-Biais and
Raquel Romano Pursuing Professional Changes . . . . . 66--68
Lwin Khin Shar and
Hee Beng Kuan Tan Defeating SQL Injection . . . . . . . . 69--77
Chung-Wei Hang and
Zhe Zhang and
Munindar P. Singh Shin: Generalized Trust Propagation with
Limited Evidence . . . . . . . . . . . . 78--85
Nir Kshetri and
San Murugesan Cloud Computing and EU Data Privacy
Regulations . . . . . . . . . . . . . . 86--89
Kirk W. Cameron Energy Oddities, Part 2: Why Green
Computing Is Odd . . . . . . . . . . . . 90--93
Karl Ricanek, Jr. and
Gayathri Mahalingam Biometrically, How Identical Are
Identical Twins? . . . . . . . . . . . . 94--96
Hal Berghel The SCDOR Hack: Great Security Theater
in Five Stages . . . . . . . . . . . . . 97--99
John Riedl Crowdfunding Technology Innovation . . . 100--103
Brian David Johnson Jimmy: The Robot That Changed It All . . 104--107
Anonymous Computer SocietyConnection . . . . . . . 120--121
Anonymous Call and Calendar . . . . . . . . . . . 122--123
David Alan Grier Attention to Context . . . . . . . . . . 124
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Larry Smarr: Building Mosaic . . . . . . 6--8
Brian M. Gaff and
Ralph A. Loren Patent Monetization . . . . . . . . . . 9--11
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Lee Garber Analytics Goes on Location with New
Approaches . . . . . . . . . . . . . . . 14--17
Lee Garber News Briefs . . . . . . . . . . . . . . 18--20
Sherali Zeadally and
Gregorio Martinez and
Han-Chieh Chao Securing Cyberspace in the 21st Century 22--23
Pavlos Basaras and
Dimitrios Katsaros and
Leandros Tassiulas Detecting Influential Spreaders in
Complex, Dynamic Networks . . . . . . . 24--29
Cristina Alcaraz and
Javier Lopez Wide-Area Situational Awareness for
Critical Infrastructure Protection . . . 30--37
Ignasi Paredes-Oliva and
Pere Barlet-Ros and
Josep Sole-Pareta Scan Detection under Sampling: A New
Perspective . . . . . . . . . . . . . . 38--44
Huansheng Ning and
Hong Liu and
Laurence T. Yang Cyberentity Security in the Internet of
Things . . . . . . . . . . . . . . . . . 46--53
Awais Rashid and
Alistair Baron and
Paul Rayson and
Corinne May-Chahal and
Phil Greenwood and
James Walkerdine Who Am I? Analyzing Digital Personas in
Cybercrime Investigations . . . . . . . 54--61
Adeeb Alhomoud and
Irfan Awan and
Jules Ferdinand Pagna Disso and
Muhammad Younas A Next-Generation Approach to Combating
Botnets . . . . . . . . . . . . . . . . 62--66
Iyad Rahwan and
Sohan Dsouza and
Alex Rutherford and
Victor Naroditskiy and
James McInerney and
Matteo Venanzi and
Nicholas R. Jennings and
Manuel Cebrian Global Manhunt Pushes the Limits of
Social Mobilization . . . . . . . . . . 68--75
Xiaohan Ma and
Zhigang Deng and
Mian Dong and
Lin Zhong Characterizing the Performance and Power
Consumption of $3$D Mobile Games . . . . 76--82
Ruth H. Sanders Why Learn a Foreign Language? . . . . . 83--85
Niklas Elmqvist and
Pourang Irani Ubiquitous Analytics: Interacting with
Big Data Anywhere, Anytime . . . . . . . 86--89
Steve Hodges Batteries Not Included: Powering the
Ubiquitous Computing Dream . . . . . . . 90--93
David Ferraiolo and
Serban Gavrila and
Wayne Jansen Enabling an Enterprise-Wide,
Data-Centric Operating Environment . . . 94--96
Jason Pace The Ways We Play, Part 2: Mobile Game
Changers . . . . . . . . . . . . . . . . 97--99
Ana M. Moreno and
Ahmed Seffah and
Rafael Capilla and
Maria-Isabel Sanchez-Segura HCI Practices for Building Usable
Software . . . . . . . . . . . . . . . . 100--102
Anonymous Computer Society Connection . . . . . . 110--113
Anonymous Call and Calendar . . . . . . . . . . . 114--115
David Alan Grier Equal before the Bar . . . . . . . . . . 116
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Bob Metcalfe: Ethernet at Forty . . . . 6--9
Brian M. Gaff Who Invents What . . . . . . . . . . . . 10--12
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 13--14
Neal Leavitt Hybrid Clouds Move to the Forefront . . 15--18
Lee Garber News Briefs . . . . . . . . . . . . . . 19--21
Theresa-Marie Rhyne and
Min Chen Cutting-Edge Research in Visualization 22--24
Aditi Majumder and
Behzad Sajadi Large Area Displays: The Changing Face
of Visualization . . . . . . . . . . . . 26--33
Hank Childs and
Berk Geveci and
Will Schroeder and
Jeremy Meredith and
Kenneth Moreland and
Christopher Sewell and
Torsten Kuhlen and
E. Wes Bethel Research Challenges for Visualization
Software . . . . . . . . . . . . . . . . 34--42
Robert Kosara and
Jock Mackinlay Storytelling: The Next Step for
Visualization . . . . . . . . . . . . . 44--50
Daniel F. Keefe and
Tobias Isenberg Reimagining the Scientific Visualization
Interaction Paradigm . . . . . . . . . . 51--57
Ben Shneiderman and
Catherine Plaisant and
Bradford W. Hesse Improving Healthcare with Interactive
Visualization . . . . . . . . . . . . . 58--66
Tobias Schreck and
Daniel Keim Visual Analysis of Social Media Data . . 68--75
Qing Li and
Chris Larsen and
Tim van der Horst IPv6: A Catalyst and Evasion Tool for
Botnets and Malware Delivery Networks 76--82
A. F. Szczepanski and
Jian Huang and
T. Baer and
Y. C. Mack and
S. Ahern Data Analysis and Visualization in
High-Performance Computing . . . . . . . 84--92
Hal Berghel Computing Technology and Survivable
Journalism . . . . . . . . . . . . . . . 93--97
Domenico Talia Clouds for Scalable Big Data Analytics 98--101
Ahmad Poursaberi and
Svetlana Yanushkevich and
Marina L. Gavrilova and
Vlad P. Shmerko and
Patrick S. P. Wang Situational Awareness through Biometrics 102--104
Brian David Johnson Secret Science Fiction . . . . . . . . . 105--107
Joseph Turner Power Management as Choice Architecture 108--111
Anonymous Computer Society Connection . . . . . . 118--120
Anonymous Call and Calendar . . . . . . . . . . . 121--123
David Alan Grier Working in Conference . . . . . . . . . 124
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Gordon Bell: Building Blocks of
Computing . . . . . . . . . . . . . . . 6--7
Anonymous Letters . . . . . . . . . . . . . . . . 8
Brian M. Gaff Are You Exhausted by Your First Sale? 9--11
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Lee Garber Game Accessibility: Enabling Everyone to
Play . . . . . . . . . . . . . . . . . . 14--18
Lee Garber News Briefs . . . . . . . . . . . . . . 19--21
Katina Michael and
Keith W. Miller Big Data: New Opportunities and New
Challenges [Guest Editors' introduction] 22--24
Jess Hemerly Public Policy Considerations for
Data-Driven Innovation . . . . . . . . . 25--31
Paul P. Tallon Corporate Governance of Big Data:
Perspectives on Value, Risk, and Cost 32--38
Jeremy Pitt and
Aikaterini Bourazeri and
Andrzej Nowak and
Magda Roszczynska-Kurasinska and
Agnieszka Rychwalska and
Inmaculada Rodriguez Santiago and
Maite Lopez Sanchez and
Monica Florea and
Mihai Sanduleac Transforming Big Data into Collective
Awareness . . . . . . . . . . . . . . . 40--45
Marcus R. Wigan and
Roger Clarke Big Data's Big Unintended Consequences 46--53
Carolyn McGregor Big Data in Neonatal Intensive Care . . 54--59
Pauline Anthonysamy and
Phil Greenwood and
Awais Rashid Social Networking Privacy: Understanding
the Disconnect from Policy to Controls 60--67
E. Thomas Ewing and
Samah Gad and
Naren Ramakrishnan Gaining Insights into Epidemics by
Mining Historical Newspapers . . . . . . 68--72
Niels Henze and
Alireza Sahami Shrazi and
Albrecht Schmidt and
Martin Pielot and
Florian Michahelles Empirical Research through Ubiquitous
Data Collection . . . . . . . . . . . . 74--76
Alexander Repenning Making Programming Accessible and
Exciting . . . . . . . . . . . . . . . . 78--81
Ann E. K. Sobel The Modern Educator . . . . . . . . . . 82--83
James Bret Michael Empowering Users through Secure
On-Demand Data Provisioning . . . . . . 84--85
Gerard J. Holzmann A Three-Step Program for Recovering
Hackers . . . . . . . . . . . . . . . . 86--88
Anonymous Computer Society Connection . . . . . . 90--91
Anonymous Call and Calendar . . . . . . . . . . . 92--96
David Alan Grier The Comfort Zone . . . . . . . . . . . . 104
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Katie Hafner: The Origins of the
Internet . . . . . . . . . . . . . . . . 6--7
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 8--9
Sixto Ortiz Jr. Software-Defined Networking: On the
Verge of a Breakthrough? . . . . . . . . 10--12
Lee Garber News Briefs . . . . . . . . . . . . . . 13--15
Brian M. Gaff The Troll under the Bridge . . . . . . . 17--19
Marc Streit and
Oliver Bimber Visual Analytics: Seeking the Unknown 20--21
Jean-Daniel Fekete Visual Analytics Infrastructures: From
Data Management to Exploration . . . . . 22--29
Carsten Gorg and
Youn-ah Kang and
Zhicheng Liu and
John Stasko Visual Analytics Support for
Intelligence Analysis . . . . . . . . . 30--38
Kwan-Liu Ma and
Chris W. Muelder Large-Scale Graph Visualization and
Analytics . . . . . . . . . . . . . . . 39--46
Daniel A. Keim and
Milos Krstajic and
Christian Rohrdantz and
Tobias Schreck Real-Time Visual Analytics for Text
Streams . . . . . . . . . . . . . . . . 47--55
Jarke J. van Wijk Evaluation: A Challenge for Visual
Analytics . . . . . . . . . . . . . . . 56--60
Diane J. Cook and
Aaron S. Crandall and
Brian L. Thomas and
Narayanan C. Krishnan CASAS: A Smart Home in a Box . . . . . . 62--69
Tsahee Zidenberg and
Isaac Keslassy and
Uri Weiser Optimal Resource Allocation with
MultiAmdahl . . . . . . . . . . . . . . 70--77
Brian David Johnson From NASA . . . . . . . . . . . . . . . 78--81
Paul Witman Social Media for Social Value . . . . . 82--85
Hal Berghel Through the PRISM Darkly . . . . . . . . 86--90
Matt Stansberry The Future of Green IT: Solving the
Accountability Issue . . . . . . . . . . 91--93
Khaled M. Khan and
Qutaibah Malluhi Trust in Cloud Services: Providing More
Controls to Clients . . . . . . . . . . 94--96
Anonymous Computer Society Connection . . . . . . 97--98
Anonymous Call and Calendar . . . . . . . . . . . 99--102
David Alan Grier Short-Term Loan . . . . . . . . . . . . 112
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Charles Severance Len Kleinrock: The Theory of Packets
[Computing Conversations] . . . . . . . 6--8
Brian M. Gaff and
Joanna M. Dombrowski Ten Things to Know about Applying for
Non-US Patents . . . . . . . . . . . . . 9--11
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Lee Garber The Lowly API Is Ready to Step Front and
Center . . . . . . . . . . . . . . . . . 14--17
Lee Garber News Briefs . . . . . . . . . . . . . . 18--20
Greg Atwood and
Soo-Ik Chae and
Simon S. Y. Shim Next-Generation Memory [Guest Editors'
introduction] . . . . . . . . . . . . . 21--22
Yan Li and
Khandker N. Quader NAND Flash Memory: Challenges and
Opportunities . . . . . . . . . . . . . 23--29
Yoon-Jong Song and
Gitae Jeong and
In-Gyu Baek and
Jungdal Choi What Lies Ahead for Resistance-Based
Memory Technologies? . . . . . . . . . . 30--36
Amber Huffman and
Dale Juenemann The Nonvolatile Memory Transformation of
Client Storage . . . . . . . . . . . . . 38--44
Anirudh Badam How Persistent Memory Will Change
Software Systems . . . . . . . . . . . . 45--51
Steven Swanson and
Adrian M. Caulfield Refactor, Reduce, Recycle: Restructuring
the I/O Stack for the Future of Storage 52--59
Kaiping Liu and
Hee Beng Kuan Tan and
Xu Chen Binary Code Analysis . . . . . . . . . . 60--68
Elise van den Hoven and
Evelien van de Garde-Perik and
Serge Offermans and
Koen van Boerdonk and
Kars-Michiel H. Lenssen Moving Tangible Interaction Systems to
the Next Level . . . . . . . . . . . . . 70--76
Eric Brechner Getting Diagonal on the Xbox One
Trifecta . . . . . . . . . . . . . . . . 77--78
Lawrence O'Gorman Putting a Kinder Face on Public Cameras 79--81
Emil Vassev and
Mike Hinchey Autonomy Requirements Engineering . . . 82--84
Bjorn Hartmann and
Paul K. Wright Designing Bespoke Interactive Devices 85--89
Patrick Fiaux and
Maoyuan Sun and
Lauren Bradel and
Chris North and
Naren Ramakrishnan and
Alex Endert Bixplorer: Visual Analytics with
Biclusters . . . . . . . . . . . . . . . 90--94
Cameron Wilson What's Up Next for Code.org? . . . . . . 95--97
Anonymous IEEE Computer Society Election . . . . . 98--106
Anonymous IEEE President-Elect Candidates Address
Computer Society Concerns . . . . . . . 107--112
Anonymous Call and Calendar . . . . . . . . . . . 113--117
David Alan Grier The Tenor of Our Times . . . . . . . . . 128
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--7
Anonymous Letters . . . . . . . . . . . . . . . . 10--12
Charles Severance John C. Hollar: History of Computing . . 13--14
Brian M. Gaff and
Alyssa Harvey Dawson Working with Your Legal Department . . . 17--19
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 20--21
Neal Leavitt Storage Challenge: Where Will All That
Big Data Go? . . . . . . . . . . . . . . 22--25
Anonymous News Briefs . . . . . . . . . . . . . . 26--28
Mark Guzdial and
Betsy DiSalvo Computing Education: Beyond the
Classroom . . . . . . . . . . . . . . . 30--31
Maria Knobelsdorf and
Jan Vahrenhold Addressing the Full Range of Students:
Challenges in K--12 Computer Science
Education . . . . . . . . . . . . . . . 32--37
Kylie Peppler STEAM-Powered Computing Education: Using
E-Textiles to Integrate the Arts and
STEM . . . . . . . . . . . . . . . . . . 38--43
Sally Fincher and
Daniel Knox The Porous Classroom: Professional
Practices in the Computing Curriculum 44--51
Karen Brennan Learning Computing through Creating and
Connecting . . . . . . . . . . . . . . . 52--59
Allison Elliott Tew and
Brian Dorn The Case for Validated Tools in Computer
Science Education Research . . . . . . . 60--66
Dean N. Williams and
Timo Bremer and
Charles Doutriaux and
John Patchett and
Sean Williams and
Galen Shipman and
Ross Miller and
David R. Pugmire and
Brian Smith and
Chad Steed and
E. Wes Bethel and
Hank Childs and
Harinarayan Krishnan and
Prabhat Prabhat and
Michael Wehner and
Claudio T. Silva and
Emanuele Santos and
David Koop and
Tommy Ellqvist and
Jorge Poco and
Berk Geveci and
Aashish Chaudhary and
Andy Bauer and
Alexander Pletzer and
Dave Kindig and
Gerald L. Potter and
Thomas P. Maxwell Ultrascale Visualization of Climate Data 68--76
Jianwei Niu and
Jing Peng and
Lei Shu and
Chao Tong and
Wanjiun Liao An Empirical Study of a Chinese Online
Social Network --- Renren . . . . . . . 78--84
Rogerio Luis de Carvalho Costa and
Pedro Furtado Providing Quality of Experience for
Users: The Next DBMS Challenge . . . . . 86--93
Karl Ricanek The Next Biometric Challenge: Medical
Alterations . . . . . . . . . . . . . . 94--96
Beth Cohen PaaS: New Opportunities for Cloud
Application Development . . . . . . . . 97--100
Brian David Johnson That Copernican Moment . . . . . . . . . 101--103
Hal Berghel Toxic Cookies . . . . . . . . . . . . . 104--107
Anonymous Computer Society Connection . . . . . . 108--109
Anonymous Call and Calendar . . . . . . . . . . . 110--113
David Alan Grier The Errant Hashtag: For the Common Good 124
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--7
Anonymous Letters . . . . . . . . . . . . . . . . 10--12
Charles Severance Eben Upton: Raspberry Pi . . . . . . . . 14--16
Brian M. Gaff and
Greg Hendershott So, You Want to Start a Software
Company? . . . . . . . . . . . . . . . . 17--19
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 20--21
Lee Garber Gestural Technology: Moving Interfaces
in a New Direction [Technology News] . . 22--25
Anonymous News Briefs . . . . . . . . . . . . . . 26--28
Srinivas Devadas Toward a Coherent Multicore Memory Model 30--31
Matthew Schuchhardt and
Abhishek Das and
Nikos Hardavellas and
Gokhan Memik and
Alok Choudhary The Impact of Dynamic Directories on
Multicore Interconnects . . . . . . . . 32--39
Arrvindh Shriraman and
Hongzhou Zhao and
Sandhya Dwarkadas An Application-Tailored Approach to
Hardware Cache Coherence . . . . . . . . 40--47
Tushar Krishna and
Chia-Hsin Owen Chen and
Sunghyun Park and
Woo-Cheol Kwon and
Suvinay Subramanian and
Anantha P. Chandrakasan and
Li-Shiuan Peh Single-Cycle Multihop Asynchronous
Repeated Traversal: A SMART Future for
Reconfigurable On-Chip Networks . . . . 48--55
Qingchuan Shi and
Omer Khan Toward Holistic Soft-Error-Resilient
Shared-Memory Multicores . . . . . . . . 56--64
Michiel van Genuchten and
Les Hatton Quantifying Software's Impact . . . . . 66--72
Cristina Alcaraz and
Sherali Zeadally Critical Control System Protection in
the 21st Century . . . . . . . . . . . . 74--83
Nir Kshetri and
San Murugesan EU and US Cybersecurity Strategies and
Their Impact on Businesses and Consumers 84--88
Grace Metri and
Manuj Sabharwal and
Sundar Iyer and
Abhishek Agrawal Hardware/Software Codesign to Optimize
SoC Device Battery Life . . . . . . . . 89--92
Charles Severance MOOCs: An Insider's View . . . . . . . . 93--96
Lorraine Morgan and
Kieran Conboy Key Factors Impacting Cloud Computing
Adoption . . . . . . . . . . . . . . . . 97--99
Keri Johnson and
Jebediah Pavleas and
Jack Chang Kinecting to Mathematics through
Embodied Interactions . . . . . . . . . 101--104
Kai Kunze and
Masakazu Iwamura and
Koichi Kise and
Seiichi Uchida and
Shinichiro Omachi Activity Recognition for the Mind:
Toward a Cognitive ``Quantified Self'' 105--108
Anonymous Computer Society Connection . . . . . . 109--110
Anonymous Call and Calendar . . . . . . . . . . . 114--119
David Alan Grier Not Part of the Plan . . . . . . . . . . 136
Anonymous [Front cover] . . . . . . . . . . . . . c1
Anonymous [Masthead] . . . . . . . . . . . . . . . 1
Anonymous Table of contents . . . . . . . . . . . 2--3
Anonymous IEEE Computer Society Membership
[Advertisement] . . . . . . . . . . . . 4--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--7
Charles Severance Ian Horrocks: Standardizing OWL . . . . 8--9
Brian M. Gaff and
David J. Levine and
Raymond Gabriel Understanding US Trade Controls . . . . 10--13
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 14--15
Neal Leavitt Today's Mobile Security Requires a New
Approach . . . . . . . . . . . . . . . . 16--19
Lee Garber News Briefs . . . . . . . . . . . . . . 20--22
Tiziana Margaria and
Mike Hinchey Simplicity in IT: The Power of Less . . 23--25
Barry D. Floyd and
Steve Bosselmann ITSy --- Simplicity Research in
Information and Communication Technology 26--32
Jan Bosch Achieving Simplicity with the
Three-Layer Product Model . . . . . . . 34--39
Cristina Seceleanu and
Ivica Crnkovic Component Models for Reasoning . . . . . 40--47
Anna-Lena Lamprecht and
Stefan Naujokat and
Ina Schaefer Variability Management beyond Feature
Models . . . . . . . . . . . . . . . . . 48--54
Johannes Neubauer and
Bernhard Steffen Plug-and-Play Higher-Order Process
Integration . . . . . . . . . . . . . . 56--62
Chandra Prasad and
Wolfram Schulte Taking Control of Your Engineering Tools 63--66
Anonymous IEEE Computer Society Information . . . 67
Tiberiu Seceleanu and
Gaetana Sapienza A Tool Integration Framework for
Sustainable Embedded Systems Development 68--71
Regina Herzlinger and
Margo Seltzer and
Mark Gaynor Applying KISS to Healthcare Information
Technology . . . . . . . . . . . . . . . 72--74
Arshdeep Bahga and
Vijay K. Madisetti Rapid Prototyping of Multitier
Cloud-Based Services and Systems . . . . 76--83
James Bret Michael and
Phillip A. Laplante and
Jeffery Payne and
Paul E. Black and
Jeffrey M. Voas Does Security Trump Reliability? . . . . 84--86
David S. L. Wei and
San Murugesan and
Sy-Yen Kuo and
Kshirasagar Naik and
Danny Krizanc Enhancing Data Integrity and Privacy in
the Cloud: An Agenda . . . . . . . . . . 87--90
Joshua C. Klontz and
Anil K. Jain A Case Study of Automated Face
Recognition: The Boston Marathon
Bombings Suspects . . . . . . . . . . . 91--94
Brian David Johnson Jimmy Takes Manhattan . . . . . . . . . 95--98
Anonymous Computer Society Connection . . . . . . 99--101
Anonymous Call and Calendar . . . . . . . . . . . 102--105
David Alan Grier The Trappings of Power . . . . . . . . . 120
Anonymous CES [Advertisement] . . . . . . . . . . c4
Anonymous [Front cover] . . . . . . . . . . . . . c1
Anonymous IEEE Cloud Computing . . . . . . . . . . c2
Anonymous [Masthead] . . . . . . . . . . . . . . . 1
Anonymous Table of contents . . . . . . . . . . . 2--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Alan Grier The Cycles of Continuous Improvement . . 6--8
Charles Severance Andrew Tanenbaum: Writing the Book on
Networks . . . . . . . . . . . . . . . . 9--10
Brian M. Gaff and
Judy St. John Legal Careers for Engineers . . . . . . 11--13
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 14--15
Lee Garber Robot OS: A New Day for Robot Design . . 16--20
Anonymous News Briefs . . . . . . . . . . . . . . 21--23
Vladimir Getov Computing Laws: Origins, Standing, and
Impact [Guest editors' introduction] . . 24--25
Bob Metcalfe Metcalfe's Law after 40 Years of
Ethernet . . . . . . . . . . . . . . . . 26--31
Tsugio Makimoto Implications of Makimoto's Wave . . . . 32--37
Gene M. Amdahl Computer Architecture and Amdahl's Law 38--46
Andrew A. Chien and
Vijay Karamcheti Moore's Law: The First Ending and a New
Beginning . . . . . . . . . . . . . . . 48--53
Patrick S. Ryan and
Sarah Falvey and
Ronak Merchant When the Cloud Goes Local: The Global
Problem with Data Localization . . . . . 54--59
Roy van Pelt and
Anna Vilanova Understanding Blood-Flow Dynamics: New
Challenges for Visualization . . . . . . 60--67
Karim El Defrawy and
Sky Faber Blindfolded Data Search via Secure
Pattern Matching . . . . . . . . . . . . 68--75
Kim Schaffer Passwords, Privacy, and Policies: Can
They Do Business Together? . . . . . . . 76--79
Ting Hua and
Chang-Tien Lu and
Naren Ramakrishnan and
Feng Chen and
Jaime Arredondo and
David Mares and
Kristen Summers Analyzing Civil Unrest through Social
Media . . . . . . . . . . . . . . . . . 80--84
Ann E. K. Sobel The Escalating Cost of College . . . . . 85--87
Hy Resnick Busted: A Digital Group Game to Help
At-Risk Youth Stay out of Jail . . . . . 88--90
Hal Berghel The Intimidation Factor: How a
Surveillance State Can Affect What You
Read in Professional Publications . . . 91--95
Hao Han and
Yinxing Xue Mashup technology: Beyond open
programming interfaces . . . . . . . . . 96--99
Anonymous IEEE Computer Society Information . . . 100
Anonymous Conte Voted 2014 Computer Society
President-Elect . . . . . . . . . . . . 101--103
Anonymous Computer Society Connection . . . . . . 105--106
Anonymous IEEE Computer Society Membership
[Advertisement] . . . . . . . . . . . . 107
Anonymous Call and Calendar . . . . . . . . . . . 108--111
David Alan Grier The Way We Organize Ourselves . . . . . 124
Anonymous IEEE 10th World Congress on Services
(Services 2014) [House Advertisement] c2
Anonymous Masthead . . . . . . . . . . . . . . . . 1
Anonymous Table of Contents . . . . . . . . . . . 2--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Dejan S. Milojicic Reinventing Relevance . . . . . . . . . 6--8
Raghu Machiraju Fixing the Mercator Projection for the
Internet Age . . . . . . . . . . . . . . 9
Anonymous IEEE Computer Society [House
Advertisement] . . . . . . . . . . . . . 10
Charles Severance Massimo Banzi: Building Arduino . . . . 11--12
Brian M. Gaff Corporate Risks from Social Media . . . 13--15
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 16--17
Anonymous News Briefs . . . . . . . . . . . . . . 18--21
Ron Vetter Digital Magazines: The Future of
Publishing Is Here . . . . . . . . . . . 22--23
Karin Strauss and
Doug Burger What the Future Holds for Solid-State
Memory . . . . . . . . . . . . . . . . . 24--31
Shyamnath Gollakota and
Matthew S. Reynolds and
Joshua R. Smith and
David J. Wetherall The Emergence of RF-Powered Computing 32--39
Anuj Kumar and
Florian Metze and
Matthew Kam Enabling the Rapid Development and
Adoption of Speech-User Interfaces . . . 40--47
Emerson Murphy-Hill The Future of Social Learning in
Software Engineering . . . . . . . . . . 48--54
Hye-Chung Kum and
Ashok Krishnamurthy and
Ashwin Machanavajjhala and
Stanley C. Ahalt Social Genome: Putting Big Data to Work
for Population Informatics . . . . . . . 56--63
Paolo Montuschi and
Alfredo Benso Augmented Reading: The Present and
Future of Electronic Scientific
Publications . . . . . . . . . . . . . . 64--74
Eli Tilevich and
Young-Woo Kwon Cloud-Based Execution to Improve Mobile
Application Energy Efficiency . . . . . 75--77
Hal Berghel Privacy Informatics: A Primer on
Defensive Tactics for a Society under
Siege . . . . . . . . . . . . . . . . . 78--82
Nir Kshetri Japan's Changing Cybersecurity Landscape 83--86
Brian David Johnson Utopia Rising . . . . . . . . . . . . . 87--89
Anonymous Computer Society Connection . . . . . . 90
Anonymous Call and Calendar . . . . . . . . . . . 91--93
David Alan Grier Just Out of It . . . . . . . . . . . . . 104
Anonymous IEEE Cloud Computing [House
Advertisement] . . . . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society Membership House
Advertisement . . . . . . . . . . . . . c2--c2
Anonymous Masthead . . . . . . . . . . . . . . . . 1
Anonymous Table of Contents . . . . . . . . . . . 2--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
David Forsyth Object Detection with Discriminatively
Trained Part-Based Models . . . . . . . 6--7
Charles Severance Joseph Hardin: NCSA Mosaic . . . . . . . 8--10
Brian M. Gaff IP 2013--2014: Looking Forward and
Looking Back . . . . . . . . . . . . . . 11--13
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 14--15
Lee Garber News Briefs . . . . . . . . . . . . . . 16--20
Renee Bryce and
Rick Kuhn Software Testing [Guest editors'
introduction] . . . . . . . . . . . . . 21--22
Midhat Ali and
Francesco De Angelis and
Daniele Fani and
Antonia Bertolino and
Guglielmo De Angelis and
Andrea Polini An Extensible Framework for Online
Testing of Choreographed Services . . . 23--29
Nuno Antunes and
Marco Vieira Penetration Testing for Web Services . . 30--36
Cemal Yilmaz and
Sandro Fouche and
Myra B. Cohen and
Adam Porter and
Gulsen Demiroz and
Ugur Koc Moving Forward with Combinatorial
Interaction Testing . . . . . . . . . . 37--45
Jerry Gao and
Xiaoying Bai and
Wei-Tek Tsai and
Tadahiro Uehara Mobile Application Testing: A Tutorial 46--55
Andreas Dahn and
Clemens H. Cap Application Transparency and
Manipulation . . . . . . . . . . . . . . 56--61
William J. Chimiak and
Samuel T. Patton and
Stephen Janansky Enhanced IP: IPv4 with 64-Bit Addresses 62--69
Manfred Broy and
Albrecht Schmidt Challenges in Engineering Cyber-Physical
Systems . . . . . . . . . . . . . . . . 70--72
Hal Berghel Moral Hazards, Negative Externalities,
and the Surveillance Economy . . . . . . 73--77
Apostol Vassilev and
Timothy A. Hall The Importance of Entropy to Information
Security . . . . . . . . . . . . . . . . 78--81
Peter Gruenbaum Undergraduates Teach Game Programming
Using Scratch . . . . . . . . . . . . . 82--84
Rafael Capilla and
Oscar Ortiz and
Mike Hinchey Context Variability for Context-Aware
Systems . . . . . . . . . . . . . . . . 85--87
Jeffrey E. Froyd The Nature of Scholarship in Computing
Education: An Approach from
\booktitleIEEE Transactions on Education 88--90
Anonymous Computer Society Connection . . . . . . 91
Anonymous Call and Calendar . . . . . . . . . . . 92--93
David Alan Grier Practice and Theory . . . . . . . . . . 104
Anonymous IEEE Cloud Computing Magazine [House
Advertisement] . . . . . . . . . . . . . c3--c3
Anonymous Rock Stars of Mobile Cloud [House
Advertisement] . . . . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Software Experts Summit [House
Advertisement] . . . . . . . . . . . . . c2--c2
Anonymous Masthead . . . . . . . . . . . . . . . . 1
Anonymous Table of Contents . . . . . . . . . . . 2--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Peter Brusilovsky Collective Class Wisdom: Collaborative
Lecture Annotation . . . . . . . . . . . 6
Anonymous Letters . . . . . . . . . . . . . . . . 7--9
Charles Severance Computing Conversations: Len Kleinrock:
The First Two Packets on the Internet 10--11
Brian M. Gaff Contracts 101 . . . . . . . . . . . . . 12--15
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 16--17
Lee Garber News Briefs . . . . . . . . . . . . . . 18--21
Chirag Shah and
Robert Capra and
Preben Hansen Collaborative Information Seeking [Guest
editors' introduction] . . . . . . . . . 22--25
Zhe Xu and
Jay Ramanathan and
Rajiv Ramnath Identifying Knowledge Brokers and Their
Role in Enterprise Research through
Social Media . . . . . . . . . . . . . . 26--31
Yihan Tao and
Anastasios Tombros Investigating Collaborative Sensemaking
Behavior in Collaborative Information
Seeking . . . . . . . . . . . . . . . . 38--45
Zhen Yue and
Shuguang Han and
Daqing He and
Jiepu Jiang Influences on Query Reformulation in
Collaborative Web Search . . . . . . . . 46--53
Marti A. Hearst What's Missing from Collaborative
Search? . . . . . . . . . . . . . . . . 58--61
Zheng Chen and
Jian-Tao Sun and
Xuedong Huang Web Information at Your Fingertips:
Paper as an Interaction Metaphor . . . . 62--66
Christian Timmerer and
Benjamin Rainer The Social Multimedia Experience . . . . 67--69
Hal Berghel STEM, Revisited . . . . . . . . . . . . 70--73
Hugo Placido da Silva and
Ana Fred Harnessing the Power of Biosignals . . . 74--77
Kirk Cameron The Evolution of Power Measurement . . . 78--80
Gary McGraw Security Fatigue? Shift Your Paradigm 81--83
Brian David Johnson The Darwin App . . . . . . . . . . . . . 84--86
Anonymous Computer Society Connection . . . . . . 87
Anonymous Call and Calendar . . . . . . . . . . . 88--89
David Alan Grier Assets to the Table . . . . . . . . . . 100
Anonymous Rock Stars of Mobile Cloud [House
Advertisement] . . . . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1
Anonymous Fuel Your Imagination [House
Advertisement] . . . . . . . . . . . . . c2
Anonymous Masthead . . . . . . . . . . . . . . . . 1
Anonymous Table of Contents . . . . . . . . . . . 2--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Ling Liu Service Selection and Recommendation
through Collective Intelligence . . . . 6
Charles Severance Doug Van Houweling: Building the NSFNet 7--9
Brian M. Gaff Readers' Choice [Intellectual Property
laws] . . . . . . . . . . . . . . . . . 10--12
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 13--14
Anonymous News Briefs . . . . . . . . . . . . . . 15--19
Carl Chang and
Bill N. Schilit Aware Computing [Guest Editors'
introduction] . . . . . . . . . . . . . 20--21
Sarah Vieweg and
Adam Hodges Rethinking Context: Leveraging Human and
Machine Computation in Disaster Response 22--27
Mohammed Ehsan Hoque and
Rosalind W. Picard Rich Nonverbal Sensing Technology for
Automated Social Skills Training . . . . 28--35
Mark Matthews and
Saeed Abdullah and
Geri Gay and
Tanzeem Choudhury Tracking Mental Well-Being: Balancing
Rich Sensing and Patient Needs . . . . . 36--43
Giampiero E. G. Beroggi Internet Voting: An Empirical Evaluation 44--50
Anonymous Software Experts Summit [House
Advertisement] . . . . . . . . . . . . . 51
Juan R. Terven and
Joaquin Salas and
Bogdan Raducanu New Opportunities for Computer
Vision-Based Assistive Technology
Systems for the Visually Impaired . . . 52--58
Ying-Dar Lin and
Chia-Yin Lee and
Yu-Sung Wu and
Pei-Hsiu Ho and
Fu-Yu Wang and
Yi-Lang Tsai Active versus Passive Malware Collection 59--65
Hal Berghel Mr. Snowden's Legacy . . . . . . . . . . 66--70
Katia Vega and
Hugo Fuks Beauty Technology: Body Surface
Computing . . . . . . . . . . . . . . . 71--75
Jooyoung Kim and
Dong Sun Shin and
Dae Ok Kim and
Dae Hyun Lee and
Jaekeun Kwak and
Antonio Di Carlo and
Alberto Paoluzzi and
Kazuomi Sugamoto and
Young Lae Moon Standardizing $3$D Medical Imaging . . . 76--79
Sarah Beecham and
Padraig O'Leary and
Sean Baker and
Ita Richardson and
John Noll Making Software Engineering Research
Relevant . . . . . . . . . . . . . . . . 80--83
George F. Hurlburt and
Jeffrey Voas Big Data, Networked Worlds . . . . . . . 84--87
Fernando Arnez and
Jason Pace and
Kelvin Sung Learning while Building Games for
Teaching . . . . . . . . . . . . . . . . 88--91
Sorel Reisman The Future of Online Instruction, Part 1 92--93
Patrick Butler and
Naren Ramakrishnan and
Elaine O. Nsoesie and
John S. Brownstein Satellite Imagery Analysis: What Can
Hospital Parking Lots Tell Us about a
Disease Outbreak? . . . . . . . . . . . 94--97
Gopal Pingali and
T. S. Mohan The Cloud Ascends in Emerging Markets:
Highlights of IEEE CCEM 2013 . . . . . . 98--101
Anonymous Computer Society Connection . . . . . . 102
Anonymous Call and Calendar . . . . . . . . . . . 103--105
David Alan Grier All That Glitters Is Not Gold . . . . . 116
Anonymous Instant Access to IEEE Publications
[House Advertisement] . . . . . . . . . c3
Anonymous Rock Stars of Mobile Cloud [House
Advertisement] . . . . . . . . . . . . . c4
Anonymous Front Cover . . . . . . . . . . . . . . c1
Anonymous Masthead . . . . . . . . . . . . . . . . 1
Anonymous Table of Contents . . . . . . . . . . . 2--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Albert Zomaya Power-Performance Tradeoff in a
Federated Cloud . . . . . . . . . . . . 6--7
Anonymous Conferences in the Palm of Your Hand
[House Advertisement] . . . . . . . . . 8
Charles Severance Nathaniel Borenstein: Multipurpose
Internet Mail Extensions (MIME) . . . . 9--11
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Anonymous Stay Connected [House Advertisement] . . 14
Anonymous Letters . . . . . . . . . . . . . . . . 15--17
Anonymous News Briefs . . . . . . . . . . . . . . 18--22
Martin Reisslein and
Bernhard Rinner and
Amit Roy-Chowdhury Smart Camera Networks [Guest editors'
introduction] . . . . . . . . . . . . . 23--25
Ching-Hui Chen and
Julien Favre and
Gregorij Kurillo and
Thomas P. Andriacchi and
Ruzena Bajcsy and
Rama Chellappa Camera Networks for Healthcare,
Teleimmersion, and Surveillance . . . . 26--36
Kevin Abas and
Caio Porto and
Katia Obraczka Wireless Smart Camera Networks for the
Surveillance of Public Spaces . . . . . 37--44
Andrea Prati and
Faisal Z. Qureshi Integrating Consumer Smart Cameras into
Camera Networks: Opportunities and
Obstacles . . . . . . . . . . . . . . . 45--51
Kaushik Mitra and
Ashok Veeraraghavan and
Aswin C. Sankaranarayanan and
Richard G. Baraniuk Toward Compressive Camera Networks . . . 52--59
Zhangyu Guan and
Tommaso Melodia Cloud-Assisted Smart Camera Networks for
Energy-Efficient $3$D Video Streaming 60--66
Juan C. SanMiguel and
Christian Micheloni and
Karen Shoop and
Gian Luca Foresti and
Andrea Cavallaro Self-Reconfigurable Smart Camera
Networks . . . . . . . . . . . . . . . . 67--73
Xian-He Sun and
Dawei Wang Concurrent Average Memory Access Time 74--80
Wen Gao and
Tiejun Huang and
Cliff Reader and
Weibei Dou and
Xilin Chen IEEE Standards for Advanced Audio and
Video Coding in Emerging Applications 81--83
Symeon Papadopoulos and
Yiannis Kompatsiaris Social Multimedia Crawling for Mining
and Search . . . . . . . . . . . . . . . 84--87
Michael Cheng Yi Cho and
Pokai Chen and
Shiuhpyng Winston Shieh Dmail: A Globally Authenticated Email
Service . . . . . . . . . . . . . . . . 88--91
Chris Preist and
Dan Schien and
Paul Shabajee and
Stephen Wood and
Christopher Hodgson Analyzing End-to-End Energy Consumption
for Digital Services . . . . . . . . . . 92--95
Kevin W. Bowyer and
James S. Doyle Cosmetic Contact Lenses and Iris
Recognition Spoofing . . . . . . . . . . 96--98
Brian David Johnson A New Doorway into Time . . . . . . . . 99--101
Hal Berghel PII, the FTC, Car Dealers, and You . . . 102--106
Anonymous Computer Society Connection . . . . . . 107
Anonymous Call and Calendar . . . . . . . . . . . 108--111
Anonymous Focus on Your Job Search [House
Advertisement] . . . . . . . . . . . . . 119
David Alan Grier The Real Change [The Errant Hashtag] . . 120
Anonymous Membership Matters [House Advertisement] c3
Anonymous Front Cover . . . . . . . . . . . . . . c1
Anonymous Rock Stars of Cybersecurity [House
Advertisement] . . . . . . . . . . . . . c2
Anonymous Masthead . . . . . . . . . . . . . . . . 1
Anonymous Table of Contents . . . . . . . . . . . 2--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Song Guo On-Time Warning Delivery for Vehicular
Ad Hoc Networks . . . . . . . . . . . . 6
Brian M. Gaff and
Heather Egan Sussman and
Jennifer Geetter Privacy and Big Data . . . . . . . . . . 7--9
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11
Lee Garber News Briefs . . . . . . . . . . . . . . 12--17
Anonymous Letters . . . . . . . . . . . . . . . . 18--19
Anonymous IEEE Security & Privacy [House
Advertisement] . . . . . . . . . . . . . 20
Ying-Dar Lin and
Chun-Ying Huang and
Matthew Wright and
Georgios Kambourakis Mobile Application Security . . . . . . 21--23
Guillermo Suarez-Tangil and
Juan E. Tapiador and
Flavio Lombardi and
Roberto Di Pietro Thwarting Obfuscated Malware via
Differential Fault Analysis . . . . . . 24--31
Yuru Shao and
Xiapu Luo and
Chenxiong Qian RootGuard: Protecting Rooted Android
Phones . . . . . . . . . . . . . . . . . 32--40
Anonymous Membership Matters [House Advertisement] 41
Felix Gomez Marmol and
Gregor Rozinaj and
Sebastian Schumann and
Ondrej Labaj and
Juraj Kacur Smart AppStore: Expanding the Frontiers
of Smartphone Ecosystems . . . . . . . . 42--47
Alessandro Armando and
Gabriele Costa and
Luca Verderame and
Alessio Merlo Securing the ``Bring Your Own Device''
Paradigm . . . . . . . . . . . . . . . . 48--56
Olga Gadyatskaya and
Fabio Massacci and
Yury Zhauniarovich Security in the Firefox OS and Tizen
Mobile Platforms . . . . . . . . . . . . 57--63
Hal Berghel Leadership Failures in the National
Security Complex . . . . . . . . . . . . 64--67
Benoit Combemale and
Julien DeAntoni and
Benoit Baudry and
Robert B. France and
Jean-Marc Jezequel and
Jeff Gray Globalizing Modeling Languages . . . . . 68--71
Irena Bojanova and
George Hurlburt and
Jeffrey Voas Imagineering an Internet of Anything . . 72--77
Jason Pace Working with Students Where Theory and
Practice Intersect . . . . . . . . . . . 78--80
Anonymous IEEE Computer Society Information [House
Advertisement] . . . . . . . . . . . . . 81
Sorel Reisman The Future of Online Instruction, Part 2 82--84
Edwin Sturrus and
Olga Kulikova Orchestrating Hybrid Cloud Deployment:
An Overview . . . . . . . . . . . . . . 85--87
Anonymous Computer Society Connection . . . . . . 88--89
Anonymous Call and Calendar . . . . . . . . . . . 90--93
David Alan Grier Peace in Our Time . . . . . . . . . . . 104
Anonymous Front Cover . . . . . . . . . . . . . . c1
Anonymous Masthead . . . . . . . . . . . . . . . . 1
Anonymous Table of Contents . . . . . . . . . . . 2--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Jian Pei Managing Data-Intensive Applications in
the Cloud . . . . . . . . . . . . . . . 6
Charles Severance Andrew S. Tanenbaum: The Impact of MINIX 7--8
Brian M. Gaff Supreme Court IP Update . . . . . . . . 9--12
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 13--14
Anonymous Letters . . . . . . . . . . . . . . . . 15
Anonymous News Briefs . . . . . . . . . . . . . . 16--21
Oliver Bimber Thinking Virtual . . . . . . . . . . . . 22--23
Mel Slater and
Maria V. Sanchez-Vives Transcending the Self in Immersive
Virtual Reality . . . . . . . . . . . . 24--30
Albert Rizzo and
Arno Hartholt and
Mario Grimani and
Andrew Leeds and
Matt Liewer Virtual Reality Exposure Therapy for
Combat-Related Posttraumatic Stress
Disorder . . . . . . . . . . . . . . . . 31--37
John R. Stowers and
Anton Fuhrmann and
Maximilian Hofbauer and
Martin Streinzer and
Axel Schmid and
Michael H. Dickinson and
Andrew D. Straw Reverse Engineering Animal Vision with
Virtual Reality and Genetics . . . . . . 38--45
Henry Fuchs and
Andrei State and
Jean-Charles Bazin Immersive $3$D Telepresence . . . . . . 46--52
Xia Yang and
Nan Sang and
Jim Alves-Foss Shortening the Boot Time of Android OS 53--58
Minyong Kim and
Young Geun Kim and
Sung Woo Chung and
Cheol Hong Kim Measuring Variance between Smartphone
Energy Consumption and Battery Life . . 59--65
Youngjung Ahn and
Yongsuk Lee and
Jin-Young Choi and
Gyungho Lee and
Dongkyun Ahn Monitoring Translation Lookahead Buffers
to Detect Code Injection Attacks . . . . 66--72
Brian David Johnson Talking to the Future . . . . . . . . . 73--75
Hal Berghel Robert David Steele on OSINT . . . . . . 76--81
Dimitrios S. Nikolopoulos and
Hans Vandierendonck and
Nikolaos Bellas and
Christos D. Antonopoulos and
Spyros Lalis and
Georgios Karakonstantis and
Andreas Burg and
Uwe Naumann Energy Efficiency through
Significance-Based Computing . . . . . . 82--85
Pablo Cesar and
Rene Kaiser and
Marian F. Ursu Toward Connected Shared Experiences . . 86--89
Chi-Wei Wang and
Chia-Wei Wang and
Chu-An Hsieh and
Shiuhpyng Winston Shieh Cloudebug: A Programmable Online Malware
Testbed . . . . . . . . . . . . . . . . 90--92
Paul Nikolich 802 LAN/MAN Standards: High Quality and
Market Relevant . . . . . . . . . . . . 93--95
Anonymous Computer Society Connection . . . . . . 96--97
Anonymous Call and Calendar . . . . . . . . . . . 98--101
David Alan Grier The Half-Told Lie . . . . . . . . . . . 108
Anonymous IEEE International Conference on Cloud
Engineering (IC2E 2015) . . . . . . . . c4
Anonymous Fuel your imagination [House
Advertisement] . . . . . . . . . . . . . c2
Anonymous Masthead . . . . . . . . . . . . . . . . 1
Anonymous Table of Contents . . . . . . . . . . . 2--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
John Grundy Determining the Cause of Design Model
Inconsistencies . . . . . . . . . . . . 6
Charles Severance Elizabeth Fong: Creating the SQL
Database Standards . . . . . . . . . . . 7--8
Brian M. Gaff and
Bruce Rubinger The Significance of Prior Art . . . . . 9--11
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Anonymous News Briefs . . . . . . . . . . . . . . 14--18
Anonymous 2015 Richard E. Merwin Distinguished
Service Award [Call for award
nominations] . . . . . . . . . . . . . . 19
Ron Vetter Technology Commercialization in the
Innovation Economy [Guest Editor's
introduction] . . . . . . . . . . . . . 20--21
Gary L. Miller and
Robert R. Hoon The Role of Public Comprehensive
Universities in Closing the Innovation
Deficit . . . . . . . . . . . . . . . . 22--27
Elyse N. Ball and
Kenneth G. Preston University Commercialization Models: The
University of Akron . . . . . . . . . . 28--36
Audrey Speicher tekMountain: A Community-Driven
Corporate Incubator . . . . . . . . . . 37--39
Savitha Srinivasan and
Isaac Barchas and
Mark Gorenberg and
Evangelos Simoudis Venture Capital: Fueling the Innovation
Economy . . . . . . . . . . . . . . . . 40--47
Ian Gorton Cyberinfrastructures: Bridging the
Divide between Scientific Research and
Software Engineering . . . . . . . . . . 48--55
Sebastian Boring and
Saul Greenberg and
Jo Vermeulen and
Jakub Dostal and
Nicolai Marquardt The Dark Patterns of Proxemic Sensing 56--60
Anonymous Rock Stars of Cybersecurity [House
Advertisement] . . . . . . . . . . . . . 61
Nabor C. Mendonca Architectural Options for Cloud
Migration . . . . . . . . . . . . . . . 62--66
Ernest L. McDuffie and
Victor P. Piotrowski The Future of Cybersecurity Education 67--69
Hal Berghel The Future of Digital Money Laundering 70--75
Dirk Basten and
Thomas Hoerstrup Organizational Effort Estimation . . . . 76--79
David A. Wheeler Preventing Heartbleed . . . . . . . . . 80--83
Christiane Gresse von Wangenheim and
Aldo von Wangenheim Teaching Game Programming in Family
Workshops . . . . . . . . . . . . . . . 84--87
Anonymous IEEE Computer Society Election . . . . . 88--97
Anonymous IEEE President-Elect Candidates Address
Computer Society Concerns . . . . . . . 98--102
Anonymous Call and Calendar . . . . . . . . . . . 103--107
David Alan Grier The Guest at the Feast . . . . . . . . . 116
Anonymous Call for Papers [House Advertisement] c3
Anonymous [Masthead] . . . . . . . . . . . . . . . 1--1
Anonymous Table of contents . . . . . . . . . . . 2--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Prasant Mohapatra Channel Bonding in Evolving Wireless
LANs . . . . . . . . . . . . . . . . . . 6--6
Charles Severance Nii Quaynor: Bringing the Internet to
Africa . . . . . . . . . . . . . . . . . 7--9
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11
Anonymous Richard E. Merwin Distinguished Service
Award . . . . . . . . . . . . . . . . . 12--12
Anonymous Instant Access to IEEE Publications
[advertisement] . . . . . . . . . . . . 13--13
Anonymous Letters . . . . . . . . . . . . . . . . 14--16
Anonymous News Briefs . . . . . . . . . . . . . . 17--21
Anonymous Rock Stars of Big Data Analytics
[advertisement] . . . . . . . . . . . . 22--22
Victor Pankratius and
Chris Mattmann Computing in Astronomy: To See the
Unseen . . . . . . . . . . . . . . . . . 23--25
Mark Jenne and
Owen Boberg and
Hasan Kurban and
Mehmet Dalkilic Studying the Milky Way Galaxy Using
ParaHeap-k . . . . . . . . . . . . . . . 26--33
Daniel Frascarelli and
Sergio Nesmachnow and
Gonzalo Tancredi High-Performance Computing of
Self-Gravity for Small Solar System
Bodies . . . . . . . . . . . . . . . . . 34--39
Anonymous Membership Matters [advertisement] . . . 40--40
Stefan C. Muller and
Gustavo Alonso and
Andre Csillaghy Scaling Astroinformatics: Python +
Automatic Parallelization . . . . . . . 41--47
Rik Jongerius and
Stefan Wijnholds and
Ronald Nijboer and
Henk Corporaal An End-to-End Computing Model for the
Square Kilometre Array . . . . . . . . . 48--54
Anonymous IEEE Computer Society Harlan D. Mills
Award: Call for software engineering
award nominations . . . . . . . . . . . 55--55
Lisa Gerhardt and
Juan Carlos Diaz Velez and
Spencer R. Klein Adventures in Antarctic Computing, or
How I Learned to Stop Worrying and Love
the Neutrino . . . . . . . . . . . . . . 56--61
F. Alexander Bogert and
Nicholas Smith and
John Holdener and
Eric M. De Jong and
Andrew F. Hart and
Luca Cinquini and
Shakeh E. Khudikyan and
David R. Thompson and
Chris A. Mattmann and
Kiri Wagstaff and
Joseph Lazio and
Dayton L. Jones and
Alice Allen and
Lior Shamir and
Peter Teuben Computing in Astronomy: Applications and
Examples . . . . . . . . . . . . . . . . 62--69
Zachary A. Collier and
Daniel DiMase and
Steve Walters and
Mark Mohammad Tehranipoor and
James H. Lambert and
Igor Linkov Cybersecurity Standards: Managing Risk
and Creating Resilience . . . . . . . . 70--76
Anonymous Call for papers . . . . . . . . . . . . 77--77
Hillery Hunter and
Luis A. Lastras-Montano and
Bishwaranjan Bhattacharjee Adapting Server Systems for New Memory
Technologies . . . . . . . . . . . . . . 78--84
Julie Hubschman My Summer with a Robot . . . . . . . . . 85--86
Karl Ricanek Beyond Recognition: The Promise of
Biometric Analytics . . . . . . . . . . 87--89
Hal Berghel Sticky Wikis . . . . . . . . . . . . . . 90--93
John Wack IEEE VSSC/1622: Voting System Standards 94--97
Tobias Hossfeld and
Christian Keimel and
Christian Timmerer Crowdsourcing Quality-of-Experience
Assessments . . . . . . . . . . . . . . 98--102
Robin A. Gandhi and
Keesha Crosby and
Harvey Siy and
Sayonnha Mandal Gauging the Impact of FISMA on Software
Security . . . . . . . . . . . . . . . . 103--107
Anonymous Computer Society Connection . . . . . . 108--108
Anonymous Call and Calendar . . . . . . . . . . . 109--112
Anonymous Symantec House Advertisement . . . . . . 113--113
Anonymous Career opportunities . . . . . . . . . . 114--119
David Alan Grier The Point of Recognition . . . . . . . . 120--120
Anonymous IEEE Advertisement . . . . . . . . . . . c3--c3
Anonymous 2015 International CES House
Advertisement . . . . . . . . . . . . . c2--c2
Anonymous Keep the Office Safe wherever you work c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 1--1
Anonymous Call for Papers House Advertisement . . 3--3
Anonymous IEEE SOSE 2015 Advertisement . . . . . . 5--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--7
Leonard Heilig A View on Cloud Computing from above the
Clouds . . . . . . . . . . . . . . . . . 8--8
Brian M. Gaff $3$D IP . . . . . . . . . . . . . . . . 9--11
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Anonymous News Briefs . . . . . . . . . . . . . . 14--20
Anonymous 2015 International CES Advertisement . . 21--21
Carlos E. Jimenez and
Agusti Solanas and
Francisco Falcone E-Government Interoperability: Linking
Open and Smart Government . . . . . . . 22--24
Konstantinos Bovalis and
Vassilios Peristeras and
Margarida Abecasis and
Raul-Mario Abril-Jimenez and
Miguel Alvarez Rodriguez and
Corinne Gattegno and
Athanasios Karalopoulos and
Ioannis Sagias and
Szabolcs Szekacs and
Suzanne Wigard Promoting Interoperability in Europe's
E-Government . . . . . . . . . . . . . . 25--33
Mario Kovac E-Health Demystified: An E-Government
Showcase . . . . . . . . . . . . . . . . 34--42
Anonymous IEEE Advertisement . . . . . . . . . . . 43--43
Marijn Janssen and
Elsa Estevez and
Tomasz Janowski Interoperability in Big, Open, and
Linked Data --- Organizational Maturity,
Capabilities, and Data Portfolios . . . 44--49
Pieter Colpaert and
Mathias Van Compernolle and
Laurens De Vocht and
Anastasia Dimou and
Miel Vander Sande and
Ruben Verborgh and
Peter Mechant and
Erik Mannens Quantifying the Interoperability of Open
Government Datasets . . . . . . . . . . 50--56
Martin le Vrang and
Agis Papantoniou and
Erika Pauwels and
Pieter Fannes and
Dominique Vandensteen and
Johan De Smedt ESCO: Boosting Job Matching in Europe
with Semantic Interoperability . . . . . 57--64
Jesus Cano and
Roberto Hernandez and
Salvador Ros Distributed Framework for Electronic
Democracy in Smart Cities . . . . . . . 65--71
Pu Liu and
Zhenghong Peng China's Smart City Pilots: A Progress
Report . . . . . . . . . . . . . . . . . 72--81
Stefano Secci and
San Murugesan Cloud Networks: Enhancing Performance
and Resiliency . . . . . . . . . . . . . 82--85
Jonathan P. Bowen and
Mike Hinchey and
Helge Janicke and
Martin Ward and
Hussein Zedan Formality, Agility, Security, and
Evolution in Software Development . . . 86--89
Wendy DuBow Attracting and Retaining Women in
Computing . . . . . . . . . . . . . . . 90--93
Hal Berghel Defending against Big Dada: Defensive
Tactics for Weapons of Mass Deception 94--98
Jason W. Bay Turning Video Gamers into Software
Developers . . . . . . . . . . . . . . . 99--101
Apostol Vassilev and
Christopher Celi Avoiding Cyberspace Catastrophes through
Smarter Testing . . . . . . . . . . . . 102--106
Anonymous Call and Calendar . . . . . . . . . . . 107--109
Anonymous Career Opportunities . . . . . . . . . . 110--125
Anonymous Rock Stars of Big Data Analytics House
Advertisement . . . . . . . . . . . . . 126--126
Anonymous IEEE Cloud Computing House Advertisement 127--127
David Alan Grier Lying to the Future . . . . . . . . . . 128--128
Anonymous IEEE Advertisement . . . . . . . . . . . c3--c3
Anonymous Samsung Advertisement: The Next Big
Thing for Business is Here . . . . . . . c2--c2
Anonymous Samsung Advertisement: One Giant Leap
Forward . . . . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 1--1
Anonymous Bring IT to Life Advertisement . . . . . 3--3
Anonymous Bring IT to Life Advertisement . . . . . 5--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--7
Roberta L. Klatzky and
J. Edward Colgate Rendering Tactile Features on
Touchscreens . . . . . . . . . . . . . . 8--8
Anonymous Discover the Best Tools and Solutions
from Wiley and Wiley-IEEE Computer Press
House Advertisement . . . . . . . . . . 9--9
Charles Severance Ian Foster and the Globus Project . . . 10--11
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Lee Garber News Briefs . . . . . . . . . . . . . . 14--18
Ying-Dar Lin and
Dan Pitt and
David Hausheer and
Erica Johnson and
Yi-Bing Lin Software-Defined Networking:
Standardization for Cloud Computing's
Second Wave . . . . . . . . . . . . . . 19--21
Jean Tourrilhes and
Puneet Sharma and
Sujata Banerjee and
Justin Pettit SDN and OpenFlow Evolution: A Standards
Perspective . . . . . . . . . . . . . . 22--29
Rick Bauer and
Ron Milford and
Li Zhen Aligning Technology and Market Drivers
in an Open Source Standards Testing
Program . . . . . . . . . . . . . . . . 30--36
Anonymous 2015 International CES Advertisement . . 37--37
Paul Quinn and
Jim Guichard Service Function Chaining: Creating a
Service Plane via Network Service
Headers . . . . . . . . . . . . . . . . 38--44
Anonymous IEEE BigDataService 2015 House
Advertisement . . . . . . . . . . . . . 45--45
Christian Esteve Rothenberg and
Roy Chua and
Josh Bailey and
Martin Winter and
Carlos N. A. Correa and
Sidney C. de Lucena and
Marcos Rogerio Salvador and
Thomas D. Nadeau When Open Source Meets Network Control
Planes . . . . . . . . . . . . . . . . . 46--54
Anonymous COOL Chips XVIII House Advertisement . . 55--55
Marco Canini and
Anja Feldmann and
Dan Levin and
Fabian Schaffert and
Stefan Schmid Software-Defined Networks: Incremental
Deployment with Panopticon . . . . . . . 56--60
Anonymous Instant Access to IEEE Publications
House Advertisement . . . . . . . . . . 61--61
Marion Dillon and
Timothy Winters Virtualization of Home Network Gateways 62--65
Lindsey Lowther Defensive Biometrics . . . . . . . . . . 66--69
m.c. schraefel and
Elizabeth F. Churchill Wellth Creation: Using Computer Science
to Support Proactive Health . . . . . . 70--72
Anonymous Symantec Advertisement . . . . . . . . . 73--73
James H. Faghmous and
Arindam Banerjee and
Shashi Shekhar and
Michael Steinbach and
Vipin Kumar and
Auroop R. Ganguly and
Nagiza Samatova Theory-Guided Data Science for Climate
Change . . . . . . . . . . . . . . . . . 74--78
Brian David Johnson Imagining and Building Robots (in
Capes!) . . . . . . . . . . . . . . . . 79--81
Hal Berghel Why Clouds Give Me a Case of the Vapors 82--85
Ramesh Jain Toward Social Life Networks . . . . . . 86--88
Kirk W. Cameron Energy Efficiency in the Wild: Why
Datacenters Fear Power Management . . . 89--92
Anonymous Fuel Your Imagination Advertisement . . 93--93
George Hurlburt and
Irena Bojanova and
Ann Sobel and
Keesha Crosby Security or Privacy? A Matter of
Perspective . . . . . . . . . . . . . . 94--98
Paul Joannou and
Alan Wassyng Understanding Integrity Level Concepts 99--101
Anonymous Computer Society Connection . . . . . . 102--102
Anonymous 2015 IEEE Services Congress IEEE BigData
Congress House Advertisement . . . . . . 103--103
Anonymous Call and Calendar . . . . . . . . . . . 104--107
Anonymous Career Opportunities . . . . . . . . . . 108--123
David Alan Grier The External Environment . . . . . . . . 124--124
Anonymous 29th IEEE International Parallel &
Distributed Processing Symposium House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous The Next Big Thing for Business is Here c2--c2
Anonymous One Giant Leap Forward . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 1--1
Anonymous The Ultimate Competitive Advantage Bring
IT to Life Advertisement . . . . . . . . 3--3
Anonymous Technology to Empower the Workforce
Bring IT to Life Advertisement . . . . . 5--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--7
Hai Jin When Data Grows Big . . . . . . . . . . 8--8
Anonymous Discover the Best Tools and Solutions
from Wiley and Wiley-IEEE Computer Press
House Advertisement . . . . . . . . . . 9--9
Dejan S. Milojicic Revitalization . . . . . . . . . . . . . 10--13
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 14--15
Anonymous News Briefs . . . . . . . . . . . . . . 16--20
Anonymous Fuel your imagination House
Advertisement . . . . . . . . . . . . . 21--21
Brian David Johnson Making in the 21st Century [Guest
Editor's introduction] . . . . . . . . . 22--23
Jun Axup and
AnnMarie Thomas and
Ariel Waldman and
Susan Faulkner and
Carolina Odman-Govender and
Jim St. Leger and
Jessica Polka and
Melissa Gregg and
Brian David Johnson The World of Making . . . . . . . . . . 24--40
Anonymous 2015 IEEE Service Congress and IEEE
BigData Congress House Advertisement . . 41--41
Crystal Beasley and
Emmeline Parsons and
Melissa Pierce and
Sam Baumgarten and
Andrius Neviera and
Shubham Banerjee and
Tyesha Snow and
Carla Diana and
Nicholas Nakadate and
Shruti Satsangi Passionate Projects: This Is What I Made 42--54
Anonymous Linkedin Corp. Advertisement . . . . . . 55--55
Yasaman Sheri and
Enrique Gabriel Legaspi and
Cynthia Erenas and
Brian Kessler and
Eri Gentry and
Ruben Estrada The Future of Making . . . . . . . . . . 56--63
William Edwards and
Judith Gebauer and
Bryan Reinicke White Space Networks: Architecture,
Application, and Opportunity . . . . . . 64--71
Alberto Bartoli and
Giorgio Davanzo and
Andrea De Lorenzo and
Eric Medvet and
Enrico Sorio Automatic Synthesis of Regular
Expressions from Examples . . . . . . . 72--80
Anonymous House Advertisement . . . . . . . . . . 81--81
Eun-Sung Jung and
Rajkumar Kettimuthu Challenges and Opportunities for
Data-Intensive Computing in the Cloud 82--85
Carmelo Ardito and
Paolo Buono and
Danilo Caivano and
Maria Francesca Costabile and
Rosa Lanzilotti and
Yvonne Dittrich Human-Centered Design in Industry:
Lessons from the Trenches . . . . . . . 86--89
Fang Jin and
Wei Wang and
Liang Zhao and
Edward Dougherty and
Yang Cao and
Chang-Tien Lu and
Naren Ramakrishnan Misinformation Propagation in the Age of
Twitter . . . . . . . . . . . . . . . . 90--94
Hal Berghel Judson Rosebush on Computer Graphics and
Animation . . . . . . . . . . . . . . . 95--99
Brian Chau and
Adam Robinson and
Jason Pace and
Rob Nash and
Kelvin Sung Corrupted: A Game to Teach Programming
Concepts . . . . . . . . . . . . . . . . 100--103
Alexander Kott and
Ananthram Swami and
Patrick McDaniel Security Outlook: Six Cyber Game
Changers for the Next 15 Years . . . . . 104--106
Anonymous Call and Calendar . . . . . . . . . . . 107--110
Anonymous Fujii Voted 2015 Computer Society
President-Elect . . . . . . . . . . . . 111--113
Anonymous Career Opportunities . . . . . . . . . . 114--127
David Alan Grier State Secrets . . . . . . . . . . . . . 128--128
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous If ``Expect the Unexpected'' Weren't So
Expected, We'd Say that's Exactly What
to Expect . . . . . . . . . . . . . . . c3--c3
Anonymous The Next Big Thing for Business is Here c2--c2
Anonymous One Giant Leap Forward . . . . . . . . . c4--c4
Anonymous Table of contents . . . . . . . . . . . 1--2
Anonymous [Masthead] . . . . . . . . . . . . . . . 3--3
Tom Conte A Time of Change . . . . . . . . . . . . 4--6
Sumi Helal Sustaining Computer's Impact and
Adapting to Change . . . . . . . . . . . 7--9
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 10--11
Ying Xu Carrying out Phylogenetic Analyses
through Computational Model Checking . . 12--12
Anonymous Startup Rock Stars [advertisement] . . . 13--13
Charles Severance Khan Academy and Computer Science . . . 14--15
Brian M. Gaff IP Issues for Start-ups . . . . . . . . 16--18
Anonymous Rock Stars of $3$D Printing
[advertisement] . . . . . . . . . . . . 19--19
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 20--21
Anonymous News . . . . . . . . . . . . . . . . . . 22--27
Roy Want and
Bill N. Schilit and
Scott Jenson Enabling the Internet of Things . . . . 28--35
Fadi H. Gebara and
H. Peter Hofstee and
Kevin J. Nowka Second-Generation Big Data Systems . . . 36--41
Peter Fonash and
Phyllis Schneck Cybersecurity: From Months to
Milliseconds . . . . . . . . . . . . . . 42--50
Anonymous IEEE IRI-2015 . . . . . . . . . . . . . 51--51
Constantinos Patsakis and
Paul Laird and
Michael Clear and
Melanie Bouroche and
Agusti Solanas Interoperable Privacy-Aware
E-Participation within Smart Cities . . 52--58
Stephen P. Crago and
John Paul Walters Heterogeneous Cloud Computing: The Way
Forward . . . . . . . . . . . . . . . . 59--61
Luca Caviglione and
Wojciech Mazurczyk Understanding Information Hiding in iOS 62--65
Mitchell E. Daniels Measuring Great Jobs and Great Lives:
The Gallup--Purdue Index . . . . . . . . 66--69
Ari Popper Transforming Business through Science
Fiction Prototyping . . . . . . . . . . 70--72
Jennifer Costley Leveraging the Standards Life Cycle for
Green IT . . . . . . . . . . . . . . . . 73--75
Hal Berghel A Paperless Gamble . . . . . . . . . . . 76--78
Anonymous CS Connection . . . . . . . . . . . . . 79--80
Anonymous Call and Calendar . . . . . . . . . . . 81--83
Anonymous Career Opportunities . . . . . . . . . . 84--91
David Alan Grier State Transitions . . . . . . . . . . . 92--92
Anonymous Call for papers . . . . . . . . . . . . c3--c3
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous 2015 IEEE Services Congress and IEEE Big
Data Congress . . . . . . . . . . . . . c2--c2
Anonymous One Giant Leap Forward . . . . . . . . . c4--c4
Anonymous Table of contents . . . . . . . . . . . 1--2
Anonymous [Masthead] . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Elisa Bertino Denial-of-Service Attacks to UMTS . . . 6--6
Charles Severance Guido van Rossum: The Early Years of
Python . . . . . . . . . . . . . . . . . 7--9
Brian M. Gaff BYOD? OMG! . . . . . . . . . . . . . . . 10--11
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Anonymous News . . . . . . . . . . . . . . . . . . 14--20
Alf Weaver and
Renee Bryce Technological Advances in Medicine: It's
Personal [Guest Editors' introduction] 21--23
Jingquan Li Ensuring Privacy in a Personal Health
Record System . . . . . . . . . . . . . 24--31
Marina Velikova and
Peter J. F. Lucas and
Maarten van der Heijden Intelligent Disease Self-Management with
Mobile Technology . . . . . . . . . . . 32--39
Anonymous Intuit, Inc. has openings for the
following positions (by location) House
Advertisement . . . . . . . . . . . . . 40--40
Kyungtae Kang and
Qixin Wang and
Junbeom Hur and
Kyung-Joon Park and
Lui Sha Medical-Grade Quality of Service for
Real-Time Mobile Healthcare . . . . . . 41--49
Arshdeep Bahga and
Vijay K. Madisetti Healthcare Data Integration and
Informatics in the Cloud . . . . . . . . 50--57
Erman Ayday and
Emiliano De Cristofaro and
Jean-Pierre Hubaux and
Gene Tsudik Whole Genome Sequencing: Revolutionary
Medicine or Privacy Nightmare? . . . . . 58--66
Adam P. Spring Creating Substance from a Cloud:
Low-Cost Product Generation . . . . . . 67--74
Greg Byrd Spotlighting Student Innovation . . . . 75--76
Hal Berghel Cyber Chutzpah: The Sony Hack and the
Celebration of Hyperbole . . . . . . . . 77--80
Emil Vassev and
Mike Hinchey KnowLang: Knowledge Representation for
Self-Adaptive Systems . . . . . . . . . 81--84
Vincent C. Hu and
D. Richard Kuhn and
David F. Ferraiolo Attribute-Based Access Control . . . . . 85--88
Anonymous CS Connection . . . . . . . . . . . . . 89--90
Anonymous Call and Calendar . . . . . . . . . . . 91--92
Anonymous Career Opportunities . . . . . . . . . . 93--99
David Alan Grier The Tyranny of Geography . . . . . . . . 100--100
Anonymous Call for papers . . . . . . . . . . . . c2--c2
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous Instant Access to IEEE Publications
House Advertisement . . . . . . . . . . c3--c3
Anonymous Startup Rock Stars [Advertisement] . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Bjorn Schuller Do Computers Have Personality? . . . . . 6--7
Charles Severance Guido van Rossum: The Modern Era of
Python . . . . . . . . . . . . . . . . . 8--10
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 11--12
Lee Garber News . . . . . . . . . . . . . . . . . . 13--19
Venkat N. Gudivada and
Ricardo Baeza-Yates and
Vijay V. Raghavan Big Data: Promises and Problems . . . . 20--23
Vito Giovanni Castellana and
Alessandro Morari and
Jesse Weaver and
Antonino Tumeo and
David Haglin and
Oreste Villa and
John Feo In-Memory Graph Databases for Web-Scale
Data . . . . . . . . . . . . . . . . . . 24--35
Zhenyun Zhuang and
Haricharan Ramachandra and
Chaoyue Xiong Taming Replication Latency of Big Data
Events with Capacity Planning . . . . . 36--41
Srividya K. Bansal and
Sebastian Kagemann Integrating Big Data: A Semantic
Extract-Transform-Load Framework . . . . 42--50
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 51--51
Karamjit Kaur and
Rinkle Rani Managing Data in Healthcare Information
Systems: Many Models, One Solution . . . 52--59
Martin Giese and
Ahmet Soylu and
Guillermo Vega-Gorgojo and
Arild Waaler and
Peter Haase and
Ernesto Jimenez-Ruiz and
Davide Lanti and
Martin Rezk and
Guohui Xiao and
Ozgur Ozcep and
Riccardo Rosati Optique: Zooming in on Big Data . . . . 60--67
Hasan Alkhatib and
Paolo Faraboschi and
Eitan Frachtenberg and
Hironori Kasahara and
Danny Lange and
Phil Laplante and
Arif Merchant and
Dejan Milojicic and
Karsten Schwan What Will 2022 Look Like? The IEEE CS
2022 Report . . . . . . . . . . . . . . 68--76
Anonymous Stay connected House Advertisement . . . 77--77
Ninad S. Thakoor and
Le An and
Bir Bhanu and
Santhoshkumar Sunderrajan and
B. S. Manjunath People Tracking in Camera Networks:
Three Open Questions . . . . . . . . . . 78--86
Hong-Linh Truong and
Schahram Dustdar Programming Elasticity in the Cloud . . 87--90
Anonymous Call for Papers . . . . . . . . . . . . 91--91
Kasper Hornbaek Flexible Displays, Rigid Designs? . . . 92--96
Tawny Schlieski Virtual Dystopia . . . . . . . . . . . . 97--98
James Bret Michael Trusted Computing: An Elusive Goal . . . 99--101
Hal Berghel Noirware . . . . . . . . . . . . . . . . 102--107
Christian Timmerer and
Touradj Ebrahimi and
Fernando Pereira Toward a New Assessment of Quality . . . 108--110
Bob Aiello Managing the High-Performance Computer
Society Standards Working Group . . . . 111--113
Steven Roach and
Mehran Sahami CS2013: Computer Science Curricula 2013 114--116
Anonymous Call and Calendar . . . . . . . . . . . 117--119
Anonymous Career Opportunities . . . . . . . . . . 120--135
David Alan Grier Building Trust . . . . . . . . . . . . . 136--136
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Instant Access to IEEE Publications
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Rock Stars of $3$D Printing House
Advertisement . . . . . . . . . . . . . c2--c2
Anonymous Are Your Developers Spending Time
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous Computer Highlights Society Magazines 4--5
David Forsyth Representation Learning . . . . . . . . 6--6
Brian M. Gaff Important IP Cases in 2015, Part One . . 7--9
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11
D. Frank Hsu and
Dorothy Marinucci and
Jeffrey M. Voas Cybersecurity: Toward a Secure and
Sustainable Cyber Ecosystem . . . . . . 12--14
Anonymous Get More, for Less! House Advertisement 15--15
Ruby B. Lee Rethinking Computers for Cybersecurity 16--25
David Gillman and
Yin Lin and
Bruce Maggs and
Ramesh K. Sitaraman Protecting Websites from Attack with
Secure Delivery Networks . . . . . . . . 26--34
Anonymous Call for Papers Advertisement . . . . . 35--35
Kristin E. Heckman and
Frank J. Stech and
Ben S. Schmoker and
Roshan K. Thomas Denial and Deception in Cyber Defense 36--44
Tomas Vagoun and
George O. Strawn Implementing the Federal Cybersecurity
R&D Strategy . . . . . . . . . . . . . . 45--55
Sek Chai Enabling Smart Camera Networks with
Smartphone Processors . . . . . . . . . 56--63
Jon D. Hagar and
Thomas L. Wissink and
D. Richard Kuhn and
Raghu N. Kacker Introducing Combinatorial Testing in a
Large Organization . . . . . . . . . . . 64--72
Anonymous IEEE Computer Society House
Advertisement . . . . . . . . . . . . . 73--73
Greg Byrd A Little Ingenuity Solves an
Elephant-Sized Problem . . . . . . . . . 74--77
Emily Shen and
Mayank Varia and
Robert K. Cunningham and
W. Konrad Vesey Cryptographically Secure Computation . . 78--81
Hal Berghel Borderline Executive Disorder . . . . . 82--86
Anonymous CS Connection . . . . . . . . . . . . . 87--89
Anonymous Call and Calendar . . . . . . . . . . . 90--93
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 94--94
Anonymous Career Opportunities . . . . . . . . . . 95--103
David Alan Grier Accidents will happen [The Errant
Hashtag] . . . . . . . . . . . . . . . . 104--104
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Instant Access to IEEE Publications
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous IEEE Security & Privacy House
Advertisement . . . . . . . . . . . . . c2--c2
Anonymous Rock Stars of Cybersecurity House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Ling Liu Enhancing Cloud Services through
Multitier Workload Analysis . . . . . . 6--6
Charles Severance John Resig: Building JQuery . . . . . . 7--8
Brian M. Gaff Important IP Cases in 2015, Part Two . . 9--11
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Ron Vetter and
San Murugesan The Web: The Next 25 Years . . . . . . . 14--17
Vishnu S. Pendyala and
Simon S. Y. Shim and
Christoph Bussler The Web That Extends beyond the World 18--25
Dave Raggett The Web of Things: Challenges and
Opportunities . . . . . . . . . . . . . 26--32
Anonymous Compsac Call for Papers House
Advertisement . . . . . . . . . . . . . 33--33
Jorg Heuer and
Johannes Hund and
Oliver Pfaff Toward the Web of Things: Applying Web
Technologies to the Physical World . . . 34--42
Anonymous STC 2015: Call for Presentations House
Advertisement . . . . . . . . . . . . . 43--43
Ron Vetter and
San Murugesan Roundtable Discussion: The Web We Look
Forward To . . . . . . . . . . . . . . . 44--50
Dirk Riehle How Open Source Is Changing the Software
Developer's Career . . . . . . . . . . . 51--57
Jason Schlessman and
Marilyn Wolf Tailoring Design for Embedded Computer
Vision Applications . . . . . . . . . . 58--62
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 63--63
Alexander De Luca and
Janne Lindqvist Is Secure and Usable Smartphone
Authentication Asking Too Much? . . . . 64--68
Alida Draudt and
Jonjozuf Hadley and
Ryan Hogan and
Leticia Murray and
Gregory Stock and
Julia Rose West Six Insights about Science Fiction
Prototyping . . . . . . . . . . . . . . 69--71
Wenqi Zhou and
Yuhong Liu Online Product Rating Manipulation and
Market Performance . . . . . . . . . . . 72--75
Susanne Hambrusch and
Ran Libeskind-Hadas The PhD Pipeline . . . . . . . . . . . . 76--79
Marat Zhanikeev A Cloud Visitation Platform to
Facilitate Cloud Federation and Fog
Computing . . . . . . . . . . . . . . . 80--83
Hal Berghel What Makes a Good Column . . . . . . . . 84--87
George Hurlburt Cyberhuman Security . . . . . . . . . . 88--91
Karen Gundy-Burlet The Use of Standards on the LADEE
Mission . . . . . . . . . . . . . . . . 92--95
Manfred Broy Rethinking Nonfunctional Software
Requirements . . . . . . . . . . . . . . 96--99
Anonymous Call and Calendar . . . . . . . . . . . 100--105
Anonymous Career Opportunities . . . . . . . . . . 106--115
David Alan Grier The GitHub Effect . . . . . . . . . . . 116--116
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Get more, for Less! House Advertisement c2--c2
Anonymous Learn More House Advertisement . . . . . c3--c3
Anonymous Rock Stars of Wearables House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Prasant Mohapatra Distributed Optimal Channel Access in
Cognitive Radio Networks . . . . . . . . 6--6
Charles Severance Roy T. Fielding: Understanding the REST
Style . . . . . . . . . . . . . . . . . 7--9
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11
Thad Starner and
Tom Martin Wearable Computing: The New Dress Code
[Guest Editors' introduction] . . . . . 12--15
Anhong Guo and
Xiaolong Wu and
Zhengyang Shen and
Thad Starner and
Hannes Baumann and
Scott Gilliland Order Picking with Head-Up Displays . . 16--24
Reuben Kirkham Can Disability Discrimination Law Expand
the Availability of Wearable Computers? 25--33
Jon C. Hammer and
Tingxin Yan Inferring Mobile User Status with Usage
Cues . . . . . . . . . . . . . . . . . . 34--40
Andrea Rosales and
Sergio Sayago and
Josep Blat Beeping Socks and Chirping Arm Bands:
Wearables That Foster Free Play . . . . 41--48
Anonymous STC 2015: Call for Presentations House
Advertisement . . . . . . . . . . . . . 49--49
Najeeb Ullah and
Maurizio Morisio and
Antonio Vetro Selecting the Best Reliability Model to
Predict Residual Defects in Open Source
Software . . . . . . . . . . . . . . . . 50--58
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 59--59
Greg Byrd Tracking Cows Wirelessly . . . . . . . . 60--63
Hal Berghel A Farewell to Air Gaps, Part 1 . . . . . 64--68
Jeffrey Voas Vetting Mobile App Vendors . . . . . . . 69--71
Reiner Hahnle and
Einar Broch Johnsen Designing Resource-Aware Cloud
Applications . . . . . . . . . . . . . . 72--75
Anonymous CS Connection . . . . . . . . . . . . . 76--77
Anonymous Call and Calendar . . . . . . . . . . . 78--82
Anonymous IEEE Computer Society House
Advertisement . . . . . . . . . . . . . 83--83
Anonymous Career Opportunities . . . . . . . . . . 84--98
Anonymous 39th Annual International Computers,
Software & Applications Conference
Advertisement . . . . . . . . . . . . . 99--99
David Alan Grier Disruptive Computing . . . . . . . . . . 100--100
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Get more, for Less! House Advertisement c2--c2
Anonymous Learn More House Advertisement . . . . . c3--c3
Anonymous Rock Stars of Wearables House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Jean-Luc Gaudiot The Times They Are A-Changin' . . . . . 4--6
Anonymous Call for Participation and Celebration
House Advertisement . . . . . . . . . . 7--7
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 8--9
Stephen W. Keckler Increasing Interconnection Network
Throughput with Virtual Channels . . . . 10--10
Anonymous Symantec Advertisement . . . . . . . . . 11--11
Brian M. Gaff ``Curiouser and Curiouser!'' --- The
Fallout from Alice . . . . . . . . . . . 12--14
Anonymous IEEE Computer Society House
Advertisement . . . . . . . . . . . . . 15--15
Anonymous 32 & 16 years ago . . . . . . . . . . . . 16--17
Jim Torresen and
Christian Plessl and
Xin Yao Self-Aware and Self-Expressive Systems 18--20
Bernhard Rinner and
Lukas Esterle and
Jennifer Simonjan and
Georg Nebehay and
Roman Pflugfelder and
Gustavo Fernandez Dominguez and
Peter R. Lewis Self-Aware and Self-Expressive Camera
Networks . . . . . . . . . . . . . . . . 21--28
Michele Amoretti and
Stefano Cagnoni Toward Collective Self-Awareness and
Self-Expression in Distributed Systems 29--36
Jurgo S. Preden and
Kalle Tammemae and
Axel Jantsch and
Mairo Leier and
Andri Riid and
Emine Calis The Benefits of Self-Awareness and
Attention in Fog and Mist Computing . . 37--45
Vincent van Beek and
Jesse Donkervliet and
Tim Hegeman and
Stefan Hugtenburg and
Alexandru Iosup Self-Expressive Management of
Business-Critical Workloads in
Virtualized Datacenters . . . . . . . . 46--54
Behrooz Parhami Amdahl's Reliability Law: A Simple
Quantification of the Weakest-Link
Phenomenon . . . . . . . . . . . . . . . 55--58
Hal Berghel A Farewell to Air Gaps, Part 2 . . . . . 59--63
Nir Kshetri Recent US Cybersecurity Policy
Initiatives: Challenges and Implications 64--69
Brian David Johnson Steve the Steampunk Robot . . . . . . . 70--72
Soto Montalvo and
Raquel Martinez and
Victor Fresno and
Rafael Capilla Multilingual Information Access on the
Web . . . . . . . . . . . . . . . . . . 73--75
Dhananjai M. Rao Computing Efficiency in Education . . . 76--79
Xiaofei Xu and
Quan Z. Sheng and
Liang-Jie Zhang and
Yushun Fan and
Schahram Dustdar From Big Data to Big Service . . . . . . 80--83
Per Ola Kristensson Next-Generation Text Entry . . . . . . . 84--87
Anonymous CS Connection . . . . . . . . . . . . . 88--89
Anonymous Call and Calendar . . . . . . . . . . . 90--93
Anonymous Career Opportunities . . . . . . . . . . 94--103
David Alan Grier Do We Need a Software Czar? . . . . . . 104--104
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward [Advertisement] c4--c4
Anonymous Rock Stars of Wearables [Advertisement] c2--c2
Anonymous STC 2015: Call for Presentations Learn
More . . . . . . . . . . . . . . . . . . c3--c3
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Shixia Liu and
Leila De Floriani Multivariate Network Exploration and
Presentations . . . . . . . . . . . . . 6--6
Anonymous Move Your Career Forward House
Advertisement . . . . . . . . . . . . . 7--7
Charles Severance Anil Jain: 25 Years of Biometric
Recognition . . . . . . . . . . . . . . 8--10
Anonymous IEEE Computer Society [Advertisement] 11--11
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13
Antonino Tumeo and
John Feo Irregular Applications: From
Architectures to Algorithms [Guest
Editors' introduction] . . . . . . . . . 14--16
Anonymous 2016 Richard E. Merwin Distinguished
Service Award House Advertisement . . . 17--17
Scott Lloyd and
Maya Gokhale In-Memory Data Rearrangement for
Irregular, Data-Intensive Computing . . 18--25
Daniele Buono and
John A. Gunnels and
Xinyu Que and
Fabio Checconi and
Fabrizio Petrini and
Tai-Ching Tuan and
Chris Long Optimizing Sparse Linear Algebra for
Large-Scale Graph Analytics . . . . . . 26--34
Andrew Lenharth and
Keshav Pingali Scaling Runtimes for Irregular
Algorithms to Large-Scale NUMA Systems 35--44
Anonymous Rock Stars of Wearables House
Advertisement . . . . . . . . . . . . . 45--45
Mahantesh Halappanavar and
Alex Pothen and
Ariful Azad and
Fredrik Manne and
Johannes Langguth and
Arif Khan Codesign Lessons Learned from
Implementing Graph Matching on
Multithreaded Architectures . . . . . . 46--55
Hitesh Rajput and
Tanmoy Som and
Soumitra Kar An Automated Vehicle License Plate
Recognition System . . . . . . . . . . . 56--61
Peter R. Lewis and
Arjun Chandra and
Funmilade Faniyi and
Kyrre Glette and
Tao Chen and
Rami Bahsoon and
Jim Torresen and
Xin Yao Architectural Aspects of Self-Aware and
Self-Expressive Computing Systems: From
Psychology to Engineering . . . . . . . 62--70
Anonymous Richard E. Merwin Scholarship House
Advertisement . . . . . . . . . . . . . 71--71
Greg Byrd Cycling through Cyberspace . . . . . . . 72--75
Hugo Bruneliere and
Jordi Cabot and
Javier Luis Canovas Izquierdo and
Leire Orue-Echevarria Arrieta and
Oliver Strauss and
Manuel Wimmer Software Modernization Revisited:
Challenges and Prospects . . . . . . . . 76--80
Zhi-Kai Zhang and
Michael Cheng Yi Cho and
Zong-Yu Wu and
Shiuhpyng Winston Shieh Identifying and Authenticating IoT
Objects in a Natural Context . . . . . . 81--83
Darold Davis Taming the Engineering of Information
Services Websites with Standards . . . . 84--89
Hal Berghel TSA: Mission Creep Meets Waste . . . . . 90--94
Anonymous PerCom Pervasive Computing 2016 House
Advertisement . . . . . . . . . . . . . 95--95
Anonymous IEEE Computer Society Election . . . . . 96--106
Anonymous COMPSAC 2016 House Advertisement . . . . 107--107
Anonymous IEEE President-Elect Candidates Address
Computer Society Concerns . . . . . . . 108--111
Anonymous Call and Calendar . . . . . . . . . . . 112--115
Anonymous Career Opportunities . . . . . . . . . . 116--126
Anonymous Deadline: 31 October House Advertisement 127--127
David Alan Grier In Search of the Diabolical Disconnect 128--128
Anonymous Call for Participation and Celebration
House Advertisement . . . . . . . . . . c3--c3
Anonymous Call for Papers House Advertisement . . c2--c2
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous 30th IEEE International Parallel and
Distributed Processing Symposium House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Sumi Helal However You Like It: Computer's Enhanced
Digital Format or Affordable Print
Option . . . . . . . . . . . . . . . . . 6--6
Anonymous The Future's Algorithm Is Here
Advertisement . . . . . . . . . . . . . 7--7
Afonso S. Bandeira An Efficient Algorithm for Exact
Recovery of Vertex Variables from Edge
Measurements . . . . . . . . . . . . . . 8--9
Brian M. Gaff Legal Issues with Wearable Technology 10--12
Anonymous Rock Stars of Cybersecurity
[Advertisement] . . . . . . . . . . . . 13--13
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 14--15
Roy Want and
Schahram Dustdar Activating the Internet of Things [Guest
Editors' introduction] . . . . . . . . . 16--20
Anonymous Focus on Your Job Search [Advertisement] 21--21
Jacob Beal and
Danilo Pianini and
Mirko Viroli Aggregate Programming for the Internet
of Things . . . . . . . . . . . . . . . 22--30
Anonymous IEEE Computer Society 2015 Call for
Major Award Nominations . . . . . . . . 31--31
Laura Belli and
Simone Cirani and
Luca Davoli and
Andrea Gorrieri and
Mirko Mancin and
Marco Picone and
Gianluigi Ferrari Design and Deployment of an IoT
Application-Oriented Testbed . . . . . . 32--40
Anonymous IEEE Computer Society Richard E. Merwin
Student Leadership Scholarship . . . . . 41--41
Mateusz Mikusz and
Sarah Clinch and
Rachel Jones and
Mike Harding and
Christopher Winstanley and
Nigel Davies Repurposing Web Analytics to Support the
IoT . . . . . . . . . . . . . . . . . . 42--49
Keun Sup Shim and
Mieszko Lis and
Omer Khan and
Srinivas Devadas The Execution Migration Machine:
Directoryless Shared-Memory Architecture 50--59
Damian D. G. Gessler and
Evren Sirin SSWAP: Enabling Transaction-Time
Reasoning for Semantic Workflows . . . . 60--68
Amir Parssian and
William Yeoh and
Mong Shan Ee Quality-Based SQL: Specifying
Information Quality in Relational
Database Queries . . . . . . . . . . . . 69--74
Hal Berghel STEM Crazy . . . . . . . . . . . . . . . 75--80
Anonymous Software Experts . . . . . . . . . . . . 81--81
Steve Brown The Power of Story . . . . . . . . . . . 82--83
Constantinos Kolias and
Angelos Stavrou and
Jeffrey Voas Securely Making ``Things'' Right . . . . 84--88
Anonymous IEEE Cloud Computing Call for Papers . . 89--89
Ralf Klamma Near-Real-Time Social Computing . . . . 90--92
Tao Chen and
Rami Bahsoon Toward a Smarter Cloud: Self-Aware
Autoscaling of Cloud Configurations and
Resources . . . . . . . . . . . . . . . 93--96
Anonymous IEEE Security & Privacy [Advertisement] 97--97
Kevin Gary Project-Based Learning . . . . . . . . . 98--100
Anonymous Linkedin Corp. Advertisement . . . . . . 101--101
Eric Durant CE2016: Guidelines for Forward-Looking
Computer Engineering Curricula . . . . . 102--104
Anonymous CS Connection . . . . . . . . . . . . . 105--106
Anonymous Call and Calendar . . . . . . . . . . . 107--111
Anonymous Career Opportunities . . . . . . . . . . 112--119
David Alan Grier Industrial Leadership . . . . . . . . . 120--120
Anonymous Call for Participation and Celebration c3--c3
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Learn more [Advertisement] . . . . . . . c4--c4
Anonymous Move Your Career Forward IEEE Computer
Society Membership [Advertisement] . . . c2--c2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Paolo Montuschi Spiking Neural Network Architecture . . 6--6
Anonymous Watch the World's Leading Experts Take
Multi-Core Strategies to New Heights
House Advertisement . . . . . . . . . . 7--7
Charles Severance Anant Agarwal: Inside edX . . . . . . . 8--9
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11
Giulio Jacucci and
Stephen Fairclough and
Erin T. Solovey Physiological Computing . . . . . . . . 12--16
Anonymous IEEE Computer Society: Be at the Center
of It All House Advertisement . . . . . 17--17
David Rozado and
Andreas Dunser Combining EEG with Pupillometry to
Improve Cognitive Workload Detection . . 18--25
Riccardo Sioni and
Luca Chittaro Stress Detection Using Physiological
Sensors . . . . . . . . . . . . . . . . 26--33
Evan M. Peck and
Emily Carlin and
Robert Jacob Designing Brain-Computer Interfaces for
Attention-Aware Systems . . . . . . . . 34--42
Venkat N. Gudivada and
Dhana Rao and
Jordan Paris Understanding Search-Engine Optimization 43--52
Anonymous Call for Special Issue Proposals House
Advertisement . . . . . . . . . . . . . 53--53
Abdelkareem Bedri and
Himanshu Sahni and
Pavleen Thukral and
Thad Starner and
David Byrd and
Peter Presti and
Gabriel Reyes and
Maysam Ghovanloo and
Zehua Guo Toward Silent-Speech Control of Consumer
Wearables . . . . . . . . . . . . . . . 54--62
Anonymous Call for Standards Award Nominations
House Advertisement . . . . . . . . . . 63--63
Madison Blake and
Rabih Younes and
Jacob Dennis and
Thomas L. Martin and
Mark Jones A User-Independent and Sensor-Tolerant
Wearable Activity Classifier . . . . . . 64--71
Hal Berghel Legislating Technology (Badly) . . . . . 72--78
Anonymous Computer Write for Us House
Advertisement . . . . . . . . . . . . . 79--79
Greg Byrd 21st Century Pong . . . . . . . . . . . 80--84
Tom Mens and
Philippe Grosjean The Ecology of Software Ecosystems . . . 85--87
Chia-Wei Wang and
Michael Cheng Yi Cho and
Chi-Wei Wang and
Shiuhpyng Winston Shieh Combating Software Piracy in Public
Clouds . . . . . . . . . . . . . . . . . 88--91
Anonymous CS Connection . . . . . . . . . . . . . 92--93
Anonymous Cloud Computing Call for Papers House
Advertisement . . . . . . . . . . . . . 94--94
Anonymous Call and Calendar . . . . . . . . . . . 95--98
Anonymous Upsilon Pi Epsilon Student Excellence
Award House Advertisement . . . . . . . 99--99
Anonymous Career Opportunities . . . . . . . . . . 100--118
Anonymous IEEE Computer Society House
Advertisement . . . . . . . . . . . . . 119--119
David Alan Grier The Voracious Discipline . . . . . . . . 120--120
Anonymous Explore Levels for Beyond the Next House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Endless Possibilities . . . . . . . . . c2--c2
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Learn more House Advertisement . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Mike Sharples Seamless Learning: Using Location-Aware
Technology to Support Art Education . . 6--6
Brian M. Gaff Patent Infringement Damages . . . . . . 7--9
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11
Vladimir Getov Scientific Grand Challenges: Toward
Exascale Supercomputing and Beyond . . . 12--14
Takemasa Miyoshi and
Keiichi Kondo and
Koji Terasaki Big Ensemble Data Assimilation in
Numerical Weather Prediction . . . . . . 15--21
Anonymous COMPSAC 2016 House Advertisement . . . . 22--22
Dylan Keon and
Cherri M. Pancake and
Harry Yeh Protecting Our Shorelines: Modeling the
Effects of Tsunamis and Storm Waves . . 23--32
Nichols A. Romero and
Aiichiro Nakano and
Katherine M. Riley and
Fuyuki Shimojo and
Rajiv K. Kalia and
Priya Vashishta and
Paul C. Messina Quantum Molecular Dynamics in the
Post-Petaflops Era . . . . . . . . . . . 33--41
Erich Strohmaier and
Hans W. Meuer and
Jack Dongarra and
Horst D. Simon The TOP500 List and Progress in
High-Performance Computing . . . . . . . 42--49
Simon Portegies Zwart and
Jeroen Bedorf Using GPUs to Enable Simulation with
Computational Gravitational Dynamics in
Astrophysics . . . . . . . . . . . . . . 50--58
Anonymous Get the Recognition You Deserve House
Advertisement . . . . . . . . . . . . . 59--59
Andrea Valdi and
Eros Lever and
Simone Benefico and
Davide Quarta and
Stefano Zanero and
Federico Maggi Scalable Testing of Mobile Antivirus
Applications . . . . . . . . . . . . . . 60--68
Anonymous Move Your Career Forward House
Advertisement . . . . . . . . . . . . . 69--69
Jia Liu and
Yong Xue and
Dominic Palmer-Brown and
Ziqiang Chen and
Xingwei He High-Throughput Geocomputational
Workflows in a Grid Environment . . . . 70--80
Anonymous ECSEE Advertisement . . . . . . . . . . 81--81
Hal Berghel The Dystory of Ahmed's Clock . . . . . . 82--85
Marco A. S. Netto and
Renato L. F. Cunha and
Nicole Sultanum Deciding When and How to Move HPC Jobs
to the Cloud . . . . . . . . . . . . . . 86--89
Ed Finn We Can Build the Future . . . . . . . . 90--91
Kim B. Schaffer Expanding Continuous Authentication with
Mobile Devices . . . . . . . . . . . . . 92--95
Steve Tockey Insanity, Hiring, and the Software
Industry . . . . . . . . . . . . . . . . 96--101
Mukesh Saini and
Abdulmotaleb El Saddik Absence Privacy Loss . . . . . . . . . . 102--105
Mark Ardis and
David Budgen and
Gregory W. Hislop and
Jeff Offutt and
Mark Sebern and
Willem Visser SE 2014: Curriculum Guidelines for
Undergraduate Degree Programs in
Software Engineering . . . . . . . . . . 106--109
Adam Eck and
Leen-Kiat Soh and
Kristen Olson and
Allan L. McCutcheon and
Jolene Smyth and
Robert F. Belli Understanding the Human Condition
through Survey Informatics . . . . . . . 110--114
Anonymous Call and Calendar . . . . . . . . . . . 115--119
Anonymous CS Connection . . . . . . . . . . . . . 120--120
Anonymous Call for Special Issue Proposals House
Advertisement . . . . . . . . . . . . . 121--121
Anonymous Career Opportunities . . . . . . . . . . 122--134
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 135--135
David Alan Grier Hidden Persuaders . . . . . . . . . . . 136--136
Anonymous Cool Chips XIX House Advertisement . . . c3--c3
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Learn more Advertisement . . . . . . . . c2--c2
Anonymous Science Minus the Fiction Advertisement c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Tim Menzies Cross-Project Data for Software
Engineering . . . . . . . . . . . . . . 6--6
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 7--8
Thomas M. Conte The Computer Society Must Change . . . . 9--9
Thomas M. Conte and
Elie Track and
Erik DeBenedictis Rebooting Computing: New Strategies for
Technology Scaling . . . . . . . . . . . 10--13
John M. Shalf and
Robert Leland Computing beyond Moore's Law . . . . . . 14--23
Mohamed M. Sabry Aly and
Mingyu Gao and
Gage Hills and
Chi-Shuen Lee and
Greg Pitner and
Max M. Shulaker and
Tony F. Wu and
Mehdi Asheghi and
Jeff Bokor and
Franz Franchetti and
Kenneth E. Goodson and
Christos Kozyrakis and
Igor Markov and
Kunle Olukotun and
Larry Pileggi and
Eric Pop and
Jan Rabaey and
Christopher Re and
H.-S. Philip Wong and
Subhasish Mitra Energy-Efficient Abundant-Data
Computing: The N3XT 1,000$ \times $ . . 24--33
D. Scott Holmes and
Alan M. Kadin and
Mark W. Johnson Superconducting Computing in Large-Scale
Hybrid Systems . . . . . . . . . . . . . 34--42
Anonymous Computer Write for us House
Advertisement . . . . . . . . . . . . . 43--43
Kirk M. Bresniker and
Sharad Singhal and
R. Stanley Williams Adapting to Thrive in a New Economy of
Memory Abundance . . . . . . . . . . . . 44--53
Santosh Khasanvis and
Mingyu Li and
Mostafizur Rahman and
Ayan K. Biswas and
Mohammad Salehi-Fashami and
Jayasimha Atulasimha and
Supriyo Bandyopadhyay and
Csaba Andras Moritz Architecting for Causal Intelligence at
Nanoscale . . . . . . . . . . . . . . . 54--64
David J. Mountain and
Mark McLean and
Douglas Palmer and
Joshua D. Prucnal and
Christopher D. Krieger Ohmic Weave: Memristor-Based Threshold
Gate Networks . . . . . . . . . . . . . 65--71
Michael K. Papamichael and
James C. Hoe The CONNECT Network-on-Chip Generator 72--79
Jeffrey Voas and
George Hurlburt Third-Party Software's Trust Quagmire 80--87
Hal Berghel What Price Gonzo Ethics? . . . . . . . . 88--93
Davide Brugali and
Rafael Capilla and
Mike Hinchey Dynamic Variability Meets Robotics . . . 94--97
Alexander Kott and
David S. Alberts and
Cliff Wang Will Cybersecurity Dictate the Outcome
of Future Wars? . . . . . . . . . . . . 98--101
Anonymous Gaudiot Voted 2016 Computer Society
President-Elect . . . . . . . . . . . . 102--104
Anonymous Call and Calendar . . . . . . . . . . . 105--109
Anonymous CS Connection . . . . . . . . . . . . . 110--111
Anonymous Career Opportunities . . . . . . . . . . 112--127
David Alan Grier Quantum Imagination . . . . . . . . . . 128--128
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society: Be at the Center
of It All House Advertisement . . . . . c2--c2
Anonymous Move Your Career Forward House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Where a Better World Shows Advertisement c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Roger U. Fujii Raising the Bar: Ensuring Quality
Products and Services for Our Members 4--4
Sumi Helal 2016 Outlook: Humans in the Technology
Loop . . . . . . . . . . . . . . . . . . 7--9
Paul Nikolich and
Kenneth Christensen and
Lori Cameron 802 Standards . . . . . . . . . . . . . 10--10
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 11--11
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 12--13
Lynette A. Jones Designing Effective Refreshable Braille
Displays . . . . . . . . . . . . . . . . 14--14
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 15--16
Gregory D. Abowd Beyond Weiser: From Ubiquitous to
Collective Computing . . . . . . . . . . 17--23
Carl K. Chang Situation Analytics: A Foundation for a
New Software Engineering Paradigm . . . 24--33
Zhihao Jiang and
Houssam Abbas and
Kuk Jin Jang and
Rahul Mangharam The Challenges of High-Confidence
Medical Device Software . . . . . . . . 34--42
Dejan Milojicic and
Timothy Roscoe Outlook on Operating Systems . . . . . . 43--51
Lalit Kumar Singh and
Gopika Vinod and
A. K. Tripathi Early Prediction of Software
Reliability: A Case Study with a Nuclear
Power Plant System . . . . . . . . . . . 52--58
Hitesh Rajput and
Tanmoy Som and
Soumitra Kar Using Radon Transform to Recognize
Skewed Images of Vehicular License
Plates . . . . . . . . . . . . . . . . . 59--65
Kjell Jorgen Hole Building Trust in E-Government Services 66--74
Hal Berghel Digital Politics 2016 . . . . . . . . . 75--79
Dragutin Petkovic Using Learning Analytics to Assess
Capstone Project Teams . . . . . . . . . 80--83
Gary McGraw Four Software Security Findings . . . . 84--87
Marilyn Wolf Embedded Software in Crisis . . . . . . 88--90
Brian David Johnson Beyond Science Fiction: The American
Dream . . . . . . . . . . . . . . . . . 91--93
Andreas Bulling Pervasive Attentive User Interfaces . . 94--98
Michael B. Spring The Future of Standardization: Are We
Destined to Repeat History? . . . . . . 99--101
Greg Byrd IEEE/IBM Watson Student Showcase . . . . 102--104
Anonymous CS Connection . . . . . . . . . . . . . 105--105
Anonymous Call and Calendar . . . . . . . . . . . 106--109
Anonymous Career Opportunities . . . . . . . . . . 110--119
David Alan Grier New Cycles of Technology . . . . . . . . 120--120
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society: Be at the Center
of It All House Advertisement . . . . . c3--c3
Anonymous Move Your Career Forward House
Advertisement . . . . . . . . . . . . . c2--c2
Anonymous Watch the World's Leading Experts Take
Multi-Core Strategies to New Heights
House Advertisement . . . . . . . . . . c4--c4
Anonymous Computer Society IEEE Fellows . . . . . 3--3
Anonymous Masthead . . . . . . . . . . . . . . . . 4--4
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 5--6
Charles Severance Bruce Schneier: The Security Mindset . . 7--8
Elisa Bertino Securing Mobile Applications . . . . . . 9--9
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11
Schahram Dustdar Cloud Computing . . . . . . . . . . . . 12--13
Fernando Diaz-del-Rio and
Javier Salmeron-Garcia and
Jose Luis Sevillano Extending Amdahl's Law for the Cloud
Computing Era . . . . . . . . . . . . . 14--22
Anonymous IEEE Computer Society: Be at the Center
of It All . . . . . . . . . . . . . . . 23--23
Alireza Khoshkbarforoushha and
Meisong Wang and
Rajiv Ranjan and
Lizhe Wang and
Leila Alem and
Samee U. Khan and
Boualem Benatallah Dimensions for Evaluating Cloud Resource
Orchestration Frameworks . . . . . . . . 24--33
Talal H. Noor and
Quan Z. Sheng and
Zakaria Maamar and
Sherali Zeadally Managing Trust in the Cloud: State of
the Art and Research Challenges . . . . 34--45
Quan Zhang and
Weisong Shi Energy-Efficient Workload Placement in
Enterprise Datacenters . . . . . . . . . 46--52
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 53--53
Lei Xu and
Chunxiao Jiang and
Yan Chen and
Jian Wang and
Yong Ren A Framework for Categorizing and
Applying Privacy-Preservation Techniques
in Big Data Mining . . . . . . . . . . . 54--62
Hal Berghel Secretocracy . . . . . . . . . . . . . . 63--67
Mahmoud Barhamgi and
Arosha K. Bandara and
Yijun Yu and
Khalid Belhajjame and
Bashar Nuseibeh Protecting Privacy in the Cloud: Current
Practices, Future Directions . . . . . . 68--72
Anonymous IEEE Computer Society House
Advertisement . . . . . . . . . . . . . 73--73
Nir Kshetri Gambling with Source Code . . . . . . . 74--77
Brian David Johnson and
David Guston Futures We Want to Inhabit . . . . . . . 78--79
Vint Cerf and
Max Senges Taking the Internet to the Next Physical
Level . . . . . . . . . . . . . . . . . 80--86
Anonymous CS Connection . . . . . . . . . . . . . 87--88
Anonymous Call and Calendar . . . . . . . . . . . 89--93
Anonymous Career Opportunities . . . . . . . . . . 94--103
David Alan Grier The Post-MOOC World . . . . . . . . . . 104--104
Anonymous Call for Participation House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward House
Advertisement . . . . . . . . . . . . . c2--c2
Anonymous Rock Stars of Risk-Based Security House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Bodies of Knowledge . . . . . . . . . . 3--3
Anonymous Masthead . . . . . . . . . . . . . . . . 4--4
Leila De Floriani Using $2$D Maps for $3$D Localization 5--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--7
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 8--9
Ying-Dar Lin and
Jeffrey Voas and
Antonio Pescape and
Peter Mueller Communications and Privacy under
Surveillance . . . . . . . . . . . . . . 10--13
Steven M. Bellovin and
Matt Blaze and
Susan Landau Insecure Surveillance: Technical Issues
with Remote Computer Searches . . . . . 14--24
Steven J. Murdoch Insecure by Design: Protocols for
Encrypted Phone Calls . . . . . . . . . 25--33
Stephen Farrell Requirements Analysis Required ---
Otherwise Targeted Monitoring Enables
Pervasive Monitoring . . . . . . . . . . 34--40
Anonymous Call for Nominees House Advertisement 41--41
Robert Koch and
Mario Golling and
Gabi Dreo Rodosek How Anonymous Is the Tor Network? A
Long-Term Black-Box Investigation . . . 42--49
Hassan Metwalley and
Stefano Traverso and
Marco Mellia Using Passive Measurements to Demystify
Online Trackers . . . . . . . . . . . . 50--55
Imran Yusof and
Al-Sakib Khan Pathan Mitigating Cross-Site Scripting Attacks
with a Content Security Policy . . . . . 56--63
Amit Sheth and
Pramod Anantharam and
Cory Henson Semantic, Cognitive, and Perceptual
Computing: Paradigms That Shape Human
Experience . . . . . . . . . . . . . . . 64--72
Hal Berghel Net Neutrality vs. Net Neutering . . . . 73--77
Shams Zawoad and
Ragib Hasan Trustworthy Digital Forensics in the
Cloud . . . . . . . . . . . . . . . . . 78--81
Robert N. Charette The STEM Anxiety Business . . . . . . . 82--87
Charlene Chuck Walrad The IEEE Computer Society and ACM's
Collaboration on Computing Education . . 88--91
Karen Bartleson Practical Insights from the Peculiar
World of Standards . . . . . . . . . . . 92--95
Gaurav Misra and
Jose M. Such How Socially Aware Are Social Media
Privacy Controls? . . . . . . . . . . . 96--99
Greg Byrd Immortal Bits: Managing Our Digital
Legacies . . . . . . . . . . . . . . . . 100--103
Angelos Stavrou and
Daniel Fleck and
Constantinos Kolias On the Move: Evading Distributed
Denial-of-Service Attacks . . . . . . . 104--107
Anonymous Call and Calendar . . . . . . . . . . . 108--112
Anonymous Conferences in the Palm of Your Hand
House Advertisement . . . . . . . . . . 113--113
David Alan Grier Go, Stop, Go, Stop . . . . . . . . . . . 128--128
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Rock Stars of Big Data House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Rock Stars of Risk-Based Security House
Advertisement . . . . . . . . . . . . . c2--c2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous Computer Society Publications . . . . . 8--9
Brian M. Gaff The Need for Speed . . . . . . . . . . . 10--12
Charles Severance Bruce Schneier: Building Cryptographic
Systems . . . . . . . . . . . . . . . . 13--15
Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 16--17
Qiang Yang Cross-Domain Data Fusion . . . . . . . . 18--18
Anonymous Call for Papers: House Advertisement . . 19--19
Naren Ramakrishnan and
Ravi Kumar Big Data . . . . . . . . . . . . . . . . 20--22
Jignesh M. Patel Operational NoSQL Systems: What's New
and What's Next? . . . . . . . . . . . . 23--30
Venkat N. Gudivada and
Dhana Rao and
Vijay V. Raghavan Renaissance in Database Management:
Navigating the Landscape of Candidate
Systems . . . . . . . . . . . . . . . . 31--42
Giovanni Cherubini and
Jens Jelitto and
Vinodh Venkatesan Cognitive Storage for Big Data . . . . . 43--51
Hsiang-Fu Yu and
Cho-Jui Hsieh and
Hyokun Yun and
S. V. N. Vishwanathan and
Inderjit Dhillon Nomadic Computing for Big Data Analytics 52--60
Asmaa Elbadrawy and
Agoritsa Polyzou and
Zhiyun Ren and
Mackenzie Sweeney and
George Karypis and
Huzefa Rangwala Predicting Student Performance Using
Personalized Analytics . . . . . . . . . 61--69
Behrooz Parhami Low Acceptance Rates of Conference
Papers Considered Harmful . . . . . . . 70--73
Hal Berghel The Bogus Science Theorem (and the Junk
Science Wager) . . . . . . . . . . . . . 74--78
Erik P. DeBenedictis The Boolean Logic Tax . . . . . . . . . 79--82
Jurgen Steimle Skin --- The Next User Interface . . . . 83--87
Yuvraj Agarwal and
Anind K. Dey Toward Building a Safe, Secure, and
Easy-to-Use Internet of Things
Infrastructure . . . . . . . . . . . . . 88--91
Michael Bennett Afrofuturism . . . . . . . . . . . . . . 92--93
John Knight and
Jack Davidson and
Anh Nguyen-Tuong and
Jason Hiser and
Michele Co Diversity in Cybersecurity . . . . . . . 94--98
Anonymous Call and Calendar . . . . . . . . . . . 99--103
David Alan Grier The Global Profession . . . . . . . . . 120--120
Anonymous Computer Entrepreneur Award: House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward: IEEE Computer
Society Membership: House Advertisement c2--c2
Anonymous Rock Stars of Big Data: House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Rock Stars of Big Data: House
Advertisement . . . . . . . . . . . . . 2--2
Anonymous Masthead . . . . . . . . . . . . . . . . 5--5
Anonymous Hiscox . . . . . . . . . . . . . . . . . 6--7
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 8--9
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11
Anonymous Move Your Career Forward IEEE Computer
Society Membership: House Advertisement 12--12
Anonymous IEEE Computer Society Conferences . . . 13--13
H. Chad Lane and
David Forsyth Virtual Learning and Object
Reconstruction . . . . . . . . . . . . . 14--15
Alfred C. Weaver and
Greg Byrd and
Renee Bryce Computing Tools and Techniques for
Emergency Response . . . . . . . . . . . 16--18
Robin R. Murphy Emergency Informatics: Using Computing
to Improve Disaster Management . . . . . 19--27
Marco Avvenuti and
Stefano Cresci and
Fabio Del Vigna and
Maurizio Tesconi Impromptu Crisis Mapping to Prioritize
Emergency Response . . . . . . . . . . . 28--37
Alper Bozkurt and
Edgar Lobaton and
Mihail Sichitiu A Biobotic Distributed Sensor Network
for Under-Rubble Search and Rescue . . . 38--46
Liliya I. Besaleva and
Alfred C. Weaver Applications of Social Networks and
Crowdsourcing for Disaster Management
Improvement . . . . . . . . . . . . . . 47--53
Henri Bal and
Dick Epema and
Cees de Laat and
Rob van Nieuwpoort and
John Romein and
Frank Seinstra and
Cees Snoek and
Harry Wijshoff A Medium-Scale Distributed System for
Computer Science Research:
Infrastructure for the Long Term . . . . 54--63
Sebastian Gayer and
Andrea Herrmann and
Thorsten Keuler and
Matthias Riebisch and
Pablo Oliveira Antonino Lightweight Traceability for the Agile
Architect . . . . . . . . . . . . . . . 64--71
Anonymous IEEE Computer Society Information . . . 72--72
Hal Berghel Attenuated FAQs . . . . . . . . . . . . 73--77
Weisong Shi and
Schahram Dustdar The Promise of Edge Computing . . . . . 78--81
John Leslie King and
Jonathan Grudin Will Computers Put Us Out of Work? . . . 82--85
Anonymous Watch the World's Leading Experts Take
Multi-Core Strategies to New Heights:
House Advertisement . . . . . . . . . . 86--86
Phillip A. Laplante and
Jeffrey Voas and
Nancy Laplante Standards for the Internet of Things: A
Case Study in Disaster Response . . . . 87--90
Anonymous IEEE Member Digital Library: House
Advertisement . . . . . . . . . . . . . 91--91
Omar Niamut and
Mu Mu and
Spyros Denazis and
Nicholas Race Social Telemedia: The Relationship
between Social Information and Networked
Media . . . . . . . . . . . . . . . . . 92--97
Greg Byrd Home Sweet Mind-Controlled Home . . . . 98--101
Jeffrey Voas and
Kim Schaffer Insights on Formal Methods in
Cybersecurity . . . . . . . . . . . . . 102--105
Anonymous CS Connection . . . . . . . . . . . . . 106--107
Anonymous Call and Calendar . . . . . . . . . . . 108--111
Anonymous IEEE Computer Society 2016 Call for
Major Award Nominations: House
Advertisement . . . . . . . . . . . . . 112--112
Anonymous SanDisk Corporation Advertisement . . . 113--113
Anonymous Career Opportunities . . . . . . . . . . 114--127
David Alan Grier Technological Improvisation . . . . . . 128--128
Anonymous Samsung Galaxy S7 edge . . . . . . . . . c2--1
Anonymous Computer Entrepreneur Award: House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Rock Stars of Cybersecurity: House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 4--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--7
Mohamed Ibrahim and
Krishnendu Chakrabarty Digital-Microfluidic Biochips . . . . . 8--9
Mark Paulk and
Lori Cameron IEEE Floating Point Standard . . . . . . 10--10
Elisa Bertino Security Threats: Protecting the New
Cyberfrontier . . . . . . . . . . . . . 11--14
Daniel Vecchiato and
Marco Vieira and
Eliane Martins The Perils of Android Security
Configuration . . . . . . . . . . . . . 15--21
David Kotz and
Carl A. Gunter and
Santosh Kumar and
Jonathan P. Weiner Privacy and Security in Mobile Health: A
Research Agenda . . . . . . . . . . . . 22--30
Ronald P. Loui and
Terrence D. Loui How to Survive a Cyber Pearl Harbor . . 31--37
V. S. Subrahmanian and
Amos Azaria and
Skylar Durst and
Vadim Kagan and
Aram Galstyan and
Kristina Lerman and
Linhong Zhu and
Emilio Ferrara and
Alessandro Flammini and
Filippo Menczer The DARPA Twitter Bot Challenge . . . . 38--46
Anonymous Computer Write for Us: House
Advertisement . . . . . . . . . . . . . 47--47
Tsong Yueh Chen and
Fei-Ching Kuo and
Wenjuan Ma and
Willy Susilo and
Dave Towey and
Jeffrey Voas and
Zhi Quan Zhou Metamorphic Testing for Cybersecurity 48--55
Qingpeng Zhang and
Daniel Dajun Zeng and
Fei-Yue Wang and
Ronald Breiger and
James A. Hendler Brokers or Bridges? Exploring Structural
Holes in a Crowdsourcing System . . . . 56--64
Anonymous Move Your Career Forward IEEE Computer
Society Membership: House Advertisement 65--65
Qiuming Luo and
Feng Xiao and
Zhong Ming and
Hao Li and
Jianyong Chen and
Jianhua Zhang Optimizing the Memory Management of a
Virtual Machine Monitor on a NUMA System 66--74
Anonymous Rock Stars of Big Data: House
Advertisement . . . . . . . . . . . . . 75--75
Anonymous Call for Nominees: House Advertisement 76--76
Sorel Reisman and
Eli Shmueli Opening the Instructional Doors to
Computer Science and IT --- Finally . . 77--79
Jeffrey Voas Demystifying the Internet of Things . . 80--83
Erik P. DeBenedictis Rebooting Computers as Learning Machines 84--87
Daniel Ullrich and
Andreas Butz Social Robots for the 21st Century . . . 88--92
Anonymous Impact a Broader Audience: House
Advertisement . . . . . . . . . . . . . 93--93
Anonymous IEEE Computer Society 2016 Call for
Major Award Nominations: House
Advertisement . . . . . . . . . . . . . 94--94
Brian David Johnson Science Fiction and the Coming Age of
Sentient Tools . . . . . . . . . . . . . 95--97
Kate Netkachova and
Robin E. Bloomfield Security-Informed Safety . . . . . . . . 98--102
Anonymous Call and Calendar . . . . . . . . . . . 103--107
Anonymous Career Opportunities . . . . . . . . . . 108--119
David Alan Grier Scientific Conversations . . . . . . . . 120--120
Anonymous Endless Possibilities Advertisement . . c2--c2
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Galaxy S7 edge . . . . . . . . . . . . . c4--c4
Anonymous Rock Stars of Cybersecurity: House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 4--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--7
Bjorn Schuller and
Jian Pei Using Computer Intelligence for
Depression Diagnosis and Crowdsourcing 8--9
Anonymous IEEE Computer Society Awards . . . . . . 10--10
Antti Oulasvirta and
Gregory D. Abowd User Interface Design in the 21st
Century . . . . . . . . . . . . . . . . 11--13
Yuta Sugiura and
Takeo Igarashi and
Masahiko Inami Cuddly User Interfaces . . . . . . . . . 14--19
Daisuke Sakamoto and
Yuta Sugiura and
Masahiko Inami and
Takeo Igarashi Graphical Instruction for Home Robots 20--25
John M. Carroll and
Jiawei Chen and
Chien Wen Tina Yuan and
Benjamin V. Hanrahan In Search of Coproduction: Smart
Services as Reciprocal Activities . . . 26--32
Anonymous Computer Write for Us House
Advertisement . . . . . . . . . . . . . 33--33
Jun Kato and
Takeo Igarashi and
Masataka Goto Programming with Examples to Develop
Data-Intensive User Interfaces . . . . . 34--42
Anonymous Move Your Career Forward IEEE Computer
Society Membership House Advertisement 43--43
Brad A. Myers and
Andrew J. Ko and
Thomas D. LaToza and
YoungSeok Yoon Programmers Are Users Too:
Human-Centered Methods for Improving
Programming Tools . . . . . . . . . . . 44--52
Samuel Kounev and
Nikolaus Huber and
Fabian Brosig and
Xiaoyun Zhu A Model-Based Approach to Designing
Self-Aware IT Systems and
Infrastructures . . . . . . . . . . . . 53--61
Xia Yang and
Peng Shi and
Haiyong Sun and
Wenxuan Zheng and
Jim Alves-Foss A Fast Boot, Fast Shutdown Technique for
Android OS Devices . . . . . . . . . . . 62--68
Anonymous IEEE Computer Society 2016 Call for
Major Award Nominations House
Advertisement . . . . . . . . . . . . . 69--69
Peter Bajcsy and
Antoine Vandecreme and
Julien Amelot and
Joe Chalfoun and
Michael Majurski and
Mary Brady Enabling Stem Cell Characterization from
Large Microscopy Images . . . . . . . . 70--79
David Alan Grier Free Tuition for Community College: A
Role for the Tech Community? . . . . . . 80--82
Anonymous Call for Nominees Education Awards
Nominations House Advertisement . . . . 83--83
Hal Berghel The Dictator's (False) Dilemma . . . . . 84--87
Norman Matloff The H-1B Visa Controversy . . . . . . . 88--93
Greg Byrd Let the Sun Shine . . . . . . . . . . . 94--97
George Hurlburt ``Good Enough'' Security: The Best We'll
Ever Have . . . . . . . . . . . . . . . 98--101
Anonymous CS Connection . . . . . . . . . . . . . 102--103
Anonymous Call and Calendar . . . . . . . . . . . 104--107
Anonymous Career Opportunities . . . . . . . . . . 108--119
David Alan Grier Aware of the Situation . . . . . . . . . 120--120
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Focus on Your Job House Advertisement c3--c3
Anonymous Rock Stars of Big Data House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Rock Stars of Pervasive, Predictive
Analytics House Advertisement . . . . . c2--c2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous Call for Nominees Education Awards
Nominations . . . . . . . . . . . . . . 4--4
Anonymous IEEE Computer Society Digital Library:
IEEE's First Digital Library . . . . . . 5--5
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 6--7
Anonymous Computer Highlights Society Magazines 8--9
David A. Bader Evolving MPI+X Toward Exascale . . . . . 10--10
Anonymous Rock Stars of Pervasive, Predictive
Analytics . . . . . . . . . . . . . . . 11--11
Domenic Forte and
Ron Perez and
Yongdae Kim and
Swarup Bhunia Supply-Chain Security for
Cyberinfrastructure [Guest editors'
introduction] . . . . . . . . . . . . . 12--16
Anonymous Not so Secure . . . . . . . . . . . . . 17--17
Parrish Ralston and
David Fry and
Scott Suko and
Bryce Winters and
Matthew King and
Robert Kober Defeating counterfeiters with
microscopic dielets embedded in
electronic components . . . . . . . . . 18--26
Anonymous 2017 Richard E. Merwin Award for
Distinguished Service . . . . . . . . . 27--27
Joseph P. Skudlarek and
Tom Katsioulas and
Michael Chen A Platform Solution for Secure
Supply-Chain and Chip Life-Cycle
Management . . . . . . . . . . . . . . . 28--34
Anonymous IEEE Security & Privacy . . . . . . . . . 35--35
Sk Subidh Ali and
Mohamed Ibrahim and
Jeyavijayan Rajendran and
Ozgur Sinanoglu and
Krishnendu Chakrabarty Supply-Chain Security of Digital
Microfluidic Biochips . . . . . . . . . 36--43
Wei Hu and
Baolei Mao and
Jason Oberg and
Ryan Kastner Detecting Hardware Trojans with
Gate-Level Information-Flow Tracking . . 44--52
Anonymous IEEE Computer Society 2016 Call for
Major Award Nominations . . . . . . . . 53--53
Kan Xiao and
Adib Nahiyan and
Mark Tehranipoor Security Rule Checking in IC Design . . 54--61
Olav Lysne and
Kjell J. Hole and
Christian Otterstad and
Oyvind Ytrehus and
Raymond Aarseth and
Jorgen Tellnes Vendor Malware: Detection Limits and
Mitigation . . . . . . . . . . . . . . . 62--69
Kim Schaffer and
Jeffrey Voas What Happened to Formal Methods for
Security? . . . . . . . . . . . . . . . 70--79
Doug Terry Toward a New Approach to IoT Fault
Tolerance . . . . . . . . . . . . . . . 80--83
Claude Y. Laporte and
Rory V. O'Connor Systems and Software Engineering
Standards for Very Small Entities:
Accomplishments and Overview . . . . . . 84--87
Erik P. DeBenedictis The Search for Computing's Secretariat 88--91
Celia Paulsen Cybersecuring Small Businesses . . . . . 92--97
Hal Berghel The Pollyanna Delusion . . . . . . . . . 98--102
Anonymous IEEE Computer Society Information . . . 103--103
Xiangshi Ren Rethinking the Relationship between
Humans and Computers . . . . . . . . . . 104--108
Evan Atherton Science Fiction Prototyping at Work . . 109--111
Amir Vahid Dastjerdi and
Rajkumar Buyya Fog Computing: Helping the Internet of
Things Realize Its Potential . . . . . . 112--116
Anonymous Facebook, Inc. . . . . . . . . . . . . . 117--117
Anonymous IEEE Computer Society Election . . . . . 118--128
Anonymous Move Your Career Forward IEEE Computer
Society Membership . . . . . . . . . . . 129--129
Anonymous IEEE Division V Delegate/Director
Candidates . . . . . . . . . . . . . . . 130--131
Anonymous Proposed Amendment to IEEE's
Constitution . . . . . . . . . . . . . . 132--133
Anonymous IEEE President-Elect Candidates Address
Computer Society Concerns . . . . . . . 134--136
Anonymous Intuit Inc. . . . . . . . . . . . . . . 137--137
Anonymous Call and Calendar . . . . . . . . . . . 138--141
David Alan Grier Changing Trust . . . . . . . . . . . . . 156--156
Anonymous Computer Write for us . . . . . . . . . c3--c3
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous 31st IEEE International Parallel and
Distributed Processing Symposium . . . . c2--c2
Anonymous Rock Stars of Cybersecurity . . . . . . c4--c4
Anonymous New Membership Options for a Better Fit
[Advertisement] . . . . . . . . . . . . 2
Anonymous Achieve your career goals with the fit
that's right for you [Advertisement] . . 3
Anonymous Masthead . . . . . . . . . . . . . . . . 4
Anonymous Table of contents . . . . . . . . . . . 5--6
Anonymous IEEE Computer Society Membership . . . . 7
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 8--9
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 10--11
Paolo Montuschi and
Jean-Michel Muller Modern Computer Arithmetic . . . . . . . 12--12
Anonymous Call for Nominees Education Awards
Nominations . . . . . . . . . . . . . . 13
San Murugesan and
Bob Colwell Next-Generation Computing Paradigms . . 14--20
Krysta M. Svore and
Matthias Troyer The Quantum Future of Computation . . . 21--30
Rodney Van Meter and
Simon J. Devitt The Path to Scalable Distributed Quantum
Computing . . . . . . . . . . . . . . . 31--42
Victoria Coleman Embodied Molecular Computation:
Potential and Challenges . . . . . . . . 43--51
Xin-She Yang and
Suash Deb and
Simon Fong and
Xingshi He and
Yu-Xin Zhao From Swarm Intelligence to
Metaheuristics: Nature-Inspired
Optimization Algorithms . . . . . . . . 52--59
Sameer Saproo and
Josef Faller and
Victor Shih and
Paul Sajda and
Nicholas R. Waytowich and
Addison Bohannon and
Vernon J. Lawhern and
Brent J. Lance and
David Jangraw Cortically Coupled Computing: A New
Paradigm for Synergistic Human-Machine
Interaction . . . . . . . . . . . . . . 60--68
Lui Sha and
Marco Caccamo and
Renato Mancuso and
Jung-Eun Kim and
Man-Ki Yoon and
Rodolfo Pellizzoni and
Heechul Yun and
Russell B. Kegley and
Dennis R. Perlman and
Greg Arundale and
Richard Bradford Real-Time Computing on Multicore
Processors . . . . . . . . . . . . . . . 69--77
Massimo Maresca The Spreadsheet Space: Eliminating the
Boundaries of Data Cross-Referencing . . 78--85
Xing Zhang and
Zhenglei Yi and
Zhi Yan and
Geyong Min and
Wenbo Wang and
Ahmed Elmokashfi and
Sabita Maharjan and
Yan Zhang Social Computing for Mobile Big Data . . 86--90
Scott Campbell Teaching Cloud Computing . . . . . . . . 91--93
Greg Byrd Seeing Is Understanding . . . . . . . . 94--97
Apostol Vassilev and
Robert Staples Entropy as a Service: Unlocking
Cryptography's Full Potential . . . . . 98--102
Anonymous Facebook, Inc. House Advertisement . . . 103
Hal Berghel Coda in the Key of F2654hD4 . . . . . . 104--109
Sanjay K. Madria Security and Risk Assessment in the
Cloud . . . . . . . . . . . . . . . . . 110--113
Robert N. Charette Dragging Government Legacy Systems Out
of the Shadows . . . . . . . . . . . . . 114--119
Anonymous CS Connection . . . . . . . . . . . . . 120--121
Anonymous Call and Calendar . . . . . . . . . . . 122--125
Anonymous Career Opportunities . . . . . . . . . . 126--143
David Alan Grier The Means of Production . . . . . . . . 144
Anonymous The Universität der Bundeswehr München
[Advertisement] . . . . . . . . . . . . c2--1
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward IEEE Computer
Society Membership [Advertisement] . . . c3--c3
Anonymous SolidThinking . . . . . . . . . . . . . c4--c4
Anonymous Achieve your career goals with the fit
that's right for you . . . . . . . . . . 1
Anonymous Masthead . . . . . . . . . . . . . . . . 2
Anonymous Table of Contents . . . . . . . . . . . 3--4
Anonymous IEEE Computer Society Education . . . . 5
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 6--7
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 8--9
Simha Sethumadhavan Hardware-Enforced Privacy . . . . . . . 10
Anonymous COMPSAC 2017 --- ITiP Symposium . . . . 11
Charles Severance The Living Computer Museum . . . . . . . 12--13
Vladimir Getov and
Adolfy Hoisie and
Pradip Bose New Frontiers in Energy-Efficient
Computing [Guest Editors' introduction] 14--18
Anonymous IEEE Computer Society . . . . . . . . . 19
Xingfu Wu and
Valerie Taylor and
Jeanine Cook and
Philip J. Mucci Using Performance-Power Modeling to
Improve Energy Efficiency of HPC
Applications . . . . . . . . . . . . . . 20--29
Bilge Acun and
Akhil Langer and
Esteban Meneses and
Harshitha Menon and
Osman Sarood and
Ehsan Totoni and
Laxmikant V. Kale Power, Reliability, and Performance: One
System to Rule them All . . . . . . . . 30--37
Ryan E. Grant and
Michael Levenhagen and
Stephen L. Olivier and
David DeBonis and
Kevin T. Pedretti and
James H. Laros III Standardizing Power Monitoring and
Control at Exascale . . . . . . . . . . 38--46
Efraim Rotem and
Uri C. Weiser and
Avi Mendelson and
Ran Ginosar and
Eliezer Weissmann and
Yoni Aizik H-EARtH: Heterogeneous Multicore
Platform Energy Management . . . . . . . 47--55
Cory Merkel and
Raqibul Hasan and
Nicholas Soures and
Dhireesha Kudithipudi and
Tarek Taha and
Sapan Agarwal and
Matthew Marinella Neuromemristive Systems: Boosting
Efficiency through Brain-Inspired
Computing . . . . . . . . . . . . . . . 56--64
Gowtham Atluri and
Angus MacDonald III and
Kelvin O. Lim and
Vipin Kumar The Brain-Network Paradigm: Using
Functional Imaging Data to Study How the
Brain Works . . . . . . . . . . . . . . 65--71
David Linthicum Responsive Data Architecture for the
Internet of Things . . . . . . . . . . . 72--75
Erik P. DeBenedictis and
R. Stanley Williams Help Wanted: A Modern-Day Turing . . . . 76--79
Dimitris E. Simos and
Rick Kuhn and
Artemios G. Voyiatzis and
Raghu Kacker Combinatorial Methods in Security
Testing . . . . . . . . . . . . . . . . 80--83
Hal Berghel Douglas Jones on Today's Voting Machines 84--89
Giulio Jacucci Beyond Search Queries . . . . . . . . . 90--93
Ryan Lee Threatcasting . . . . . . . . . . . . . 94--95
Fridolin Wild The Future of Learning at the Workplace
Is Augmented Reality . . . . . . . . . . 96--98
Anonymous Call and Calendar . . . . . . . . . . . 99--102
Anonymous Career Opportunities . . . . . . . . . . 103--111
David Alan Grier Innovating for Tomorrow . . . . . . . . 112
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward IEEE Computer
Society Membership . . . . . . . . . . . c3--c3
Anonymous New Membership Options for a Better Fit c2--c2
Anonymous IEEE Computer Society Is Where You
Choose the Resources that Fit Your
Career House Advertisement . . . . . . . 1
Anonymous Masthead . . . . . . . . . . . . . . . . 2
Anonymous Table of Contents . . . . . . . . . . . 3--4
Anonymous IEEE Computer Society Technical
Committees . . . . . . . . . . . . . . . 5
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 6--7
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 8--9
Matthew B. Dwyer Finding Flaws in Natural Language
Requirements . . . . . . . . . . . . . . 10
Upkar Varshney and
Carl K. Chang Smart Health and Well-Being . . . . . . 11--13
S. Jay Olshansky and
Bruce A. Carnes and
Yang Claire Yang and
Norvell Miller and
Janet Anderson and
Hiram Beltran-Sanchez and
Karl Ricanek, Jr. The Future of Smart Health . . . . . . . 14--21
Noel Carroll Key Success Factors for Smart and
Connected Health Software Solutions . . 22--28
Gina Sprint and
Diane J. Cook and
Roschelle Fritz and
Maureen Schmitter-Edgecombe Using Smart Homes to Detect and Analyze
Health Events . . . . . . . . . . . . . 29--37
Shurouq Hijazi and
Alex Page and
Burak Kantarci and
Tolga Soyata Machine Learning in Cardiac Health
Monitoring and Decision Support . . . . 38--48
Xiang Su and
Jarkko Hyysalo and
Mika Rautiainen and
Jukka Riekki and
Jaakko Sauvola and
Altti Ilari Maarala and
Harri Hirvonsalo and
Pingjiang Li and
Harri Honko Privacy as a Service: Protecting the
Individual in Healthcare Data Processing 49--59
Humberto Cervantes and
Rick Kazman and
Jungwoo Ryoo and
Duyoung Choi and
Duksung Jang Architectural Approaches to Security:
Four Case Studies . . . . . . . . . . . 60--67
Po-Ching Lin and
Ying-Dar Lin and
Cheng-Ying Wu and
Yuan-Cheng Lai and
Yi-Chih Kao Balanced Service Chaining in
Software-Defined Networks with Network
Function Virtualization . . . . . . . . 68--76
Amir Banifatemi and
Jean-Luc Gaudiot Engineering the New Boundaries of AI . . 77--79
Vasant Dhar Equity, Safety, and Privacy in the
Autonomous Vehicle Era . . . . . . . . . 80--83
Alexander Kott and
Ananthram Swami and
Bruce J. West The Fog of War in Cyberspace . . . . . . 84--87
Greg Byrd Tactile Digital Braille Display . . . . 88--90
Hal Berghel Chasing Elbridge's Ghost: The Digital
Gerrymander . . . . . . . . . . . . . . 91--95
Dimitrios G. Kogias and
Michael G. Xevgenis and
Charalampos Z. Patrikakis Cloud Federation and the Evolution of
Cloud Computing . . . . . . . . . . . . 96--99
Anonymous Call and Calendar . . . . . . . . . . . 100--103
David Alan Grier ``I'm Not a Computer Scientist, but
\ldots . . . . . . . . . . . . . . . . . 104
Anonymous Call for Special Issue Proposals House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward IEEE Computer
Society Membership House Advertisement c4--c4
Anonymous New Membership Options for a Better Fit
House Advertisement . . . . . . . . . . c2--c2
Anonymous IEEE Computer Society Is Where You
Choose the Resources that Fit Your
Career . . . . . . . . . . . . . . . . . 1
Anonymous Masthead . . . . . . . . . . . . . . . . 2
Anonymous Table of Contents . . . . . . . . . . . 3--4
Anonymous IEEE Computer Society's
\booktitleComputer Magazine . . . . . . 5
Roger U. Fujii Our Journey to the Future . . . . . . . 6--9
Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 12--13
Anonymous Art of Hacking E-Learning Courses IEEE
Computer Society . . . . . . . . . . . . 14
Ali Jadbabaie Defining Data Clusters . . . . . . . . . 15
Roy Want and
Trevor Pering and
Yuvraj Agarwal Multidevice Interaction [Guest Editors'
introduction] . . . . . . . . . . . . . 16--20
Anonymous Call for Special Issue Proposals . . . . 21
Jarno Leppanen and
Mikko Pelkonen and
Haipeng Guo and
Samuli Hemminki and
Petteri Nurmi and
Sasu Tarkoma Collaborative and Energy-Efficient
Speech Monitoring on Smart Devices . . . 22--30
Anonymous Can You Invent a Better World through
Technology? . . . . . . . . . . . . . . 31
Carlo Pinciroli and
Giovanni Beltrame Swarm-Oriented Programming of
Distributed Robot Networks . . . . . . . 32--41
Timothy Neate and
Matt Jones and
Michael Evans Interdevice Media: Choreographing
Content to Maximize Viewer Engagement 42--49
Tomas Bures and
Frantisek Plasil and
Michal Kit and
Petr Tuma and
Nicklas Hoch Software Abstractions for Component
Interaction in the Internet of Things 50--59
Charith Perera and
Chang Liu and
Rajiv Ranjan and
Lizhe Wang and
Albert Y. Zomaya Privacy-Knowledge Modeling for the
Internet of Things: A Look Back . . . . 60--68
Anonymous Watch the World's Leading Experts Take
Multi-Core Strategies to New Heights . . 69
Alexander Kott and
Ananthram Swami and
Bruce J. West The Internet of Battle Things . . . . . 70--75
Erik P. DeBenedictis Computational Complexity and New
Computing Approaches . . . . . . . . . . 76--79
Vincent C. Hu and
Rick Kuhn Access Control Policy Verification . . . 80--83
Brian David Johnson So Long, and Thanks for All the Robots 84--85
Kenneth M. Zemrowski NIST Bases Flagship Security Engineering
Publication on ISO/IEC/IEEE 15288:2015 86--88
Anonymous Nominations are solicited for the
Seymour Cray, Sidney Fernbach & Ken
Kennedy awards . . . . . . . . . . . . . 89
Anonymous Kasahara Voted 2017 Computer Society
President-Elect . . . . . . . . . . . . 90--92
Anonymous Call and Calendar . . . . . . . . . . . 93--95
David Alan Grier Fifteen Years to Open Source . . . . . . 96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward IEEE Computer
Society Membership . . . . . . . . . . . c3--c3
Anonymous New Membership Options for a Better Fit c2--c2
Anonymous TechIgnite . . . . . . . . . . . . . . . c4--c4
Anonymous IEEE Computer Society Is Where You
Choose the Resources that Fit Your
Career House Advertisement . . . . . . . 1
Anonymous Masthead . . . . . . . . . . . . . . . . 2
Anonymous Table of Contents . . . . . . . . . . . 3--4
Jean-Luc Gaudiot 2017: The New Computer Society . . . . . 5--7
Shaoshan Liu and
James Peng and
Jean-Luc Gaudiot Computer, Drive My Car! . . . . . . . . 8
Anonymous ACM--IEEE CS Eckert--Mauchly Award House
Advertisement . . . . . . . . . . . . . 9
Erich Neuhold \booktitleComputer, January 1967 and
1992 . . . . . . . . . . . . . . . . . . 10--11
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 12--13
Sumi Helal \booktitleComputer's 50th Anniversary 14--18
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 19
Thomas M. Conte and
Erik P. DeBenedictis and
Paolo A. Gargini and
Elie Track Rebooting Computing: The Road Ahead . . 20--29
Mahadev Satyanarayanan The Emergence of Edge Computing . . . . 30--39
Antti Oulasvirta User Interface Design with Combinatorial
Optimization . . . . . . . . . . . . . . 40--47
Daqing Zhang and
Hao Wang and
Dan Wu Toward Centimeter-Scale Human Activity
Sensing with Wi-Fi Signals . . . . . . . 48--57
John Atkinson and
Alvaro Maurelia Redundancy-Based Trust in
Question-Answering Systems . . . . . . . 58--65
G. R. Gangadharan Open Source Solutions for Cloud
Computing . . . . . . . . . . . . . . . 66--70
Brian David Johnson The Impossible Thing . . . . . . . . . . 71
Jeffrey Voas and
Philip Laplante Curriculum Considerations for the
Internet of Things . . . . . . . . . . . 72--75
Nir Kshetri and
Jeffrey Voas Banking on Availability . . . . . . . . 76--80
Anonymous My CS House Advertisement . . . . . . . 81
Hal Berghel Software Sophistry and Political Sleight
of Hand . . . . . . . . . . . . . . . . 82--87
Anonymous CS Connection . . . . . . . . . . . . . 88--90
Anonymous Seymour Cray, Sidney Fernbach, & Ken
Kennedy Awards House Advertisement . . . 91
Anonymous Call and Calendar . . . . . . . . . . . 92--94
Anonymous Can You Invent a Better World through
Technologies? House Advertisement . . . 95
David Alan Grier Local Culture, Global Habits . . . . . . 96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward IEEE Computer
Society Membership House Advertisement c3--c3
Anonymous New Membership Options for a Better Fit
House Advertisement . . . . . . . . . . c2--c2
Anonymous TechIgnite: A Rock Star Technology Event
House Advertisement . . . . . . . . . . c4--c4
Anonymous IEEE Computer Society Is Where You
Choose the Resources that Fit Your
Career . . . . . . . . . . . . . . . . . 1
Anonymous Masthead . . . . . . . . . . . . . . . . 2
Anonymous Table of Contents . . . . . . . . . . . 3--4
Bruce McMillin and
Tao Zhang Fog Computing for Smart Living . . . . . 5
David Alan Grier Computer's First Issues and the First
Volunteer . . . . . . . . . . . . . . . 6--7
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 8--9
Peter A. Zientara and
Sooyeon Lee and
Gus H. Smith and
Rorry Brenner and
Laurent Itti and
Mary B. Rosson and
John M. Carroll and
Kevin M. Irick and
Vijaykrishnan Narayanan Third Eye: A Shopping Assistant for the
Visually Impaired . . . . . . . . . . . 16--24
Anonymous myCS House . . . . . . . . . . . . . . . 25
Florian Wahl and
Rui Zhang and
Martin Freund and
Oliver Amft Personalizing $3$D-Printed Smart
Eyeglasses to Augment Daily Life . . . . 26--35
Cheng Zhang and
Sinan Hersek and
Yiming Pu and
Danrui Sun and
Qiuyue Xue and
Thad E. Starner and
Gregory D. Abowd and
Omer T. Inan Bioacoustics-Based Human-Body-Mediated
Communication . . . . . . . . . . . . . 36--46
Anonymous ACM--IEEE CS Eckert--Mauchly Award . . . 47
Rajan Bhattacharyya and
Brian A. Coffman and
Jaehoon Choe and
Matthew E. Phillips Does Neurotechnology Produce a Better
Brain? . . . . . . . . . . . . . . . . . 48--58
Scott Jenson The Future IoT: Building Better Legos 68--71
Erik P. DeBenedictis It's Time to Redefine Moore's Law Again 72--75
Elisa Bertino and
Nayeem Islam Botnets and Internet of Things Security 76--79
Barry Brown The Social Life of Autonomous Cars . . . 92--96
Anonymous IEEE Computer Society 2017 Call for
Major Award Nominations . . . . . . . . 98
Anonymous Call for Nominees Education Awards
Nominations House Advertisement . . . . 103
Anonymous Move Your Career Forward IEEE Computer
Society Membership . . . . . . . . . . . c3--c3
Anonymous New Membership Options for a Better Fit c2--c2
Anonymous TechIgnite . . . . . . . . . . . . . . . c4--c4
Anonymous IEEE Computer Society is Where You
Choose the Resources that Fit Your
Career . . . . . . . . . . . . . . . . . 1
Anonymous Masthead . . . . . . . . . . . . . . . . 2
Anonymous Table of Contents . . . . . . . . . . . 3--4
Anonymous IEEE Computer Society Richard E. Merwin
Student Leadership Scholarship . . . . . 5
David Alan Grier When the Field was Young . . . . . . . . 6--7
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 8--9
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 10--11
Daniel J. Sorin Persistent Memory . . . . . . . . . . . 12
Anonymous Focus on Your Job Search . . . . . . . . 13
Katarzyna Wac and
Homero Rivas and
Maddalena Fiordelli Quality-of-Life Technologies . . . . . . 14--19
Mirana Randriambelonoro and
Yu Chen and
Pearl Pu Can Fitness Trackers Help Diabetic and
Obese Users Make and Sustain Lifestyle
Changes? . . . . . . . . . . . . . . . . 20--29
Aarti Sathyanarayana and
Jaideep Srivastava and
Luis Fernandez-Luque The Science of Sweet Dreams: Predicting
Sleep Efficiency from Wearable Device
Data . . . . . . . . . . . . . . . . . . 30--38
Anonymous Call for Nominees Education Awards
Nominations . . . . . . . . . . . . . . 39
Tongda Zhang and
Renate Fruchter and
Maria Frank Are They Paying Attention? A Model-Based
Method to Identify Individuals' Mental
States . . . . . . . . . . . . . . . . . 40--49
Adela C. Timmons and
Theodora Chaspari and
Sohyun C. Han and
Laura Perrone and
Shrikanth S. Narayanan and
Gayla Margolin Using Multimodal Wearable Technology to
Detect Conflict among Couples . . . . . 50--59
Eisa Zarepour and
Mohammadreza Hosseini and
Salil S. Kanhere and
Arcot Sowmya and
Hamid R. Rabiee Applications and Challenges of Wearable
Visual Lifeloggers . . . . . . . . . . . 60--69
Chuck Walrad Standards for the Enterprise IT
Profession . . . . . . . . . . . . . . . 70--73
Scooter Willis You Never Forget Your First Project . . 74--76
Anonymous Nominations are Solicited for the
Seymour Cray Sidney Fernbach & Ken
Kennedy Awards House Advertisement . . . 77
Angelos Stavrou and
Jeffrey Voas Verified Time . . . . . . . . . . . . . 78--82
Anonymous Conferences in the Palm of Your Hand . . 83
Hal Berghel On the Problem of (Cyber) Attribution 84--89
Steve Brown The New Diversity: Working with
Nonhumans . . . . . . . . . . . . . . . 90--91
Anonymous Call and Calendar . . . . . . . . . . . 92--94
Anonymous IEEE Computer Society 2017 Call for
Major Award Nominations . . . . . . . . 95
David Alan Grier Digital Trade . . . . . . . . . . . . . 96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward IEEE Computer
Society Membership . . . . . . . . . . . c3--c3
Anonymous New Membership Options for a Better Fit c2--c2
Anonymous TechIgnite . . . . . . . . . . . . . . . c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous Elsewhere in the CS . . . . . . . . . . 4--5
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 6
Sven Dietrich Cybersecurity and the Future . . . . . . 7
Stephen P. Morse The Intel 8086 Chip and the Future of
Microprocessor Design . . . . . . . . . 8--9
Charles Severance Resurrecting the CDC 6500 Supercomputer 10--12
Leila De Floriani A High-level Language for Interactive
Data Visualization . . . . . . . . . . . 13
Stefano Zanero Cyber-Physical Systems . . . . . . . . . 14--16
Gerry Howser and
Bruce McMillin Using Information-Flow Methods to
Analyze the Security of Cyber-Physical
Systems . . . . . . . . . . . . . . . . 17--26
Teodora Sanislav and
Sherali Zeadally and
George Dan Mois A Cloud-Integrated, Multilayered,
Agent-Based Cyber-Physical System
Architecture . . . . . . . . . . . . . . 27--37
Cesare Alippi and
Manuel Roveri The (Not) Far-Away Path to Smart
Cyber-Physical Systems: An
Information-Centric Framework . . . . . 38--47
Rolf Oppliger and
Gunther Pernul and
Sokratis Katsikas New Frontiers: Assessing and Managing
Security Risks . . . . . . . . . . . . . 48--51
Gaute Wangen Information Security Risk Assessment: A
Method Comparison . . . . . . . . . . . 52--61
Judith E. Y. Rossebo and
Reinder Wolthuis and
Frank Fransen and
Gunnar Bjorkman and
Nuno Medeiros An Enhanced Risk-Assessment Methodology
for Smart Grids . . . . . . . . . . . . 62--71
Pete Burnap and
Yulia Cherdantseva and
Andrew Blyth and
Peter Eden and
Kevin Jones and
Hugh Soulsby and
Kristan Stoddart Determining and Sharing Risk Data in
Distributed Interdependent Systems . . . 72--79
Zahid Akhtar and
Ajita Rattani A Face in any Form: New Challenges and
Opportunities for Face Recognition
Technology . . . . . . . . . . . . . . . 80--90
Ruben S. Montero and
Elisa Rojas and
Alfonso A. Carrillo and
Ignacio M. Llorente Extending the Cloud to the Network Edge 91--95
Erik P. DeBenedictis Computer Architecture's Changing Role in
Rebooting Computing . . . . . . . . . . 96--99
George Hurlburt Shining Light on the Dark Web . . . . . 100--105
Marta E. Cecchinato and
Anna L. Cox Smartwatches: Digital Handcuffs or Magic
Bracelets? . . . . . . . . . . . . . . . 106--109
Hal Berghel Alt-News and Post-Truths in the `Fake
News' Era . . . . . . . . . . . . . . . 110--114
Anonymous Call and Calendar . . . . . . . . . . . 115--119
David Alan Grier The Radical Technology of Industrie 4.0 120
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous myCS . . . . . . . . . . . . . . . . . . c4--c4
Anonymous Move Your Career Forward IEEE Computer
Society Membership . . . . . . . . . . . c3--c3
Anonymous New Membership Options for a Better Fit c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 6--7
Grace A. Lewis Cloud Computing . . . . . . . . . . . . 8--9
Giovanni De Micheli and
Luca Benini Networks on Chips: 15 Years Later . . . 10--11
Bjorn Schuller Can Affective Computing Save Lives? Meet
Mobile Health . . . . . . . . . . . . . 13
Carl K. Chang and
Sorel Reisman and
Edmundo Tovar Advances in Learning Technologies . . . 14--17
Austin Cory Bart and
Javier Tibau and
Eli Tilevich and
Clifford A. Shaffer and
Dennis Kafura BlockPy: An Open Access Data-Science
Environment for Introductory Programmers 18--26
Soroush Ghorashi and
Carlos Jensen Integrating Collaborative and Live
Coding for Distance Education . . . . . 27--35
Sujata Rani and
Parteek Kumar A Sentiment Analysis System to Improve
Teaching and Learning . . . . . . . . . 36--43
Toru Ishida and
Tetsuo Sawaragi and
Kumiyo Nakakoji and
Takushi Sogo Interdisciplinary Education for Design
Innovation . . . . . . . . . . . . . . . 44--52
Henry C. B. Chan Internet of Education Resources Using a
Chemistry-Inspired Framework . . . . . . 54--60
Yang Xie and
Chongxi Bao and
Ankur Srivastava Security-Aware 2.5D Integrated Circuit
Design Flow Against Hardware IP Piracy 62--71
Zoltan Adam Mann The Top Eight Misconceptions about
NP-Hardness . . . . . . . . . . . . . . 72--79
Richard E. Fairley and
Mary Jane Willshire Better Now Than Later: Managing
Technical Debt in Systems Development 80--87
Jeffrey Voas and
Rick Kuhn What Happened to Software Metrics? . . . 88--98
Brian David Johnson Sentient Tools and the Future of Work 99
Gary McGraw Six Tech Trends Impacting Software
Security . . . . . . . . . . . . . . . . 100--102
W. Richards Adrion How Computer Science Departments and
Faculty Can Contribute to the CS for All
Initiative . . . . . . . . . . . . . . . 103--105
Andrew C. Gray and
Eric M. Schwartz A Successful Approach to the 2016 RobotX
Challenge . . . . . . . . . . . . . . . 106--109
Nicholas A. Valentino and
John Leslie King and
Walter W. Hill Polling and Prediction in the 2016
Presidential Election . . . . . . . . . 110--115
Joanna Bryson and
Alan Winfield Standardizing Ethical Design for
Artificial Intelligence and Autonomous
Systems . . . . . . . . . . . . . . . . 116--119
Hal Berghel A Quick Take on Windows Security
Evolution . . . . . . . . . . . . . . . 120--124
Anonymous Call and Calendar . . . . . . . . . . . 125--129
Anonymous CS Connection . . . . . . . . . . . . . 130--131
David Alan Grier A Russian Tragedy . . . . . . . . . . . 132
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Lee Garber \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Lynette A. Jones A Haptic Compass for Navigation . . . . 6
Erich Neuhold Computer, June 1967 and 1992 . . . . . . 7
Tom Snyder and
Greg Byrd The Internet of Everything . . . . . . . 8--9
David Alan Grier The Yau Years: 1981--1984 . . . . . . . 10--11
Mark D. Hill and
Michael R. Marty Retrospective on Amdahl's Law in the
Multicore Era . . . . . . . . . . . . . 12--14
Anonymous myCS . . . . . . . . . . . . . . . . . . 15
Marilyn Wolf and
Saibal Mukhopadhyay VLSI for the Internet of Things . . . . 16--18
Chenguang Shen and
Mani Srivastava Exploring Hardware Heterogeneity to
Improve Pervasive Context Inferences . . 19--26
Mingze Gao and
Qian Wang and
Md Tanvir Arafin and
Yongqiang Lyu and
Gang Qu Approximate Computing for Low Power and
Security in the Internet of Things . . . 27--34
Mathias Soeken and
Pierre-Emmanuel Gaillardon and
Saeideh Shirinzadeh and
Rolf Drechsler and
Giovanni De Micheli A PLiM Computer for the Internet of
Things . . . . . . . . . . . . . . . . . 35--40
Aldo Romani and
Marco Tartagni and
Enrico Sangiorgi Doing a Lot with a Little: Micropower
Conversion and Management for
Ambient-Powered Electronics . . . . . . 41--49
Gagan Gupta and
Tony Nowatzki and
Vinay Gangadhar and
Karthikeyan Sankaralingam Kickstarting Semiconductor Innovation
with Open Source Hardware . . . . . . . 50--59
Patrick Eugster and
Chamikara Jayalath and
Kirill Kogan and
Julian Stephen Big Data Analytics beyond the Single
Datacenter . . . . . . . . . . . . . . . 60--68
Jeffrey Voas and
Phillip A. Laplante The IoT Blame Game . . . . . . . . . . . 69--73
Jennifer Davis Marketing and Engineering --- Working
across the Aisle . . . . . . . . . . . . 74--75
Erik P. DeBenedictis and
Jesse K. Mee and
Michael P. Frank The Opportunities and Controversies of
Reversible Computing . . . . . . . . . . 76--80
Hsiu-Chuan Huang and
Zhi-Kai Zhang and
Hao-Wen Cheng and
Shiuhpyng Winston Shieh Web Application Security: Threats,
Countermeasures, and Pitfalls . . . . . 81--85
Harold Thimbleby Improve IT, Improve Healthcare . . . . . 86--91
Justin Riley and
John Noss and
Wes Dillingham and
James Cuff and
Ignacio M. Llorente A High-Availability Cloud for Research
Computing . . . . . . . . . . . . . . . 92--95
Anonymous CS Connection . . . . . . . . . . . . . 96--98
Anonymous Call and Calendar . . . . . . . . . . . 99--103
David Alan Grier Global Connections . . . . . . . . . . . 104
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward IEEE Computer
Society Membership . . . . . . . . . . . c3--c3
Anonymous New Membership Options for a Better Fit c2--c2
Anonymous Prepare to Connect . . . . . . . . . . . c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--5
Anonymous New Membership Options For a Better Fit 6
Anonymous Achieve your career goals with the fit
that's right for you . . . . . . . . . . 7
Anonymous Computer, July 1967 and 1992 . . . . . . 8--9
Rick Kazman Software Engineering . . . . . . . . . . 10--11
Jorg Henkel and
Paolo Montuschi Computer Engineers' Challenges for the
Next Decade: The Triangle of Power
Density, Circuit Degradation, and
Reliability . . . . . . . . . . . . . . 12
Scooter Willis and
Greg Byrd and
Brian David Johnson Challenge-Based Learning . . . . . . . . 13--16
Nancy Boyer Inspiring the Next Generation of
Scientists and Engineers: K--12 and
Beyond . . . . . . . . . . . . . . . . . 17--19
Lindsey Hitchcock Greenpower: Racing to a STEM Finish . . 20--22
Randy Swearer Industry-Backed Competitions: Helping
Today's Students Prepare for Tomorrow's
Careers . . . . . . . . . . . . . . . . 23--25
Anonymous Low-Cost High-Altitude Ballooning . . . 26--28
Randy Scheid Code4GoodPBC: Bridging the Gap between
Innovation and Philanthropy . . . . . . 29--31
Richard S. Thomas Using Design Slam to Foster Lifelong
Learning Solutions . . . . . . . . . . . 32--33
Anonymous Call For Nominees . . . . . . . . . . . 34
Juan C. SanMiguel and
Andrea Cavallaro Networked Computer Vision: The
Importance of a Holistic Simulator . . . 35--43
Jorg Liebig and
Sven Apel and
Andreas Janker and
Florian Garbe and
Sebastian Oster Handling Static Configurability in
Refactoring Engines . . . . . . . . . . 44--53
Liliana Pasquale and
Carlo Ghezzi and
Edoardo Pasi and
Christos Tsigkanos and
Menouer Boubekeur and
Blanca Florentino-Liano and
Tarik Hadzic and
Bashar Nuseibeh Topology-Aware Access Control of Smart
Spaces . . . . . . . . . . . . . . . . . 54--63
Yamini Allu and
Fred Douglis and
Mahesh Kamat and
Philip Shilane and
Hugo Patterson and
Ben Zhu Backup to the Future: How Workload and
Hardware Changes Continually Redefine
Data Domain File Systems . . . . . . . . 64--72
Anonymous Move Your Career Forward . . . . . . . . 73
Mohammad A. Salahuddin and
Ala Al-Fuqaha and
Mohsen Guizani and
Khaled Shuaib and
Farag Sallabi Softwarization of Internet of Things
Infrastructure for Secure and Smart
Healthcare . . . . . . . . . . . . . . . 74--79
Constantinos Kolias and
Georgios Kambourakis and
Angelos Stavrou and
Jeffrey Voas DDoS in the IoT: Mirai and Other Botnets 80--84
Natalie Vanatta Envisioning the Future to Empower Action 85
Hal Berghel Which Is More Dangerous --- the Dark Web
or the Deep State? . . . . . . . . . . . 86--91
Al Crouch and
Michael Laisne and
Martin Keim Generalizing Access to Instrumentation
Embedded in a Semiconductor Device . . . 92--95
Sorel Reisman Teaching vs. Research--Optimizing Your
Contribution for Society's Well-Being 96--98
Scooter Willis Stand on the Shoulders of Giants . . . . 99--102
Anonymous CS Connection . . . . . . . . . . . . . 103--105
Anonymous Call and Calendar . . . . . . . . . . . 106--111
David Alan Grier Connecting to Nigeria . . . . . . . . . 112
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society 2017 Call for
Major Award Nominations . . . . . . . . c3--c3
Anonymous One membership. Unlimited knowledge . . c4--c4
Anonymous Prepare to Connect . . . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
David Alan Grier The Better Mix: 1985--1990 . . . . . . . 4--5
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 6--7
Pascal Guitton and
Philippe Nain and
François Sillion Inria: From Cold-War Computing to
Digital Sciences . . . . . . . . . . . . 8--12
Anonymous IEEE Computer Society Information . . . 13
Erik P. DeBenedictis Computer Design Starts Over . . . . . . 14--17
Shaoshan Liu and
Jie Tang and
Zhe Zhang and
Jean-Luc Gaudiot Computer Architectures for Autonomous
Driving . . . . . . . . . . . . . . . . 18--25
Rathijit Sen and
David A. Wood Energy-Proportional Computing: A New
Definition . . . . . . . . . . . . . . . 26--33
Fei Xia and
Ashur Rafiev and
Ali Aalsaud and
Mohammed Al-Hayanni and
James Davis and
Joshua Levine and
Andrey Mokhov and
Alexander Romanovsky and
Rishad Shafik and
Alex Yakovlev and
Sheng Yang Voltage, Throughput, Power, Reliability,
and Multicore Scaling . . . . . . . . . 34--45
Ike Nassi Scaling the Computer to the Problem:
Application Programming with Unlimited
Memory . . . . . . . . . . . . . . . . . 46--51
Christof Teuscher The Weird, the Small, and the
Uncontrollable: Redefining the Frontiers
of Computing . . . . . . . . . . . . . . 52--58
Anonymous IEEE Computer Society Richard E. Merwin
Student Leadership Scholarship . . . . . 59
Andreas Stefik and
Stefan Hanenberg Methodological Irregularities in
Programming-Language Research . . . . . 60--63
John Hagel and
John Seely Brown Shaping Strategies for the IoT . . . . . 64--68
Anonymous Sustaining Moore's law with $3$D chips 69--73
Kate Netkachova and
Robin Bloomfield Is Chocolate Good for You --- or, Is the
Cloud Secure? . . . . . . . . . . . . . 74--78
Anonymous Upsilon Pi Epsilon Student Excellence
Award: Up to Four \$1,000 Awards . . . . 79
Anonymous IEEE Computer Society Election . . . . . 80--93
Anonymous IEEE Division VIII Delegate/Director
Candidates . . . . . . . . . . . . . . . 94--95
Anonymous IEEE President-Elect Candidates Address
Computer Society Concerns . . . . . . . 96--100
Anonymous CS Connection . . . . . . . . . . . . . 101--103
David Alan Grier The Lingua Franca of Technology . . . . 104
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Looking for the BEST Tech Job for You? c2--c2
Anonymous Move Your Career Forward IEEE Computer
Society Membership . . . . . . . . . . . c3--c3
Anonymous One membership. Unlimited knowledge . . c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--7
Ann DeMarle Let Us Entertain You . . . . . . . . . . 8--9
Kenneth Magel Revisiting the Impact of the Ada
Programming Language . . . . . . . . . . 10--11
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 12--13
Philip Treleaven and
Richard Gendal Brown and
Danny Yang Blockchain Technology in Finance . . . . 14--17
Tomaso Aste and
Paolo Tasca and
Tiziana Di Matteo Blockchain Technologies: The Foreseeable
Impact on Society and Industry . . . . . 18--28
Chris Khan and
Antony Lewis and
Emily Rutland and
Clemens Wan and
Kevin Rutter and
Clark Thompson A Distributed-Ledger Consortium Model
for Collaborative Innovation . . . . . . 29--37
Ittay Eyal Blockchain Technology: Transforming
Libertarian Cryptocurrency Dreams to
Finance and Banking Realities . . . . . 38--49
Daniele Magazzeni and
Peter McBurney and
William Nash Validation and Verification of Smart
Contracts: A Research Agenda . . . . . . 50--57
Michael Bedford Taylor The Evolution of Bitcoin Hardware . . . 58--66
Fariborz Farahmand The Importance of Human Information
Processing: A Behavioral Economics Model
for Predicting Domain Name Choice . . . 67--74
Anonymous Stay Connected . . . . . . . . . . . . . 75
Mohiuddin Ahmed Thwarting DoS Attacks: A Framework for
Detection based on Collective Anomalies
and Clustering . . . . . . . . . . . . . 76--82
Mark Embury and
Jan Clayton Standardization and Certification
Challenges for Biopharmaceutical Plants 83--86
Hal Berghel Oh, What a Tangled Web: Russian Hacking,
Fake News, and the 2016 US Presidential
Election . . . . . . . . . . . . . . . . 87--91
Chii Chang and
Satish Narayana Srirama and
Rajkumar Buyya Indie Fog: An Efficient Fog-Computing
Infrastructure for the Internet of
Things . . . . . . . . . . . . . . . . . 92--98
Anonymous IEEE Computer Society Information . . . 99
Hyunji Chung and
Michaela Iorga and
Jeffrey Voas and
Sangjin Lee ``Alexa, Can I Trust You?'' . . . . . . 100--104
David Alan Grier Bringing the Benefits Home . . . . . . . 105
Kyle Rakos and
Alex Ruffino and
Charles Li and
Katherine Mao and
Luke McBee and
Ryan McBee and
Matt Molo and
Sanay Shah and
Ian Sibley and
Tyler Stagge Purdue University Team Tackles Global
Underwater-Vehicle Competition . . . . . 106--110
Anonymous Looking for the BEST Tech Job for You? 111
Julie Jenson Bennett The Meanings in the Machine . . . . . . 112
Anonymous Achieve your career goals with the fit
that's right for you . . . . . . . . . . c2--c2
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Move Your Career Forward IEEE Computer
Society Membership . . . . . . . . . . . c4--c4
Anonymous One membership. Unlimited knowledge . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--7
Ben Shneiderman Revisiting the Astonishing Growth of
Human--Computer Interaction Research . . 8--11
David B. Lomet The Future of Data Management . . . . . 12--13
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 14--15
Antti Oulasvirta On-Skin Interfaces . . . . . . . . . . . 16--18
Jurgen Steimle and
Joanna Bergstrom-Lehtovirta and
Martin Weigel and
Aditya Shekhar Nittala and
Sebastian Boring and
Alex Olwal and
Kasper Hornbak On-Skin Interaction Using Body Landmarks 19--27
Pedro Lopes and
Patrick Baudisch Interactive Systems Based on Electrical
Muscle Stimulation . . . . . . . . . . . 28--35
Mahadev Satyanarayanan Edge Computing . . . . . . . . . . . . . 36--38
Anonymous One membership. Unlimited knowledge . . 39
Guenter Klas Edge Computing and the Role of Cellular
Networks . . . . . . . . . . . . . . . . 40--49
Peng Liu and
Lance Hartung and
Suman Banerjee Lightweight Multitenancy at the
Network's Extreme Edge . . . . . . . . . 50--57
Ganesh Ananthanarayanan and
Paramvir Bahl and
Peter Bodik and
Krishna Chintalapudi and
Matthai Philipose and
Lenin Ravindranath and
Sudipta Sinha Real-Time Video Analytics: The Killer
App for Edge Computing . . . . . . . . . 58--67
Hal Berghel Net Neutrality Reloaded . . . . . . . . 68--72
Brian David Johnson The Weaponization of AI: A Glimpse into
Future Threats . . . . . . . . . . . . . 73
Erik P. DeBenedictis $3$D Software: A New Research Imperative 74--77
Jeffrey Voas and
Nir Kshetri Human Tagging . . . . . . . . . . . . . 78--85
Robert N. Charette Low Clearance Ahead: Can Predictable IT
Crashes Be Avoided? . . . . . . . . . . 86--91
Jie Tang and
Dawei Sun and
Shaoshan Liu and
Jean-Luc Gaudiot Enabling Deep Learning on IoT Devices 92--96
Anonymous IEEE Computer Society . . . . . . . . . 97
Gregory W. Hislop and
Heidi J. C. Ellis Humanitarian Open Source Software in
Computing Education . . . . . . . . . . 98--101
Albrecht Schmidt Technologies to Amplify the Mind . . . . 102--106
Anonymous \booktitleIEEE Transactions on Cloud
Computing . . . . . . . . . . . . . . . 107
David Alan Grier Keeping the Internet Global . . . . . . 108
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society: Be at the Center
of It All . . . . . . . . . . . . . . . c2--c2
Anonymous Looking for the BEST Tech Job for You? c3--c3
Anonymous Prepare to Connect . . . . . . . . . . . c4--c4
Anonymous Table of contents . . . . . . . . . . . 1--2
Anonymous [Masthead] . . . . . . . . . . . . . . . 3
Anonymous Highlights Society Magazines . . . . . . 4--7
Nancy G. Leveson The Therac-25: 30 Years Later . . . . . 8--11
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 12--13
Michael Beigl and
Florian Michahelles and
Hide Tokuda and
Steve Hodges Programming the World . . . . . . . . . 14--17
Fulvio Corno and
Luigi De Russis and
Alberto Monge Roffarello A Semantic Web Approach to Simplifying
Trigger-Action Programming in the IoT 18--24
Anonymous IEEE Computer Society . . . . . . . . . 25
Jack Hodges and
Kimberly Garcia and
Steven Ray Semantic Development and Integration of
Standards for Adoption and
Interoperability . . . . . . . . . . . . 26--36
Anonymous IEEE Transactions on Sustainable
Computing . . . . . . . . . . . . . . . 37
Thomas Kubitza and
Albrecht Schmidt meSchup: A Platform for Programming
Interconnected Smart Things . . . . . . 38--49
Henry B. Wolfe The Mobile Phone as Surveillance Device:
Progress, Perils, and Protective
Measures . . . . . . . . . . . . . . . . 50--58
Anonymous Stay connected . . . . . . . . . . . . . 59
Roja Bandari and
Zicong Zhou and
Hai Qian and
Timothy R. Tangherlini and
Vwani P. Roychowdhury A Resistant Strain: Revealing the Online
Grassroots Rise of the Antivaccination
Movement . . . . . . . . . . . . . . . . 60--67
Daniel Lam and
Ethan Stillman and
Anthony Cariello and
Andrew McCorkle and
Ahmed Fouad A High School Team's Hard Road to
Success in an International Engineering
Competition . . . . . . . . . . . . . . 68--71
Hal Berghel The New Science Wars . . . . . . . . . . 72--76
David Alan Grier A More National Technology . . . . . . . 77
Paul Grassi and
Mike Garcia and
Katie Boeckl Government Adopts an Industry Approach
to Open Source Collaboration . . . . . . 78--81
Adam L. Young and
Moti Yung On Ransomware and Envisioning the Enemy
of Tomorrow . . . . . . . . . . . . . . 82--85
Patricia Takako Endo and
Guto Leoni Santos and
Daniel Rosendo and
Demis Moacir Gomes and
Andre Moreira and
Judith Kelner and
Djamel Sadok and
Glauco Estacio Goncalves and
Mozhgan Mahloo Minimizing and Managing Cloud Failures 86--90
Brian David Johnson The Future of Shopping: An Eerie
Silence? . . . . . . . . . . . . . . . . 91
Anonymous CS Connection . . . . . . . . . . . . . 92--93
Anonymous IEEE Transactions on Big Data . . . . . 94
Anonymous IEEE Transactions on Multi-Scale
Computing Systems . . . . . . . . . . . 95
Peter Brusilovsky Toward Flexible MOOCs: Student-Sourcing
of Learning Content at Scale . . . . . . 96
Anonymous IEEE Computer Society: Be at the Center
of It All . . . . . . . . . . . . . . . c2--c2
Anonymous Looking for the BEST Tech Job for You? c4--c4
Anonymous myCS . . . . . . . . . . . . . . . . . . c3--c3
Anonymous Table of contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Jean-Luc Gaudiot Embracing Changes . . . . . . . . . . . 4--6
Hausi A. Muller The Rise of Intelligent Cyber-Physical
Systems . . . . . . . . . . . . . . . . 7--9
David Patterson Reduced Instruction Set Computers Then
and Now . . . . . . . . . . . . . . . . 10--12
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 13--15
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 16--17
Mike Daily and
Swarup Medasani and
Reinhold Behringer and
Mohan Trivedi Self-Driving Cars . . . . . . . . . . . 18--23
Ernst D. Dickmanns Developing the Sense of Vision for
Autonomous Road Vehicles at UniBwM . . . 24--31
Mina J. Hanna and
Shawn C. Kimmel Current US Federal Policy Framework for
Self-Driving Vehicles: Opportunities and
Challenges . . . . . . . . . . . . . . . 32--40
Anonymous IEEE Computer Society . . . . . . . . . 41
Shaoshan Liu and
Jie Tang and
Chao Wang and
Quan Wang and
Jean-Luc Gaudiot A Unified Cloud Platform for Autonomous
Driving . . . . . . . . . . . . . . . . 42--49
Nirav Ajmeri and
Chung-Wei Hang and
Simon D. Parsons and
Munindar P. Singh Aragorn: Eliciting and Maintaining
Secure Service Policies . . . . . . . . 50--58
Anonymous COMPSAC 2018 . . . . . . . . . . . . . . 59
William Knowles and
Jose M. Such and
Antonios Gouglidis and
Gaurav Misra and
Awais Rashid All That Glitters Is Not Gold: On the
Effectiveness of Cybersecurity
Qualifications . . . . . . . . . . . . . 60--71
Hal Berghel Equifax and the Latest Round of Identity
Theft Roulette . . . . . . . . . . . . . 72--76
Chris Arkenberg The Future of Intelligent Assistants . . 77
Georgios Karakonstantis and
Dimitrios S. Nikolopoulos and
Dimitris Gizopoulos and
Pedro Trancoso and
Yiannakis Sazeides and
Christos D. Antonopoulos and
Srikumar Venugopal and
Shidhartha Das Error-Resilient Server Ecosystems for
Edge and Cloud Datacenters . . . . . . . 78--81
John A. Stankovic and
James W. Sturges and
Jon Eisenberg A 21st Century Cyber-Physical Systems
Education . . . . . . . . . . . . . . . 82--85
Erik P. DeBenedictis Plotting a Socially Responsible Course
for Computers Using Cybersecurity as an
Example . . . . . . . . . . . . . . . . 86--90
Nir Kshetri and
Jeffrey Voas Hacking Power Grids: A Current Problem 91--95
Alexander Kott and
David S. Alberts How Do You Command an Army of
Intelligent Things? . . . . . . . . . . 96--100
Anonymous Metra Voted 2018 Computer Society
President-Elect . . . . . . . . . . . . 101--103
David Alan Grier The Subway to China . . . . . . . . . . 104
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society: Be at the Center
of It All . . . . . . . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . c3--c3
Anonymous Looking for the BEST Tech Job for You? c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Hironori Kasahara Satisfaction and Sustainability . . . . 4--6
Anonymous \booktitleIEEE Transactions on Big Data 7
Anonymous Highlights Society Magazines . . . . . . 8--10
Anonymous \booktitleIEEE Cloud Computing Call for
Papers . . . . . . . . . . . . . . . . . 11
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 12--13
Sumi Helal 2018 Outlook: The Emerging Web and
Information Sciences . . . . . . . . . . 14--16
Anonymous myCS . . . . . . . . . . . . . . . . . . 17
Wendy Hall and
Ramine Tinati and
Will Jennings From Brexit to Trump: Social Media's
Role in Democracy . . . . . . . . . . . 18--27
Wojciech Szpankowski and
Ananth Grama Frontiers of Science of Information:
Shannon Meets Turing . . . . . . . . . . 28--38
Anonymous IEEE Computer Society . . . . . . . . . 39
C. Gordon Bell and
Ike Nassi Revisiting Scalable Coherent Shared
Memory . . . . . . . . . . . . . . . . . 40--49
Hong Mei and
Yao Guo Toward Ubiquitous Operating Systems: A
Software-Defined Perspective . . . . . . 50--56
Dario Bruneo and
Salvatore Distefano and
Francesco Longo and
Giovanni Merlino and
Antonio Puliafito I/Ocloud: Adding an IoT Dimension to
Cloud Infrastructures . . . . . . . . . 57--65
Tanusree Chatterjee and
Sushmita Ruj and
Sipra Das Bit Security Issues in Named Data Networks 66--75
Connor Tingley and
George Serwin and
Rohan Tuli and
Jenya Kirsch Posner and
Celvi Lisy and
Lily Bresee and
Keaton Viadro and
Chip Morimoto Turning an International Competition
into a Valuable Learning Experience . . 76--79
Jeffrey Voas and
Rick Kuhn and
Celia Paulsen and
Kim Schaffer Educating Next-Gen Computer Scientists 80--88
Hal Berghel Disinformatics: The Discipline behind
Grand Deceptions . . . . . . . . . . . . 89--93
Apostol Vassilev and
Nicky Mouha and
Luis Brandao Psst, Can You Keep a Secret? . . . . . . 94--97
Anonymous CS Connection . . . . . . . . . . . . . 98--102
Anonymous Got flaws? . . . . . . . . . . . . . . . 103
Nathan Shedroff Self-Managing Real Estate . . . . . . . 104
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society: Be at the Center
of It All . . . . . . . . . . . . . . . c2--c2
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . c3--c3
Anonymous Looking for the BEST Tech Job for You? c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous Highlights Society Magazines . . . . . . 4--7
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 8--9
Bruce McMillin Software Engineering . . . . . . . . . . 10--12
David Harel and
Guy Katz and
Rami Marelly and
Assaf Marron Wise Computing: Toward Endowing System
Development with Proactive Wisdom . . . 14--26
Alexander Egyed and
Klaus Zeman and
Peter Hehenberger and
Andreas Demuth Maintaining Consistency across
Engineering Artifacts . . . . . . . . . 28--35
Ivan Handler Data Sharing Defined --- Really! . . . . 36--42
Stergios Papadimitriou and
Lefteris Moussiades Mac OS versus FreeBSD: A Comparative
Evaluation . . . . . . . . . . . . . . . 44--53
Roman Beck Beyond Bitcoin: The Rise of Blockchain
World . . . . . . . . . . . . . . . . . 54--58
Gary McGraw The New Killer App for Security:
Software Inventory . . . . . . . . . . . 60--62
Hal Berghel Bruce Schneier on Future Digital Threats 64--67
Erik P. DeBenedictis A Future with Quantum Machine Learning 68--71
Rajendra K. Raj and
Allen Parrish Toward Standards in Undergraduate
Cybersecurity Education in 2018 . . . . 72--75
Amitangshu Pal and
Krishna Kant IoT-Based Sensing and Communications
Infrastructure for the Fresh Food Supply
Chain . . . . . . . . . . . . . . . . . 76--80
F. D. Wright Standards: Engaging for the Future . . . 81--83
Anonymous CS Connection . . . . . . . . . . . . . 84--87
Anonymous Computer WRITE FOR US . . . . . . . . . 88
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society Information . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous Highlights Society Magazines . . . . . . 4--6
Anonymous IEEE Computer Society . . . . . . . . . 7
Daniel J. Sorin Low-Power Content Addressable Memory . . 8--9
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 10--11
Oresti Banos and
Christopher Nugent E-Coaching for Health . . . . . . . . . 12--15
Sergio F. Ochoa and
Francisco J. Gutierrez Architecting E-Coaching Systems: A First
Step for Dealing with Their Intrinsic
Design Complexity . . . . . . . . . . . 16--23
Julie M. Robillard and
Jesse Hoey Emotion and Motivation in Cognitive
Assistive Technologies for Dementia . . 24--34
Anonymous Impact a broader audience . . . . . . . 35
Paolo Pilloni and
Luca Piras and
Salvatore Carta and
Gianni Fenu and
Fabrizio Mulas and
Ludovico Boratto Recommender System Lets Coaches Identify
and Help Athletes Who Begin Losing
Motivation . . . . . . . . . . . . . . . 36--42
Mario O. Parra and
Jesus Favela and
Luis A. Castro and
Arturo Morales Monitoring Eating Behaviors for a
Nutritionist E-Assistant Using
Crowdsourcing . . . . . . . . . . . . . 43--51
Chit-Kwan Lin and
Andreas Wild and
Gautham N. Chinya and
Yongqiang Cao and
Mike Davies and
Daniel M. Lavery and
Hong Wang Programming Spiking Neural Networks on
Intel's Loihi . . . . . . . . . . . . . 52--61
Scooter Willis The Maker Revolution . . . . . . . . . . 62--65
Hal Berghel Trolling Pathologies . . . . . . . . . . 66--69
Dimitrios Serpanos The Cyber-Physical Systems Revolution 70--73
Nir Kshetri and
Jeffrey Voas Hacking's Brand-Equity Nexus . . . . . . 74--77
Anonymous CS Connection . . . . . . . . . . . . . 78--80
Anonymous Connect on Interface . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society: Be at the Center
of It All . . . . . . . . . . . . . . . c3--c3
Anonymous Share the gift of knowledge: Give Your
Favorite Student a Membership to the
IEEE Computer Society! . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous Letters . . . . . . . . . . . . . . . . 4--7
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 8--10
Anonymous IEEE Computer Society Information . . . 11
Ronald F. DeMara and
Paolo Montuschi Non-Volatile Memory Trends: Toward
Improving Density and Energy Profiles
across the System Stack . . . . . . . . 12--13
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 14--15
Daniel Prince Cybersecurity: The Security and
Protection Challenges of Our Digital
World . . . . . . . . . . . . . . . . . 16--19
Sulabh Bhattarai and
Yong Wang End-to-End Trust and Security for
Internet of Things Applications . . . . 20--27
Zhen Ni and
Qianmu Li and
Gang Liu Game-Model-Based Network Security Risk
Control . . . . . . . . . . . . . . . . 28--38
Anonymous Impact a broader audience . . . . . . . 39
Yongsuk Lee and
Gyungho Lee Detecting Code Reuse Attacks with Branch
Prediction . . . . . . . . . . . . . . . 40--47
Anonymous Recognizing Excellence in High
Performance Computing Nominations are
Solicited for the Seymour Cray, Sidney
Fernbach, and Ken Kennedy Awards . . . . 48
Anonymous Take the CS Library wherever you go! . . 49
Kristofer E. Bouchard and
James B. Aimone and
Miyoung Chun and
Thomas Dean and
Michael Denker and
Markus Diesmann and
David D. Donofrio and
Loren M. Frank and
Narayanan Kasthuri and
Christof Koch and
Oliver Rubel and
Horst D. Simon and
F. T. Sommer and
Prabhat International Neuroscience Initiatives
through the Lens of High-Performance
Computing . . . . . . . . . . . . . . . 50--59
Konstantin Rubinov and
Luciano Baresi What Are We Missing When Testing Our
Android Apps? . . . . . . . . . . . . . 60--68
Anonymous \booktitleIEEE Transactions on Big Data 69
Hal Berghel Weaponizing Twitter Litter:
Abuse-Forming Networks and Social Media 70--73
Thomas M. Conte and
Erik P. DeBenedictis and
Avi Mendelson and
Dejan Milojicic Rebooting Computers to Avoid Meltdown
and Spectre . . . . . . . . . . . . . . 74--77
Mina J. Hanna Net Neutrality: A Brief Overview of the
Policy and the FCC's Ruling to Upend It 78--81
Chung-Kuan Chen and
Zhi-Kai Zhang and
Shan-Hsin Lee and
Shiuhpyng Shieh Penetration Testing in the IoT Age . . . 82--85
Jeffrey Voas and
Phillip A. Laplante IoT's Certification Quagmire . . . . . . 86--89
Jon Rosdahl Computer Society Standards Drive
Industry . . . . . . . . . . . . . . . . 90--94
Anonymous Looking for the BEST Tech Job for You? 95
Anonymous CS Connection . . . . . . . . . . . . . 96
Anonymous Connect on Interface . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society: Be at the Center
of It All . . . . . . . . . . . . . . . c3--c3
Anonymous Share the Gift of Knowledge: Give Your
Favorite Student a Membership to the
IEEE Computer Society! . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous Highlights Society Magazines . . . . . . 4--6
Anonymous 2018 CSI-IEEE CS Joint Education Award 7
Leila De Floriani Globe Browsing in OpenSpace . . . . . . 8--9
Erich Neuhold Computer, 1968 and 1993 . . . . . . . . 10--11
Nicholas D. Lane and
Pete Warden The Deep (Learning) Transformation of
Mobile and Embedded Computing . . . . . 12--16
Anonymous 2019 Richard E. Merwin Award for
Distinguished Service . . . . . . . . . 17
Andreas Moshovos and
Jorge Albericio and
Patrick Judd and
Alberto Delmas Lascorz and
Sayeh Sharify and
Zissis Poulos and
Tayler Hetherington and
Tor Aamodt and
Natalie Enright Jerger Exploiting Typical Values to Accelerate
Deep Learning . . . . . . . . . . . . . 18--30
Anonymous IEEE Computer Society Harlan D. Mills
Award . . . . . . . . . . . . . . . . . 31
Shuochao Yao and
Yiran Zhao and
Aston Zhang and
Shaohan Hu and
Huajie Shao and
Chao Zhang and
Lu Su and
Tarek Abdelzaher Deep Learning for the Internet of Things 32--41
Seyed Ali Osia and
Ali Shahin Shamsabadi and
Ali Taheri and
Hamid R. Rabiee and
Hamed Haddadi Private and Scalable Personal Data
Analytics Using Hybrid Edge-to-Cloud
Deep Learning . . . . . . . . . . . . . 42--49
Thomas Plotz and
Yu Guan Deep Learning for Human Activity
Recognition in Mobile Computing . . . . 50--59
Jagmohan Chauhan and
Suranga Seneviratne and
Yining Hu and
Archan Misra and
Aruna Seneviratne and
Youngki Lee Breathing-Based Authentication on
Resource-Constrained IoT Devices using
Recurrent Neural Networks . . . . . . . 60--67
Jungmo Ahn and
Huynh Nguyen Loc and
Rajesh Krishna Balan and
Youngki Lee and
JeongGil Ko Finding Small-Bowel Lesions: Challenges
in Endoscopy-Image-Based Learning
Systems . . . . . . . . . . . . . . . . 68--76
Anonymous Call for Nominees Education Awards
Nominations . . . . . . . . . . . . . . 77
Robert N. Charette Puncturing Pernicious Project Pufferies 78--83
Hal Berghel Malice Domestic: The Cambridge Analytica
Dystopia . . . . . . . . . . . . . . . . 84--89
Marilyn Wolf Computing in the Real World Is the
Grandest of Challenges . . . . . . . . . 90--91
Nir Kshetri and
Jeffrey Voas Cyberthreats under the Bed . . . . . . . 92--95
Anonymous IEEE Computer Society . . . . . . . . . 96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous 2019 IEEE-CS Charles Babbage Award . . . c4--c4
Anonymous myCS . . . . . . . . . . . . . . . . . . c2--c2
Anonymous Recognizing Excellence in High
Performance Computing Nominations are
Solicited for the Seymour Cray Sidney
Fernbach & Ken Kennedy Awards . . . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous Highlights Society Magazines . . . . . . 4--6
Bjorn Schuller What Affective Computing Reveals about
Autistic Children's Facial Expressions
of Joy or Fear . . . . . . . . . . . . . 7--8
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 9--10
Anonymous Looking for the BEST Tech Job for You? 11
James Hendler and
Wendy Hall and
Noshir Contractor Web Science: Now More Than Ever . . . . 12--17
Kyungsik Han and
Hyunggu Jung and
Jin Yea Jang and
Dongwon Lee Understanding Users' Privacy Attitudes
through Subjective and Objective
Assessments: An Instagram Case Study . . 18--28
Anonymous 2019 IEEE-CS Charles Babbage Award . . . 29
John Gastil and
Sascha D. Meinrath Bringing Citizens and Policymakers
Together Online: Imagining the
Possibilities and Taking Stock of
Privacy and Transparency Hazards . . . . 30--40
Anonymous 2019 Richard E. Merwin Award for
Distinguished Service . . . . . . . . . 41
Daye Nam and
Mayank Kejriwal How Do Organizations Publish Semantic
Markup? Three Case Studies Using Public
\tt Schema.org Crawls . . . . . . . . . 42--51
Jun Sun and
Steffen Staab and
Jerome Kunegis Understanding Social Networks Using
Transfer Learning . . . . . . . . . . . 52--60
Anonymous IEEE Letters of the Computer Society . . 61
Carleen F. Maitland Now You See It, Now You Don't: Digital
Connectivity in Marginalized Communities 62--71
Toru Ishida and
Yohei Murakami and
Donghui Lin and
Takao Nakaguchi and
Masayuki Otani Language Service Infrastructure on the
Web: The Language Grid . . . . . . . . . 72--81
Erik P. DeBenedictis Accelerated Architectures Create
Programming Opportunities . . . . . . . 82--85
Kristen Greene and
Michelle Steves and
Mary Theofanos No Phishing beyond This Point . . . . . 86--89
Trevor Pering and
Kathy Farrington and
Thorsten Dahm Taming the IoT: Operationalized Testing
to Secure Connected Devices . . . . . . 90--94
Anonymous IEEE Computer Society . . . . . . . . . 95
Richard Vedder Benefits of College---By Degrees . . . . 96--99
F. D. Wright and
Thomas M. Conte Standards: Roadmapping Computer
Technology Trends Enlightens Industry 100--103
Anonymous CS Connection . . . . . . . . . . . . . 104
Anonymous Call for Nominees Education Awards
Nominations . . . . . . . . . . . . . . c3--c3
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society Harlan D. Mills
Award . . . . . . . . . . . . . . . . . c4--c4
Anonymous Share the Gift of Knowledge: Give Your
Favorite Student a Membership to the
IEEE Computer Society! . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Ayten Ozge Akmandor and
Niraj K. Jha Detecting and Alleviating Stress with
SoDA . . . . . . . . . . . . . . . . . . 4--5
Anonymous Highlights Society Magazines . . . . . . 6--8
Anonymous IEEE Computer Society Information . . . 9
Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 10--11
Jeffrey Voas and
Rick Kuhn and
Constantinos Kolias and
Angelos Stavrou and
Georgios Kambourakis Cybertrust in the IoT Age . . . . . . . 12--15
Rodrigo Roman-Castro and
Javier Lopez and
Stefanos Gritzalis Evolution and Trends in IoT Security . . 16--25
Natalija Vlajic and
Daiwei Zhou IoT as a Land of Opportunity for DDoS
Hackers . . . . . . . . . . . . . . . . 26--34
Anonymous IEEE Computer Society Harlan D. Mills
Award . . . . . . . . . . . . . . . . . 35
Weizhi Meng Intrusion Detection in the Era of IoT:
Building Trust via Traffic Filtering and
Sampling . . . . . . . . . . . . . . . . 36--43
Jose Maria de Fuentes and
Lorena Gonzalez-Manzano and
Agusti Solanas and
Fatbardh Veseli Attribute-Based Credentials for
Privacy-Aware Smart Health Services in
IoT-Based Smart Cities . . . . . . . . . 44--53
Jatinder Singh and
Christopher Millard and
Chris Reed and
Jennifer Cobbe and
Jon Crowcroft Accountability in the IoT: Systems, Law,
and Ways Forward . . . . . . . . . . . . 54--65
Ryan Gary Kim and
Janardhan Rao Doppa and
Partha Pratim Pande and
Diana Marculescu and
Radu Marculescu Machine Learning and Manycore Systems
Design: A Serendipitous Symbiosis . . . 66--77
Timothy Buzzelli University of Central Florida Takes the
Bronze at Annual International
Programming Competition . . . . . . . . 78--81
Rick Kuhn and
Mohammad Raunak and
Raghu Kacker Can Reducing Faults Prevent
Vulnerabilities? . . . . . . . . . . . . 82--85
Hal Berghel Newton's Great Insight . . . . . . . . . 86--90
Yoshihiro Shiroishi and
Kunio Uchiyama and
Norihiro Suzuki Society 5.0: For Human Security and
Well-Being . . . . . . . . . . . . . . . 91--95
Anonymous CS Connection . . . . . . . . . . . . . 96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous 2019 Richard E. Merwin Award for
Distinguished Service . . . . . . . . . c4--c4
Anonymous Share the Gift of Knowledge: Give Your
Favorite Student a Membership to the
IEEE Computer Society! . . . . . . . . . c2--c2
Anonymous TCHPC IEEE Computer Society Technical
Consortium on High Performance Computing c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Patrick Schaumont and
Paolo Montuschi The Rise of Hardware Security in
Computer Architectures . . . . . . . . . 4--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--8
Anonymous Call for Nominees Education Awards
Nominations . . . . . . . . . . . . . . 9
Anonymous \booktitleComputer, August 1968 and 1993 10--12
Anonymous 2019 Richard E. Merwin Award for
Distinguished Service . . . . . . . . . 13
Oresti Banos and
Chris Nugent M-Coaching: Towards the Next Generation
of Mobile-Driven Healthcare Support
Services . . . . . . . . . . . . . . . . 14--17
Mauro Tschanz and
Tim Lucas Dorner and
Jurgen Holm and
Kerstin Denecke Using eMMA to Manage Medication . . . . 18--25
Haolin Wang and
Qingpeng Zhang and
Mary Ip and
Joseph Tak Fai Lau Social Media-based Conversational Agents
for Health Management and Interventions 26--33
Simo Hosio and
Jaro Karppinen and
Niels van Berkel and
Jonas Oppenlaender and
Jorge Goncalves Mobile Decision Support and Data
Provisioning for Low Back Pain . . . . . 34--43
Hal Berghel and
Daniel Berleant The Online Trolling Ecosystem . . . . . 44--51
Erik P. DeBenedictis A Role for IEEE in Quantum Computing . . 52--55
Jim Isaak and
Mina J. Hanna User Data Privacy: Facebook, Cambridge
Analytica, and Privacy Protection . . . 56--59
Robin Bloomfield and
Peter Bishop and
Eoin Butler and
Robert Stroud Security-Informed Safety: Supporting
Stakeholders with Codes of Practice . . 60--65
Roy Want and
Wei Wang and
Stan Chesnutt Accurate Indoor Location for the IoT . . 66--70
Anonymous IEEE Computer Society . . . . . . . . . 71
Anonymous IEEE Computer Society Election . . . . . 72--85
Anonymous IEEE Division V Delegate/Director
Candidates . . . . . . . . . . . . . . . 86--87
Anonymous IEEE President-Elect Candidates Address
Computer Society Concerns . . . . . . . 88--93
Anonymous CS Connection . . . . . . . . . . . . . 94--96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous 2019 IEEE-CS Charles Babbage Award . . . c4--c4
Anonymous IEEE Computer Society: Be at the Center
of It All . . . . . . . . . . . . . . . c2--c2
Anonymous IEEE Computer Society Harlan D. Mills
Award . . . . . . . . . . . . . . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous Computer Highlights Society Magazines 4--6
Anonymous Stay connected . . . . . . . . . . . . . 7
Jaideep Vaidya Privacy-Preserving Statistics . . . . . 8--9
Anonymous IEEE Letters of the Computer Society . . 10
Anonymous September, 1968 and 1993 . . . . . . . . 11--12
Anonymous Call for Nominees Education Awards
Nominations . . . . . . . . . . . . . . 13
Sumi Helal The Expanding Frontier of Artificial
Intelligence . . . . . . . . . . . . . . 14--17
Plamen P. Angelov and
Xiaowei Gu Toward Anthropomorphic Machine Learning 18--27
Hani Hagras Toward Human-Understandable, Explainable
AI . . . . . . . . . . . . . . . . . . . 28--36
Anonymous 2018 CSI-IEEE CS Joint Education Award 37
Dagmar Schuller and
Bjorn W. Schuller The Age of Artificial Emotional
Intelligence . . . . . . . . . . . . . . 38--46
Anonymous IEEE Computer Society Harlan D. Mills
Award . . . . . . . . . . . . . . . . . 47
Thang N. Dinh and
My T. Thai AI and Blockchain: A Disruptive
Integration . . . . . . . . . . . . . . 48--53
Wasim Ahmad Bhat Is a Data-Capacity Gap Inevitable in Big
Data Storage? . . . . . . . . . . . . . 54--62
Anonymous Looking for the BEST Tech Job for You? 63
Mahbub Hassan and
Wen Hu and
Guhao Lan and
Aruna Seneviratne and
Sara Khalifa and
Sajal K. Das Kinetic-Powered Health Wearables:
Challenges and Opportunities . . . . . . 64--74
Anonymous IEEE Transactions on Big Data . . . . . 75
Rolf Ernst Automated Driving: The Cyber-Physical
Perspective . . . . . . . . . . . . . . 76--79
George Hurlburt Toward Applied Cyberethics . . . . . . . 80--84
Anonymous IEEE Computer Society . . . . . . . . . 85
Florence Hudson and
Chris Clark Wearables and Medical Interoperability:
The Evolving Frontier . . . . . . . . . 86--90
Anonymous Computer WRITE FOR US . . . . . . . . . 91
Anonymous CS Connection . . . . . . . . . . . . . 92--96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous 2019 IEEE-CS Charles Babbage Award . . . c4--c4
Anonymous IEEE COMPUTER SOCIETY: Be at the Center
of It All . . . . . . . . . . . . . . . c2--c2
Anonymous 2019 Richard E. Merwin Award for
Distinguished Service . . . . . . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Staff List . . . . . . . . . . . . . . . 3
Lori Cameron [Elsewhere in the CS] . . . . . . . . . 4--6
Erich Neuhold [50 & 25 Years Ago] . . . . . . . . . . . 7--9
Oleg Sokolsky and
Nicola Bezzo Resiliency in Cyber-Physical Systems
[Guest Editors' Introduction] . . . . . 10--12
Darren Cofer and
Andrew Gacek and
John Backes and
Michael W. Whalen and
Lee Pike and
Adam Foltzer and
Michal Podhradsky and
Gerwin Klein and
Ihor Kuz and
June Andronick and
Gernot Heiser and
Douglas Stuart A Formal Approach to Constructing Secure
Air Vehicle Software . . . . . . . . . . 14--23
Tarek Abdelzaher and
Nora Ayanian and
Tamer Basar and
Suhas Diggavi and
Jana Diesner and
Deepak Ganesan and
Ramesh Govindan and
Susmit Jha and
Tancrede Lepoint and
Benjamin Marlin and
Klara Nahrstedt and
David Nicol and
Raj Rajkumar and
Stephen Russell and
Sanjit Seshia and
Fei Sha and
Prashant Shenoy and
Mani Srivastava and
Gaurav Sukhatme and
Ananthram Swami and
Paulo Tabuada and
Don Towsley and
Nitin Vaidya and
Venu Veeravalli Toward an Internet of Battlefield
Things: A Resilience Perspective . . . . 24--36
Varun Badrinath Krishna and
Ziping Wu and
Vaidehi V. Ambardekar and
Richard Macwan and
William H. Sanders Cyberattacks on Primary Frequency
Response Mechanisms in Power Grids . . . 37--45
Yuchang Won and
Buyeon Yu and
Jaegeun Park and
In-Hee Park and
Haegeon Jeong and
Jeanseong Baik and
Kyungtae Kang and
Insup Lee and
Sang Hyuk Son and
Kyung-Joon Park and
Yongsoon Eun An Attack-Resilient CPS Architecture for
Hierarchical Control: A Case Study on
Train Control Systems . . . . . . . . . 46--55
Mohammad Shihabul Haque and
Daniel Jun Xian Ng and
Arvind Easwaran and
Karthikeyan Thangamariappan Contract-Based Hierarchical Resilience
Management for Cyber-Physical Systems 56--65
Tanesh Kumar and
Pawani Porambage and
Ijaz Ahmad and
Madhusanka Liyanage and
Erkki Harjula and
Mika Ylianttila Securing Gadget-Free Digital Services 66--77
Sylvain Halle and
Raphael Khoury and
Mewena Awesso Streamlining the Inclusion of Computer
Experiments In a Research Paper . . . . 78--89
Hal Bergel Election Integrity 2018: Are We Better
Off Than We Were in 2016? [Aftershock] 90--94
Christos Koulamas and
Athanasios Kalogeras Cyber-Physical Systems and Digital Twins
in the Industrial Internet of Things
[Cyber-Physical Systems] . . . . . . . . 95--98
Nir Kshetri Cryptocurrencies: Transparency Versus
Privacy [Cybertrust] . . . . . . . . . . 99--111
Hal Berghel The Genesis of Postmodern Disinformatics
[Out of Band] . . . . . . . . . . . . . 102--105
Claudio Lima Developing Open and Interoperable
DLT/Blockchain Standards [Standards] . . 106--111
Anonymous IEEE Computer Society information . . . 112
Anonymous Front Cover . . . . . . . . . . . . . . C1
Anonymous Front cover . . . . . . . . . . . . . . ??
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . ??
Lori Cameron [Elsewhere in the CS] . . . . . . . . . 4--6
Erich Neuhold Computer, December 1968 and 1993 [50 & 25
Years Ago] . . . . . . . . . . . . . . . 7--9
Yasha Wang and
Katsuyuki Yamazaki Governments in the Age of Big Data and
Smart Cities [Guest Editors'
Introduction] . . . . . . . . . . . . . 10--12
Anonymous IEEE Computer Society information . . . ??
Takahiro Sumitomo and
Noboru Koshizuka Progress and Initiatives for Open Data
Policy in Japan . . . . . . . . . . . . 14--23
Hui Gao and
Chi Harold Liu and
Wendong Wang Hybrid Vehicular Crowdsourcing With
Driverless Cars: Challenges and a
Solution . . . . . . . . . . . . . . . . 24--31
Leye Wang and
Bin Guo and
Qiang Yang Smart City Development With Urban
Transfer Learning . . . . . . . . . . . 32--41
Jiangtao Wang and
Junfeng Zhao and
Yong Zhang and
Xin Peng and
Ying Li and
Yun Xie Enabling Human-Centric Smart Cities:
Crowdsourcing-Based Practice in China 42--49
Noboru Koshizuka and
Stephan Haller and
Ken Sakamura CPaaS.io: An EU--Japan Collaboration on
Open Smart-City Platforms . . . . . . . 50--58
Nir Kshetri Blockchain and Electronic Healthcare
Records [Cybertrust] . . . . . . . . . . 59--63
Ju Wang and
Xiaojiang Chen and
Dingyi Fang and
Jie Xiong and
Hongbo Jiang and
Rajesh Krishna Balan Material Identification and Target
Imaging with RFIDs [IoT Connection] . . 64--68
Erik P. DeBenedictis and
Michael P. Frank The National Quantum Initiative Will
Also Benefit Classical Computers
[Rebooting Computing] . . . . . . . . . 69--73
Anonymous De Floriani Voted 2019 IEEE Computer
Society President-Elect [Report to
Members] . . . . . . . . . . . . . . . . 74--76
Anonymous [CS Connection] . . . . . . . . . . . . 78--80
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Cecilia Metra The 2019 IEEE Computer Society:
Targeting Member Satisfaction and
Technical Excellence . . . . . . . . . . 4--6
Lori Cameron \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 7--9
Erich Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 10--12
David Alan Grier A revolutionary outlook [EIC's Message] 13--14
Anonymous \booktitleIEEE Software Call For
Articles . . . . . . . . . . . . . . . . 14
Anonymous IEEE Computer Society . . . . . . . . . 15
Elisa Bertino and
Shawn Merrill and
Alina Nesen and
Christine Utz Redefining Data Transparency: A
Multidimensional Approach . . . . . . . 16--26
Ben Shneiderman and
Catherine Plaisant Interactive Visual Event Analytics:
Opportunities and Challenges . . . . . . 27--35
Dong Wang and
Boleslaw K. Szymanski and
Tarek Abdelzaher and
Heng Ji and
Lance Kaplan The Age of Social Sensing . . . . . . . 36--45
Jiangtao Wang and
Yasha Wang and
Qin Lv Crowd-Assisted Machine Learning: Current
Issues and Future Directions . . . . . . 46--53
Marilyn Wolf Computer Security as Civil Defense . . . 54--57
Anonymous Erratum [for ``Toward
Human-Understandable, Explainable AI''] 57
Nir Kshetri and
Jeffrey Voas Online Advertising Fraud . . . . . . . . 58--61
Anonymous \booktitleIEEE Transactions on Big Data 61
Lu Dai and
Stan Krolikoski A unique collaboration: revitalizing
existing standards while preparing for
the future . . . . . . . . . . . . . . . 62--65
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 65
Hal Berghel Vehicle Telematics: The Good, Bad and
Ugly . . . . . . . . . . . . . . . . . . 66--70
Anonymous B. Ramakrishna Rau Award . . . . . . . . 71
Hironori Kasahara Collaboration for the Future . . . . . . 72--76
Anonymous Front Cover . . . . . . . . . . . . . . C1
Anonymous ACM/IEEE CS Eckert--Mauchly Award . . . C2
Anonymous IEEE Computer Society Interface . . . . C3
Anonymous IEEE Computer Society Jobs Board . . . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Bjoern Schuller Microexpressions: A Chance for Computers
to Beat Humans at Detecting Hidden
Emotions? . . . . . . . . . . . . . . . 4--5
Anonymous \booktitleIEEE Security & Privacy
Subscription . . . . . . . . . . . . . . 5
Lori Cameron \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--8
Erich Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 9--11
Anonymous \booktitleIEEE Transactions on Big Data 11
David Alan Grier Holding Us Together . . . . . . . . . . 12--13
Anonymous Call For Articles Software Magazine . . 13
Vard Antinyan and
Anna B. Sandberg and
Miroslaw Staron A Pragmatic View on Code Complexity
Management . . . . . . . . . . . . . . . 14--22
Anonymous \booktitleIT Professional Call for
Articles . . . . . . . . . . . . . . . . 22
Kjell J. Hole and
Christian Otterstad Software Systems With Antifragility to
Downtime . . . . . . . . . . . . . . . . 23--31
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 31
Philip Treleaven and
Jeremy Barnett and
Adriano Koshiyama Algorithms: Law and Regulation . . . . . 32--40
K. Siddique and
Z. Akhtar and
F. Aslam Khan and
Y. Kim KDD Cup 99 Data Sets: A Perspective on
the Role of Data Sets in Network
Intrusion Detection Research . . . . . . 41--51
Anonymous \booktitleIEEE Computer Graphics &
Applications Subscription . . . . . . . 51
Kirk M. Bresniker and
Paolo Faraboschi and
Avi Mendelson and
Dejan Milojicic and
Timothy Roscoe and
Robert N. M. Watson Rack-Scale Capabilities: Fine-Grained
Protection for Large-Scale Memories . . 52--62
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 62
Amitangshu Pal and
Krishna Kant NFMI: Connectivity for Short-Range IoT
Applications . . . . . . . . . . . . . . 63--67
Anonymous \booktitleIEEE Intelligent Systems . . . 67
Anonymous \booktitleIEEE Multimedia . . . . . . . 67
Rick Kuhn and
Dylan Yaga and
Jeffrey Voas Rethinking Distributed Ledger Technology 68--72
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous B. Ramakrishna Rau Award . . . . . . . . C2--C2
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Computer Society Job Boards . . . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Albert Y. Zomaya A Novel Hierarchical Two-Tier
Node-Deployment Strategy for Sustainable
Wireless Sensor Networks . . . . . . . . 4--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--8
Anonymous IT Professional Call for Articles . . . 8--8
Anonymous \booktitleIT Professional Call for
Articles . . . . . . . . . . . . . . . . 8
Erich Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 9--11
David Alan Grier Learning to Live in an Insecure World 12--13
Anonymous \booktitleSecurity & Privacy Subscribe 13--13
Ann Sobel and
Allen Parrish and
Rajendra K. Raj Curricular Foundations for Cybersecurity 14--17
Anonymous \booktitleIEEE Transactions on Big Data 17--17
Matthew Hudnall Educational and Workforce Cybersecurity
Frameworks: Comparing, Contrasting, and
Mapping . . . . . . . . . . . . . . . . 18--28
Diana L. Burley and
Alfred H. Lewis Jr. Cybersecurity Curricula 2017 and Boeing:
Linking Curricular Guidance to
Professional Practice . . . . . . . . . 29--37
David Gibson and
Vijay Anand and
Josh Dehlinger and
Charles Dierbach and
Tracy Emmersen and
Andrew Phillips Accredited Undergraduate Cybersecurity
Degrees: Four Approaches . . . . . . . . 38--47
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 47--47
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 47
Tracy Emmersen and
Joseph M. Hatfield and
Jeff Kosseff and
Steven R. Orr IV The USNA's Interdisciplinary Approach to
Cybersecurity Education . . . . . . . . 48--57
Jean R. S. Blair and
Andrew O. Hall and
Edward Sobiesk Educating Future Multidisciplinary
Cybersecurity Teams . . . . . . . . . . 58--66
Jessica Ivy and
Sarah B. Lee and
Dana Franz and
Joseph Crumpton Seeding Cybersecurity Workforce Pathways
With Secondary Education . . . . . . . . 67--75
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 75--75
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 75
Hal Berghel Codes of Ethics in a Post-Truth World 76--80
Robert N. Charette Evolving From Know-How to Know-What . . 81--86
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 86--86
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 86
Nir Kshetri and
Jeffrey Voas Trusting Pirated Software . . . . . . . 87--90
Anonymous Front Cover . . . . . . . . . . . . . . C1
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous Letters of the Computer Society . . . . C2
Anonymous Letters of the Computer Society . . . . C2--C2
Anonymous IEEE Computer Society information . . . C3--C3
Anonymous IEEE Computer Society Jobs Board . . . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--6
Anonymous \booktitleIEEE Software & Privacy . . . . 6--6
E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 7--9
Anonymous \booktitleIEEE Software Call for
Articles . . . . . . . . . . . . . . . . 9--9
D. A. Grier The Path Across the Great Deep . . . . . 10--11
Anonymous \booktitleIEEE Transactions on Big Data 11--11
N. Nag and
R. Jain A Navigational Approach to Health:
Actionable Guidance for Improved Quality
of Life . . . . . . . . . . . . . . . . 12--20
J. M. Such and
P. Ciholas and
A. Rashid and
J. Vidler and
T. Seabrook Basic Cyber Hygiene: Does It Work? . . . 21--31
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 31--31
G. P. De Francesco The General Data Protection Regulation's
Practical Impact on Software
Architecture . . . . . . . . . . . . . . 32--39
K. Fawaz and
K. G. Shin Security and Privacy in the Internet of
Things . . . . . . . . . . . . . . . . . 40--49
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 49--49
F. Farahmand and
F. Farahmand Privacy Decision Making: The Brain
Approach . . . . . . . . . . . . . . . . 50--58
Anonymous \booktitleIEEE Computer Graphics &
Applications Subscribe . . . . . . . . . 58--58
D. Riehle The Innovations of Open Source . . . . . 59--63
Anonymous IT Professional Call for Articles . . . 63--63
N. Kshetri and
J. Voas Thoughts on Cyberbullying . . . . . . . 64--68
Anonymous \booktitleIEEE Persuasive Computing Call
for Articles . . . . . . . . . . . . . . 68--68
J. C. Havens and
A. Hessami From Principles and Standards to
Certification . . . . . . . . . . . . . 69--72
Anonymous Erratum . . . . . . . . . . . . . . . . 72--72
Anonymous \booktitleIEEE MultiMedia . . . . . . . 72--72
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE World Congress on Services 2019 . . C2--C2
Anonymous \booktitleIEEE Computer Society
information . . . . . . . . . . . . . . C3--C3
Anonymous COMPSAC 2019 . . . . . . . . . . . . . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--6
Anonymous IEEE World Congress on Services 2019 . . 6--6
E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 7--10
Anonymous \booktitleComputer Graphics &
Applications Subscribe . . . . . . . . . 10--10
D. A. Grier A Familiar Vision . . . . . . . . . . . 11--12
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 12--12
V. N. Gudivada and
S. Pankanti and
G. Seetharaman and
Y. Zhang Cognitive Computing Systems: Their
Potential and the Future . . . . . . . . 13--18
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 18--18
Anonymous Letters of the Computer Society . . . . 19--19
M. V. DeBole and
B. Taba and
A. Amir and
F. Akopyan and
A. Andreopoulos and
W. P. Risk and
J. Kusnitz and
C. Ortega Otero and
T. K. Nayak and
R. Appuswamy and
P. J. Carlson and
A. S. Cassidy and
P. Datta and
S. K. Esser and
G. J. Garreau and
K. L. Holland and
S. Lekuch and
M. Mastro and
J. McKinstry and
C. di Nolfo and
B. Paulovicks and
J. Sawada and
K. Schleupen and
B. G. Shaw and
J. L. Klamo and
M. D. Flickner and
J. V. Arthur and
D. S. Modha TrueNorth: Accelerating From Zero to 64
Million Neurons in 10 Years . . . . . . 20--29
S. D. Pyle and
J. D. Sapp and
R. F. DeMara Leveraging Stochasticity for In Situ
Learning in Binarized Deep Neural
Networks . . . . . . . . . . . . . . . . 30--39
Anonymous Subscribe to \booktitleSecurity & Privacy
Magazine . . . . . . . . . . . . . . . . 39--39
N. Rasiwasia Perspectives on Becoming an Applied
Machine Learning Scientist . . . . . . . 40--47
Z. Ma and
J. Wu and
S. Zhong and
J. Jiang and
S. J. Heinen Human Eye Movements Reveal Video Frame
Importance . . . . . . . . . . . . . . . 48--57
S. O. Hwang and
A. Mehmood Blockchain-Based Resource Syndicate . . 58--66
B. Rinner Can We Trust Smart Cameras? . . . . . . 67--70
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 70--70
Anonymous \booktitleSecurity & Privacy Magazine . . 71--71
L. M. Morman How Do We Prepare the Next Generation
for a Career in Our Digital Era? . . . . 72--74
Anonymous \booktitleIEEE Intelligent Systems
Magazine . . . . . . . . . . . . . . . . 74--74
Anonymous \booktitleIEEE MultiMedia Magazine . . . 74--74
Anonymous \booktitleIEEE Transactions on Big Data 75--75
Anonymous CS Connection . . . . . . . . . . . . . 76--76
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Website Launch . . C2--C2
Anonymous IEEE Computer Society information . . . C3--C3
Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
J. Vaidya Advances in Hardware Trojan Detection 4--5
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 5--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--8
Anonymous \booktitleIEEE Security & Privacy
Magazine Subscribe . . . . . . . . . . . 8--8
E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 9--11
Anonymous \booktitleIEEE Software Magazine Call
For Articles . . . . . . . . . . . . . . 11--11
D. A. Grier Exploring the Current State of Quantum
Computing . . . . . . . . . . . . . . . 12--12
T. S. Humble and
E. P. DeBenedictis Quantum Realism . . . . . . . . . . . . 13--17
Anonymous \booktitleIEEE Transactions on Big Data 17--17
R. Shaydulin and
H. Ushijima-Mwesigwa and
C. F. A. Negre and
I. Safro and
S. M. Mniszewski and
Y. Alexeev A Hybrid Approach for Solving
Optimization Problems on Small Quantum
Computers . . . . . . . . . . . . . . . 18--26
A. Paler and
D. Herr and
S. J. Devitt Really Small Shoe Boxes: On Realistic
Quantum Resource Estimation . . . . . . 27--37
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 37--37
C. C. McGeoch and
R. Harris and
S. P. Reinhardt and
P. I. Bunyk Practical Annealing-Based Quantum
Computing . . . . . . . . . . . . . . . 38--46
S. Hu and
P. Liu and
C. R. Chen and
M. Pistoia and
J. Gambetta Reduction-Based Problem Mapping for
Quantum Computing . . . . . . . . . . . 47--57
P. Liu and
S. Hu and
M. Pistoia and
C. R. Chen and
J. M. Gambetta Stochastic Optimization of Quantum
Programs . . . . . . . . . . . . . . . . 58--67
Anonymous \booktitleIEEE IT Professionals Call for
Articles . . . . . . . . . . . . . . . . 67--67
G. F. Hurlburt The Tyranny of Urgency . . . . . . . . . 68--72
Anonymous \booktitleIEEE Computer Graphics &
Applications Magazine . . . . . . . . . 72--72
P. Laplante and
S. Applebaum NIST's 18 Internet of Things Trust
Concerns . . . . . . . . . . . . . . . . 73--76
Anonymous Social Networking . . . . . . . . . . . 77--77
D. Serpanos There Is No Safety Without Security and
Dependability . . . . . . . . . . . . . 78--81
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 81--81
M. Ballhausen Free and Open Source Software Licenses
Explained . . . . . . . . . . . . . . . 82--86
Anonymous \booktitleIEEE Intelligent Systems
Magazine . . . . . . . . . . . . . . . . 86--86
Anonymous IEEE Jobs Board . . . . . . . . . . . . 87--87
D. Wright Meeting Industry's Standardization Needs 88--92
Anonymous \booktitleIEEE MultiMedia Magazine . . . 92--92
Anonymous IEEE Letters of the Computer Society . . 93--93
Anonymous CS Connections . . . . . . . . . . . . . 94--96
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE World Congress on Services 2019 . . C2--C2
Anonymous IEEE Computer Society information . . . C3--C3
Anonymous \booktitleSecurity & Privacy Magazine . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--6
E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 7--9
D. A. Grier Transforming the Field . . . . . . . . . 10--11
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 11--11
M. Youssef and
F. Kawsar Transformative Computing and
Communication . . . . . . . . . . . . . 12--14
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 14--14
Anonymous IEEE Computer Society Technical
Consortium on High Performance Computing 15--15
M. Alloulah and
H. Huang Future Millimeter-Wave Indoor Systems: A
Blueprint for Joint Communication and
Sensing . . . . . . . . . . . . . . . . 16--24
S. Savazzi and
S. Sigg and
F. Vicentini and
S. Kianoush and
R. Findling On the Use of Stray Wireless Signals for
Sensing: a Look Beyond 5G for the Next
Generation of Industry . . . . . . . . . 25--36
Anonymous \booktitleIEEE Software Call for
Articles . . . . . . . . . . . . . . . . 36--36
M. Satyanarayanan and
N. Davies Augmenting Cognition Through Edge
Computing . . . . . . . . . . . . . . . 37--46
Anonymous \booktitleIEEE Multimedia Magazine . . . 46--46
L. Moreno and
P. Martinez The Harmonization of Accessibility
Standards for Public Policies . . . . . 57--66
Anonymous \booktitleIEEE Transactions on Big Data 66--66
G. C. Bowker The Computerization Time Crunch . . . . 67--71
Anonymous \booktitleIEEE Security & Privacy
Subscription . . . . . . . . . . . . . . 71--71
M. T. Khan and
H. Shrobe Security of Cyberphysical Systems:
Chaining Induction and Deduction . . . . 72--75
J. D. Roth and
C. E. Lutton and
J. B. Michael Security Through Simplicity: a Case
Study in Logical Segmentation Inference 76--79
Anonymous CS Connections . . . . . . . . . . . . . 80--83
Anonymous IT Professional Call For Papers . . . . 83--83
Anonymous IEEE Computer Society information . . . 84--84
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Job Board . . . . C2--C2
Anonymous IEEE Computer Society Social Networking C3--C3
Anonymous \booktitleIEEE Computing Edge Magazine C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Job Boards . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
K. Mueller Advances in Visualization Recommender
Systems . . . . . . . . . . . . . . . . 4--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--8
E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 9--11
E. Akleman Computing Through Time . . . . . . . . . 10--10
D. A. Grier Go/No Go . . . . . . . . . . . . . . . . 12--13
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 13--13
M. Villari and
M. Fazio and
S. Dustdar and
O. Rana and
D. N. Jha and
R. Ranjan Osmosis: The Osmotic Computing Platform
for Microelements in the Cloud, Edge,
and Internet of Things . . . . . . . . . 14--26
H. Silva Borges and
M. T. Valente How Do Developers Promote Open Source
Projects? . . . . . . . . . . . . . . . 27--33
A. Figueroa and
J. Atkinson Dual-View Learning for Detecting Web
Query Intents . . . . . . . . . . . . . 34--42
H. Kim and
E. A. Lee and
S. Dustdar Creating a Resilient IoT With Edge
Computing . . . . . . . . . . . . . . . 43--53
G. Mcgraw and
R. Bonett and
H. Figueroa and
V. Shepardson Security Engineering for Machine
Learning . . . . . . . . . . . . . . . . 54--57
Anonymous \booktitleIEEE Multimedia Magazine . . . 57--57
H. Habibi Gharakheili and
A. Sivanathan and
A. Hamza and
V. Sivaraman Network-Level Security for the Internet
of Things: Opportunities and Challenges 58--62
Anonymous \booktitleIEEE Software Magazine Call
for Articles . . . . . . . . . . . . . . 62--62
H. Schoettle Open Source License Compliance --- Why
and How? . . . . . . . . . . . . . . . . 63--67
Anonymous \booktitleIEEE Computer Graphics
Applications Call for Articles . . . . . 67--67
R. Simpson The IEEE Standards Association Corporate
Program: Engaging Industry in Standards
Development . . . . . . . . . . . . . . 68--71
Anonymous \booktitleIEEE IT Professionals Call for
Articles . . . . . . . . . . . . . . . . 71--71
K. J. Hole and
S. Ahmad Biologically Driven Artificial
Intelligence . . . . . . . . . . . . . . 72--75
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 75--75
Anonymous \booktitleIEEE Computer Magazine Call
for 2019 Major Awards Nominations . . . 76--76
Anonymous IEEE Computer Society Election . . . . . 77--90
Anonymous \booktitleIEEE Security & Privacy
Subscribe . . . . . . . . . . . . . . . 90--90
Anonymous IEEE Division VIII Delegate/Director
Candidates . . . . . . . . . . . . . . . 91--92
Anonymous IEEE President-Elect Candidates Address
Computer Society Concerns . . . . . . . 93--96
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous \booktitleIEEE Computing Edge Subscribe C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous \booktitleComputer Call for Special
Issue Proposals . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Q. Fettes and
M. Clark and
R. Bunescu and
A. Karanth and
A. Louri Dynamic Voltage and Frequency Scaling in
NoCs With Supervised and Reinforcement
Learning Techniques . . . . . . . . . . 4--5
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 6--8
Anonymous \booktitleIEEE Multimedia Magazine . . . 8--8
E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 9--11
D. A. Grier Translational Computing: What Needs the
Translation? . . . . . . . . . . . . . . 12--14
Anonymous 2019 IEEE Computer Society Election . . 14--14
Anonymous Richard E. Merwin Award . . . . . . . . 15--15
D. Abramson and
M. Parashar Translational Research in Computer
Science . . . . . . . . . . . . . . . . 16--23
Anonymous \booktitleIEEE IT Professional Call For
Papers . . . . . . . . . . . . . . . . . 23--23
R. Kuhn and
J. Voas and
P. Laplante Taking Score on the Success of
Blockchain, So Far . . . . . . . . . . . 24--34
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 34--34
A. Zamansky and
D. van der Linden and
I. Hadar and
S. Bleuer-Elsner Log My Dog: Perceived Impact of Dog
Activity Tracking . . . . . . . . . . . 35--43
Anonymous \booktitleIEEE Transactions on Big Data 43--43
M. Salisbury When Computers Advise Us: How to
Represent the Types of Knowledge Users
Seek for Expert Advice . . . . . . . . . 44--51
Anonymous 2019 IEEE Computer Society Election . . 51--51
P. Hukal and
N. Berente and
M. Germonprez and
A. Schecter Bots Coordinating Work in Open Source
Software Projects . . . . . . . . . . . 52--60
C. Huang and
T. Wang and
C. Lin Early Results on the Business Value of
Internet of Things Initiatives . . . . . 61--67
B. Varghese and
P. Leitner and
S. Ray and
K. Chard and
A. Barker and
Y. Elkhatib and
H. Herry and
C. Hong and
J. Singer and
F. P. Tso and
E. Yoneki and
M. Zhani Cloud Futurology . . . . . . . . . . . . 68--77
A. P. Fournaris and
A. S. Lalos and
D. Serpanos Generative Adversarial Networks in
AI-Enabled Safety-Critical Systems:
Friend or Foe? . . . . . . . . . . . . . 78--81
R. Bloomfield and
H. Khlaaf and
P. Ryan Conmy and
G. Fletcher Disruptive Innovations and Disruptive
Assurance: Assuring Machine Learning and
Autonomy . . . . . . . . . . . . . . . . 82--89
Anonymous IEEE Social Networking . . . . . . . . . 90--90
Anonymous CS Connection . . . . . . . . . . . . . 91--92
Anonymous IEEE Computer Society . . . . . . . . . C3--C3
Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous [Front cover] . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Computer Architecture
Letters . . . . . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 4--6
P. Montuschi New and Emerging Topics in Computing . . 7--8
Anonymous \booktitleIEEE Intelligent Systems . . . 8--8
Anonymous 50 25 Years Ago . . . . . . . . . . . . 9--11
E. Akleman Computing Through Time . . . . . . . . . 11--11
D. A. Grier A Good Party . . . . . . . . . . . . . . 12--13
S. D. Crocker The Arpanet and Its Impact on the State
of Networking . . . . . . . . . . . . . 14--23
Anonymous \booktitleIEEE Computer Graphics
Applications . . . . . . . . . . . . . . 23--23
P. Stimers The U.S. National Quantum Initiative . . 24--29
Y. Lu and
G. K. Thiruvathukal and
A. S. Kaseb and
K. Gauen and
D. Rijhwani and
R. Dailey and
D. Malik and
Y. Huang and
S. Aghajanzadeh and
M. M. Guo See the World Through Network Cameras 30--40
Anonymous IEEE IT Professionals Call for Articles 40--40
A. Jukan and
F. Carpio and
X. Masip and
A. J. Ferrer and
N. Kemper and
B. U. Stetina Fog-to-Cloud Computing for Farming:
Low-Cost Technologies, Data Exchange,
and Animal Welfare . . . . . . . . . . . 41--51
F. Bertini and
S. G. Rizzo and
D. Montesi Can Information Hiding in Social Media
Posts Represent a Threat? . . . . . . . 52--60
Anonymous \booktitleIEEE Pervasive Computing Call
for Papers . . . . . . . . . . . . . . . 60--60
X. Wang and
W. Sun and
L. Hu and
Y. Zhao and
W. E. Wong and
Z. Chen Software-Testing Contests: Observations
and Lessons Learned . . . . . . . . . . 61--69
Anonymous \booktitleIEEE Security & Privacy
Magazine Subscribe . . . . . . . . . . . 69--69
T. W. Kim and
S. Mejia From Artificial Intelligence to
Artificial Wisdom: What Socrates Teaches
Us . . . . . . . . . . . . . . . . . . . 70--74
Anonymous IEEE DataPort . . . . . . . . . . . . . 75--75
A. Vassilev Can Deep Learning Save Us and Itself
From the Avalanche of Threats in
Cyberspace? . . . . . . . . . . . . . . 76--82
Anonymous \booktitleComputer Call for Special
Issue Proposals . . . . . . . . . . . . 83--83
P. Zhang and
S. Pan and
M. Mirshekari and
J. Fagert and
H. Y. Noh Structures as Sensors: Indirect Sensing
for Inferring Users and Environments . . 84--88
Anonymous \booktitleIEEE Transactions on Big Data 88--88
M. Campbell Synthetic Data: How AI Is Transitioning
From Data Consumer to Data Producer
\ldots and Why That's Important . . . . 89--91
J. McAffer Getting Started With Open Source
Governance . . . . . . . . . . . . . . . 92--96
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 96--96
A. E. K. Sobel A New (?) Educational View of Computing 97--98
Anonymous \booktitleIEEE Software Magazine Call
for Articles . . . . . . . . . . . . . . 98--98
H. Berghel Huawei, BIS, and the IEEE: It's Déj\`a Vu
All Over Again . . . . . . . . . . . . . 99--104
Anonymous IEEE Social Networking . . . . . . . . . 105--105
G. Thompson Ethernet: From Office to Data Center to
IoT . . . . . . . . . . . . . . . . . . 106--109
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 109--109
E. P. DeBenedictis Powerball and Quantum Supremacy . . . . 110--112
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Job Board . . . . . . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Social Networking . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous 50 25 Years Ago . . . . . . . . . . . . 4--6
Anonymous \booktitleIEEE Multimedia Magazine . . . 6--6
M. Parashar The Reproducibility Initiative . . . . . 7--8
Anonymous \booktitleIEEE Transactions on Big Data 8--8
Anonymous Elsewhere in the CS . . . . . . . . . . 9--11
Anonymous \booktitleIEEE Intelligent Systems
Magazine . . . . . . . . . . . . . . . . 11--11
D. A. Grier Toward Healthier Lifestyles . . . . . . 12--13
Anonymous \booktitleIEEE Security and Privacy
Magazine Subscribe . . . . . . . . . . . 13--13
S. Helal and
R. Jain Digital Health-Active and Healthy Living 14--17
M. Gadaleta and
M. Rossi and
E. J. Topol and
S. R. Steinhubl and
G. Quer On the Effectiveness of Deep
Representation Learning: The Atrial
Fibrillation Case . . . . . . . . . . . 18--29
N. Homdee and
R. Alam and
J. A. Hayes and
T. Hamid and
J. Park and
S. Wolfe and
H. Goins and
N. Fyffe and
T. Newbold and
T. Smith-Jackson and
A. Bankole and
M. S. Anderson and
J. Lach Agitation Monitoring and Prevention
System for Dementia Caregiver
Empowerment . . . . . . . . . . . . . . 30--39
C. Tseng and
C. Lin and
H. Chang and
C. Liu and
B. M. F. Serafico and
L. Wu and
C. Lin and
T. Hsu and
C. Huang and
M. Lo Cloud-Based Artificial Intelligence
System for Large-Scale Arrhythmia
Screening . . . . . . . . . . . . . . . 40--51
W. C. Chu and
C. Shih and
W. Chou and
S. I. Ahamed and
P. Hsiung Artificial Intelligence of Things in
Sports Science: Weight Training as an
Example . . . . . . . . . . . . . . . . 52--61
O. Pinarer and
A. Ozgovde Application-Aware Dynamic Energy
Management for Portable Devices . . . . 62--72
Y. Shiroishi and
K. Uchiyama and
N. Suzuki Better Actions for Society 5.0: Using AI
for Evidence-Based Policy Making That
Keeps Humans in the Loop . . . . . . . . 73--78
Anonymous \booktitleIEEE Computer Architecture
Letters . . . . . . . . . . . . . . . . 79--79
J. B. Michael Assessing the Trustworthiness of
Electronic Systems . . . . . . . . . . . 80--83
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 83--83
Anonymous CS Connection . . . . . . . . . . . . . 84--84
Anonymous \booktitleIEEE Software Magazine Call
for Articles . . . . . . . . . . . . . . 84--84
Anonymous IEEE Computer Society information . . . C3--C3
Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous [Front cover] . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Transactions on Computers C2--C2
Anonymous Table of contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
C. Metra The 2019 IEEE Computer Society: Hit
Target on Member Satisfaction and
Technical Excellence . . . . . . . . . . 4--11
Anonymous IEEE Computer Society . . . . . . . . . 11--11
Anonymous \booktitleComputer Highlights Society
Magazines . . . . . . . . . . . . . . . 12--14
Anonymous \booktitleIEEE Internet Computing
Magazine . . . . . . . . . . . . . . . . 15--15
H. Lei and
C. Qiu and
H. Yao and
S. Guo When Blockchain-Enabled Internet of
Things Meets Cloud Computing . . . . . . 16--17
Anonymous \booktitleIEEE Software Magazine Call
For Articles . . . . . . . . . . . . . . 17--17
E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 18--21
Anonymous \booktitleIEEE Multimedia Magazine . . . 19--19
E. Akleman Computing Through Time . . . . . . . . . 20--20
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 21--21
Anonymous IEEE Computer Society Awards . . . . . . 22--27
D. A. Grier The IEEE Computer Society and the Tools
of the Past . . . . . . . . . . . . . . 28--30
Anonymous \booktitleIEEE Intelligent Systems
Magazine . . . . . . . . . . . . . . . . 30--30
D. Milojicic Technology Predictions . . . . . . . . . 31--33
P. Faraboschi and
E. Frachtenberg and
P. Laplante and
K. Mansfield and
D. Milojicic Technology Predictions: Art, Science,
and Fashion . . . . . . . . . . . . . . 34--38
D. Lange Cognitive Robotics: Making Robots Sense,
Understand, and Interact . . . . . . . . 39--44
K. Bresniker and
A. Gavrilovska and
J. Holt and
D. Milojicic and
T. Tran Grand Challenge: Applying Artificial
Intelligence and Machine Learning to
Cybersecurity . . . . . . . . . . . . . 45--52
E. Frachtenberg Practical Drone Delivery . . . . . . . . 53--57
R. Saracco Digital Twins: Bridging Physical Space
and Cyberspace . . . . . . . . . . . . . 58--64
A. Mendelson Security and Privacy in the Age of Big
Data and Machine Learning . . . . . . . 65--70
T. Coughlin Nonvolatile Memory Express: The Link
That Binds Them . . . . . . . . . . . . 71--79
J. Voas Predictions on Predictions . . . . . . . 80--82
A. Hoffman Moral Hazards in Cyber Vulnerability
Markets . . . . . . . . . . . . . . . . 83--88
P. E. Black and
M. Singh Opaque Wrappers and Patching: Negative
Results . . . . . . . . . . . . . . . . 89--93
A. Pal and
K. Kant Using Blockchain for Provenance and
Traceability in Internet of
Things-Integrated Food Logistics . . . . 94--98
M. Campbell Smart Edge: The Effects of Shifting the
Center of Data Gravity Out of the Cloud 99--102
D. Spinellis How to Select Open Source Components . . 103--106
A. E. K. Sobel Revisiting Whether Everyone Should Go to
College . . . . . . . . . . . . . . . . 107--108
Anonymous Erratum . . . . . . . . . . . . . . . . 108--108
David G. Hough The IEEE Standard 754: One for the
History Books . . . . . . . . . . . . . 109--112
Anonymous \booktitleIEEE Security Privacy Magazine
Subscribe . . . . . . . . . . . . . . . 113--113
E. P. DeBenedictis Moore's Law: A Hard Act to Follow . . . 114--117
Anonymous \booktitleIEEE Transactions on Big Data 117--117
Anonymous Shull Voted 2020 IEEE Computer Society
President-Elect . . . . . . . . . . . . 118--120
Anonymous IEEE Computer Society . . . . . . . . . C3--C3
Anonymous \booktitleIEEE Social Networking . . . . C4--C4