Table of contents for issues of Computer

Last update: Thu Dec 21 07:14:09 MST 2023                Valid HTML 3.2!

Volume 43, Number 1, January, 2010
Volume 43, Number 2, February, 2010
Volume 43, Number 3, March, 2010
Volume 43, Number 4, April, 2010
Volume 43, Number 5, May, 2010
Volume 43, Number 6, June, 2010
Volume 43, Number 7, July, 2010
Volume 43, Number 8, August, 2010
Volume 43, Number 9, September, 2010
Volume 43, Number 10, October, 2010
Volume 43, Number 11, November, 2010
Volume 43, Number 12, December, 2010
Volume 44, Number 1, January, 2011
Volume 44, Number 2, February, 2011
Volume 44, Number 3, March, 2011
Volume 44, Number 4, April, 2011
Volume 44, Number 5, May, 2011
Volume 44, Number 6, June, 2011
Volume 44, Number 7, July, 2011
Volume 44, Number 8, August, 2011
Volume 44, Number 9, September, 2011
Volume 44, Number 10, October, 2011
Volume 44, Number 11, November, 2011
Volume 44, Number 12, December, 2011
Volume 45, Number 1, January, 2012
Volume 45, Number 2, February, 2012
Volume 45, Number 3, March, 2012
Volume 45, Number 4, April, 2012
Volume 45, Number 5, May, 2012
Volume 45, Number 6, June, 2012
Volume 45, Number 7, July, 2012
Volume 45, Number 8, August, 2012
Volume 45, Number 9, September, 2012
Volume 45, Number 10, October, 2012
Volume 45, Number 11, November, 2012
Volume 45, Number 12, December, 2012
Volume 46, Number 1, January, 2013
Volume 46, Number 2, February, 2013
Volume 46, Number 3, March, 2013
Volume 46, Number 4, April, 2013
Volume 46, Number 5, May, 2013
Volume 46, Number 6, June, 2013
Volume 46, Number 7, July, 2013
Volume 46, Number 8, August, 2013
Volume 46, Number 9, September, 2013
Volume 46, Number 10, October, 2013
Volume 46, Number 11, November, 2013
Volume 46, Number 12, December, 2013
Volume 47, Number 1, January, 2014
Volume 47, Number 2, 2014
Volume 47, Number 3, 2014
Volume 47, Number 4, April, 2014
Volume 47, Number 5, May, 2014
Volume 47, Number 6, June, 2014
Volume 47, Number 7, July, 2014
Volume 47, Number 8, August, 2014
Volume 47, Number 9, September, 2014
Volume 47, Number 10, October, 2014
Volume 47, Number 11, November, 2014
Volume 47, Number 12, December, 2014
Volume 48, Number 1, January, 2015
Volume 48, Number 2, February, 2015
Volume 48, Number 3, March, 2015
Volume 48, Number 4, April, 2015
Volume 48, Number 5, May, 2015
Volume 48, Number 6, June, 2015
Volume 48, Number 7, July, 2015
Volume 48, Number 8, August, 2015
Volume 48, Number 9, September, 2015
Volume 48, Number 10, October, 2015
Volume 48, Number 11, November, 2015
Volume 48, Number 12, December, 2015
Volume 49, Number 1, January, 2016
Volume 49, Number 2, February, 2016
Volume 49, Number 3, March, 2016
Volume 49, Number 4, April, 2016
Volume 49, Number 5, May, 2016
Volume 49, Number 6, June, 2016
Volume 49, Number 7, July, 2016
Volume 49, Number 8, August, 2016
Volume 49, Number 9, September, 2016
Volume 49, Number 10, October, 2016
Volume 49, Number 11, November, 2016
Volume 49, Number 12, December, 2016
Volume 50, Number 1, January, 2017
Volume 50, Number 2, February, 2017
Volume 50, Number 3, March, 2017
Volume 50, Number 4, April, 2017
Volume 50, Number 5, May, 2017
Volume 50, Number 6, June, 2017
Volume 50, Number 7, July, 2017
Volume 50, Number 8, August, 2017
Volume 50, Number 9, September, 2017
Volume 50, Number 10, October, 2017
Volume 50, Number 11, November, 2017
Volume 50, Number 12, December, 2017
Volume 51, Number 1, January, 2018
Volume 51, Number 2, February, 2018
Volume 51, Number 3, March, 2018
Volume 51, Number 4, April, 2018
Volume 51, Number 5, May, 2018
Volume 51, Number 6, June, 2018
Volume 51, Number 7, July, 2018
Volume 51, Number 8, August, 2018
Volume 51, Number 9, September, 2018
Volume 51, Number 11, November, 2018
Volume 51, Number 12, December, 2018
Volume 52, Number 1, January, 2019
Volume 52, Number 2, February, 2019
Volume 52, Number 3, March, 2019
Volume 52, Number 4, April, 2019
Volume 52, Number 5, May, 2019
Volume 52, Number 6, June, 2019
Volume 52, Number 7, July, 2019
Volume 52, Number 8, August, 2019
Volume 52, Number 9, September, 2019
Volume 52, Number 10, October, 2019
Volume 52, Number 11, November, 2019
Volume 52, Number 12, December, 2019


Computer
Volume 43, Number 1, January, 2010

                      Anonymous   Computer Highlights Society Magazines    4--5
                 James D. Isaak   Computer Society 2010: Innovation,
                                  Leadership, Community, and Careers . . . 6--8
               David Alan Grier   Designing the Future . . . . . . . . . . 9--11
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 12--13
                Sixto Ortiz Jr.   Is $3$D Finally Ready for the Web? . . . 14--16
           Linda Dailey Paulson   New Lithography Approach Promises
                                  Powerful Chips . . . . . . . . . . . . . 17--20
                    Larry Smarr   Project GreenLight: Optimizing
                                  Cyber-infrastructure for a
                                  Carbon-Constrained World . . . . . . . . 22--27
             David Lorge Parnas   Really Rethinking `Formal Methods' . . . 28--34
               Simon Dobson and   
               Roy Sterritt and   
                Paddy Nixon and   
                   Mike Hinchey   Fulfilling the Vision of Autonomic
                                  Computing  . . . . . . . . . . . . . . . 35--41
                Marco Conti and   
                    Mohan Kumar   Opportunities in Opportunistic Computing 42--50
        Robert P. Schumaker and   
                  Hsinchun Chen   A Discrete Stock Price Prediction Engine
                                  Based on Financial News  . . . . . . . . 51--56
         Thomas F. Stafford and   
                   Robin Poston   Online Security Threats and Computer
                                  User Intentions  . . . . . . . . . . . . 58--64
                       Bob Ward   Computer Society Programs Serve Members  65--69
                       Bob Ward   Call and Calendar  . . . . . . . . . . . 70--71
                  James Hendler   Web 3.0: The Dawn of Semantic Search . . 77--80
                   Mark Woh and   
               Scott Mahlke and   
               Trevor Mudge and   
           Chaitali Chakrabarti   Mobile Supercomputers for the
                                  Next-Generation Cell Phone . . . . . . . 81--85
                    Dirk Riehle   The Economic Case for Open Source
                                  Foundations  . . . . . . . . . . . . . . 86--90
              Bruce Nordman and   
                Ken Christensen   Proxying: The Next Step in Reducing IT
                                  Energy Use . . . . . . . . . . . . . . . 91--93

Computer
Volume 43, Number 2, February, 2010

                 Neville Holmes   The Profession . . . . . . . . . . . . . 96, 94--95
               David Alan Grier   Raising Barns  . . . . . . . . . . . . . 7--9
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 10--11
                   Neal Leavitt   Will NoSQL Databases Live Up to Their
                                  Promise? . . . . . . . . . . . . . . . . 12--14
           Linda Dailey Paulson   Onboard Cooler Keeps Chips Comfortable   15--18
               Awais Rashid and   
           Thomas Cottenier and   
             Phil Greenwood and   
          Ruzanna Chitchyan and   
             Regine Meunier and   
             Roberta Coelho and   
              Mario Sudholt and   
                  Wouter Joosen   Aspect-Oriented Software Development in
                                  Practice: Tales from AOSD--Europe  . . . 19--26
                     Ron Vetter   Authentication by Biometric Verification 28--29
                      Arun Ross   Iris Recognition: The Path Forward . . . 30--35
               Anil K. Jain and   
             Jianjiang Feng and   
             Karthik Nandakumar   Fingerprint Matching . . . . . . . . . . 36--44
             Rama Chellappa and   
                Pawan Sinha and   
           P. Jonathon Phillips   Face Recognition by Computers and Humans 46--55
            Marios Savvides and   
          Karl Ricanek, Jr. and   
           Damon L. Woodard and   
                   Gerry Dozier   Unconstrained Biometric Identification:
                                  Emerging Technologies  . . . . . . . . . 56--62
              Mikko Siponen and   
              Seppo Pahnila and   
                M. Adam Mahmood   Compliance with Information Security
                                  Policies: An Empirical Investigation . . 64--71
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 78
                       Bob Ward   Moore Wins Karlsson Award  . . . . . . . 79--84
                      Anonymous   Call and Calendar  . . . . . . . . . . . 85--86
                  Jay Liebowitz   Strategic Intelligence, Social
                                  Networking, and Knowledge Retention  . . 87--89
           Patricia O'Hagan and   
               Edward Hanna and   
                   Roy Sterritt   Addressing the Corrections Crisis with
                                  Software Technology  . . . . . . . . . . 90--93
               Albrecht Schmidt   Ubiquitous Computing: Are We There Yet?  95--97
                   Ann Q. Gates   Discovery, Innovation, and Creativity:
                                  The Core of Computing  . . . . . . . . . 98--100
             William W. Agresti   The Four Forces Shaping Cybersecurity    101--104

Computer
Volume 43, Number 3, March, 2010

 Swen Kiesewetter-Köbinger   Programmers' Capital . . . . . . . . . . 108, 106--107
                      Anonymous   Letters to the Editor  . . . . . . . . . 6--9
               David Alan Grier   Someday, You Will Understand . . . . . . 11--13
                      Anonymous   32 and16 Years Ago . . . . . . . . . . . 14--15
                     David Geer   Is It Really Time for Real-Time Search?  16--19
           Linda Dailey Paulson   Scientists Develop Camera Made of Fabric 20--22
            Angela C. Sodan and   
              Jacob Machina and   
              Arash Deshmeh and   
          Kevin Macnaughton and   
                  Bryan Esbaugh   Parallelism via Multithreaded and
                                  Multicore CPUs . . . . . . . . . . . . . 24--32
         Moshe (Maury) Bach and   
               Mark Charney and   
                Robert Cohn and   
          Elena Demikhovsky and   
                 Tevi Devor and   
              Kim Hazelwood and   
               Aamer Jaleel and   
              Chi-Keung Luk and   
                 Gail Lyons and   
               Harish Patil and   
                        Ady Tal   Analyzing Parallel Programs with Pin . . 34--41
       Roger D. Chamberlain and   
           Mark A. Franklin and   
              Eric J. Tyson and   
           James H. Buckley and   
              Jeremy Buhler and   
              Greg Galloway and   
              Saurabh Gayen and   
               Michael Hall and   
       E. F. Berkley Shands and   
                  Naveen Singla   Auto-Pipe: Streaming Applications on
                                  Architecturally Diverse Systems  . . . . 42--49
             Davide Pasetto and   
           Fabrizio Petrini and   
                  Virat Agarwal   Tools for Very Fast Regular Expression
                                  Matching . . . . . . . . . . . . . . . . 50--58
               Sylvain Hall and   
              Tevfik Bultan and   
              Graham Hughes and   
             Muath Alkhalaf and   
               Roger Villemaire   Runtime Verification of Web Service
                                  Interface Contracts  . . . . . . . . . . 59--66
            Suman K. Mandal and   
          Rabi N. Mahapatra and   
        Praveen S. Bhojwani and   
              Saraju P. Mohanty   IntellBatt: Toward a Smarter Battery . . 67--71
                       Bob Ward   Computer Society Names Award Recipients  77--80
                       Bob Ward   Call and Calendar  . . . . . . . . . . . 81--82
                Kirk W. Cameron   Trading in Green IT  . . . . . . . . . . 83--85
             Nicholas Bowen and   
                    Jim Spohrer   Viewpoint: The Future of Computing
                                  Practice and Education . . . . . . . . . 86--89
        Wil M. P. van Aalst and   
            Kees M. van Hee and   
       Jan Martijn van Werf and   
                   Marc Verdonk   Auditing 2.0: Using Process Mining to
                                  Support Tomorrow's Auditor . . . . . . . 90--93
             Thomas M. Chen and   
                  Victoria Wang   Web Filtering and Censoring  . . . . . . 94--97

Computer
Volume 43, Number 4, April, 2010

                 Neville Holmes   The Digital Climate of English Change    100, 98--99
               David Alan Grier   Utter Chaos  . . . . . . . . . . . . . . 6--9
                      Anonymous   32 and 16 years ago  . . . . . . . . . . 10--11
      Steven J. Vaughan-Nichols   Will HTML 5 Restandardize the Web? . . . 13--15
           Linda Dailey Paulson   New Technique Provides Energy Wirelessly 16--19
           Nickolas Falkner and   
          Raja Sooriamurthi and   
           Zbigniew Michalewicz   Puzzle-Based Learning for Engineering
                                  and Computer Science . . . . . . . . . . 20--28
                Peter Aiken and   
          Robert M. Stanley and   
           Juanita Billings and   
                  Luke Anderson   Using Codes of Conduct to Resolve Legal
                                  Disputes . . . . . . . . . . . . . . . . 29--34
       Arutyun I. Avetisyan and   
               Roy Campbell and   
             Indranil Gupta and   
           Michael T. Heath and   
               Steven Y. Ko and   
          Gregory R. Ganger and   
          Michael A. Kozuch and   
           David O'Hallaron and   
               Marcel Kunze and   
             Thomas T. Kwan and   
                  Kevin Lai and   
               Martha Lyons and   
         Dejan S. Milojicic and   
               Hing Yan Lee and   
              Yeng Chai Soh and   
              Ng Kwang Ming and   
             Jing-Yuan Luke and   
                   Han Namgoong   Open Cirrus: a Global Cloud Computing
                                  Testbed  . . . . . . . . . . . . . . . . 35--43
              Edward Walker and   
             Walter Brisken and   
                Jonathan Romney   To Lease or Not to Lease from Storage
                                  Clouds . . . . . . . . . . . . . . . . . 44--50
              Karthik Kumar and   
                 Yung-Hsiang Lu   Cloud Computing for Mobile Users: Can
                                  Offloading Computation Save Energy?  . . 51--56
           Victor R. Basili and   
            Mikael Lindvall and   
             Myrna Regardie and   
             Carolyn Seaman and   
              Jens Heidrich and   
     Jürgen Münch and   
             Dieter Rombach and   
                Adam Trendowicz   Linking Software Development and
                                  Business Strategy Through Measurement    57--65
                       Bob Ward   Ken Birman Wins Kanai Award  . . . . . . 66--68
               Rajesh P. N. Rao   Probabilistic Analysis of an Ancient
                                  Undeciphered Script  . . . . . . . . . . 76--80
             Karin Breitman and   
              Markus Endler and   
             Rafael Pereira and   
              Marcello Azambuja   When TV Dies, Will It Go to the Cloud?   81--83
                  Leah Buechley   Questioning Invisibility . . . . . . . . 84--86
                    Jim Vallino   Cutting Across the Disciplines . . . . . 87--89
         James Bret Michael and   
          John F. Sarkesain and   
        Thomas C. Wingfield and   
          Georgios Dementis and   
    Gonzalo Nuno Baptista Sousa   Integrating Legal and Policy Factors in
                                  Cyberpreparedness  . . . . . . . . . . . 90--92
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 93

Computer
Volume 43, Number 5, May, 2010

                   Kai A. Olsen   Computing a Better World . . . . . . . . 96, 94--95
               David Alan Grier   The Age of Accountability  . . . . . . . 6--8
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 10--11
                  George Lawton   Fighting Intrusions into Wireless
                                  Networks . . . . . . . . . . . . . . . . 12--15
           Linda Dailey Paulson   Libraries Face the Challenge of
                                  Archiving Digital Material . . . . . . . 16--19
                    Yun Wan and   
                      Gang Peng   What's Next for Shopbots?  . . . . . . . 20--26
               Lorcan Coyle and   
               Mike Hinchey and   
            Bashar Nuseibeh and   
      José Luiz Fiadeiro   Guest Editors' Introduction: Evolving
                                  Critical Systems . . . . . . . . . . . . 28--33
               Gabor Karsai and   
             Fabio Massacci and   
             Leon Osterweil and   
             Ina Schieferdecker   Evolving Embedded Systems  . . . . . . . 34--40
                   Tom Mens and   
                 Jeff Magee and   
                 Bernhard Rumpe   Evolving Software Architecture
                                  Descriptions of Critical Systems . . . . 42--48
           Mass Soldal Lund and   
     Bjòrnar Solhaug and   
            Ketil Stòlen   Evolution in Relation to Risk and Trust
                                  Management . . . . . . . . . . . . . . . 49--55
              Bernard Cohen and   
                   Philip Boxer   Why Critical Systems Need Help to Evolve 56--63
               William Robinson   A Roadmap for Comprehensive Requirements
                                  Modeling . . . . . . . . . . . . . . . . 64--72
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 73
                       Bob Ward   Bertrand Meyer Receives 2010 Mills Award 77--79
                Kirk W. Cameron   The Challenges of Energy-Proportional
                                  Computing  . . . . . . . . . . . . . . . 82--83
               Yoshiaki Kushiki   The Future of Embedded Software:
                                  Adapting to Drastic Change . . . . . . . 84--86
             Vishnu Vinekar and   
         Christopher L. Huntley   Agility versus Maturity: Is There Really
                                  a Trade-Off? . . . . . . . . . . . . . . 87--89
                 David De Roure   e-Science and the Web  . . . . . . . . . 90--93
                 Neville Holmes   The Rise and Rise of Digital Gluttony    96, 94--95

Computer
Volume 43, Number 6, June, 2010

                      Anonymous   Computer Highlights Society Magazines    4--5
               David Alan Grier   The Value of a Good Name . . . . . . . . 7--9
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 10--11
                     David Geer   Are Companies Actually Using Secure
                                  Development Life Cycles? . . . . . . . . 12--16
           Linda Dailey Paulson   Steganography Development Offers Promise 18--21
                  Oliver Bimber   Capturing the World  . . . . . . . . . . 22--23
               Franz Leberl and   
              Horst Bischof and   
                Thomas Pock and   
            Arnold Irschara and   
                Stefan Kluckner   Aerial Computer Vision for a $3$D
                                  Virtual Habitat  . . . . . . . . . . . . 24--31
          Dragomir Anguelov and   
              Carole Dulong and   
               Daniel Filip and   
            Christian Frueh and   
      Stéphane Lafon and   
               Richard Lyon and   
              Abhijit Ogale and   
                Luc Vincent and   
                    Josh Weaver   Google Street View: Capturing the World
                                  at Street Level  . . . . . . . . . . . . 32--38
             Sameer Agarwal and   
          Yasutaka Furukawa and   
               Noah Snavely and   
              Brian Curless and   
            Steven M. Seitz and   
               Richard Szeliski   Reconstructing Rome  . . . . . . . . . . 40--47
            Michael Goesele and   
             Jens Ackermann and   
             Simon Fuhrmann and   
              Ronny Klowsky and   
            Fabian Langguth and   
         Patrick Mücke and   
                    Martin Ritz   Scene Reconstruction from Community
                                  Photo Collections  . . . . . . . . . . . 48--53
               Jaak Tepandi and   
           Ilja T\vsahhirov and   
            Stanislav Vassiljev   Wireless PKI Security and Mobile Voting  54--60
                Anita Sarma and   
             David Redmiles and   
      André van der Hoek   Categorizing the Spectrum of
                                  Coordination Technology  . . . . . . . . 61--67
                       Bob Ward   Computer Society Announces Award Winners 72--73
           Cees G. M. Snoek and   
         Arnold W. M. Smeulders   Visual-Concept Search Solved?  . . . . . 76--78
            D. Richard Kuhn and   
            Edward J. Coyne and   
                Timothy R. Weil   Adding Attributes to Role-Based Access
                                  Control  . . . . . . . . . . . . . . . . 79--81
               Lecia Barker and   
      Joanne McGrath Cohoon and   
                   Lucy Sanders   Strategy Trumps Money: Recruiting
                                  Undergraduate Women into Computing . . . 82--85
                 Chris Harrison   Appropriated Interaction Surfaces  . . . 86--89
           Tiziana Margaria and   
               Bernhard Steffen   Simplicity as a Driver for Agile
                                  Innovation . . . . . . . . . . . . . . . 90--92
          Anne-F. Rutkowski and   
              Carol S. Saunders   Growing Pains with Information Overload  96, 94--95

Computer
Volume 43, Number 7, July, 2010

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   The Spirit of Combination  . . . . . . . 6--9
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 10--11
                Sixto Ortiz Jr.   Taking Business Intelligence to the
                                  Masses . . . . . . . . . . . . . . . . . 12--15
           Linda Dailey Paulson   New Approach Combines TV and Social
                                  Networking . . . . . . . . . . . . . . . 16--19
            Mari Carmen Domingo   Managing Healthcare through Social
                                  Networks . . . . . . . . . . . . . . . . 20--25
         Brigitte Piniewski and   
              Johan Muskens and   
           Leonardo Estevez and   
              Randy Carroll and   
                   Rick Cnossen   Empowering Healthcare Patients with
                                  Smart Technology . . . . . . . . . . . . 27--34
          Jatinder R. Palta and   
         Vincent A. Frouhar and   
             Robert A. Zlotecki   Leveraging Pervasive Technologies to
                                  Improve Collection of Prostate Cancer
                                  Outcome Data . . . . . . . . . . . . . . 35--42
               Mark Weitzel and   
                 Andy Smith and   
             Scott de Deugd and   
                   Robert Yates   A Web 2.0 Model for Patient-Centered
                                  Health Informatics Applications  . . . . 43--50
        Kenneth Fleischmann and   
                William Wallace   Value Conflicts in Computational
                                  Modeling . . . . . . . . . . . . . . . . 57--63
              Eduardo Huedo and   
              Ruben Montero and   
               Ignacio Llorente   Grid Architecture from a Metascheduling
                                  Perspective  . . . . . . . . . . . . . . 51--56
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 75
                John Carter and   
              Karthick Rajamani   Designing Energy-Efficient Servers and
                                  Data Centers . . . . . . . . . . . . . . 76--78
                  Art Gowan and   
                  Han Reichgelt   Emergence of the Information Technology
                                  Discipline . . . . . . . . . . . . . . . 79--81
              Daniel Schall and   
           Schahram Dustdar and   
                 M. Brian Blake   Programming Human and Software-Based Web
                                  Services . . . . . . . . . . . . . . . . 82--85
                 Neville Holmes   The Future of the Computing Profession   88, 86--87

Computer
Volume 43, Number 8, August, 2010

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   Mental Discipline  . . . . . . . . . . . 6--8
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 9--10
                   Neal Leavitt   Researchers Fight to Keep Implanted
                                  Medical Devices Safe from Hackers  . . . 11--14
           Linda Dailey Paulson   Project Converts Arms and Hands into
                                  Input Devices  . . . . . . . . . . . . . 15--18
           Jacek Izydorczyk and   
              Michal Izydorczyk   Microprocessor Scaling: What Limits Will
                                  Hold?  . . . . . . . . . . . . . . . . . 20--26
              Yonghong Tian and   
         Jaideep Srivastava and   
               Tiejun Huang and   
              Noshir Contractor   Social Multimedia Computing  . . . . . . 27--36
                 Moo Nam Ko and   
           Gorrell P. Cheek and   
             Mohamed Shehab and   
                    Ravi Sandhu   Social-Networks Connect Services . . . . 37--43
               Fei-Yue Wang and   
                Daniel Zeng and   
           James A. Hendler and   
             Qingpeng Zhang and   
                  Zhuo Feng and   
                Yanqing Gao and   
                   Hui Wang and   
                     Guanpi Lai   A Study of the Human Flesh Search
                                  Engine: Crowd-Powered Expansion of
                                  Online Knowledge . . . . . . . . . . . . 45--53
               Henri E. Bal and   
              Jason Maassen and   
      Rob V. van Nieuwpoort and   
                Niels Drost and   
                Roelof Kemp and   
                Nick Palmer and   
             Thilo Kielmann and   
             Frank Seinstra and   
                  Ceriel Jacobs   Real-World Distributed Computer with
                                  Ibis . . . . . . . . . . . . . . . . . . 54--62
      Simon Portegies Zwart and   
                Derek Groen and   
           Tomoaki Ishiyama and   
             Keigo Nitadori and   
           Junichiro Makino and   
               Cees de Laat and   
             Steve McMillan and   
                 Kei Hiraki and   
              Stefan Harfst and   
                   Paola Grosso   Simulating the Universe on an
                                  Intercontinental Grid  . . . . . . . . . 63--70
                      Anonymous   IEEE Computer Society Election . . . . . 71--78
                      Anonymous   IEEE President-Elect Candidates Address
                                  Computer Society Concerns  . . . . . . . 79--83
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 90
         James Bret Michael and   
                Eneken Tikk and   
             Peter Wahlgren and   
            Thomas C. Wingfield   From Chaos to Collective Defense . . . . 91--94
              S. S. Iyengar and   
      Supratik Mukhopadhyay and   
    Christopher Steinmuller and   
                         Xin Li   Preventing Future Oil Spills with
                                  Software-Based Event Detection . . . . . 95--97
              Stephen T. Frezza   Computer Science: Is It Really the
                                  Scientific Foundation for Software
                                  Engineering? . . . . . . . . . . . . . . 98--101
               James C. Spohrer   IBM's University Programs  . . . . . . . 102--104
               Steve Hodges and   
                 Nicolas Villar   The Hardware Is Not a Given  . . . . . . 106--109
              Anthony Cleve and   
                   Tom Mens and   
               Jean-Luc Hainaut   Data-Intensive System Evolution  . . . . 110--112
               Noel Sharkey and   
               Marc Goodman and   
                      Nick Ross   The Coming Robot Crime Wave  . . . . . . 116, 114--115

Computer
Volume 43, Number 9, September, 2010

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   Finding What You Want  . . . . . . . . . 8--10
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 11--12
                     David Geer   Whatever Happened to
                                  Network-Access-Control Technology? . . . 13--16
           Linda Dailey Paulson   New Service Promises to Improve Online
                                  Search . . . . . . . . . . . . . . . . . 17--20
              Nancy R. Mead and   
                  Joe Jarzombek   Advancing Software Assurance with
                                  Public-Private Collaboration . . . . . . 21--30
       Frederick T. Sheldon and   
                  Claire Vishik   Moving Toward Trustworthy Systems: R&D
                                  Essentials . . . . . . . . . . . . . . . 31--40
         Samuel T. Redwine, Jr.   Fitting Software Assurance into Higher
                                  Education  . . . . . . . . . . . . . . . 41--46
            Ann E. K. Sobel and   
                    Gary McGraw   Interview: Software Security in the Real
                                  World  . . . . . . . . . . . . . . . . . 47--53
                    Wei Tan and   
                  Jia Zhang and   
                     Ian Foster   Network Analysis of Scientific
                                  Workflows: a Gateway to Reuse  . . . . . 54--61
             Todd Mytkowicz and   
                 Amer Diwan and   
         Matthias Hauswirth and   
                  Peter Sweeney   The Effect of Omitted-Variable Bias on
                                  the Evaluation of Compiler Optimizations 62--67
                       Bob Ward   Society Honors Five Top Computing
                                  Professionals  . . . . . . . . . . . . . 74--76
                       Bob Ward   Call and Calendar  . . . . . . . . . . . 77--78
               George P. Schell   IT Value: From Moore's Law to a Flat
                                  World  . . . . . . . . . . . . . . . . . 79--81
                 Ron Kohavi and   
           Roger Longbotham and   
                    Toby Walker   Online Experiments: Practical Lessons    82--85
                Kirk W. Cameron   A Tale of Two Green Lists  . . . . . . . 86--88
                 Neville Holmes   Seven Digital Steps to Avoid Utter Hell  92, 90--91

Computer
Volume 43, Number 10, October, 2010

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 6
                      Anonymous   In Memoriam: Scott Hamilton  . . . . . . 7
               David Alan Grier   The Curious and the Confident  . . . . . 8--10
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 11--12
                   Neal Leavitt   Network-Usage Changes Push Internet
                                  Traffic to the Edge  . . . . . . . . . . 13--15
           Linda Dailey Paulson   How Safe Are Secure Websites?  . . . . . 17--20
         Sergio Toral Marin and   
Maria del Rocio Martinez-Torres and   
               Federico Barrero   Reforming ICT Graduate Programs to Meet
                                  Professional Needs . . . . . . . . . . . 22--29
              Jarrod A. Roy and   
         Farinaz Koushanfar and   
                 Igor L. Markov   Ending Piracy of Integrated Circuits . . 30--38
               Ramesh Karri and   
      Jeyavijayan Rajendran and   
             Kurt Rosenfeld and   
           Mohammad Tehranipoor   Trustworthy Hardware: Identifying and
                                  Classifying Hardware Trojans . . . . . . 39--46
                    Nir Kshetri   Cloud Computing in Developing Economies  47--55
                Juan Hamers and   
                Lieven Eeckhout   Scenario-Based Resource Prediction for
                                  QoS-Aware Media Processing . . . . . . . 56--63
                       Bob Ward   Society Forms New Technical Committee on
                                  Semantic Computing . . . . . . . . . . . 64--65
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 76--76
         Naren Ramakrishnan and   
              David Hanauer and   
                Benjamin Keller   Mining Electronic Health Records . . . . 77--81
             Richard J. LeBlanc   What Should All CS Graduates Know? . . . 82--84
            Keith W. Miller and   
               Jeffrey Voas and   
                  Phil Laplante   In Trust We Trust  . . . . . . . . . . . 85--87
               Manfred Broy and   
                  Ralf Reussner   Architectural Concepts in Programming
                                  Languages  . . . . . . . . . . . . . . . 88--91
              Paul Lukowicz and   
                Oliver Amft and   
              Daniel Roggen and   
                 Jingyuan Cheng   On-Body Sensing: From Gesture-Based
                                  Input to Activity-Driven Interaction . . 92--96
                 Neville Holmes   The Future of the Computing Profession:
                                  Readers' E-mails . . . . . . . . . . . . 100, 98--99

Computer
Volume 43, Number 11, November, 2010

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   Sabotage!  . . . . . . . . . . . . . . . 6--8
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 9--10
      Steven J. Vaughan-Nichols   Gigabit Wi-Fi Is on Its Way  . . . . . . 11--14
                      Anonymous   Worm Targets Industrial-Plant Operations 15--18
              Peter Pirolli and   
               Jenny Preece and   
                Ben Shneiderman   Cyberinfrastructure for Social Action on
                                  National Priorities  . . . . . . . . . . 20--21
               Robert Kraut and   
             Mary Lou Maher and   
               Judith Olson and   
           Thomas W. Malone and   
              Peter Pirolli and   
                 John C. Thomas   Scientific Foundations: a Case for
                                  Technology-Mediated Social-Participation
                                  Theory . . . . . . . . . . . . . . . . . 22--28
                  Ed H. Chi and   
                Sean Munson and   
            Gerhard Fischer and   
               Sarah Vieweg and   
                   Cynthia Parr   Advancing the Design of
                                  Technology-Mediated Social Participation
                                  Systems  . . . . . . . . . . . . . . . . 29--35
                 Gary Olson and   
                Gloria Mark and   
        Elizabeth Churchill and   
                    Dana Rotman   New Missions for a Sociotechnical
                                  Infrastructure . . . . . . . . . . . . . 37--43
          Bradford W. Hesse and   
               Derek Hansen and   
             Thomas Finholt and   
                Sean Munson and   
              Wendy Kellogg and   
                 John C. Thomas   Social Participation in Health 2.0 . . . 45--52
          John Carlo Bertot and   
             Paul T. Jaeger and   
                Sean Munson and   
                   Tom Glaisyer   Social Media Technology and Government
                                  Transparency . . . . . . . . . . . . . . 53--59
                Cliff Lampe and   
               Paul Resnick and   
               Andrea Forte and   
               Sarita Yardi and   
                Dana Rotman and   
              Todd Marshall and   
                  Wayne Lutters   Educational Priorities for
                                  Technology-Mediated Social Participation 60--67
                       Bob Ward   Blue Gene Architect Gara Receives 2010
                                  Cray Award . . . . . . . . . . . . . . . 78--80
                      Anonymous   Call and Calendar  . . . . . . . . . . . 81--82
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 83
                    Timo Hannay   What Can the Web Do for Science? . . . . 84--87
             Prith Banerjee and   
             Rich Friedrich and   
                   Lueny Morell   Open Innovation at HP Labs . . . . . . . 88--90
       Karthikeyan Umapathy and   
                  Sandeep Purao   Systems Integration and Web Services . . 91--94
                Kirk W. Cameron   Green with Envy  . . . . . . . . . . . . 95--96
                 Neville Holmes   Some Social Aspects of Computers and
                                  Numbers  . . . . . . . . . . . . . . . . 100, 98--99

Computer
Volume 43, Number 12, December, 2010

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   Letters to the Editor  . . . . . . . . . 6--8
                  Carl K. Chang   It Has Been a Long Journey --- From the
                                  Heart of a Loyal Computer Society
                                  Volunteer  . . . . . . . . . . . . . . . 9--10
                 James D. Isaak   2010 to 2020 --- Looking Forward . . . . 11--13
                 David A. Grier   Investing in Ignorance . . . . . . . . . 14--16
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 17--18
                   Neal Leavitt   Payment Applications Make E-Commerce
                                  Mobile . . . . . . . . . . . . . . . . . 19--22
           Linda Dailey Paulson   Energy-Saving PCs Work while Sleeping    23--26
               Tiejun Huang and   
              Yonghong Tian and   
                    Wen Gao and   
                        Jian Lu   Mediaprinting: Identifying Multimedia
                                  Content for Digital Rights Management    28--35
      Chaiyakorn Yingsaeree and   
              Giuseppe Nuti and   
               Philip Treleaven   Computational Finance  . . . . . . . . . 36--43
       Badrish Chandramouli and   
                Mohamed Ali and   
         Jonathan Goldstein and   
              Beysim Sezgin and   
              Balan Sethu Raman   Data Stream Management Systems for
                                  Computational Finance  . . . . . . . . . 45--52
                Brad Spiers and   
                   Denis Wallez   High-Performance Computing on Wall
                                  Street . . . . . . . . . . . . . . . . . 53--59
           Antonio Coronato and   
             Giuseppe De Pietro   Formal Design of Ambient Intelligence
                                  Applications . . . . . . . . . . . . . . 60--68
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 85
               Evan M. Peck and   
        Erin Treacy Solovey and   
            Krysta Chauncey and   
           Angelo Sassaroli and   
             Sergio Fantini and   
         Robert J. K. Jacob and   
            Audrey Girouard and   
           Leanne M. Hirshfield   Your Brain, Your Computer, and You . . . 86--89
            George Hurlburt and   
               Jeffrey Voas and   
               Keith Miller and   
              Phil Laplante and   
                   Bret Michael   A Nonlinear Perspective on Higher
                                  Education  . . . . . . . . . . . . . . . 90--92
                Emil Vassev and   
                   Mike Hinchey   The Challenge of Developing Autonomic
                                  Systems  . . . . . . . . . . . . . . . . 93--96


Computer
Volume 44, Number 1, January, 2011

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                  Sorel Reisman   Planning for an Inevitable Future  . . . 6--8
                     Ron Vetter   Print, Mobile, and Online  . . . . . . . 9--11
               David Alan Grier   The Migration to the Middle  . . . . . . 12--14
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 15--16
                  George Lawton   $3$D Displays without Glasses: Coming to
                                  a Screen near You  . . . . . . . . . . . 17--19
           Linda Dailey Paulson   Scanning the Future with New Barcodes    20--23
         Geetha Thiagarajan and   
         Venkatesh Sarangan and   
Ramasubramanian Suriyanarayanan and   
  Pragathichitra Sethuraman and   
      Anand Sivasubramaniam and   
         Avinash Yegyanarayanan   Automating a Building's Carbon
                                  Management . . . . . . . . . . . . . . . 24--30
           Samuel H. Fuller and   
             Lynette I. Millett   Computing Performance: Game Over or Next
                                  Level? . . . . . . . . . . . . . . . . . 31--38
      Parthasarathy Ranganathan   From Microprocessors to Nanostores:
                                  Rethinking Data-Centric Systems  . . . . 39--48
        Daniel S. Stevenson and   
                 Robert O. Conn   Bridging the Interconnection Density Gap
                                  for Exascale Computation . . . . . . . . 49--57
                   Roy Sterritt   Apoptotic Computing: Programmed Death by
                                  Default for Computer-Based Systems . . . 59--65
          Anna Squicciarini and   
     Sathya Dev Rajasekaran and   
             Marco Casassa Mont   Using Modeling and Simulation to
                                  Evaluate Enterprises' Risk Exposure to
                                  Social Networks  . . . . . . . . . . . . 66--73
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 81
                      Anonymous   Computer Society Winner Nets \$50,000
                                  Prize  . . . . . . . . . . . . . . . . . 82--84
                      Anonymous   Call and Calendar  . . . . . . . . . . . 85--86
             Bill Tomlinson and   
           M. Six Silberman and   
                      Jim White   Can More Efficient IT Be Worse for the
                                  Environment? . . . . . . . . . . . . . . 87--89
                  Neil Ferguson   Achieving Synergy in the
                                  Industry-Academia Relationship . . . . . 90--92
                     John Riedl   The Promise and Peril of Social
                                  Computing  . . . . . . . . . . . . . . . 93--95
              Karl Ricanek, Jr.   Dissecting the Human Identity  . . . . . 96--97
                 Neville Holmes   Computers and Their Users  . . . . . . . 100, 98--99

Computer
Volume 44, Number 2, February, 2011

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   A Very Bad Idea  . . . . . . . . . . . . 6--8
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 9--10
                Sixto Ortiz Jr.   Is Peer-to-Peer on the Decline?  . . . . 11--13
           Linda Dailey Paulson   IBM Project Proposes Using Light to Make
                                  Chips Faster . . . . . . . . . . . . . . 14--17
                Vivek Menon and   
                 Shamik Das and   
           Bharat Jayaraman and   
               Venu Govindaraju   Transitioning from Microelectronics to
                                  Nanoelectronics  . . . . . . . . . . . . 18--19
                Greg Snider and   
               Rick Amerson and   
                Dick Carter and   
             Hisham Abdalla and   
   Muhammad Shakeel Qureshi and   
            Jasmin Leveille and   
       Massimiliano Versace and   
               Heather Ames and   
               Sean Patrick and   
          Benjamin Chandler and   
     Anatoli Gorchetchnikov and   
                 Ennio Mingolla   From Synapses to Circuitry: Using
                                  Memristive Memory to Explore the
                                  Electronic Brain . . . . . . . . . . . . 21--28
             Daniel Schinke and   
             Neil Di Spigna and   
        Mihir Shiveshwarkar and   
                   Paul Franzon   Computing with Novel Floating-Gate
                                  Devices  . . . . . . . . . . . . . . . . 29--36
                Andre DeHon and   
                Benjamin Gojman   Crystals and Snowflakes: Building
                                  Computation from Nanowire Crossbars  . . 37--45
                Wenjing Rao and   
               Chengmo Yang and   
               Ramesh Karri and   
                 Alex Orailoglu   Toward Future Systems with Nanoscale
                                  Devices: Overcoming the Reliability
                                  Challenge  . . . . . . . . . . . . . . . 46--53
                   Jeff Yan and   
           Ahmad Salah El Ahmad   Captcha Robustness: a Security
                                  Engineering Perspective  . . . . . . . . 54--60
              Richard Welke and   
            Rudy Hirschheim and   
                 Andrew Schwarz   Service-Oriented Architecture Maturity   61--67
                       Bob Ward   Tom Williams Wins TTTC Award . . . . . . 74--76
              Phil Laplante and   
            George Hurlburt and   
               Keith Miller and   
                   Jeffrey Voas   Certainty through Uncertainty? . . . . . 79--81
               Ina Schaefer and   
                  Reiner Hahnle   Formal Methods in Software Product Line
                                  Engineering  . . . . . . . . . . . . . . 82--85
           Albrecht Schmidt and   
          Marc Langheinrich and   
               Kritian Kersting   Perception beyond the Here and Now . . . 86--88
                Ann E. K. Sobel   Academic Misconduct in the Early 21st
                                  Century  . . . . . . . . . . . . . . . . 89--90
                    Kelvin Sung   Recent Videogame Console Technologies    91--93
                  Robert Fabian   Computing Professionals  . . . . . . . . 96, 94--95

Computer
Volume 44, Number 3, March, 2011

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   Letters to the Editor  . . . . . . . . . 6
               David Alan Grier   The Voice of Wisdom  . . . . . . . . . . 8--10
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 11--12
                  George Lawton   4G: Engineering versus Marketing . . . . 14--16
           Linda Dailey Paulson   Accessing the Internet via Overhead
                                  Lights . . . . . . . . . . . . . . . . . 18--21
         Savitha Srinivasan and   
                 Vladimir Getov   Navigating the Cloud Computing Landscape
                                  --- Technologies, Services, and Adopters 22--23
     Balakrishna Narasimhan and   
                   Ryan Nichols   State of Cloud Applications and
                                  Platforms: The Cloud Adopters' View  . . 24--28
                 Yousef Khalidi   Building a Cloud Computing Platform for
                                  New Possibilities  . . . . . . . . . . . 29--34
             Prith Banerjee and   
          Richard Friedrich and   
                Cullen Bash and   
           Patrick Goldsack and   
          Bernardo Huberman and   
                John Manley and   
          Chandrakant Patel and   
  Parthasarathy Ranganathan and   
                Alistair Veitch   Everything as a Service: Powering the
                                  New Information Economy  . . . . . . . . 36--43
           Benny Rochwerger and   
            David Breitgand and   
               Amir Epstein and   
                David Hadas and   
                   Irit Loy and   
              Kenneth Nagin and   
             Johan Tordsson and   
             Carmelo Ragusa and   
            Massimo Villari and   
             Stuart Clayman and   
               Eliezer Levy and   
      Alessandro Maraschini and   
          Philippe Massonet and   
                Henar Munoz and   
              Giovanni Toffetti   Reservoir --- When One Cloud Is Not
                                  Enough . . . . . . . . . . . . . . . . . 44--51
                     Eric Olden   Architecting a Cloud-Scale Identity
                                  Fabric . . . . . . . . . . . . . . . . . 52--59
                    Robin Vasan   A Venture Perspective on Cloud Computing 60--62
            Orathai Sukwong and   
                  Hyong Kim and   
                      James Hoe   Commercial Antivirus Software
                                  Effectiveness: An Empirical Study  . . . 63--70
                       Bob Ward   Chen, Hescott Win Society Education
                                  Awards . . . . . . . . . . . . . . . . . 71--73
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 83
           P. Jonathon Phillips   Improving Face Recognition Technology    84--86
       Shyong (Tony) K. Lam and   
                     John Riedl   The Past, Present, and Future of
                                  Wikipedia  . . . . . . . . . . . . . . . 87--90
                Kirk W. Cameron   Computing's Role in Resource Accounting  91--92
           Peter J. Denning and   
                 Neville Holmes   Computer Science: An Interview . . . . . 96, 94--95

Computer
Volume 44, Number 4, April, 2011

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   Letters to the Editor  . . . . . . . . . 6--7
           David Alan Grier and   
            Erin Dian Dumbacher   Where Are You From?  . . . . . . . . . . 8--10
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 11--12
                Sixto Ortiz Jr.   Chipmakers ARM for Battle in Traditional
                                  Computing Market . . . . . . . . . . . . 14--17
           Linda Dailey Paulson   Some Users Find the Speed of Light Too
                                  Slow for Their Networks  . . . . . . . . 18--21
               Sasu Tarkoma and   
               Eemil Lagerspetz   Arching over the Mobile Computing Chasm:
                                  Platforms and Runtimes . . . . . . . . . 22--28
                 Steven Fontana   Technology Development as an Alternative
                                  to Traditional Technology Transfer
                                  Models . . . . . . . . . . . . . . . . . 30--36
          Thomas Miller III and   
              Stephen Walsh and   
                Seth Hollar and   
             Elaine Rideout and   
                  Beryl Pittman   Engineering and Innovation: An Immersive
                                  Start-up Experience  . . . . . . . . . . 38--46
                  Ann Gates and   
             Rodrigo Romero and   
         Miguel Alonso, Jr. and   
                Fanny Klett and   
         J. Fernando Naveda and   
                   Dina Requena   Cultivating Entrepreneurial Thinking
                                  through IEEE-CS Student Chapters . . . . 48--55
             Alberto Savoia and   
               Patrick Copeland   Entrepreneurial Innovation at Google . . 56--61
                 Toby Myers and   
            R. Geoff Dromey and   
                 Peter Fritzson   Comodeling: From Requirements to an
                                  Integrated Software/Hardware Model . . . 62--70
                       Bob Ward   Akyildiz Wins W. Wallace McDowell Award  71--73
             Antonio Kruger and   
          Johannes Schoning and   
                Patrick Olivier   How Computing Will Change the Face of
                                  Retail . . . . . . . . . . . . . . . . . 84--87
        Hans Vandierendonck and   
                       Tom Mens   Averting the Next Software Crisis  . . . 88--90
             Thomas M. Chen and   
                Saeed Abu-Nimeh   Lessons from Stuxnet . . . . . . . . . . 91--93
             Tommer Leyvand and   
              Casey Meekhof and   
                Yi-Chen Wei and   
                   Jian Sun and   
                    Baining Guo   Kinect Identity: Technology and
                                  Experience . . . . . . . . . . . . . . . 94--96
            James J. Sluss, Jr.   Engineering Education Activities in
                                  Electric Energy Systems  . . . . . . . . 97--98
                 Jieping Ye and   
                  Teresa Wu and   
                    Jing Li and   
                     Kewei Chen   Machine Learning Approaches for the
                                  Neuroimaging Study of Alzheimer's
                                  Disease  . . . . . . . . . . . . . . . . 99--101
            Dejan Milojicic and   
                    Rich Wolski   Eucalyptus: Delivering a Private Cloud   102--104
               Chris Morris and   
                   Kai A. Olsen   Democracy and Technology . . . . . . . . 108, 106--107

Computer
Volume 44, Number 5, May, 2011

                       Bob Ward   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   Not for All Markets  . . . . . . . . . . 6--8
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 9--10
                    Linda World   Forecasting in Geologic Time: The Tohoku
                                  Quake and Tsunami  . . . . . . . . . . . 11--13
                      Anonymous   Flying Robots Designed to Form Emergency
                                  Network  . . . . . . . . . . . . . . . . 14--16
             Lourdes Moreno and   
            Paloma Martinez and   
                 Belen Ruiz and   
                   Ana Iglesias   Toward an Equal Opportunity Web:
                                  Applications, Standards, and Tools that
                                  Increase Accessibility . . . . . . . . . 18--26
                Bill N. Schilit   Mobile Computing: Looking to the Future  28--29
             Tommi Mikkonen and   
             Antero Taivalsaari   Reports of the Web's Death Are Greatly
                                  Exaggerated  . . . . . . . . . . . . . . 30--36
             Anna Spagnolli and   
             Nicola Corradi and   
          Luciano Gamberini and   
                 Eve Hoggan and   
             Giulio Jacucci and   
            Cecilia Katzeff and   
                Loove Broms and   
                     Li Jonsson   Eco-Feedback on the Go: Motivating
                                  Energy Awareness . . . . . . . . . . . . 38--45
   J. Antonio Garcia-Macias and   
       Jorge Alvarez-Lozano and   
      Paul Estrada-Martinez and   
           Edgardo Aviles-Lopez   Browsing the Internet of Things with
                                  Sentient Visors  . . . . . . . . . . . . 46--52
                  Raja Bose and   
            Jorg Brakensiek and   
            Keun-Young Park and   
                Jonathan Lester   Morphing Smartphones into Automotive
                                  Application Platforms  . . . . . . . . . 53--61
           Nenad Medvidovic and   
            Hossein Tajalli and   
              Joshua Garcia and   
                   Ivo Krka and   
                 Yuriy Brun and   
                 George Edwards   Engineering Heterogeneous Robotics
                                  Systems: a Software Architecture-Based
                                  Approach . . . . . . . . . . . . . . . . 62--71
                       Bob Ward   Grid Pioneer Foster Named 2011 Kanai
                                  Award Winner . . . . . . . . . . . . . . 83--85
         Christopher L. Huntley   The Developer's Perspective  . . . . . . 88--90
  Parthasarathy Ranganathan and   
                  Jichuan Chang   Saving the World, One Server at a Time,
                                  Together . . . . . . . . . . . . . . . . 91--93
               Anil K. Jain and   
                  Brendan Klare   Matching Forensic Sketches and Mug Shots
                                  to Apprehend Criminals . . . . . . . . . 94--96
                 Shilad Sen and   
                     John Riedl   Folksonomy Formation . . . . . . . . . . 97--101
                 Neville Holmes   Aspects of Data Obesity  . . . . . . . . 104, 102--103

Computer
Volume 44, Number 6, June, 2011

                       Bob Ward   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   Dumb Grids and Smart Markets . . . . . . 6--8
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 9--10
                   Neal Leavitt   Mobile Security: Finally a Serious
                                  Problem? . . . . . . . . . . . . . . . . 11--14
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 18--20
                  R. J. Honicky   Understanding and Using Rendezvous to
                                  Enhance Mobile Crowdsourcing
                                  Applications . . . . . . . . . . . . . . 22--28
                     Sumi Helal   IT Footprinting --- Groundwork for
                                  Future Smart Cities  . . . . . . . . . . 30--31
             Milind Naphade and   
           Guruduth Banavar and   
             Colin Harrison and   
           Jurij Paraszczak and   
                  Robert Morris   Smarter Cities and Their Innovation
                                  Challenges . . . . . . . . . . . . . . . 32--39
            Kai Kuikkaniemi and   
             Giulio Jacucci and   
            Marko Turpeinen and   
                 Eve Hoggan and   
                    Jorg Muller   From Space to Stage: How Interactive
                                  Screens Will Change Urban Life . . . . . 40--47
      Felipe Gil-Castineira and   
   Enrique Costa-Montenegro and   
Francisco J. Gonzalez-Castano and   
       Cristina Lopez-Bravo and   
                 Timo Ojala and   
                      Raja Bose   Experiences inside the Ubiquitous Oulu
                                  Smart City . . . . . . . . . . . . . . . 48--55
                Jungwoo Lee and   
              Songhoon Baik and   
                   Choonhwa Lee   Building an Integrated Service
                                  Management Platform for Ubiquitous
                                  Cities . . . . . . . . . . . . . . . . . 56--63
         Nilanjan Mukherjee and   
              Janusz Rajski and   
         Grzegorz Mrugalski and   
               Artur Pogiel and   
                   Jerzy Tyszer   Ring Generator: An Ultimate Linear
                                  Feedback Shift Register  . . . . . . . . 64--71
            Dejan Milojicic and   
                  Phil Laplante   Special Technical Communities  . . . . . 84--88
                       Bob Ward   Kuck Receives Computer Pioneer Award;
                                  VMware's Greene and Rosenblum Win
                                  Computer Entrepreneur Award; Dozens of
                                  New CSDP and CSDA Holders Named  . . . . 89--91
                       Bob Ward   Call and Calendar  . . . . . . . . . . . 92--93
                Cesar Pardo and   
          Francisco J. Pino and   
               Felix Garcia and   
                 Mario Piattini   Harmonizing Quality Assurance Processes
                                  and Product Characteristics  . . . . . . 94--96
                    John Solaro   The Kinect Digital Out-of-Box Experience 97--99
               Dan Breznitz and   
           Michael Murphree and   
                Seymour Goodman   Ubiquitous Data Collection: Rethinking
                                  Privacy Debates  . . . . . . . . . . . . 100--102
              Cynthia Rudin and   
      Rebecca J. Passonneau and   
              Axinia Radeva and   
               Steve Ierome and   
               Delfina F. Isaac   21st-Century Data Miners Meet
                                  19th-Century Electrical Cables . . . . . 103--105
                       Jan Cuny   Transforming Computer Science Education
                                  in High Schools  . . . . . . . . . . . . 107--109
                 Neville Holmes   Computing and the Step Function  . . . . 112, 110--111

Computer
Volume 44, Number 7, July, 2011

               David Alan Grier   Experienced Hands  . . . . . . . . . . . 6--8
              Brian M. Gaff and   
            Catherine J. Toppin   Ten Things to Know When Applying for a
                                  Patent . . . . . . . . . . . . . . . . . 11--12
                Sixto Ortiz Jr.   The Problem with Cloud-Computing
                                  Standardization  . . . . . . . . . . . . 13--16
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 17--19
               Daqing Zhang and   
                    Bin Guo and   
                      Zhiwen Yu   The Emergence of Social and Community
                                  Intelligence . . . . . . . . . . . . . . 21--28
              Oliver Bimber and   
                  Carl K. Chang   Computational Archaeology: Reviving the
                                  Past with Present-Day Tools  . . . . . . 30--31
            Michael Edmunds and   
                    Tony Freeth   Using Computation to Decode the First
                                  Known Computer . . . . . . . . . . . . . 32--39
               Eugene Ch'ng and   
              Henry Chapman and   
            Vincent Gaffney and   
            Phil Murgatroyd and   
              Chris Gaffney and   
              Wolfgang Neubauer   From Sites to Landscapes: How Computing
                                  Technology Is Shaping Archaeological
                                  Practice . . . . . . . . . . . . . . . . 40--46
           Roberto Scopigno and   
             Marco Callieri and   
              Paolo Cignoni and   
       Massimiliano Corsini and   
          Matteo Dellepiane and   
           Federico Ponchio and   
                Guido Ranzuglia   $3$D Models for Cultural Heritage:
                                  Beyond Plain Visualization . . . . . . . 48--55
               Vid Petrovic and   
              Aaron Gidding and   
                 Tom Wypych and   
              Falko Kuester and   
          Thomas A. DeFanti and   
                 Thomas E. Levy   Dealing with Archaeology's Data
                                  Avalanche  . . . . . . . . . . . . . . . 56--60
                   Renju Li and   
                    Tao Luo and   
                Hongbin Zha and   
                         Wei Lu   Computer-Assisted Archaeological Line
                                  Drawing  . . . . . . . . . . . . . . . . 62--65
       Mohammad Tehranipoor and   
             Hassan Salmani and   
               Xuehui Zhang and   
              Xiaoxiao Wang and   
               Ramesh Karri and   
      Jeyavijayan Rajendran and   
                 Kurt Rosenfeld   Trustworthy Hardware: Trojan Detection
                                  and Design-for-Trust Challenges  . . . . 66--74
                    Dirk Riehle   Controlling and Steering Open Source
                                  Projects . . . . . . . . . . . . . . . . 93--96
         Richard P. Larrick and   
                Kirk W. Cameron   Consumption-Based Metrics: From Autos to
                                  IT . . . . . . . . . . . . . . . . . . . 97--99
                Kevin W. Bowyer   What Surprises Do Identical Twins Have
                                  for Identity Science?  . . . . . . . . . 100--102
       Shyong (Tony) K. Lam and   
                     John Riedl   Expressing My Inner Gnome: Appearance
                                  and Behavior in Virtual Worlds . . . . . 103--105
                   Kai A. Olsen   Programmed Politeness  . . . . . . . . . 108, 106--107

Computer
Volume 44, Number 8, August, 2011

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   The Chicken Bus  . . . . . . . . . . . . 6--8
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 9--10
              Brian M. Gaff and   
            Catherine J. Toppin   Ten Things to Know When Your Patent
                                  Application Is Pending . . . . . . . . . 11--12
      Steven J. Vaughan-Nichols   OpenFlow: The Next Generation of the
                                  Network? . . . . . . . . . . . . . . . . 13--15
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 16--18
                      Greg Goth   IBM PC Retrospective: There Was Enough
                                  Right to Make It Work  . . . . . . . . . 26--33
                  David Bradley   A Personal History of the IBM PC . . . . 19--25
                   Edward Bride   The IBM Personal Computer: a
                                  Software-Driven Market . . . . . . . . . 34--39
                   Gurbir Singh   The IBM PC: The Silicon Story  . . . . . 40--45
             Pieter Simoens and   
             Filip De Turck and   
                Bart Dhoedt and   
                 Piet Demeester   Remote Display Solutions for Mobile
                                  Cloud Computing  . . . . . . . . . . . . 46--53
                Sungkap Yeo and   
                 Hsien-Hsin Lee   Using Mathematical Modeling in
                                  Provisioning a Heterogeneous Cloud
                                  Computing Environment  . . . . . . . . . 55--62
             Alain Chesnais and   
                  Sorel Reisman   From the Presidents of the IEEE Computer
                                  Society and ACM  . . . . . . . . . . . . 63--64
                      Anonymous   IEEE Computer Society Election . . . . . 65--73
                      Anonymous   IEEE President-Elect Candidates Address
                                  Computer Society Concerns  . . . . . . . 75--80
                      Anonymous   Call and Calendar  . . . . . . . . . . . 81--82
                John Bryant and   
                      Jason Bay   Stereoscopic Technologies and Effects    93--95
                Emil Vassev and   
                   Mike Hinchey   Knowledge Representation and Reasoning
                                  for Intelligent Software Systems . . . . 96--99
          Manfred Tscheligi and   
 Alexander Meschtscherjakov and   
                David Wilfinger   Interactive Computing on Wheels  . . . . 100--102
              Manish Marwah and   
                  Amip Shah and   
                Cullen Bash and   
          Chandrakant Patel and   
             Naren Ramakrishnan   Using Data Mining to Help Design
                                  Sustainable Products . . . . . . . . . . 103--106
              Charles Severance   Toward Developing an Education App Store 107--109
                 Neville Holmes   The Cultural Potential of Keyboards  . . 112, 110--111

Computer
Volume 44, Number 9, September, 2011

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   Leisure Science  . . . . . . . . . . . . 6--8
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 9--10
              Brian M. Gaff and   
            Catherine J. Toppin   Ten Things to Know When Your Patent
                                  Application Is Allowed . . . . . . . . . 11--13
                   Neal Leavitt   IPv6: Any Closer to Adoption?  . . . . . 14--16
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 18--20
                  Rolf Oppliger   Security and Privacy in an Online World  21--22
            Saeed Abu-Nimeh and   
             Thomas M. Chen and   
                    Omar Alzubi   Malicious and Spam Posts in Online
                                  Social Networks  . . . . . . . . . . . . 23--28
           Hossein Saiedian and   
                 Dan S. Broyles   Security Vulnerabilities in the
                                  Same-Origin Policy: Implications and
                                  Alternatives . . . . . . . . . . . . . . 29--36
         Florian Kerschbaum and   
             Axel Schropfer and   
              Antonio Zilli and   
           Richard Pibernik and   
           Octavian Catrina and   
        Sebastiaan de Hoogh and   
         Berry Schoenmakers and   
             Stelvio Cimato and   
                Ernesto Damiani   Secure Collaborative Supply-Chain
                                  Management . . . . . . . . . . . . . . . 38--43
            Francisco Rocha and   
             Salvador Abreu and   
                 Miguel Correia   The Final Frontier: Confidentiality and
                                  Privacy in the Cloud . . . . . . . . . . 44--50
              Rodrigo Roman and   
               Pablo Najera and   
                   Javier Lopez   Securing the Internet of Things  . . . . 51--58
              Siani Pearson and   
             Marco Casassa Mont   Sticky Policies: An Approach for
                                  Managing Privacy across Multiple Parties 60--68
        Frederick Ryckbosch and   
             Stijn Polfliet and   
                Lieven Eeckhout   Trends in Server Energy Proportionality  69--72
                Vivek Menon and   
           Bharat Jayaraman and   
               Venu Govindaraju   The Three Rs of Cyberphysical Spaces . . 73--79
                      Anonymous   Bookshelf  . . . . . . . . . . . . . . . 87
                      Anonymous   Barrett Wins Pre-College Education Award 88--90
                      Anonymous   Call and Calendar  . . . . . . . . . . . 91--92
            Henry Lieberman and   
            Karthik Dinakar and   
                   Birago Jones   Let's Gang Up on Cyberbullying . . . . . 93--96
       Suparna Bhattacharya and   
                K. Gopinath and   
          Karthick Rajamani and   
                   Manish Gupta   Software Bloat and Wasted Joules: Is
                                  Modularity a Hurdle to Green Software?   97--101
         Christopher L. Huntley   Onshore Mobile App Development:
                                  Successes and Challenges . . . . . . . . 102--104
          Karl Ricanek, Jr. and   
               Benjamin Barbour   What Are Soft Biometrics and How Can
                                  They Be Used?  . . . . . . . . . . . . . 106--108
            Alessio Malizia and   
                   Kai A. Olsen   Has Everything Been Invented? On
                                  Software Development and the Future of
                                  Apps . . . . . . . . . . . . . . . . . . 112, 110--111

Computer
Volume 44, Number 10, October, 2011

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   The Habit of Change  . . . . . . . . . . 6--8
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 9--10
                Sixto Ortiz Jr.   Bringing $3$D to the Small Screen  . . . 11--13
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 14--16
              Carl K. Chang and   
             David M. Weiss and   
                   Mike Hinchey   Where Software Engineering Meets \ldots  17--18
                   Manfred Broy   Can Practitioners Neglect Theory and
                                  Theoreticians Neglect Practice?  . . . . 19--24
               Brian Fitzgerald   Open Source Software: Lessons from and
                                  for Software Engineering . . . . . . . . 25--30
                    Mark Harman   Software Engineering Meets Evolutionary
                                  Computation  . . . . . . . . . . . . . . 31--39
                     Robyn Lutz   Software Engineering for Space
                                  Exploration  . . . . . . . . . . . . . . 41--46
                Stephen Yau and   
                          Ho An   Software Engineering Meets Services and
                                  Cloud Computing  . . . . . . . . . . . . 47--53
                   David Parnas   Software Engineering --- Missing in
                                  Action: a Personal Perspective . . . . . 54--58
                Jae Min Kim and   
                Minyong Kim and   
                Joonho Kong and   
            Hyung Beom Jang and   
                 Sung Woo Chung   Display Power Management That Detects
                                  User Intent  . . . . . . . . . . . . . . 60--66
                      Anonymous   UTA's Yale Patt Wins First IEEE CS Rau
                                  Award  . . . . . . . . . . . . . . . . . 67--69
                   Justin Clark   Object Digitization for Everyone . . . . 81--83
                   Min Chen and   
             Anne Trefethen and   
     Rene Banares-Alcantara and   
             Marina Jirotka and   
                 Bob Coecke and   
                Thomas Ertl and   
               Albrecht Schmidt   From Data Analysis and Visualization to
                                  Causality Discovery  . . . . . . . . . . 84--87
                Dirk Basten and   
                    Ali Sunyaev   Guidelines for Software Development
                                  Effort Estimation  . . . . . . . . . . . 88--90
               Johan Bollen and   
                      Huina Mao   Twitter Mood as a Stock Market Predictor 91--94
                   Mark Guzdial   Learning How to Prepare Computer Science
                                  High School Teachers . . . . . . . . . . 95--97
                 Neville Holmes   Digital Machinery and Analog Brains  . . 100, 98--99

Computer
Volume 44, Number 11, November, 2011

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   The Honest Give-and-Take . . . . . . . . 6--8
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 9--10
                     Lee Garber   Turning on the Lights for Wireless
                                  Communications . . . . . . . . . . . . . 11--14
                      Anonymous   System Identifies User Location without
                                  GPS or Wi-Fi . . . . . . . . . . . . . . 15--17
             Vladimir Getov and   
              Adolfy Hoisie and   
            Harvey J. Wasserman   Codesign for Systems and Applications:
                                  Charting the Path to Exascale Computing  19--21
                 John Shalf and   
                Dan Quinlan and   
                 Curtis Janssen   Rethinking Hardware--Software Codesign
                                  for Exascale Systems . . . . . . . . . . 22--30
               Sayantan Sur and   
            Sreeram Potluri and   
           Krishna Kandalla and   
             Hari Subramoni and   
       Dhabaleswar K. Panda and   
                    Karen Tomko   Codesign for InfiniBand Clusters . . . . 31--36
            Darren Kerbyson and   
             Abhinav Vishnu and   
               Kevin Barker and   
                  Adolfy Hoisie   Codesign Challenges for Exascale
                                  Systems: Performance, Power, and
                                  Reliability  . . . . . . . . . . . . . . 37--43
                  Dan Stanzione   The iPlant Collaborative:
                                  Cyberinfrastructure to Feed the World    44--52
 Bindu Madhavi Padmanabhuni and   
              Hee Beng Kuan Tan   Defending against Buffer-Overflow
                                  Vulnerabilities  . . . . . . . . . . . . 53--60
              Giuseppe Nuti and   
         Mahnoosh Mirghaemi and   
           Philip Treleaven and   
          Chaiyakorn Yingsaeree   Algorithmic Trading  . . . . . . . . . . 61--69
                      Anonymous   Chuck Seitz Wins Cray Award  . . . . . . 70--70
                      Anonymous   Cleve Moler Wins Fernbach Award  . . . . 71--71
                   David Walden   Fiftieth Anniversary of MIT's Compatible
                                  Time-Sharing System  . . . . . . . . . . 71--71
                      Anonymous   Susan Graham receives Kennedy Award  . . 72--72
                      Anonymous   Call and Calendar  . . . . . . . . . . . 73--74
             Yung-Hsiang Lu and   
                  Qinru Qiu and   
                Ali R. Butt and   
                Kirk W. Cameron   End-to-End Energy Management . . . . . . 75--77
                  Arun Ross and   
                    Ayman Abaza   Human Ear Recognition  . . . . . . . . . 79--81
    Jose Luis Gomez-Barroso and   
             Claudio Feijoo and   
                  Ramon Compano   Opportunities in the Mobile Search
                                  Market . . . . . . . . . . . . . . . . . 83--85
                Shubu Mukherjee   If Anything in This Life Is Certain,
                                  It's That You Can Kill Any ISA . . . . . 87--88
                   Mikhil Masli   Crowdsourcing Maps . . . . . . . . . . . 90--93
               Kai A. Olsen and   
                Alessio Malizia   Automated Personal Assistants  . . . . . 112, 110--111

Computer
Volume 44, Number 12, December, 2011

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                  Sorel Reisman   Looking Back, Looking Forward  . . . . . 8--10
               David Alan Grier   Uncharted Territory  . . . . . . . . . . 12--14
                      Anonymous   32 and 16 Years Ago  . . . . . . . . . . 15--16
                   Neal Leavitt   Internet Security under Attack: The
                                  Undermining of Digital Certificates  . . 17--20
                      Anonymous   Serious Security Flaws Identified in
                                  Cloud Systems  . . . . . . . . . . . . . 21--23
            Jesse M. Heines and   
             Gena R. Greher and   
           S. Alex Ruthmann and   
              Brendan L. Reilly   Two Approaches to Interdisciplinary
                                  Computing $+$ Music Courses  . . . . . . 25--32
                 Joe Geigel and   
             Marla Schweppe and   
                David Huynh and   
                Brian Johnstone   Adapting a Virtual World for Theatrical
                                  Performance  . . . . . . . . . . . . . . 33--38
                 So Yamaoka and   
               Lev Manovich and   
            Jeremy Douglass and   
                  Falko Kuester   Cultural Analytics in Large-Scale
                                  Visualization Environments . . . . . . . 39--48
                    Ami Marowka   Back to Thin-Core Massively Parallel
                                  Processors . . . . . . . . . . . . . . . 49--54
                Mary Lacity and   
               Erran Carmel and   
                 Joseph Rottman   Rural Outsourcing: Delivering ITO and
                                  BPO Services from Remote Domestic
                                  Locations  . . . . . . . . . . . . . . . 55--62
              Laura Ferrari and   
                    Marco Mamei   Discovering City Dynamics through Sports
                                  Tracking Applications  . . . . . . . . . 63--68
                      Anonymous   Grier Voted 2012 Computer Society
                                  President-Elect  . . . . . . . . . . . . 69--70
                      Anonymous   North America New PhD Numbers Hold
                                  Steady . . . . . . . . . . . . . . . . . 71--73
                      Anonymous   Call and Calendar  . . . . . . . . . . . 74--76
              Wil van der Aalst   Using Process Mining to Bridge the Gap
                                  between BI and BPM . . . . . . . . . . . 77--80
                Douglas Baldwin   Is Computer Science a Relevant Academic
                                  Discipline for the 21st Century? . . . . 81--83
                 Emi Tamaki and   
                   Jun Rekimoto   PossessedHand: Controlling Hand
                                  Movements with Computer Output . . . . . 84--86
                Alexander Hills   Museums at Your Fingertips . . . . . . . 87--89
                   Kim Schaffer   Are Password Requirements too Difficult? 90--92
             Rafael Capilla and   
                      Jan Bosch   The Promise and Challenge of Runtime
                                  Variability  . . . . . . . . . . . . . . 93--95
                 Neville Holmes   The Profession and Digital Technology    116, 114--115


Computer
Volume 45, Number 1, January, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                   John W. Walz   Creating Our Future  . . . . . . . . . . 6--7
                     Ron Vetter   Digital Computer: The Next-Generation
                                  Flagship Publication . . . . . . . . . . 8--9
              Charles Severance   The Second-Order Effects of Steve Jobs   10--11
                      Anonymous   32 & 16 years ago . . . . . . . . . . . . 12--13
              Brian M. Gaff and   
             Ralph A. Loren and   
              Gabriel J. McCool   Intellectual Property, Part I  . . . . . 14--16
                     Lee Garber   The Challenges of Securing the
                                  Virtualized Environment  . . . . . . . . 17--20
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 21--23
             Daniel A. Reed and   
           Dennis B. Gannon and   
                 James R. Larus   Imagining the Future: Thoughts on
                                  Computing  . . . . . . . . . . . . . . . 25--30
                  Dawn Song and   
                 Elaine Shi and   
                Ian Fischer and   
                  Umesh Shankar   Cloud Data Protection for the Masses . . 39--45
              Bjarne Stroustrup   Software Development for Infrastructure  47--58
              S. S. Iyengar and   
                     Xin Li and   
                Huanhuan Xu and   
      Supratik Mukhopadhyay and   
            N. Balakrishnan and   
                Amit Sawant and   
                Puneeth Iyengar   Toward More Precise Radiotherapy
                                  Treatment of Lung Tumors . . . . . . . . 59--65
          Antonia Bertolino and   
       Guglielmo De Angelis and   
            Sampo Kellomaki and   
                  Andrea Polini   Enhancing Service Federation
                                  Trustworthiness through Online Testing   66--72
                      Anonymous   Two CS Members Win US Presidential
                                  Honors . . . . . . . . . . . . . . . . . 73--76
                      Anonymous   Call and Calendar  . . . . . . . . . . . 77--78
               Anil K. Jain and   
                    Soweon Yoon   Automatic Detection of Altered
                                  Fingerprints . . . . . . . . . . . . . . 79--82
                      Doug Lyon   The Java Tree Withers  . . . . . . . . . 83--85
                    Hal Berghel   Identity Theft and Financial Fraud: Some
                                  Strangeness in the Proportions . . . . . 86--89
       Shyong (Tony) K. Lam and   
                     John Riedl   Are Our Online ``Friends'' Really
                                  Friends? . . . . . . . . . . . . . . . . 91--93
          Matthew Tolentino and   
                Kirk W. Cameron   The Optimist, the Pessimist, and the
                                  Global Race to Exascale in 20 Megawatts  95--97
           David Alan Grier and   
            Erin Dian Dumbacher   The Common Future  . . . . . . . . . . . 108

Computer
Volume 45, Number 2, February, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 6
              Charles Severance   JavaScript: Designing a Language in 10
                                  Days . . . . . . . . . . . . . . . . . . 7--8
              Brian M. Gaff and   
             Ralph A. Loren and   
           Elizabeth A. Spinney   Intellectual Property, Part II . . . . . 9--11
                      Anonymous   32 & 16 years ago . . . . . . . . . . . . 12--13
                  George Lawton   Cloud Streaming Brings Video to Mobile
                                  Devices  . . . . . . . . . . . . . . . . 14--16
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 17--19
               Simon S. Y. Shim   Guest Editor's Introduction: The CAP
                                  Theorem's Growing Impact . . . . . . . . 21--22
                    Eric Brewer   Pushing the CAP: Strategies for
                                  Consistency and Availability . . . . . . 23--29
               Seth Gilbert and   
                 Nancy A. Lynch   Perspectives on the CAP Theorem  . . . . 30--36
                Daniel J. Abadi   Consistency Tradeoffs in Modern
                                  Distributed Database System Design: CAP
                                  is Only Part of the Story  . . . . . . . 37--42
             Raghu Ramakrishnan   CAP and Cloud Data Management  . . . . . 43--49
          Kenneth P. Birman and   
         Daniel A. Freedman and   
                   Qi Huang and   
                 Patrick Dowell   Overcoming CAP with Consistent
                                  Soft-State Replication . . . . . . . . . 50--58
                Gary C. Kessler   Information Security: New Threats or
                                  Familiar Problems? . . . . . . . . . . . 59--65
               Nuno Antunes and   
                   Marco Vieira   Defending against Web Application
                                  Vulnerabilities  . . . . . . . . . . . . 66--72
                 Justin Jee and   
           Lee Case Klippel and   
        M. Shahriar Hossain and   
         Naren Ramakrishnan and   
                     Bud Mishra   Discovering the Ebb and Flow of Ideas
                                  from Text Corpora  . . . . . . . . . . . 73--77
  Christian Muller-Tomfelde and   
                   Morten Fjeld   Tabletops: Interactive Horizontal
                                  Displays for Ubiquitous Computing  . . . 78--81
            Angelos Stavrou and   
               Jeffrey Voas and   
            Tom Karygiannis and   
               Steve Quirolgico   Building Security into Off-the-Shelf
                                  Smartphones  . . . . . . . . . . . . . . 82--84
                  Jimmy Gambier   An Independent Social Game Company's
                                  Perspective  . . . . . . . . . . . . . . 85--87
                    Bo Brinkman   The Next Step for Ethics Education Is
                                  Enforcing the Code . . . . . . . . . . . 88--90
                    Francis Hsu   The Impossible and the Possible  . . . . 91--92
                       Bob Ward   Computer Society Names Winners of Three
                                  Key Awards . . . . . . . . . . . . . . . 93--95
                      Anonymous   Call and Calendar  . . . . . . . . . . . 97--98
           David Alan Grier and   
            Erin Dian Dumbacher   The New Internationalists  . . . . . . . 112

Computer
Volume 45, Number 3, March, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Monash Museum of Computing History . . . 6--7
              Brian M. Gaff and   
      Thomas J. Smedinghoff and   
                    Socheth Sor   Privacy and Data Security  . . . . . . . 8--10
                      Anonymous   32 & 16 years ago . . . . . . . . . . . . 11--12
                     Lee Garber   Wi-Fi Races into a Faster Future . . . . 13--16
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 18--20
                   T. M. Murali   Guest Editor's Introduction:
                                  Computationally Driven Experimental
                                  Biology  . . . . . . . . . . . . . . . . 22--23
          Michael B. Mayhew and   
                    Xin Guo and   
            Steven B. Haase and   
         Alexander J. Hartemink   Close Encounters of the Collaborative
                                  Kind . . . . . . . . . . . . . . . . . . 24--30
                Mehmet Koyuturk   Using Protein Interaction Networks to
                                  Understand Complex Diseases  . . . . . . 31--38
               Fabio Vandin and   
                  Eli Upfal and   
            Benjamin J. Raphael   Algorithms and Genome Sequencing:
                                  Identifying Driver Pathways in Cancer    39--46
               Steven S. Skiena   Redesigning Viral Genomes  . . . . . . . 47--53
             Lwin Khin Shar and   
              Hee Beng Kuan Tan   Defending against Cross-Site Scripting
                                  Attacks  . . . . . . . . . . . . . . . . 55--62
               Xiaojun Quan and   
                 Liu Wenyin and   
                  Wenyu Dou and   
                  Hui Xiong and   
                        Yong Ge   Link Graph Analysis for Business Site
                                  Selection  . . . . . . . . . . . . . . . 64--69
                    Hal Berghel   WikiLeaks and the Matter of Private
                                  Manning  . . . . . . . . . . . . . . . . 70--73
            Kirk W. Cameron and   
                        Rong Ge   Generalizing Amdahl's Law for Power and
                                  Energy . . . . . . . . . . . . . . . . . 75--77
             Aaron Halfaker and   
                     John Riedl   Bots and Cyborgs: Wikipedia's Immune
                                  System . . . . . . . . . . . . . . . . . 79--82
             Cornelius Held and   
                Julia Krumm and   
               Petra Markel and   
                Ralf P. Schenke   Intelligent Video Surveillance . . . . . 83--84
                      Anonymous   Computer Society Connection  . . . . . . 85--87
                       Bob Ward   Call and Calendar  . . . . . . . . . . . 88--89
           David Alan Grier and   
            Erin Dian Dumbacher   Free Agency  . . . . . . . . . . . . . . 104

Computer
Volume 45, Number 4, April, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Discovering JavaScript Object Notation   6--8
              Brian M. Gaff and   
            Brian P. Murphy and   
                 Peter J. Cuomo   Defending Against Patent Infringement    9--12
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 13--14
                Sixto Ortiz Jr.   New Approach Keeps Security in Context   15--17
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 18--20
           Albrecht Schmidt and   
            Elizabeth Churchill   Interaction Beyond the Keyboard  . . . . 21--24
          Jan B. F. van Erp and   
               Fabien Lotte and   
             Michael Tangermann   Brain-Computer Interfaces: Beyond
                                  Medical Applications . . . . . . . . . . 26--34
             Hans Gellersen and   
                  Florian Block   Novel Interactions on the Keyboard . . . 36--40
                 Andreas Riener   Gestural Interaction in Vehicular
                                  Applications . . . . . . . . . . . . . . 42--47
     Michel Beaudouin-Lafon and   
              Stephane Huot and   
             Mathieu Nancel and   
               Wendy Mackay and   
          Emmanuel Pietriga and   
              Romain Primet and   
               Julie Wagner and   
            Olivier Chapuis and   
            Clement Pillias and   
             James R. Eagan and   
            Tony Gjerlufsen and   
               Clemens Klokmose   Multisurface Interaction in the WILD
                                  Room . . . . . . . . . . . . . . . . . . 48--56
             Andrea Bianchi and   
                 Ian Oakley and   
                  Dong-Soo Kwon   Open Sesame: Design Guidelines for
                                  Invisible Passwords  . . . . . . . . . . 58--65
              Kai-hui Chang and   
                    Chris Browy   Parallel Logic Simulation: Myth or
                                  Reality? . . . . . . . . . . . . . . . . 67--73
              Daniel Yellin and   
             Yifat Yulevich and   
           Alexander Pyasic and   
                 Avshalom Houri   Optimized Interactive Processes  . . . . 74--81
               Gary Marsden and   
             Edward Cutrell and   
                 Matt Jones and   
           Amit A. Nanavati and   
                Nitendra Rajput   Making Technology Invisible in the
                                  Developing World . . . . . . . . . . . . 82--85
                 David C. Hodge   Increasing Tuition's Affordability . . . 86--88
               Brian Fitzgerald   Software Crisis 2.0  . . . . . . . . . . 89--91
  Anthony Patrick Melaragno and   
           Damindra Bandara and   
         Duminda Wijesekera and   
             James Bret Michael   Securing the ZigBee Protocol in the
                                  Smart Grid . . . . . . . . . . . . . . . 92--94
                 Henry Tsai and   
                    Kelvin Sung   Mobile Applications and Museum
                                  Visitation . . . . . . . . . . . . . . . 95--98
                      Anonymous   Computer Society Recognizes Outstanding
                                  Professionals  . . . . . . . . . . . . . 99--101
                      Anonymous   Call and Calendar  . . . . . . . . . . . 102--103
           David Alan Grier and   
            Erin Dian Dumbacher   Learning from the Best . . . . . . . . . 116

Computer
Volume 45, Number 5, May, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Van Jacobson: Getting NSFNet off the
                                  Ground . . . . . . . . . . . . . . . . . 6--9
              Brian M. Gaff and   
         Stephen G. Huggard and   
               Gregory W. Carey   Do I Need A Lawyer? If You Have to Ask,
                                  You Probably Do  . . . . . . . . . . . . 10--12
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 13--14
                   Neal Leavitt   Will Power Problems Curtail Processor
                                  Progress?  . . . . . . . . . . . . . . . 15--17
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 18--20
                   Roy Want and   
                Bill N. Schilit   Interactive Digital Signage  . . . . . . 21--24
                Nick Taylor and   
                 Keith Cheverst   Supporting Community Awareness with
                                  Interactive Displays . . . . . . . . . . 26--32
              Adrian Friday and   
               Nigel Davies and   
            Christos Efstratiou   Reflections on Long-Term Experiments
                                  with Public Displays . . . . . . . . . . 34--41
                 Timo Ojala and   
          Vassilis Kostakos and   
                Hannu Kukka and   
            Tommi Heikkinen and   
               Tomas Linden and   
                Marko Jurmu and   
                 Simo Hosio and   
               Fabio Kruger and   
                  Daniele Zanni   Multipurpose Interactive Public Displays
                                  in the Wild: Three Years Later . . . . . 42--49
                Florian Alt and   
                Jorg Muller and   
               Albrecht Schmidt   Advertising on Public Display Networks   50--56
               Nigel Davies and   
          Marc Langheinrich and   
                   Rui Jose and   
               Albrecht Schmidt   Open Display Networks: a Communications
                                  Medium for the 21st Century  . . . . . . 58--64
                Jamie Erbes and   
   Hamid R. Motahari-Nezhad and   
                  Sven Graupner   The Future of Enterprise IT in the Cloud 66--72
        Lars Hopland Nestas and   
                  Kjell J. Hole   Building and Maintaining Trust in
                                  Internet Voting  . . . . . . . . . . . . 74--80
                   Tony Hey and   
              Dennis Gannon and   
                  Jim Pinkelman   The Future of Data-Intensive Science . . 81--82
                      Zhiwei Xu   Measuring Green IT in Society  . . . . . 83--85
                    Hal Berghel   Breaking the Fourth Wall of Electronic
                                  Crime: Blame It on the Thespians . . . . 86--88
            Alessio Malizia and   
                   Kai A. Olsen   Toward a New Search Paradigm --- Can We
                                  Learn from Ants? . . . . . . . . . . . . 89--91
               Anil K. Jain and   
                   Rong Jin and   
                   Jung-Eun Lee   Tattoo Image Matching and Retrieval  . . 93--96
                      Anonymous   Computer Society Honors Top Scientists   97--99
                      Anonymous   Call and Calendar  . . . . . . . . . . . 100--102
           David Alan Grier and   
            Erin Dian Dumbacher   Teaching the Intangible  . . . . . . . . 116

Computer
Volume 45, Number 6, June, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Alan Turing and Bletchley Park . . . . . 6--8
              Brian M. Gaff and   
           Gregory J. Ploussios   Open Source Software . . . . . . . . . . 9--11
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                     Lee Garber   Tangible User Interfaces: Technology You
                                  Can Touch  . . . . . . . . . . . . . . . 15--18
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 19--21
                 Carl Chang and   
             Vladimir Getov and   
                    Kelvin Sung   Computing in Asia: a Sampling of Recent
                                  Success Stories  . . . . . . . . . . . . 23--25
                   Hong Mei and   
                 Gang Huang and   
                        Tao Xie   Internetware: a Software Paradigm for
                                  Internet Computing . . . . . . . . . . . 26--31
                   Mikio Aoyama   Computing for the Next-Generation
                                  Automobile . . . . . . . . . . . . . . . 32--37
                Lijuan Wang and   
                   Yao Qian and   
              Matthew Scott and   
                  Gang Chen and   
                    Frank Soong   Computer-Assisted Audiovisual Language
                                  Learning . . . . . . . . . . . . . . . . 38--47
                  Wing-Kin Sung   Bioinformatics Applications in Genomics  57--63
               Zhenyu Zhang and   
                 W. K. Chan and   
                      T. H. Tse   Fault Localization Based Only on Failed
                                  Runs . . . . . . . . . . . . . . . . . . 64--71
                  Jerome Israel   Why the FBI Can't Build a Case
                                  Management System  . . . . . . . . . . . 73--80
  Virginia N. L. Franqueira and   
               Roel J. Wieringa   Role-Based Access Control in Retrospect  81--88
                Jeff Munson and   
                Phillip Pasqual   Using Technology in Autism Research: The
                                  Promise and the Perils . . . . . . . . . 89--91
              Devon M. Simmonds   The Programming Paradigm Evolution . . . 93--95
              Richard J. Lipton   Might Turing Have Won a Turing Award?    96--97
               Robert Harle and   
                    Andy Hopper   Sports Sensing: An Olympic Challenge for
                                  Computing  . . . . . . . . . . . . . . . 98--101
              Rolf Oppliger and   
                Bruno Wildhaber   Common Misconceptions in Computer and
                                  Information Security . . . . . . . . . . 102--104
                      Anonymous   Society Honors Fagin for Work on
                                  Databases  . . . . . . . . . . . . . . . 105--106
                      Anonymous   Call and Calendar  . . . . . . . . . . . 107--109
           David Alan Grier and   
            Erin Dian Dumbacher   Controlling Share  . . . . . . . . . . . 128

Computer
Volume 45, Number 7, July, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 6--7
              Charles Severance   The Art of Teaching Computer Science:
                                  Niklaus Wirth  . . . . . . . . . . . . . 8--10
              Brian M. Gaff and   
         Richard N. Kimball and   
                 Jill M. Hanson   Raising Capital: Where to Find It, How
                                  to Secure It, and Tips on What to Avoid  11--13
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 14--15
                Sixto Ortiz Jr.   Computing Trends Lead to New Programming
                                  Languages  . . . . . . . . . . . . . . . 17--20
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 21--23
                  Oliver Bimber   What's Real About Augmented Reality? . . 24--25
           Michael Gervautz and   
             Dieter Schmalstieg   Anywhere Interfaces Using Handheld
                                  Augmented Reality  . . . . . . . . . . . 26--31
                  Mark Mine and   
                 David Rose and   
                   Bei Yang and   
            Jeroen van Baar and   
         Anselm Grundhöfer   Projection-Based Augmented Reality in
                                  Disney Theme Parks . . . . . . . . . . . 32--40
                Ailsa Barry and   
             Jonathan Trout and   
              Paul Debenham and   
                  Graham Thomas   Augmented Reality in a Public Space: The
                                  Natural History Museum, London . . . . . 42--47
               Nassir Navab and   
                Tobias Blum and   
                Lejing Wang and   
                Aslì and   
                       Okur and   
                 Thomas Wendler   First Deployments of Augmented Reality
                                  in Operating Rooms . . . . . . . . . . . 48--55
          Mark Billinghurst and   
            Andreas Dünser   Augmented Reality in the Classroom . . . 56--63
              Daniel E. O'Leary   Computer-Based Political Action: The
                                  Battle and Internet Blackout over PIPA   64--72
              Jianyong Chen and   
                  Yang Wang and   
                   Xiaomin Wang   On-Demand Security Architecture for
                                  Cloud Computing  . . . . . . . . . . . . 73--78
                    Hal Berghel   The OuijAmazon Desktop Metaphor  . . . . 80--82
             Eitan Frachtenberg   Holistic Datacenter Design in the Open
                                  Compute Project  . . . . . . . . . . . . 83--85
           Patrizio Campisi and   
             Daria La Rocca and   
                Gaetano Scarano   EEG for Automatic Person Recognition . . 87--89
           Anuradha Uduwage and   
              Joseph A. Konstan   The Answer Is Out There: Online Q&A Sites 90--92
                      Anonymous   Avi\vzienis Wins Eckert--Mauchly Award   93--95
                      Anonymous   Call and Calendar  . . . . . . . . . . . 96--98
           David Alan Grier and   
            Erin Dian Dumbacher   Repurposers  . . . . . . . . . . . . . . 116

Computer
Volume 45, Number 8, August, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 6--7
              Charles Severance   Teaching the World: Daphne Koller and
                                  Coursera . . . . . . . . . . . . . . . . 8--9
              Brian M. Gaff and   
               Kenneth Choy and   
                     Jamie Chan   Doing Business in China  . . . . . . . . 11--13
                      Anonymous   32 & 16 years ago . . . . . . . . . . . . 14--15
                     Lee Garber   Converged Infrastructure: Addressing the
                                  Efficiency Challenge . . . . . . . . . . 17--20
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 21--23
         Stephen W. Keckler and   
            Steven K. Reinhardt   Massively Multithreaded Computing
                                  Systems  . . . . . . . . . . . . . . . . 24--25
           John A. Stratton and   
      Christopher Rodrigues and   
                 I-Jui Sung and   
               Li-Wen Chang and   
             Nasser Anssari and   
                   Geng Liu and   
             Wen-mei W. Hwu and   
                     Nady Obeid   Algorithm and Data Optimization
                                  Techniques for Scaling to Massively
                                  Threaded Systems . . . . . . . . . . . . 26--32
              Stanley Tzeng and   
              Brandon Lloyd and   
                  John D. Owens   A GPU Task-Parallel Model with
                                  Dependency Resolution  . . . . . . . . . 34--41
         Benedict R. Gaster and   
                      Lee Howes   Can GPGPU Programming Be Liberated from
                                  the Data-Parallel Bottleneck?  . . . . . 42--52
             Antonino Tumeo and   
              Simone Secchi and   
                   Oreste Villa   Designing Next-Generation Massively
                                  Multithreaded Architectures for
                                  Irregular Applications . . . . . . . . . 53--61
             Stephen Davies and   
          Stacey Aylor Seal and   
                 Jesse Hatfield   Cinefile: a Category-Based Analytic
                                  Browser  . . . . . . . . . . . . . . . . 62--69
      Lorraine J. Haricombe and   
              L. Ada Emmett and   
                Perry Alexander   Open Access: An Evolving Alternative . . 70--72
        Victor Ng-Thow-Hing and   
                   Sandra Okita   Playdates with Robots  . . . . . . . . . 73--75
              Franco Zambonelli   Toward Sociotechnical Urban
                                  Superorganisms . . . . . . . . . . . . . 76--78
                       Tom Mens   On the Complexity of Software Systems    79--81
         William H. Boothby and   
Wolff Heintschel von Heinegg and   
         James Bret Michael and   
         Michael N. Schmitt and   
            Thomas C. Wingfield   When Is a Cyberattack a Use of Force or
                                  an Armed Attack? . . . . . . . . . . . . 82--84
                      Anonymous   IEEE Computer Society Election . . . . . 85--93
                      Anonymous   IEEE President-Elect Candidates Address
                                  Computer Society Concerns  . . . . . . . 94--99
                      Anonymous   Call and Calendar  . . . . . . . . . . . 100--103
           David Alan Grier and   
            Erin Dian Dumbacher   The Winner Takes It All  . . . . . . . . 120

Computer
Volume 45, Number 9, September, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Bertrand Meyer: Software Engineering and
                                  the Eiffel Programming Language  . . . . 6--8
              Brian M. Gaff and   
            Brian P. Murphy and   
             Ralph A. Loren and   
        Christine A. Dudzik and   
                   Lisa Swiszcz   Patent Reform: New Tools for Challenging
                                  Patent Validity as of September 2012 . . 9--11
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                   Neal Leavitt   Are Mobile Payments Ready to Cash in
                                  Yet? . . . . . . . . . . . . . . . . . . 15--18
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 19--20
       Kaushik R. Chowdhury and   
            Dave Cavalcanti and   
            Mostafa El-Said and   
              Tommaso Mazza and   
              Chittabrata Ghosh   Modeling and Simulation of Smart and
                                  Green Computing Systems  . . . . . . . . 22--23
                  Swades De and   
                   Riya Singhal   Toward Uninterrupted Operation of
                                  Wireless Sensor Networks . . . . . . . . 24--30
       Prabhakar T. Venkata and   
  S. N. Akshay Uttama Nambi and   
       R. Venkatesha Prasad and   
               Ignas Niemegeers   Bond Graph Modeling for
                                  Energy-Harvesting Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 31--38
             Murat Kocaoglu and   
                Derya Malak and   
                  Ozgur B. Akan   Fundamentals of Green Communications and
                                  Computing: Modeling and Simulation . . . 40--46
                Sungkap Yeo and   
              Hsien-Hsin S. Lee   SimWare: a Holistic Warehouse-Scale
                                  Computer Simulator . . . . . . . . . . . 48--55
              Baris Aksanli and   
      Jagannathan Venkatesh and   
          Tajana Simunic Rosing   Using Datacenter Simulation to Evaluate
                                  Green Energy Integration . . . . . . . . 56--64
     Mahinthan Chandramohan and   
              Hee Beng Kuan Tan   Detection of Mobile Malware in the Wild  65--71
                Julian Ohrt and   
                   Volker Turau   Cross-Platform Development Tools for
                                  Smartphone Applications  . . . . . . . . 72--79
                 Xiaoqi Yan and   
                Chi-Wing Fu and   
               Andrew J. Hanson   Multitouching the Fourth Dimension . . . 80--88
              Bruce Nordman and   
            Ken Christensen and   
                     Alan Meier   Think Globally, Distribute Power
                                  Locally: The Promise of Nanogrids  . . . 89--91
                    Hal Berghel   The Dumbing Down of SportPhishing  . . . 92--94
          Karl Ricanek, Jr. and   
                  Chris Boehnen   Facial Analytics: From Big Data to Law
                                  Enforcement  . . . . . . . . . . . . . . 95--97
                Cliff Lampe and   
                 Nicole Ellison   Understanding Facebook: Social Computing
                                  Isn't `Just' Social  . . . . . . . . . . 98--100
         Dejan S. Milojicic and   
              Martin Arlitt and   
     Doree Duncan Seligmann and   
    George K. Thiruvathukal and   
             Christian Timmerer   Innovation Mashups: Academic Rigor Meets
                                  Social Networking Buzz . . . . . . . . . 101--105
                      Anonymous   Call and Calendar  . . . . . . . . . . . 106--108
           David Alan Grier and   
            Erin Dian Dumbacher   It's Complicated . . . . . . . . . . . . 124

Computer
Volume 45, Number 10, October, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 6--7
              Charles Severance   The Apache Software Foundation: Brian
                                  Behlendorf . . . . . . . . . . . . . . . 8--9
              Brian M. Gaff and   
                 Karl P. Fryzel   Starting a Business: Which Entity
                                  Structure Is Best for You? . . . . . . . 10--12
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 14--15
                     Lee Garber   Using In-Memory Analytics to Quickly
                                  Crunch Big Data  . . . . . . . . . . . . 16--18
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 19--21
               Mike Hinchey and   
               Sooyong Park and   
                   Klaus Schmid   Building Dynamic Software Product Lines  22--26
                  Jan Bosch and   
                 Rafael Capilla   Dynamic Variability in
                                  Software-Intensive Embedded System
                                  Families . . . . . . . . . . . . . . . . 28--35
              Nelly Bencomo and   
         Svein Hallsteinsen and   
     Eduardo Santana de Almeida   A View of the Dynamic Software Product
                                  Line Landscape . . . . . . . . . . . . . 36--41
             Luciano Baresi and   
                 Sam Guinea and   
               Liliana Pasquale   Service-Oriented Dynamic Software
                                  Product Lines  . . . . . . . . . . . . . 42--48
                Jaejoon Lee and   
             Gerald Kotonya and   
                Daniel Robinson   Engineering Service-Based Dynamic
                                  Software Product Lines . . . . . . . . . 49--55
                Pete Sawyer and   
           Raúl Mazo and   
                Daniel Diaz and   
           Camille Salinesi and   
                   Danny Hughes   Using Constraint Programming to Manage
                                  Configurations in Self-Adaptive Systems  56--63
                Mark Hedley and   
                     Jian Zhang   Accurate Wireless Localization in Sports 64--70
         Moustafa AbdelBaky and   
            Manish Parashar and   
                Hyunjoo Kim and   
             Kirk E. Jordan and   
             Vipin Sachdeva and   
               James Sexton and   
               Hani Jamjoom and   
               Zon-Yin Shae and   
           Gergina Pencheva and   
              Reza Tavakoli and   
                Mary F. Wheeler   Enabling High-Performance Computing as a
                                  Service  . . . . . . . . . . . . . . . . 72--80
                Ann E. K. Sobel   Should Everyone Go to College? . . . . . 82--83
                James D. Hollan   Activity-Enriched Computing: Capturing
                                  and Mining Activity Histories  . . . . . 84--87
                 Tim Boland and   
                  Paul E. Black   Juliet 1.1 C/C++ and Java Test Suite . . 88--90
                Peter Gruenbaum   Underrepresented Youth Creating
                                  Culturally Relevant Games  . . . . . . . 91--93
     Krishna P. C. Madhavan and   
         Mihaela Vorvoreanu and   
            Niklas Elmqvist and   
               Aditya Johri and   
         Naren Ramakrishnan and   
               G. Alan Wang and   
                    Ann McKenna   Portfolio Mining . . . . . . . . . . . . 95--99
                 Bryan Reinicke   It's 2012, So Why Am I Driving a 1972
                                  Bug? . . . . . . . . . . . . . . . . . . 100--103
                      Anonymous   New EICs Named for IEEE Computer Society
                                  Publications . . . . . . . . . . . . . . 104--106
                      Anonymous   Call and Calendar  . . . . . . . . . . . 107--109
           David Alan Grier and   
            Erin Dian Dumbacher   The Computer in the Mirror . . . . . . . 128

Computer
Volume 45, Number 11, November, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Inventing PHP: Rasmus Lerdorf  . . . . . 6--7
              Brian M. Gaff and   
             Ralph A. Loren and   
                 Amy M. DeCloux   A Brief Overview of the America Invents
                                  Act  . . . . . . . . . . . . . . . . . . 8--10
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                   Neal Leavitt   Big Iron Moves Toward Exascale Computing 14--17
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 18--20
                Ann E. K. Sobel   The Move Toward Electronic Health
                                  Records  . . . . . . . . . . . . . . . . 22--23
                   Doug Fridsma   Electronic Health Records: The HHS
                                  Perspective  . . . . . . . . . . . . . . 24--26
Inmaculada Carrión Señor and   
José Luis Fernández Alemán and   
                 Ambrosio Toval   Personal Health Records: New Means to
                                  Safely Handle Health Data? . . . . . . . 27--33
              Raik Kuhlisch and   
              Ben Kraufmann and   
                  Hannes Restel   Electronic Case Records in a Box:
                                  Integrating Patient Data in Healthcare
                                  Networks . . . . . . . . . . . . . . . . 34--40
                 Sujoy Basu and   
               Alan H. Karp and   
                     Jun Li and   
               James Pruyne and   
                Jerry Rolia and   
             Sharad Singhal and   
             Jaap Suermondt and   
                Ram Swaminathan   Fusion: Managing Healthcare Records at
                                  Cloud Scale  . . . . . . . . . . . . . . 42--49
                Kevin Brady and   
              Ram D. Sriram and   
            Bettijoyce Lide and   
               Kathleen Roberts   Testing the Nation's Healthcare
                                  Information Infrastructure: NIST
                                  Perspective  . . . . . . . . . . . . . . 50--57
                Barry Fagin and   
                    Dale Skrien   Debugging on the Shoulders of Giants:
                                  von Neumann's Programs 65 Years Later    59--68
              Jason Dedrick and   
                  Jian Tang and   
             Kenneth L. Kraemer   China's Indigenous Innovation Policy:
                                  Impact on Multi-national R&D  . . . . . . 70--78
               Edward Curry and   
                 Bill Guyon and   
           Charles Sheridan and   
                Brian Donnellan   Sustainable IT: Challenges, Postures,
                                  and Outcomes . . . . . . . . . . . . . . 79--81
                    Hal Berghel   Stratfor or Stratagainst . . . . . . . . 82--85
               Anil K. Jain and   
             Karthik Nandakumar   Biometric Authentication: System
                                  Security and User Privacy  . . . . . . . 87--92
                   Frank Bi and   
              Joseph A. Konstan   Customer Service 2.0: Where Social
                                  Computing Meets Customer Relations . . . 93--95
                      Anonymous   Computer Society Connection  . . . . . . 96--98
                      Anonymous   Call and Calendar  . . . . . . . . . . . 99--101
           David Alan Grier and   
            Erin Dian Dumbacher   Love the Show! . . . . . . . . . . . . . 120

Computer
Volume 45, Number 12, December, 2012

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                   John W. Walz   Implementing SP7: a Review of Progress
                                  in 2012  . . . . . . . . . . . . . . . . 6--9
              Charles Severance   Vint Cerf: a Brief History of Packets    10--12
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 16--17
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 22--24
                Gary C. Kessler   Advancing the Science of Digital
                                  Forensics  . . . . . . . . . . . . . . . 25--27
                 Joel Young and   
            Kristina Foster and   
           Simson Garfinkel and   
                Kevin Fairbanks   Distinct Sector Hashes for Target File
                                  Detection  . . . . . . . . . . . . . . . 28--35
                   Ray Hunt and   
               Sherali Zeadally   Network Forensics: An Analysis of
                                  Techniques, Tools, and Trends  . . . . . 36--43
                Irfan Ahmed and   
        Sebastian Obermeier and   
             Martin Naedele and   
          Golden G. Richard III   SCADA Systems: Challenges for Forensic
                                  Investigators  . . . . . . . . . . . . . 44--51
                  Yong Wang and   
               Kevin Streff and   
                   Sonell Raman   Smartphone Security Challenges . . . . . 52--58
                Aaron Spear and   
                Markus Levy and   
              Mathieu Desnoyers   Using Tracing to Solve the Multicore
                                  System Debug Problem . . . . . . . . . . 60--64
   Rafael Moreno-Vozmediano and   
           Ruben S. Montero and   
            Ignacio M. Llorente   IaaS Cloud Architecture: From
                                  Virtualized Datacenters to Federated
                                  Cloud Infrastructures  . . . . . . . . . 65--72
       Naren Sundaravaradan and   
         Naren Ramakrishnan and   
               David A. Hanauer   Factorizing Event Sequences  . . . . . . 73--75
                Manfred Lau and   
                 Jun Mitani and   
                 Takeo Igarashi   Digital Fabrication  . . . . . . . . . . 76--79
               Arnold Brown and   
             Benjamin Apple and   
         James Bret Michael and   
               Michael Schumann   Atomic-Level Security for Web
                                  Applications in a Cloud Environment  . . 80--83
                Emil Vassev and   
                   Mike Hinchey   Awareness in Software-Intensive Systems  84--87
                  Brad Hallisey   Building a Virtual World: The Pipeline
                                  and Process  . . . . . . . . . . . . . . 90--92
                      Anonymous   Milojicic Voted 2013 Computer Society
                                  President-Elect  . . . . . . . . . . . . 93--95
                      Anonymous   CS Announces 2012 Winners of Kennedy and
                                  Rau Awards . . . . . . . . . . . . . . . 96--98
                      Anonymous   Call and Calendar  . . . . . . . . . . . 99--101
           David Alan Grier and   
            Erin Dian Dumbacher   Work/Play  . . . . . . . . . . . . . . . 116


Computer
Volume 46, Number 1, January, 2013

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   The Unseen and the Seen  . . . . . . . . 6--7
                     Ron Vetter   Embracing Digital Publishing . . . . . . 8--10
              Charles Severance   Van Jacobson: Content-Centric Networking 11--13
              Brian M. Gaff and   
             Ralph A. Loren and   
                 Gareth Dickson   Protecting Bioinformatics as
                                  Intellectual Property  . . . . . . . . . 15--17
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 18--19
                   Neal Leavitt   Bringing Big Analytics to the Masses . . 20--23
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 24--26
              Santosh Kumar and   
               Wendy Nilsen and   
                Misha Pavel and   
                Mani Srivastava   Mobile Health: Revolutionizing
                                  Healthcare Through Transdisciplinary
                                  Research . . . . . . . . . . . . . . . . 28--35
             Gunar Schirner and   
             Deniz Erdogmus and   
          Kaushik Chowdhury and   
                   Taskin Padir   The Future of Human-in-the-Loop
                                  Cyber-Physical Systems . . . . . . . . . 36--45
          Thanassis Rikakis and   
           Aisling Kelliher and   
                  Nicole Lehrer   Experiential Media and Digital Culture   46--54
               Noel Sharkey and   
                 Amanda Sharkey   Robotic Surgery: On the Cutting Edge of
                                  Ethics . . . . . . . . . . . . . . . . . 56--64
       Kjell Jòrgen Hole   Management of Hidden Risks . . . . . . . 65--70
                 Upkar Varshney   A Smart Approach to Medication
                                  Management . . . . . . . . . . . . . . . 71--76
                  San Murugesan   Cloud Computing: The New Normal? . . . . 77--79
            Brian David Johnson   When Science Fiction and Science Fact
                                  Meet . . . . . . . . . . . . . . . . . . 80--82
                Kirk W. Cameron   Energy Oddities, Part 1: Why the Energy
                                  World Is Odd . . . . . . . . . . . . . . 83--84
                    Hal Berghel   RFIDiocy: It's Déj\`a Vu All over Again   85--88
                 John Riedl and   
                     Eric Riedl   Crowdsourcing Medical Research . . . . . 89--92
               David Alan Grier   The Here and Now . . . . . . . . . . . . 108

Computer
Volume 46, Number 2, February, 2013

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                     Lee Garber   Letters  . . . . . . . . . . . . . . . . 6
              Charles Severance   Mitchell Baker: The Mozilla Foundation   7--9
              Brian M. Gaff and   
         Stephen G. Huggard and   
               Gregory W. Carey   Paying Bribes Abroad Will Get You in Hot
                                  Water in the US  . . . . . . . . . . . . 11--13
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 14--15
                     Lee Garber   GPUs Go Mobile . . . . . . . . . . . . . 16--19
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 20--23
           Mohamed Ali Feki and   
               Fahim Kawsar and   
           Mathieu Boussard and   
             Lieven Trappeniers   The Internet of Things: The Next
                                  Technological Revolution . . . . . . . . 24--25
               Steve Hodges and   
              Stuart Taylor and   
             Nicolas Villar and   
                James Scott and   
               Dominik Bial and   
         Patrick Tobias Fischer   Prototyping Connected Devices for the
                                  Internet of Things . . . . . . . . . . . 26--34
              Daniel Roggen and   
       Gerhard Tröster and   
              Paul Lukowicz and   
              Alois Ferscha and   
José del R. Millán and   
            Ricardo Chavarriaga   Opportunistic Human Activity and Context
                                  Recognition  . . . . . . . . . . . . . . 36--45
               Sang Wan Lee and   
             Oliver Prenzel and   
                  Zeungnam Bien   Applying Human Learning Principles to
                                  User-Centered IoT Systems  . . . . . . . 46--52
               Gerd Kortuem and   
          Arosha K. Bandara and   
                 Neil Smith and   
              Mike Richards and   
                   Marian Petre   Educating the Internet-of-Things
                                  Generation . . . . . . . . . . . . . . . 53--61
 Sasitharan Balasubramaniam and   
              Jussi Kangasharju   Realizing the Internet of Nano Things:
                                  Challenges, Solutions, and Applications  62--68
             Jane W. S. Liu and   
             Chi-Sheng Shih and   
               Edward T.-H. Chu   Cyberphysical Elements of
                                  Disaster-Prepared Smart Environments . . 69--75
             Mukesh Singhal and   
      Santosh Chandrasekhar and   
                Tingjian Ge and   
                Ravi Sandhu and   
               Ram Krishnan and   
              Gail-Joon Ahn and   
                  Elisa Bertino   Collaboration in Multicloud Computing
                                  Environments: Framework and Security
                                  Issues . . . . . . . . . . . . . . . . . 76--84
                Jon G. Hall and   
                Lucia Rapanotti   Beauty in Software Engineering . . . . . 85--87
                   Michael Lutz   Undergraduate Software Engineering at
                                  RIT: Past, Present, and Future . . . . . 88--90
                Rinku Dewri and   
         Ramakrishna Thurimella   Can a Phone's GPS `Lie' Intelligently?   91--93
                     Jason Pace   The Ways We Play, Part 1: From PCs to
                                  Consoles to Mobile Phones  . . . . . . . 94--96
                      Anonymous   EIC Applicants Sought for CS
                                  Periodicals, 2014--2015 Terms  . . . . . 106--108
                      Anonymous   Call and Calendar  . . . . . . . . . . . 109--111
               David Alan Grier   The Ethical Dimension  . . . . . . . . . 112

Computer
Volume 46, Number 3, March, 2013

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Pooja Sankar: Building the Piazza
                                  Collaboration System . . . . . . . . . . 6--7
              Brian M. Gaff and   
                 Peter J. Cuomo   Design Patents . . . . . . . . . . . . . 8--10
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                   Neal Leavitt   A Technology that Comes Highly
                                  Recommended  . . . . . . . . . . . . . . 14--17
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 18--20
              Jane Chu Prey and   
               Alfred C. Weaver   Fostering Gender Diversity in Computing  22--23
                 Wendy M. DuBow   Diversity in Computing: Why It Matters
                                  and How Organizations Can Achieve It . . 24--29
              Telle Whitney and   
              Denise Gammal and   
                Barbara Gee and   
               Jody Mahoney and   
                Caroline Simard   Priming the Pipeline: Addressing
                                  Gender-Based Barriers in Computing . . . 30--36
                 Mary Fernandez   A Path Between: Mentoring the Next
                                  Generation of Computing Professionals    38--41
           Chris Stephenson and   
                   Rebecca Dovi   More than Gender: Taking a Systemic
                                  Approach to Improving K-12 Computer
                                  Science Education  . . . . . . . . . . . 42--46
               Crystal Eney and   
                Ed Lazowska and   
              Helene Martin and   
                   Stuart Reges   Broadening Participation: The Why and
                                  the How  . . . . . . . . . . . . . . . . 48--51
            James P. Cohoon and   
          J. McGrath Cohoon and   
                 Mary Lou Soffa   Educating Diverse Computing Students at
                                  the University of Virginia . . . . . . . 52--55
                    Maria Klawe   Increasing Female Participation in
                                  Computing: The Harvey Mudd College Story 56--58
                   Deepak Kumar   Serving Women with a Purposeful Vision   60--61
             Robert B. Schnabel   Personal Reflections on Gender Diversity
                                  in Computing . . . . . . . . . . . . . . 62--63
                  Kate Starbird   Returning to My Inner Nerd: Following
                                  the `Social' Disruption of Computing . . 63--65
                 Annie I. Anton   Facing Challenges and Having Fun . . . . 65--66
       Alice Bonhomme-Biais and   
                  Raquel Romano   Pursuing Professional Changes  . . . . . 66--68
             Lwin Khin Shar and   
              Hee Beng Kuan Tan   Defeating SQL Injection  . . . . . . . . 69--77
             Chung-Wei Hang and   
                  Zhe Zhang and   
              Munindar P. Singh   Shin: Generalized Trust Propagation with
                                  Limited Evidence . . . . . . . . . . . . 78--85
                Nir Kshetri and   
                  San Murugesan   Cloud Computing and EU Data Privacy
                                  Regulations  . . . . . . . . . . . . . . 86--89
                Kirk W. Cameron   Energy Oddities, Part 2: Why Green
                                  Computing Is Odd . . . . . . . . . . . . 90--93
          Karl Ricanek, Jr. and   
            Gayathri Mahalingam   Biometrically, How Identical Are
                                  Identical Twins? . . . . . . . . . . . . 94--96
                    Hal Berghel   The SCDOR Hack: Great Security Theater
                                  in Five Stages . . . . . . . . . . . . . 97--99
                     John Riedl   Crowdfunding Technology Innovation . . . 100--103
            Brian David Johnson   Jimmy: The Robot That Changed It All . . 104--107
                      Anonymous   Computer SocietyConnection . . . . . . . 120--121
                      Anonymous   Call and Calendar  . . . . . . . . . . . 122--123
               David Alan Grier   Attention to Context . . . . . . . . . . 124

Computer
Volume 46, Number 4, April, 2013

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Larry Smarr: Building Mosaic . . . . . . 6--8
              Brian M. Gaff and   
                 Ralph A. Loren   Patent Monetization  . . . . . . . . . . 9--11
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                     Lee Garber   Analytics Goes on Location with New
                                  Approaches . . . . . . . . . . . . . . . 14--17
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 18--20
           Sherali Zeadally and   
          Gregorio Martinez and   
                 Han-Chieh Chao   Securing Cyberspace in the 21st Century  22--23
             Pavlos Basaras and   
         Dimitrios Katsaros and   
             Leandros Tassiulas   Detecting Influential Spreaders in
                                  Complex, Dynamic Networks  . . . . . . . 24--29
           Cristina Alcaraz and   
                   Javier Lopez   Wide-Area Situational Awareness for
                                  Critical Infrastructure Protection . . . 30--37
       Ignasi Paredes-Oliva and   
            Pere Barlet-Ros and   
              Josep Sole-Pareta   Scan Detection under Sampling: A New
                                  Perspective  . . . . . . . . . . . . . . 38--44
             Huansheng Ning and   
                   Hong Liu and   
               Laurence T. Yang   Cyberentity Security in the Internet of
                                  Things . . . . . . . . . . . . . . . . . 46--53
               Awais Rashid and   
             Alistair Baron and   
                Paul Rayson and   
         Corinne May-Chahal and   
             Phil Greenwood and   
               James Walkerdine   Who Am I? Analyzing Digital Personas in
                                  Cybercrime Investigations  . . . . . . . 54--61
             Adeeb Alhomoud and   
                 Irfan Awan and   
Jules Ferdinand Pagna Disso and   
                Muhammad Younas   A Next-Generation Approach to Combating
                                  Botnets  . . . . . . . . . . . . . . . . 62--66
                Iyad Rahwan and   
               Sohan Dsouza and   
            Alex Rutherford and   
         Victor Naroditskiy and   
            James McInerney and   
             Matteo Venanzi and   
       Nicholas R. Jennings and   
                 Manuel Cebrian   Global Manhunt Pushes the Limits of
                                  Social Mobilization  . . . . . . . . . . 68--75
                 Xiaohan Ma and   
               Zhigang Deng and   
                  Mian Dong and   
                      Lin Zhong   Characterizing the Performance and Power
                                  Consumption of $3$D Mobile Games . . . . 76--82
                Ruth H. Sanders   Why Learn a Foreign Language?  . . . . . 83--85
            Niklas Elmqvist and   
                  Pourang Irani   Ubiquitous Analytics: Interacting with
                                  Big Data Anywhere, Anytime . . . . . . . 86--89
                   Steve Hodges   Batteries Not Included: Powering the
                                  Ubiquitous Computing Dream . . . . . . . 90--93
            David Ferraiolo and   
             Serban Gavrila and   
                   Wayne Jansen   Enabling an Enterprise-Wide,
                                  Data-Centric Operating Environment . . . 94--96
                     Jason Pace   The Ways We Play, Part 2: Mobile Game
                                  Changers . . . . . . . . . . . . . . . . 97--99
              Ana M. Moreno and   
               Ahmed Seffah and   
             Rafael Capilla and   
    Maria-Isabel Sanchez-Segura   HCI Practices for Building Usable
                                  Software . . . . . . . . . . . . . . . . 100--102
                      Anonymous   Computer Society Connection  . . . . . . 110--113
                      Anonymous   Call and Calendar  . . . . . . . . . . . 114--115
               David Alan Grier   Equal before the Bar . . . . . . . . . . 116

Computer
Volume 46, Number 5, May, 2013

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Bob Metcalfe: Ethernet at Forty  . . . . 6--9
                  Brian M. Gaff   Who Invents What . . . . . . . . . . . . 10--12
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 13--14
                   Neal Leavitt   Hybrid Clouds Move to the Forefront  . . 15--18
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 19--21
        Theresa-Marie Rhyne and   
                       Min Chen   Cutting-Edge Research in Visualization   22--24
             Aditi Majumder and   
                  Behzad Sajadi   Large Area Displays: The Changing Face
                                  of Visualization . . . . . . . . . . . . 26--33
                Hank Childs and   
                Berk Geveci and   
             Will Schroeder and   
            Jeremy Meredith and   
           Kenneth Moreland and   
         Christopher Sewell and   
             Torsten Kuhlen and   
                  E. Wes Bethel   Research Challenges for Visualization
                                  Software . . . . . . . . . . . . . . . . 34--42
              Robert Kosara and   
                 Jock Mackinlay   Storytelling: The Next Step for
                                  Visualization  . . . . . . . . . . . . . 44--50
            Daniel F. Keefe and   
                Tobias Isenberg   Reimagining the Scientific Visualization
                                  Interaction Paradigm . . . . . . . . . . 51--57
            Ben Shneiderman and   
         Catherine Plaisant and   
              Bradford W. Hesse   Improving Healthcare with Interactive
                                  Visualization  . . . . . . . . . . . . . 58--66
             Tobias Schreck and   
                    Daniel Keim   Visual Analysis of Social Media Data . . 68--75
                    Qing Li and   
               Chris Larsen and   
              Tim van der Horst   IPv6: A Catalyst and Evasion Tool for
                                  Botnets and Malware Delivery Networks    76--82
          A. F. Szczepanski and   
                 Jian Huang and   
                    T. Baer and   
                 Y. C. Mack and   
                       S. Ahern   Data Analysis and Visualization in
                                  High-Performance Computing . . . . . . . 84--92
                    Hal Berghel   Computing Technology and Survivable
                                  Journalism . . . . . . . . . . . . . . . 93--97
                 Domenico Talia   Clouds for Scalable Big Data Analytics   98--101
           Ahmad Poursaberi and   
      Svetlana Yanushkevich and   
        Marina L. Gavrilova and   
            Vlad P. Shmerko and   
             Patrick S. P. Wang   Situational Awareness through Biometrics 102--104
            Brian David Johnson   Secret Science Fiction . . . . . . . . . 105--107
                  Joseph Turner   Power Management as Choice Architecture  108--111
                      Anonymous   Computer Society Connection  . . . . . . 118--120
                      Anonymous   Call and Calendar  . . . . . . . . . . . 121--123
               David Alan Grier   Working in Conference  . . . . . . . . . 124

Computer
Volume 46, Number 6, June, 2013

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Gordon Bell: Building Blocks of
                                  Computing  . . . . . . . . . . . . . . . 6--7
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 8
                  Brian M. Gaff   Are You Exhausted by Your First Sale?    9--11
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                     Lee Garber   Game Accessibility: Enabling Everyone to
                                  Play . . . . . . . . . . . . . . . . . . 14--18
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 19--21
             Katina Michael and   
                Keith W. Miller   Big Data: New Opportunities and New
                                  Challenges [Guest Editors' introduction] 22--24
                   Jess Hemerly   Public Policy Considerations for
                                  Data-Driven Innovation . . . . . . . . . 25--31
                 Paul P. Tallon   Corporate Governance of Big Data:
                                  Perspectives on Value, Risk, and Cost    32--38
                Jeremy Pitt and   
       Aikaterini Bourazeri and   
              Andrzej Nowak and   
Magda Roszczynska-Kurasinska and   
       Agnieszka Rychwalska and   
Inmaculada Rodriguez Santiago and   
        Maite Lopez Sanchez and   
              Monica Florea and   
                Mihai Sanduleac   Transforming Big Data into Collective
                                  Awareness  . . . . . . . . . . . . . . . 40--45
            Marcus R. Wigan and   
                   Roger Clarke   Big Data's Big Unintended Consequences   46--53
               Carolyn McGregor   Big Data in Neonatal Intensive Care  . . 54--59
        Pauline Anthonysamy and   
             Phil Greenwood and   
                   Awais Rashid   Social Networking Privacy: Understanding
                                  the Disconnect from Policy to Controls   60--67
            E. Thomas Ewing and   
                  Samah Gad and   
             Naren Ramakrishnan   Gaining Insights into Epidemics by
                                  Mining Historical Newspapers . . . . . . 68--72
                Niels Henze and   
      Alireza Sahami Shrazi and   
           Albrecht Schmidt and   
              Martin Pielot and   
            Florian Michahelles   Empirical Research through Ubiquitous
                                  Data Collection  . . . . . . . . . . . . 74--76
            Alexander Repenning   Making Programming Accessible and
                                  Exciting . . . . . . . . . . . . . . . . 78--81
                Ann E. K. Sobel   The Modern Educator  . . . . . . . . . . 82--83
             James Bret Michael   Empowering Users through Secure
                                  On-Demand Data Provisioning  . . . . . . 84--85
             Gerard J. Holzmann   A Three-Step Program for Recovering
                                  Hackers  . . . . . . . . . . . . . . . . 86--88
                      Anonymous   Computer Society Connection  . . . . . . 90--91
                      Anonymous   Call and Calendar  . . . . . . . . . . . 92--96
               David Alan Grier   The Comfort Zone . . . . . . . . . . . . 104

Computer
Volume 46, Number 7, July, 2013

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Katie Hafner: The Origins of the
                                  Internet . . . . . . . . . . . . . . . . 6--7
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 8--9
                Sixto Ortiz Jr.   Software-Defined Networking: On the
                                  Verge of a Breakthrough? . . . . . . . . 10--12
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 13--15
                  Brian M. Gaff   The Troll under the Bridge . . . . . . . 17--19
                Marc Streit and   
                  Oliver Bimber   Visual Analytics: Seeking the Unknown    20--21
             Jean-Daniel Fekete   Visual Analytics Infrastructures: From
                                  Data Management to Exploration . . . . . 22--29
               Carsten Gorg and   
               Youn-ah Kang and   
               Zhicheng Liu and   
                    John Stasko   Visual Analytics Support for
                                  Intelligence Analysis  . . . . . . . . . 30--38
                Kwan-Liu Ma and   
               Chris W. Muelder   Large-Scale Graph Visualization and
                                  Analytics  . . . . . . . . . . . . . . . 39--46
             Daniel A. Keim and   
             Milos Krstajic and   
        Christian Rohrdantz and   
                 Tobias Schreck   Real-Time Visual Analytics for Text
                                  Streams  . . . . . . . . . . . . . . . . 47--55
              Jarke J. van Wijk   Evaluation: A Challenge for Visual
                                  Analytics  . . . . . . . . . . . . . . . 56--60
              Diane J. Cook and   
          Aaron S. Crandall and   
            Brian L. Thomas and   
          Narayanan C. Krishnan   CASAS: A Smart Home in a Box . . . . . . 62--69
           Tsahee Zidenberg and   
             Isaac Keslassy and   
                     Uri Weiser   Optimal Resource Allocation with
                                  MultiAmdahl  . . . . . . . . . . . . . . 70--77
            Brian David Johnson   From NASA  . . . . . . . . . . . . . . . 78--81
                    Paul Witman   Social Media for Social Value  . . . . . 82--85
                    Hal Berghel   Through the PRISM Darkly . . . . . . . . 86--90
                Matt Stansberry   The Future of Green IT: Solving the
                                  Accountability Issue . . . . . . . . . . 91--93
             Khaled M. Khan and   
               Qutaibah Malluhi   Trust in Cloud Services: Providing More
                                  Controls to Clients  . . . . . . . . . . 94--96
                      Anonymous   Computer Society Connection  . . . . . . 97--98
                      Anonymous   Call and Calendar  . . . . . . . . . . . 99--102
               David Alan Grier   Short-Term Loan  . . . . . . . . . . . . 112

Computer
Volume 46, Number 8, August, 2013

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Charles Severance   Len Kleinrock: The Theory of Packets
                                  [Computing Conversations]  . . . . . . . 6--8
              Brian M. Gaff and   
           Joanna M. Dombrowski   Ten Things to Know about Applying for
                                  Non-US Patents . . . . . . . . . . . . . 9--11
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                     Lee Garber   The Lowly API Is Ready to Step Front and
                                  Center . . . . . . . . . . . . . . . . . 14--17
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 18--20
                Greg Atwood and   
                Soo-Ik Chae and   
               Simon S. Y. Shim   Next-Generation Memory [Guest Editors'
                                  introduction]  . . . . . . . . . . . . . 21--22
                     Yan Li and   
             Khandker N. Quader   NAND Flash Memory: Challenges and
                                  Opportunities  . . . . . . . . . . . . . 23--29
             Yoon-Jong Song and   
                Gitae Jeong and   
                In-Gyu Baek and   
                   Jungdal Choi   What Lies Ahead for Resistance-Based
                                  Memory Technologies? . . . . . . . . . . 30--36
              Amber Huffman and   
                 Dale Juenemann   The Nonvolatile Memory Transformation of
                                  Client Storage . . . . . . . . . . . . . 38--44
                  Anirudh Badam   How Persistent Memory Will Change
                                  Software Systems . . . . . . . . . . . . 45--51
             Steven Swanson and   
            Adrian M. Caulfield   Refactor, Reduce, Recycle: Restructuring
                                  the I/O Stack for the Future of Storage  52--59
                Kaiping Liu and   
          Hee Beng Kuan Tan and   
                        Xu Chen   Binary Code Analysis . . . . . . . . . . 60--68
        Elise van den Hoven and   
 Evelien van de Garde-Perik and   
            Serge Offermans and   
          Koen van Boerdonk and   
        Kars-Michiel H. Lenssen   Moving Tangible Interaction Systems to
                                  the Next Level . . . . . . . . . . . . . 70--76
                  Eric Brechner   Getting Diagonal on the Xbox One
                                  Trifecta . . . . . . . . . . . . . . . . 77--78
              Lawrence O'Gorman   Putting a Kinder Face on Public Cameras  79--81
                Emil Vassev and   
                   Mike Hinchey   Autonomy Requirements Engineering  . . . 82--84
             Bjorn Hartmann and   
                 Paul K. Wright   Designing Bespoke Interactive Devices    85--89
              Patrick Fiaux and   
                Maoyuan Sun and   
              Lauren Bradel and   
                Chris North and   
         Naren Ramakrishnan and   
                    Alex Endert   Bixplorer: Visual Analytics with
                                  Biclusters . . . . . . . . . . . . . . . 90--94
                 Cameron Wilson   What's Up Next for Code.org? . . . . . . 95--97
                      Anonymous   IEEE Computer Society Election . . . . . 98--106
                      Anonymous   IEEE President-Elect Candidates Address
                                  Computer Society Concerns  . . . . . . . 107--112
                      Anonymous   Call and Calendar  . . . . . . . . . . . 113--117
               David Alan Grier   The Tenor of Our Times . . . . . . . . . 128

Computer
Volume 46, Number 9, September, 2013

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--7
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 10--12
              Charles Severance   John C. Hollar: History of Computing . . 13--14
              Brian M. Gaff and   
           Alyssa Harvey Dawson   Working with Your Legal Department . . . 17--19
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 20--21
                   Neal Leavitt   Storage Challenge: Where Will All That
                                  Big Data Go? . . . . . . . . . . . . . . 22--25
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 26--28
               Mark Guzdial and   
                  Betsy DiSalvo   Computing Education: Beyond the
                                  Classroom  . . . . . . . . . . . . . . . 30--31
          Maria Knobelsdorf and   
                 Jan Vahrenhold   Addressing the Full Range of Students:
                                  Challenges in K--12 Computer Science
                                  Education  . . . . . . . . . . . . . . . 32--37
                  Kylie Peppler   STEAM-Powered Computing Education: Using
                                  E-Textiles to Integrate the Arts and
                                  STEM . . . . . . . . . . . . . . . . . . 38--43
              Sally Fincher and   
                    Daniel Knox   The Porous Classroom: Professional
                                  Practices in the Computing Curriculum    44--51
                  Karen Brennan   Learning Computing through Creating and
                                  Connecting . . . . . . . . . . . . . . . 52--59
        Allison Elliott Tew and   
                     Brian Dorn   The Case for Validated Tools in Computer
                                  Science Education Research . . . . . . . 60--66
           Dean N. Williams and   
                Timo Bremer and   
          Charles Doutriaux and   
              John Patchett and   
              Sean Williams and   
              Galen Shipman and   
                Ross Miller and   
           David R. Pugmire and   
                Brian Smith and   
                 Chad Steed and   
              E. Wes Bethel and   
                Hank Childs and   
       Harinarayan Krishnan and   
            Prabhat Prabhat and   
             Michael Wehner and   
           Claudio T. Silva and   
            Emanuele Santos and   
                 David Koop and   
             Tommy Ellqvist and   
                 Jorge Poco and   
                Berk Geveci and   
          Aashish Chaudhary and   
                 Andy Bauer and   
          Alexander Pletzer and   
                Dave Kindig and   
           Gerald L. Potter and   
              Thomas P. Maxwell   Ultrascale Visualization of Climate Data 68--76
                Jianwei Niu and   
                  Jing Peng and   
                    Lei Shu and   
                  Chao Tong and   
                   Wanjiun Liao   An Empirical Study of a Chinese Online
                                  Social Network --- Renren  . . . . . . . 78--84
Rogerio Luis de Carvalho Costa and   
                  Pedro Furtado   Providing Quality of Experience for
                                  Users: The Next DBMS Challenge . . . . . 86--93
                   Karl Ricanek   The Next Biometric Challenge: Medical
                                  Alterations  . . . . . . . . . . . . . . 94--96
                     Beth Cohen   PaaS: New Opportunities for Cloud
                                  Application Development  . . . . . . . . 97--100
            Brian David Johnson   That Copernican Moment . . . . . . . . . 101--103
                    Hal Berghel   Toxic Cookies  . . . . . . . . . . . . . 104--107
                      Anonymous   Computer Society Connection  . . . . . . 108--109
                      Anonymous   Call and Calendar  . . . . . . . . . . . 110--113
               David Alan Grier   The Errant Hashtag: For the Common Good  124

Computer
Volume 46, Number 10, October, 2013

                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--7
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 10--12
              Charles Severance   Eben Upton: Raspberry Pi . . . . . . . . 14--16
              Brian M. Gaff and   
               Greg Hendershott   So, You Want to Start a Software
                                  Company? . . . . . . . . . . . . . . . . 17--19
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 20--21
                     Lee Garber   Gestural Technology: Moving Interfaces
                                  in a New Direction [Technology News] . . 22--25
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 26--28
               Srinivas Devadas   Toward a Coherent Multicore Memory Model 30--31
        Matthew Schuchhardt and   
               Abhishek Das and   
          Nikos Hardavellas and   
               Gokhan Memik and   
                 Alok Choudhary   The Impact of Dynamic Directories on
                                  Multicore Interconnects  . . . . . . . . 32--39
         Arrvindh Shriraman and   
              Hongzhou Zhao and   
              Sandhya Dwarkadas   An Application-Tailored Approach to
                                  Hardware Cache Coherence . . . . . . . . 40--47
             Tushar Krishna and   
        Chia-Hsin Owen Chen and   
              Sunghyun Park and   
             Woo-Cheol Kwon and   
        Suvinay Subramanian and   
    Anantha P. Chandrakasan and   
                  Li-Shiuan Peh   Single-Cycle Multihop Asynchronous
                                  Repeated Traversal: A SMART Future for
                                  Reconfigurable On-Chip Networks  . . . . 48--55
              Qingchuan Shi and   
                      Omer Khan   Toward Holistic Soft-Error-Resilient
                                  Shared-Memory Multicores . . . . . . . . 56--64
      Michiel van Genuchten and   
                     Les Hatton   Quantifying Software's Impact  . . . . . 66--72
           Cristina Alcaraz and   
               Sherali Zeadally   Critical Control System Protection in
                                  the 21st Century . . . . . . . . . . . . 74--83
                Nir Kshetri and   
                  San Murugesan   EU and US Cybersecurity Strategies and
                                  Their Impact on Businesses and Consumers 84--88
                Grace Metri and   
            Manuj Sabharwal and   
                Sundar Iyer and   
               Abhishek Agrawal   Hardware/Software Codesign to Optimize
                                  SoC Device Battery Life  . . . . . . . . 89--92
              Charles Severance   MOOCs: An Insider's View . . . . . . . . 93--96
            Lorraine Morgan and   
                  Kieran Conboy   Key Factors Impacting Cloud Computing
                                  Adoption . . . . . . . . . . . . . . . . 97--99
               Keri Johnson and   
           Jebediah Pavleas and   
                     Jack Chang   Kinecting to Mathematics through
                                  Embodied Interactions  . . . . . . . . . 101--104
                  Kai Kunze and   
           Masakazu Iwamura and   
                Koichi Kise and   
             Seiichi Uchida and   
              Shinichiro Omachi   Activity Recognition for the Mind:
                                  Toward a Cognitive ``Quantified Self''   105--108
                      Anonymous   Computer Society Connection  . . . . . . 109--110
                      Anonymous   Call and Calendar  . . . . . . . . . . . 114--119
               David Alan Grier   Not Part of the Plan . . . . . . . . . . 136

Computer
Volume 46, Number 11, November, 2013

                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1
                      Anonymous   [Masthead] . . . . . . . . . . . . . . . 1
                      Anonymous   Table of contents  . . . . . . . . . . . 2--3
                      Anonymous   IEEE Computer Society Membership
                                  [Advertisement]  . . . . . . . . . . . . 4--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--7
              Charles Severance   Ian Horrocks: Standardizing OWL  . . . . 8--9
              Brian M. Gaff and   
            David J. Levine and   
                Raymond Gabriel   Understanding US Trade Controls  . . . . 10--13
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 14--15
                   Neal Leavitt   Today's Mobile Security Requires a New
                                  Approach . . . . . . . . . . . . . . . . 16--19
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 20--22
           Tiziana Margaria and   
                   Mike Hinchey   Simplicity in IT: The Power of Less  . . 23--25
             Barry D. Floyd and   
               Steve Bosselmann   ITSy --- Simplicity Research in
                                  Information and Communication Technology 26--32
                      Jan Bosch   Achieving Simplicity with the
                                  Three-Layer Product Model  . . . . . . . 34--39
         Cristina Seceleanu and   
                 Ivica Crnkovic   Component Models for Reasoning . . . . . 40--47
        Anna-Lena Lamprecht and   
            Stefan Naujokat and   
                   Ina Schaefer   Variability Management beyond Feature
                                  Models . . . . . . . . . . . . . . . . . 48--54
          Johannes Neubauer and   
               Bernhard Steffen   Plug-and-Play Higher-Order Process
                                  Integration  . . . . . . . . . . . . . . 56--62
             Chandra Prasad and   
                Wolfram Schulte   Taking Control of Your Engineering Tools 63--66
                      Anonymous   IEEE Computer Society Information  . . . 67
          Tiberiu Seceleanu and   
               Gaetana Sapienza   A Tool Integration Framework for
                                  Sustainable Embedded Systems Development 68--71
          Regina Herzlinger and   
              Margo Seltzer and   
                    Mark Gaynor   Applying KISS to Healthcare Information
                                  Technology . . . . . . . . . . . . . . . 72--74
             Arshdeep Bahga and   
             Vijay K. Madisetti   Rapid Prototyping of Multitier
                                  Cloud-Based Services and Systems . . . . 76--83
         James Bret Michael and   
        Phillip A. Laplante and   
              Jeffery Payne and   
              Paul E. Black and   
                Jeffrey M. Voas   Does Security Trump Reliability? . . . . 84--86
            David S. L. Wei and   
              San Murugesan and   
                 Sy-Yen Kuo and   
           Kshirasagar Naik and   
                  Danny Krizanc   Enhancing Data Integrity and Privacy in
                                  the Cloud: An Agenda . . . . . . . . . . 87--90
           Joshua C. Klontz and   
                   Anil K. Jain   A Case Study of Automated Face
                                  Recognition: The Boston Marathon
                                  Bombings Suspects  . . . . . . . . . . . 91--94
            Brian David Johnson   Jimmy Takes Manhattan  . . . . . . . . . 95--98
                      Anonymous   Computer Society Connection  . . . . . . 99--101
                      Anonymous   Call and Calendar  . . . . . . . . . . . 102--105
               David Alan Grier   The Trappings of Power . . . . . . . . . 120
                      Anonymous   CES [Advertisement]  . . . . . . . . . . c4

Computer
Volume 46, Number 12, December, 2013

                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1
                      Anonymous   IEEE Cloud Computing . . . . . . . . . . c2
                      Anonymous   [Masthead] . . . . . . . . . . . . . . . 1
                      Anonymous   Table of contents  . . . . . . . . . . . 2--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               David Alan Grier   The Cycles of Continuous Improvement . . 6--8
              Charles Severance   Andrew Tanenbaum: Writing the Book on
                                  Networks . . . . . . . . . . . . . . . . 9--10
              Brian M. Gaff and   
                  Judy St. John   Legal Careers for Engineers  . . . . . . 11--13
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 14--15
                     Lee Garber   Robot OS: A New Day for Robot Design . . 16--20
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 21--23
                 Vladimir Getov   Computing Laws: Origins, Standing, and
                                  Impact [Guest editors' introduction] . . 24--25
                   Bob Metcalfe   Metcalfe's Law after 40 Years of
                                  Ethernet . . . . . . . . . . . . . . . . 26--31
                Tsugio Makimoto   Implications of Makimoto's Wave  . . . . 32--37
                 Gene M. Amdahl   Computer Architecture and Amdahl's Law   38--46
            Andrew A. Chien and   
               Vijay Karamcheti   Moore's Law: The First Ending and a New
                                  Beginning  . . . . . . . . . . . . . . . 48--53
            Patrick S. Ryan and   
               Sarah Falvey and   
                 Ronak Merchant   When the Cloud Goes Local: The Global
                                  Problem with Data Localization . . . . . 54--59
               Roy van Pelt and   
                  Anna Vilanova   Understanding Blood-Flow Dynamics: New
                                  Challenges for Visualization . . . . . . 60--67
           Karim El Defrawy and   
                      Sky Faber   Blindfolded Data Search via Secure
                                  Pattern Matching . . . . . . . . . . . . 68--75
                   Kim Schaffer   Passwords, Privacy, and Policies: Can
                                  They Do Business Together? . . . . . . . 76--79
                   Ting Hua and   
              Chang-Tien Lu and   
         Naren Ramakrishnan and   
                  Feng Chen and   
            Jaime Arredondo and   
                David Mares and   
                Kristen Summers   Analyzing Civil Unrest through Social
                                  Media  . . . . . . . . . . . . . . . . . 80--84
                Ann E. K. Sobel   The Escalating Cost of College . . . . . 85--87
                     Hy Resnick   Busted: A Digital Group Game to Help
                                  At-Risk Youth Stay out of Jail . . . . . 88--90
                    Hal Berghel   The Intimidation Factor: How a
                                  Surveillance State Can Affect What You
                                  Read in Professional Publications  . . . 91--95
                    Hao Han and   
                    Yinxing Xue   Mashup technology: Beyond open
                                  programming interfaces . . . . . . . . . 96--99
                      Anonymous   IEEE Computer Society Information  . . . 100
                      Anonymous   Conte Voted 2014 Computer Society
                                  President-Elect  . . . . . . . . . . . . 101--103
                      Anonymous   Computer Society Connection  . . . . . . 105--106
                      Anonymous   IEEE Computer Society Membership
                                  [Advertisement]  . . . . . . . . . . . . 107
                      Anonymous   Call and Calendar  . . . . . . . . . . . 108--111
               David Alan Grier   The Way We Organize Ourselves  . . . . . 124


Computer
Volume 47, Number 1, January, 2014

                      Anonymous   IEEE 10th World Congress on Services
                                  (Services 2014) [House Advertisement]    c2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1
                      Anonymous   Table of Contents  . . . . . . . . . . . 2--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
             Dejan S. Milojicic   Reinventing Relevance  . . . . . . . . . 6--8
                Raghu Machiraju   Fixing the Mercator Projection for the
                                  Internet Age . . . . . . . . . . . . . . 9
                      Anonymous   IEEE Computer Society [House
                                  Advertisement] . . . . . . . . . . . . . 10
              Charles Severance   Massimo Banzi: Building Arduino  . . . . 11--12
                  Brian M. Gaff   Corporate Risks from Social Media  . . . 13--15
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 16--17
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 18--21
                     Ron Vetter   Digital Magazines: The Future of
                                  Publishing Is Here . . . . . . . . . . . 22--23
              Karin Strauss and   
                    Doug Burger   What the Future Holds for Solid-State
                                  Memory . . . . . . . . . . . . . . . . . 24--31
        Shyamnath Gollakota and   
        Matthew S. Reynolds and   
            Joshua R. Smith and   
             David J. Wetherall   The Emergence of RF-Powered Computing    32--39
                 Anuj Kumar and   
              Florian Metze and   
                    Matthew Kam   Enabling the Rapid Development and
                                  Adoption of Speech-User Interfaces . . . 40--47
            Emerson Murphy-Hill   The Future of Social Learning in
                                  Software Engineering . . . . . . . . . . 48--54
              Hye-Chung Kum and   
        Ashok Krishnamurthy and   
     Ashwin Machanavajjhala and   
               Stanley C. Ahalt   Social Genome: Putting Big Data to Work
                                  for Population Informatics . . . . . . . 56--63
            Paolo Montuschi and   
                  Alfredo Benso   Augmented Reading: The Present and
                                  Future of Electronic Scientific
                                  Publications . . . . . . . . . . . . . . 64--74
               Eli Tilevich and   
                 Young-Woo Kwon   Cloud-Based Execution to Improve Mobile
                                  Application Energy Efficiency  . . . . . 75--77
                    Hal Berghel   Privacy Informatics: A Primer on
                                  Defensive Tactics for a Society under
                                  Siege  . . . . . . . . . . . . . . . . . 78--82
                    Nir Kshetri   Japan's Changing Cybersecurity Landscape 83--86
            Brian David Johnson   Utopia Rising  . . . . . . . . . . . . . 87--89
                      Anonymous   Computer Society Connection  . . . . . . 90
                      Anonymous   Call and Calendar  . . . . . . . . . . . 91--93
               David Alan Grier   Just Out of It . . . . . . . . . . . . . 104
                      Anonymous   IEEE Cloud Computing [House
                                  Advertisement] . . . . . . . . . . . . . c4--c4

Computer
Volume 47, Number 2, 2014

                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society Membership House
                                  Advertisement  . . . . . . . . . . . . . c2--c2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1
                      Anonymous   Table of Contents  . . . . . . . . . . . 2--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                  David Forsyth   Object Detection with Discriminatively
                                  Trained Part-Based Models  . . . . . . . 6--7
              Charles Severance   Joseph Hardin: NCSA Mosaic . . . . . . . 8--10
                  Brian M. Gaff   IP 2013--2014: Looking Forward and
                                  Looking Back . . . . . . . . . . . . . . 11--13
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 14--15
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 16--20
                Renee Bryce and   
                      Rick Kuhn   Software Testing [Guest editors'
                                  introduction]  . . . . . . . . . . . . . 21--22
                 Midhat Ali and   
       Francesco De Angelis and   
               Daniele Fani and   
          Antonia Bertolino and   
       Guglielmo De Angelis and   
                  Andrea Polini   An Extensible Framework for Online
                                  Testing of Choreographed Services  . . . 23--29
               Nuno Antunes and   
                   Marco Vieira   Penetration Testing for Web Services . . 30--36
               Cemal Yilmaz and   
              Sandro Fouche and   
              Myra B. Cohen and   
                Adam Porter and   
             Gulsen Demiroz and   
                       Ugur Koc   Moving Forward with Combinatorial
                                  Interaction Testing  . . . . . . . . . . 37--45
                  Jerry Gao and   
               Xiaoying Bai and   
               Wei-Tek Tsai and   
                Tadahiro Uehara   Mobile Application Testing: A Tutorial   46--55
               Andreas Dahn and   
                 Clemens H. Cap   Application Transparency and
                                  Manipulation . . . . . . . . . . . . . . 56--61
         William J. Chimiak and   
           Samuel T. Patton and   
               Stephen Janansky   Enhanced IP: IPv4 with 64-Bit Addresses  62--69
               Manfred Broy and   
               Albrecht Schmidt   Challenges in Engineering Cyber-Physical
                                  Systems  . . . . . . . . . . . . . . . . 70--72
                    Hal Berghel   Moral Hazards, Negative Externalities,
                                  and the Surveillance Economy . . . . . . 73--77
           Apostol Vassilev and   
                Timothy A. Hall   The Importance of Entropy to Information
                                  Security . . . . . . . . . . . . . . . . 78--81
                Peter Gruenbaum   Undergraduates Teach Game Programming
                                  Using Scratch  . . . . . . . . . . . . . 82--84
             Rafael Capilla and   
                Oscar Ortiz and   
                   Mike Hinchey   Context Variability for Context-Aware
                                  Systems  . . . . . . . . . . . . . . . . 85--87
               Jeffrey E. Froyd   The Nature of Scholarship in Computing
                                  Education: An Approach from
                                  \booktitleIEEE Transactions on Education 88--90
                      Anonymous   Computer Society Connection  . . . . . . 91
                      Anonymous   Call and Calendar  . . . . . . . . . . . 92--93
               David Alan Grier   Practice and Theory  . . . . . . . . . . 104
                      Anonymous   IEEE Cloud Computing Magazine [House
                                  Advertisement] . . . . . . . . . . . . . c3--c3
                      Anonymous   Rock Stars of Mobile Cloud [House
                                  Advertisement] . . . . . . . . . . . . . c4--c4

Computer
Volume 47, Number 3, 2014

                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Software Experts Summit [House
                                  Advertisement] . . . . . . . . . . . . . c2--c2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1
                      Anonymous   Table of Contents  . . . . . . . . . . . 2--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Peter Brusilovsky   Collective Class Wisdom: Collaborative
                                  Lecture Annotation . . . . . . . . . . . 6
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 7--9
              Charles Severance   Computing Conversations: Len Kleinrock:
                                  The First Two Packets on the Internet    10--11
                  Brian M. Gaff   Contracts 101  . . . . . . . . . . . . . 12--15
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 16--17
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 18--21
                Chirag Shah and   
               Robert Capra and   
                  Preben Hansen   Collaborative Information Seeking [Guest
                                  editors' introduction] . . . . . . . . . 22--25
                     Zhe Xu and   
             Jay Ramanathan and   
                  Rajiv Ramnath   Identifying Knowledge Brokers and Their
                                  Role in Enterprise Research through
                                  Social Media . . . . . . . . . . . . . . 26--31
                  Yihan Tao and   
             Anastasios Tombros   Investigating Collaborative Sensemaking
                                  Behavior in Collaborative Information
                                  Seeking  . . . . . . . . . . . . . . . . 38--45
                   Zhen Yue and   
               Shuguang Han and   
                  Daqing He and   
                    Jiepu Jiang   Influences on Query Reformulation in
                                  Collaborative Web Search . . . . . . . . 46--53
                Marti A. Hearst   What's Missing from Collaborative
                                  Search?  . . . . . . . . . . . . . . . . 58--61
                 Zheng Chen and   
               Jian-Tao Sun and   
                  Xuedong Huang   Web Information at Your Fingertips:
                                  Paper as an Interaction Metaphor . . . . 62--66
         Christian Timmerer and   
                Benjamin Rainer   The Social Multimedia Experience . . . . 67--69
                    Hal Berghel   STEM, Revisited  . . . . . . . . . . . . 70--73
      Hugo Placido da Silva and   
                       Ana Fred   Harnessing the Power of Biosignals . . . 74--77
                   Kirk Cameron   The Evolution of Power Measurement . . . 78--80
                    Gary McGraw   Security Fatigue? Shift Your Paradigm    81--83
            Brian David Johnson   The Darwin App . . . . . . . . . . . . . 84--86
                      Anonymous   Computer Society Connection  . . . . . . 87
                      Anonymous   Call and Calendar  . . . . . . . . . . . 88--89
               David Alan Grier   Assets to the Table  . . . . . . . . . . 100
                      Anonymous   Rock Stars of Mobile Cloud [House
                                  Advertisement] . . . . . . . . . . . . . c4--c4

Computer
Volume 47, Number 4, April, 2014

                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1
                      Anonymous   Fuel Your Imagination [House
                                  Advertisement] . . . . . . . . . . . . . c2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1
                      Anonymous   Table of Contents  . . . . . . . . . . . 2--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                       Ling Liu   Service Selection and Recommendation
                                  through Collective Intelligence  . . . . 6
              Charles Severance   Doug Van Houweling: Building the NSFNet  7--9
                  Brian M. Gaff   Readers' Choice [Intellectual Property
                                  laws]  . . . . . . . . . . . . . . . . . 10--12
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 13--14
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 15--19
                 Carl Chang and   
                Bill N. Schilit   Aware Computing [Guest Editors'
                                  introduction]  . . . . . . . . . . . . . 20--21
               Sarah Vieweg and   
                    Adam Hodges   Rethinking Context: Leveraging Human and
                                  Machine Computation in Disaster Response 22--27
       Mohammed Ehsan Hoque and   
             Rosalind W. Picard   Rich Nonverbal Sensing Technology for
                                  Automated Social Skills Training . . . . 28--35
              Mark Matthews and   
             Saeed Abdullah and   
                   Geri Gay and   
              Tanzeem Choudhury   Tracking Mental Well-Being: Balancing
                                  Rich Sensing and Patient Needs . . . . . 36--43
        Giampiero E. G. Beroggi   Internet Voting: An Empirical Evaluation 44--50
                      Anonymous   Software Experts Summit [House
                                  Advertisement] . . . . . . . . . . . . . 51
             Juan R. Terven and   
              Joaquin Salas and   
                Bogdan Raducanu   New Opportunities for Computer
                                  Vision-Based Assistive Technology
                                  Systems for the Visually Impaired  . . . 52--58
               Ying-Dar Lin and   
               Chia-Yin Lee and   
                 Yu-Sung Wu and   
                Pei-Hsiu Ho and   
                 Fu-Yu Wang and   
                   Yi-Lang Tsai   Active versus Passive Malware Collection 59--65
                    Hal Berghel   Mr. Snowden's Legacy . . . . . . . . . . 66--70
                 Katia Vega and   
                      Hugo Fuks   Beauty Technology: Body Surface
                                  Computing  . . . . . . . . . . . . . . . 71--75
               Jooyoung Kim and   
              Dong Sun Shin and   
                 Dae Ok Kim and   
               Dae Hyun Lee and   
               Jaekeun Kwak and   
           Antonio Di Carlo and   
           Alberto Paoluzzi and   
           Kazuomi Sugamoto and   
                 Young Lae Moon   Standardizing $3$D Medical Imaging . . . 76--79
              Sarah Beecham and   
            Padraig O'Leary and   
                 Sean Baker and   
             Ita Richardson and   
                      John Noll   Making Software Engineering Research
                                  Relevant . . . . . . . . . . . . . . . . 80--83
         George F. Hurlburt and   
                   Jeffrey Voas   Big Data, Networked Worlds . . . . . . . 84--87
             Fernando Arnez and   
                 Jason Pace and   
                    Kelvin Sung   Learning while Building Games for
                                  Teaching . . . . . . . . . . . . . . . . 88--91
                  Sorel Reisman   The Future of Online Instruction, Part 1 92--93
             Patrick Butler and   
         Naren Ramakrishnan and   
          Elaine O. Nsoesie and   
             John S. Brownstein   Satellite Imagery Analysis: What Can
                                  Hospital Parking Lots Tell Us about a
                                  Disease Outbreak?  . . . . . . . . . . . 94--97
              Gopal Pingali and   
                    T. S. Mohan   The Cloud Ascends in Emerging Markets:
                                  Highlights of IEEE CCEM 2013 . . . . . . 98--101
                      Anonymous   Computer Society Connection  . . . . . . 102
                      Anonymous   Call and Calendar  . . . . . . . . . . . 103--105
               David Alan Grier   All That Glitters Is Not Gold  . . . . . 116
                      Anonymous   Instant Access to IEEE Publications
                                  [House Advertisement]  . . . . . . . . . c3
                      Anonymous   Rock Stars of Mobile Cloud [House
                                  Advertisement] . . . . . . . . . . . . . c4

Computer
Volume 47, Number 5, May, 2014

                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1
                      Anonymous   Table of Contents  . . . . . . . . . . . 2--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                  Albert Zomaya   Power-Performance Tradeoff in a
                                  Federated Cloud  . . . . . . . . . . . . 6--7
                      Anonymous   Conferences in the Palm of Your Hand
                                  [House Advertisement]  . . . . . . . . . 8
              Charles Severance   Nathaniel Borenstein: Multipurpose
                                  Internet Mail Extensions (MIME)  . . . . 9--11
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                      Anonymous   Stay Connected [House Advertisement] . . 14
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 15--17
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 18--22
           Martin Reisslein and   
            Bernhard Rinner and   
             Amit Roy-Chowdhury   Smart Camera Networks [Guest editors'
                                  introduction]  . . . . . . . . . . . . . 23--25
             Ching-Hui Chen and   
               Julien Favre and   
           Gregorij Kurillo and   
       Thomas P. Andriacchi and   
              Ruzena Bajcsy and   
                 Rama Chellappa   Camera Networks for Healthcare,
                                  Teleimmersion, and Surveillance  . . . . 26--36
                 Kevin Abas and   
                 Caio Porto and   
                 Katia Obraczka   Wireless Smart Camera Networks for the
                                  Surveillance of Public Spaces  . . . . . 37--44
               Andrea Prati and   
              Faisal Z. Qureshi   Integrating Consumer Smart Cameras into
                                  Camera Networks: Opportunities and
                                  Obstacles  . . . . . . . . . . . . . . . 45--51
              Kaushik Mitra and   
        Ashok Veeraraghavan and   
  Aswin C. Sankaranarayanan and   
            Richard G. Baraniuk   Toward Compressive Camera Networks . . . 52--59
               Zhangyu Guan and   
                Tommaso Melodia   Cloud-Assisted Smart Camera Networks for
                                  Energy-Efficient $3$D Video Streaming    60--66
          Juan C. SanMiguel and   
        Christian Micheloni and   
                Karen Shoop and   
          Gian Luca Foresti and   
               Andrea Cavallaro   Self-Reconfigurable Smart Camera
                                  Networks . . . . . . . . . . . . . . . . 67--73
                Xian-He Sun and   
                     Dawei Wang   Concurrent Average Memory Access Time    74--80
                    Wen Gao and   
               Tiejun Huang and   
               Cliff Reader and   
                 Weibei Dou and   
                     Xilin Chen   IEEE Standards for Advanced Audio and
                                  Video Coding in Emerging Applications    81--83
        Symeon Papadopoulos and   
           Yiannis Kompatsiaris   Social Multimedia Crawling for Mining
                                  and Search . . . . . . . . . . . . . . . 84--87
       Michael Cheng Yi Cho and   
                 Pokai Chen and   
        Shiuhpyng Winston Shieh   Dmail: A Globally Authenticated Email
                                  Service  . . . . . . . . . . . . . . . . 88--91
               Chris Preist and   
                 Dan Schien and   
              Paul Shabajee and   
               Stephen Wood and   
            Christopher Hodgson   Analyzing End-to-End Energy Consumption
                                  for Digital Services . . . . . . . . . . 92--95
            Kevin W. Bowyer and   
                 James S. Doyle   Cosmetic Contact Lenses and Iris
                                  Recognition Spoofing . . . . . . . . . . 96--98
            Brian David Johnson   A New Doorway into Time  . . . . . . . . 99--101
                    Hal Berghel   PII, the FTC, Car Dealers, and You . . . 102--106
                      Anonymous   Computer Society Connection  . . . . . . 107
                      Anonymous   Call and Calendar  . . . . . . . . . . . 108--111
                      Anonymous   Focus on Your Job Search [House
                                  Advertisement] . . . . . . . . . . . . . 119
               David Alan Grier   The Real Change [The Errant Hashtag] . . 120
                      Anonymous   Membership Matters [House Advertisement] c3

Computer
Volume 47, Number 6, June, 2014

                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1
                      Anonymous   Rock Stars of Cybersecurity [House
                                  Advertisement] . . . . . . . . . . . . . c2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1
                      Anonymous   Table of Contents  . . . . . . . . . . . 2--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                       Song Guo   On-Time Warning Delivery for Vehicular
                                  Ad Hoc Networks  . . . . . . . . . . . . 6
              Brian M. Gaff and   
       Heather Egan Sussman and   
               Jennifer Geetter   Privacy and Big Data . . . . . . . . . . 7--9
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 10--11
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 12--17
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 18--19
                      Anonymous   IEEE Security & Privacy [House
                                  Advertisement] . . . . . . . . . . . . . 20
               Ying-Dar Lin and   
            Chun-Ying Huang and   
             Matthew Wright and   
           Georgios Kambourakis   Mobile Application Security  . . . . . . 21--23
    Guillermo Suarez-Tangil and   
           Juan E. Tapiador and   
            Flavio Lombardi and   
              Roberto Di Pietro   Thwarting Obfuscated Malware via
                                  Differential Fault Analysis  . . . . . . 24--31
                  Yuru Shao and   
                  Xiapu Luo and   
                 Chenxiong Qian   RootGuard: Protecting Rooted Android
                                  Phones . . . . . . . . . . . . . . . . . 32--40
                      Anonymous   Membership Matters [House Advertisement] 41
         Felix Gomez Marmol and   
             Gregor Rozinaj and   
         Sebastian Schumann and   
               Ondrej Labaj and   
                    Juraj Kacur   Smart AppStore: Expanding the Frontiers
                                  of Smartphone Ecosystems . . . . . . . . 42--47
         Alessandro Armando and   
             Gabriele Costa and   
             Luca Verderame and   
                  Alessio Merlo   Securing the ``Bring Your Own Device''
                                  Paradigm . . . . . . . . . . . . . . . . 48--56
           Olga Gadyatskaya and   
             Fabio Massacci and   
             Yury Zhauniarovich   Security in the Firefox OS and Tizen
                                  Mobile Platforms . . . . . . . . . . . . 57--63
                    Hal Berghel   Leadership Failures in the National
                                  Security Complex . . . . . . . . . . . . 64--67
           Benoit Combemale and   
            Julien DeAntoni and   
              Benoit Baudry and   
           Robert B. France and   
         Jean-Marc Jezequel and   
                      Jeff Gray   Globalizing Modeling Languages . . . . . 68--71
             Irena Bojanova and   
            George Hurlburt and   
                   Jeffrey Voas   Imagineering an Internet of Anything . . 72--77
                     Jason Pace   Working with Students Where Theory and
                                  Practice Intersect . . . . . . . . . . . 78--80
                      Anonymous   IEEE Computer Society Information [House
                                  Advertisement] . . . . . . . . . . . . . 81
                  Sorel Reisman   The Future of Online Instruction, Part 2 82--84
              Edwin Sturrus and   
                  Olga Kulikova   Orchestrating Hybrid Cloud Deployment:
                                  An Overview  . . . . . . . . . . . . . . 85--87
                      Anonymous   Computer Society Connection  . . . . . . 88--89
                      Anonymous   Call and Calendar  . . . . . . . . . . . 90--93
               David Alan Grier   Peace in Our Time  . . . . . . . . . . . 104

Computer
Volume 47, Number 7, July, 2014

                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1
                      Anonymous   Table of Contents  . . . . . . . . . . . 2--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                       Jian Pei   Managing Data-Intensive Applications in
                                  the Cloud  . . . . . . . . . . . . . . . 6
              Charles Severance   Andrew S. Tanenbaum: The Impact of MINIX 7--8
                  Brian M. Gaff   Supreme Court IP Update  . . . . . . . . 9--12
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 13--14
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 15
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 16--21
                  Oliver Bimber   Thinking Virtual . . . . . . . . . . . . 22--23
                 Mel Slater and   
         Maria V. Sanchez-Vives   Transcending the Self in Immersive
                                  Virtual Reality  . . . . . . . . . . . . 24--30
               Albert Rizzo and   
              Arno Hartholt and   
              Mario Grimani and   
               Andrew Leeds and   
                    Matt Liewer   Virtual Reality Exposure Therapy for
                                  Combat-Related Posttraumatic Stress
                                  Disorder . . . . . . . . . . . . . . . . 31--37
            John R. Stowers and   
             Anton Fuhrmann and   
        Maximilian Hofbauer and   
           Martin Streinzer and   
                Axel Schmid and   
       Michael H. Dickinson and   
                Andrew D. Straw   Reverse Engineering Animal Vision with
                                  Virtual Reality and Genetics . . . . . . 38--45
                Henry Fuchs and   
               Andrei State and   
             Jean-Charles Bazin   Immersive $3$D Telepresence  . . . . . . 46--52
                   Xia Yang and   
                   Nan Sang and   
                 Jim Alves-Foss   Shortening the Boot Time of Android OS   53--58
                Minyong Kim and   
             Young Geun Kim and   
             Sung Woo Chung and   
                 Cheol Hong Kim   Measuring Variance between Smartphone
                                  Energy Consumption and Battery Life  . . 59--65
              Youngjung Ahn and   
                Yongsuk Lee and   
             Jin-Young Choi and   
                Gyungho Lee and   
                   Dongkyun Ahn   Monitoring Translation Lookahead Buffers
                                  to Detect Code Injection Attacks . . . . 66--72
            Brian David Johnson   Talking to the Future  . . . . . . . . . 73--75
                    Hal Berghel   Robert David Steele on OSINT . . . . . . 76--81
  Dimitrios S. Nikolopoulos and   
        Hans Vandierendonck and   
            Nikolaos Bellas and   
   Christos D. Antonopoulos and   
               Spyros Lalis and   
    Georgios Karakonstantis and   
               Andreas Burg and   
                    Uwe Naumann   Energy Efficiency through
                                  Significance-Based Computing . . . . . . 82--85
                Pablo Cesar and   
                Rene Kaiser and   
                 Marian F. Ursu   Toward Connected Shared Experiences  . . 86--89
               Chi-Wei Wang and   
              Chia-Wei Wang and   
               Chu-An Hsieh and   
        Shiuhpyng Winston Shieh   Cloudebug: A Programmable Online Malware
                                  Testbed  . . . . . . . . . . . . . . . . 90--92
                  Paul Nikolich   802 LAN/MAN Standards: High Quality and
                                  Market Relevant  . . . . . . . . . . . . 93--95
                      Anonymous   Computer Society Connection  . . . . . . 96--97
                      Anonymous   Call and Calendar  . . . . . . . . . . . 98--101
               David Alan Grier   The Half-Told Lie  . . . . . . . . . . . 108
                      Anonymous   IEEE International Conference on Cloud
                                  Engineering (IC2E 2015)  . . . . . . . . c4

Computer
Volume 47, Number 8, August, 2014

                      Anonymous   Fuel your imagination [House
                                  Advertisement] . . . . . . . . . . . . . c2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1
                      Anonymous   Table of Contents  . . . . . . . . . . . 2--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                    John Grundy   Determining the Cause of Design Model
                                  Inconsistencies  . . . . . . . . . . . . 6
              Charles Severance   Elizabeth Fong: Creating the SQL
                                  Database Standards . . . . . . . . . . . 7--8
              Brian M. Gaff and   
                 Bruce Rubinger   The Significance of Prior Art  . . . . . 9--11
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 14--18
                      Anonymous   2015 Richard E. Merwin Distinguished
                                  Service Award [Call for award
                                  nominations] . . . . . . . . . . . . . . 19
                     Ron Vetter   Technology Commercialization in the
                                  Innovation Economy [Guest Editor's
                                  introduction]  . . . . . . . . . . . . . 20--21
             Gary L. Miller and   
                 Robert R. Hoon   The Role of Public Comprehensive
                                  Universities in Closing the Innovation
                                  Deficit  . . . . . . . . . . . . . . . . 22--27
              Elyse N. Ball and   
             Kenneth G. Preston   University Commercialization Models: The
                                  University of Akron  . . . . . . . . . . 28--36
                Audrey Speicher   tekMountain: A Community-Driven
                                  Corporate Incubator  . . . . . . . . . . 37--39
         Savitha Srinivasan and   
              Isaac Barchas and   
             Mark Gorenberg and   
             Evangelos Simoudis   Venture Capital: Fueling the Innovation
                                  Economy  . . . . . . . . . . . . . . . . 40--47
                     Ian Gorton   Cyberinfrastructures: Bridging the
                                  Divide between Scientific Research and
                                  Software Engineering . . . . . . . . . . 48--55
           Sebastian Boring and   
             Saul Greenberg and   
               Jo Vermeulen and   
               Jakub Dostal and   
              Nicolai Marquardt   The Dark Patterns of Proxemic Sensing    56--60
                      Anonymous   Rock Stars of Cybersecurity [House
                                  Advertisement] . . . . . . . . . . . . . 61
              Nabor C. Mendonca   Architectural Options for Cloud
                                  Migration  . . . . . . . . . . . . . . . 62--66
         Ernest L. McDuffie and   
           Victor P. Piotrowski   The Future of Cybersecurity Education    67--69
                    Hal Berghel   The Future of Digital Money Laundering   70--75
                Dirk Basten and   
               Thomas Hoerstrup   Organizational Effort Estimation . . . . 76--79
               David A. Wheeler   Preventing Heartbleed  . . . . . . . . . 80--83
Christiane Gresse von Wangenheim and   
            Aldo von Wangenheim   Teaching Game Programming in Family
                                  Workshops  . . . . . . . . . . . . . . . 84--87
                      Anonymous   IEEE Computer Society Election . . . . . 88--97
                      Anonymous   IEEE President-Elect Candidates Address
                                  Computer Society Concerns  . . . . . . . 98--102
                      Anonymous   Call and Calendar  . . . . . . . . . . . 103--107
               David Alan Grier   The Guest at the Feast . . . . . . . . . 116
                      Anonymous   Call for Papers [House Advertisement]    c3

Computer
Volume 47, Number 9, September, 2014

                      Anonymous   [Masthead] . . . . . . . . . . . . . . . 1--1
                      Anonymous   Table of contents  . . . . . . . . . . . 2--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Prasant Mohapatra   Channel Bonding in Evolving Wireless
                                  LANs . . . . . . . . . . . . . . . . . . 6--6
              Charles Severance   Nii Quaynor: Bringing the Internet to
                                  Africa . . . . . . . . . . . . . . . . . 7--9
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 10--11
                      Anonymous   Richard E. Merwin Distinguished Service
                                  Award  . . . . . . . . . . . . . . . . . 12--12
                      Anonymous   Instant Access to IEEE Publications
                                  [advertisement]  . . . . . . . . . . . . 13--13
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 14--16
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 17--21
                      Anonymous   Rock Stars of Big Data Analytics
                                  [advertisement]  . . . . . . . . . . . . 22--22
          Victor Pankratius and   
                 Chris Mattmann   Computing in Astronomy: To See the
                                  Unseen . . . . . . . . . . . . . . . . . 23--25
                 Mark Jenne and   
                Owen Boberg and   
               Hasan Kurban and   
                Mehmet Dalkilic   Studying the Milky Way Galaxy Using
                                  ParaHeap-k . . . . . . . . . . . . . . . 26--33
         Daniel Frascarelli and   
          Sergio Nesmachnow and   
               Gonzalo Tancredi   High-Performance Computing of
                                  Self-Gravity for Small Solar System
                                  Bodies . . . . . . . . . . . . . . . . . 34--39
                      Anonymous   Membership Matters [advertisement] . . . 40--40
           Stefan C. Muller and   
             Gustavo Alonso and   
                Andre Csillaghy   Scaling Astroinformatics: Python +
                                  Automatic Parallelization  . . . . . . . 41--47
              Rik Jongerius and   
           Stefan Wijnholds and   
             Ronald Nijboer and   
                 Henk Corporaal   An End-to-End Computing Model for the
                                  Square Kilometre Array . . . . . . . . . 48--54
                      Anonymous   IEEE Computer Society Harlan D. Mills
                                  Award: Call for software engineering
                                  award nominations  . . . . . . . . . . . 55--55
              Lisa Gerhardt and   
     Juan Carlos Diaz Velez and   
               Spencer R. Klein   Adventures in Antarctic Computing, or
                                  How I Learned to Stop Worrying and Love
                                  the Neutrino . . . . . . . . . . . . . . 56--61
        F. Alexander Bogert and   
             Nicholas Smith and   
              John Holdener and   
            Eric M. De Jong and   
             Andrew F. Hart and   
              Luca Cinquini and   
        Shakeh E. Khudikyan and   
          David R. Thompson and   
          Chris A. Mattmann and   
              Kiri Wagstaff and   
               Joseph Lazio and   
            Dayton L. Jones and   
                Alice Allen and   
                Lior Shamir and   
                   Peter Teuben   Computing in Astronomy: Applications and
                                  Examples . . . . . . . . . . . . . . . . 62--69
         Zachary A. Collier and   
              Daniel DiMase and   
              Steve Walters and   
  Mark Mohammad Tehranipoor and   
           James H. Lambert and   
                    Igor Linkov   Cybersecurity Standards: Managing Risk
                                  and Creating Resilience  . . . . . . . . 70--76
                      Anonymous   Call for papers  . . . . . . . . . . . . 77--77
             Hillery Hunter and   
    Luis A. Lastras-Montano and   
     Bishwaranjan Bhattacharjee   Adapting Server Systems for New Memory
                                  Technologies . . . . . . . . . . . . . . 78--84
                Julie Hubschman   My Summer with a Robot . . . . . . . . . 85--86
                   Karl Ricanek   Beyond Recognition: The Promise of
                                  Biometric Analytics  . . . . . . . . . . 87--89
                    Hal Berghel   Sticky Wikis . . . . . . . . . . . . . . 90--93
                      John Wack   IEEE VSSC/1622: Voting System Standards  94--97
            Tobias Hossfeld and   
           Christian Keimel and   
             Christian Timmerer   Crowdsourcing Quality-of-Experience
                                  Assessments  . . . . . . . . . . . . . . 98--102
            Robin A. Gandhi and   
              Keesha Crosby and   
                 Harvey Siy and   
                Sayonnha Mandal   Gauging the Impact of FISMA on Software
                                  Security . . . . . . . . . . . . . . . . 103--107
                      Anonymous   Computer Society Connection  . . . . . . 108--108
                      Anonymous   Call and Calendar  . . . . . . . . . . . 109--112
                      Anonymous   Symantec House Advertisement . . . . . . 113--113
                      Anonymous   Career opportunities . . . . . . . . . . 114--119
               David Alan Grier   The Point of Recognition . . . . . . . . 120--120
                      Anonymous   IEEE Advertisement . . . . . . . . . . . c3--c3
                      Anonymous   2015 International CES House
                                  Advertisement  . . . . . . . . . . . . . c2--c2
                      Anonymous   Keep the Office Safe wherever you work   c4--c4

Computer
Volume 47, Number 10, October, 2014

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1--1
                      Anonymous   Call for Papers House Advertisement  . . 3--3
                      Anonymous   IEEE SOSE 2015 Advertisement . . . . . . 5--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--7
                 Leonard Heilig   A View on Cloud Computing from above the
                                  Clouds . . . . . . . . . . . . . . . . . 8--8
                  Brian M. Gaff   $3$D IP  . . . . . . . . . . . . . . . . 9--11
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 14--20
                      Anonymous   2015 International CES Advertisement . . 21--21
          Carlos E. Jimenez and   
             Agusti Solanas and   
              Francisco Falcone   E-Government Interoperability: Linking
                                  Open and Smart Government  . . . . . . . 22--24
       Konstantinos Bovalis and   
       Vassilios Peristeras and   
         Margarida Abecasis and   
   Raul-Mario Abril-Jimenez and   
   Miguel Alvarez Rodriguez and   
           Corinne Gattegno and   
    Athanasios Karalopoulos and   
             Ioannis Sagias and   
           Szabolcs Szekacs and   
                 Suzanne Wigard   Promoting Interoperability in Europe's
                                  E-Government . . . . . . . . . . . . . . 25--33
                    Mario Kovac   E-Health Demystified: An E-Government
                                  Showcase . . . . . . . . . . . . . . . . 34--42
                      Anonymous   IEEE Advertisement . . . . . . . . . . . 43--43
             Marijn Janssen and   
               Elsa Estevez and   
                Tomasz Janowski   Interoperability in Big, Open, and
                                  Linked Data --- Organizational Maturity,
                                  Capabilities, and Data Portfolios  . . . 44--49
            Pieter Colpaert and   
    Mathias Van Compernolle and   
           Laurens De Vocht and   
            Anastasia Dimou and   
          Miel Vander Sande and   
             Ruben Verborgh and   
              Peter Mechant and   
                   Erik Mannens   Quantifying the Interoperability of Open
                                  Government Datasets  . . . . . . . . . . 50--56
            Martin le Vrang and   
           Agis Papantoniou and   
              Erika Pauwels and   
              Pieter Fannes and   
      Dominique Vandensteen and   
                 Johan De Smedt   ESCO: Boosting Job Matching in Europe
                                  with Semantic Interoperability . . . . . 57--64
                 Jesus Cano and   
          Roberto Hernandez and   
                   Salvador Ros   Distributed Framework for Electronic
                                  Democracy in Smart Cities  . . . . . . . 65--71
                     Pu Liu and   
                 Zhenghong Peng   China's Smart City Pilots: A Progress
                                  Report . . . . . . . . . . . . . . . . . 72--81
              Stefano Secci and   
                  San Murugesan   Cloud Networks: Enhancing Performance
                                  and Resiliency . . . . . . . . . . . . . 82--85
          Jonathan P. Bowen and   
               Mike Hinchey and   
              Helge Janicke and   
                Martin Ward and   
                  Hussein Zedan   Formality, Agility, Security, and
                                  Evolution in Software Development  . . . 86--89
                    Wendy DuBow   Attracting and Retaining Women in
                                  Computing  . . . . . . . . . . . . . . . 90--93
                    Hal Berghel   Defending against Big Dada: Defensive
                                  Tactics for Weapons of Mass Deception    94--98
                   Jason W. Bay   Turning Video Gamers into Software
                                  Developers . . . . . . . . . . . . . . . 99--101
           Apostol Vassilev and   
               Christopher Celi   Avoiding Cyberspace Catastrophes through
                                  Smarter Testing  . . . . . . . . . . . . 102--106
                      Anonymous   Call and Calendar  . . . . . . . . . . . 107--109
                      Anonymous   Career Opportunities . . . . . . . . . . 110--125
                      Anonymous   Rock Stars of Big Data Analytics House
                                  Advertisement  . . . . . . . . . . . . . 126--126
                      Anonymous   IEEE Cloud Computing House Advertisement 127--127
               David Alan Grier   Lying to the Future  . . . . . . . . . . 128--128
                      Anonymous   IEEE Advertisement . . . . . . . . . . . c3--c3
                      Anonymous   Samsung Advertisement: The Next Big
                                  Thing for Business is Here . . . . . . . c2--c2
                      Anonymous   Samsung Advertisement: One Giant Leap
                                  Forward  . . . . . . . . . . . . . . . . c4--c4

Computer
Volume 47, Number 11, November, 2014

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1--1
                      Anonymous   Bring IT to Life Advertisement . . . . . 3--3
                      Anonymous   Bring IT to Life Advertisement . . . . . 5--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--7
         Roberta L. Klatzky and   
              J. Edward Colgate   Rendering Tactile Features on
                                  Touchscreens . . . . . . . . . . . . . . 8--8
                      Anonymous   Discover the Best Tools and Solutions
                                  from Wiley and Wiley-IEEE Computer Press
                                  House Advertisement  . . . . . . . . . . 9--9
              Charles Severance   Ian Foster and the Globus Project  . . . 10--11
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                     Lee Garber   News Briefs  . . . . . . . . . . . . . . 14--18
               Ying-Dar Lin and   
                   Dan Pitt and   
             David Hausheer and   
              Erica Johnson and   
                    Yi-Bing Lin   Software-Defined Networking:
                                  Standardization for Cloud Computing's
                                  Second Wave  . . . . . . . . . . . . . . 19--21
            Jean Tourrilhes and   
              Puneet Sharma and   
            Sujata Banerjee and   
                  Justin Pettit   SDN and OpenFlow Evolution: A Standards
                                  Perspective  . . . . . . . . . . . . . . 22--29
                 Rick Bauer and   
                Ron Milford and   
                        Li Zhen   Aligning Technology and Market Drivers
                                  in an Open Source Standards Testing
                                  Program  . . . . . . . . . . . . . . . . 30--36
                      Anonymous   2015 International CES Advertisement . . 37--37
                 Paul Quinn and   
                   Jim Guichard   Service Function Chaining: Creating a
                                  Service Plane via Network Service
                                  Headers  . . . . . . . . . . . . . . . . 38--44
                      Anonymous   IEEE BigDataService 2015 House
                                  Advertisement  . . . . . . . . . . . . . 45--45
Christian Esteve Rothenberg and   
                   Roy Chua and   
                Josh Bailey and   
              Martin Winter and   
        Carlos N. A. Correa and   
        Sidney C. de Lucena and   
    Marcos Rogerio Salvador and   
               Thomas D. Nadeau   When Open Source Meets Network Control
                                  Planes . . . . . . . . . . . . . . . . . 46--54
                      Anonymous   COOL Chips XVIII House Advertisement . . 55--55
               Marco Canini and   
              Anja Feldmann and   
                  Dan Levin and   
           Fabian Schaffert and   
                  Stefan Schmid   Software-Defined Networks: Incremental
                                  Deployment with Panopticon . . . . . . . 56--60
                      Anonymous   Instant Access to IEEE Publications
                                  House Advertisement  . . . . . . . . . . 61--61
              Marion Dillon and   
                Timothy Winters   Virtualization of Home Network Gateways  62--65
                Lindsey Lowther   Defensive Biometrics . . . . . . . . . . 66--69
             m.c. schraefel and   
         Elizabeth F. Churchill   Wellth Creation: Using Computer Science
                                  to Support Proactive Health  . . . . . . 70--72
                      Anonymous   Symantec Advertisement . . . . . . . . . 73--73
          James H. Faghmous and   
           Arindam Banerjee and   
             Shashi Shekhar and   
          Michael Steinbach and   
                Vipin Kumar and   
          Auroop R. Ganguly and   
                Nagiza Samatova   Theory-Guided Data Science for Climate
                                  Change . . . . . . . . . . . . . . . . . 74--78
            Brian David Johnson   Imagining and Building Robots (in
                                  Capes!)  . . . . . . . . . . . . . . . . 79--81
                    Hal Berghel   Why Clouds Give Me a Case of the Vapors  82--85
                    Ramesh Jain   Toward Social Life Networks  . . . . . . 86--88
                Kirk W. Cameron   Energy Efficiency in the Wild: Why
                                  Datacenters Fear Power Management  . . . 89--92
                      Anonymous   Fuel Your Imagination Advertisement  . . 93--93
            George Hurlburt and   
             Irena Bojanova and   
                  Ann Sobel and   
                  Keesha Crosby   Security or Privacy? A Matter of
                                  Perspective  . . . . . . . . . . . . . . 94--98
               Paul Joannou and   
                   Alan Wassyng   Understanding Integrity Level Concepts   99--101
                      Anonymous   Computer Society Connection  . . . . . . 102--102
                      Anonymous   2015 IEEE Services Congress IEEE BigData
                                  Congress House Advertisement . . . . . . 103--103
                      Anonymous   Call and Calendar  . . . . . . . . . . . 104--107
                      Anonymous   Career Opportunities . . . . . . . . . . 108--123
               David Alan Grier   The External Environment . . . . . . . . 124--124
                      Anonymous   29th IEEE International Parallel &
                                  Distributed Processing Symposium House
                                  Advertisement  . . . . . . . . . . . . . c3--c3
                      Anonymous   The Next Big Thing for Business is Here  c2--c2
                      Anonymous   One Giant Leap Forward . . . . . . . . . c4--c4

Computer
Volume 47, Number 12, December, 2014

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 1--1
                      Anonymous   The Ultimate Competitive Advantage Bring
                                  IT to Life Advertisement . . . . . . . . 3--3
                      Anonymous   Technology to Empower the Workforce
                                  Bring IT to Life Advertisement . . . . . 5--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--7
                        Hai Jin   When Data Grows Big  . . . . . . . . . . 8--8
                      Anonymous   Discover the Best Tools and Solutions
                                  from Wiley and Wiley-IEEE Computer Press
                                  House Advertisement  . . . . . . . . . . 9--9
             Dejan S. Milojicic   Revitalization . . . . . . . . . . . . . 10--13
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 14--15
                      Anonymous   News Briefs  . . . . . . . . . . . . . . 16--20
                      Anonymous   Fuel your imagination House
                                  Advertisement  . . . . . . . . . . . . . 21--21
            Brian David Johnson   Making in the 21st Century [Guest
                                  Editor's introduction] . . . . . . . . . 22--23
                   Jun Axup and   
            AnnMarie Thomas and   
              Ariel Waldman and   
             Susan Faulkner and   
    Carolina Odman-Govender and   
              Jim St. Leger and   
              Jessica Polka and   
              Melissa Gregg and   
            Brian David Johnson   The World of Making  . . . . . . . . . . 24--40
                      Anonymous   2015 IEEE Service Congress and IEEE
                                  BigData Congress House Advertisement . . 41--41
            Crystal Beasley and   
           Emmeline Parsons and   
             Melissa Pierce and   
             Sam Baumgarten and   
            Andrius Neviera and   
           Shubham Banerjee and   
                Tyesha Snow and   
                Carla Diana and   
          Nicholas Nakadate and   
                Shruti Satsangi   Passionate Projects: This Is What I Made 42--54
                      Anonymous   Linkedin Corp. Advertisement . . . . . . 55--55
              Yasaman Sheri and   
    Enrique Gabriel Legaspi and   
             Cynthia Erenas and   
              Brian Kessler and   
                 Eri Gentry and   
                  Ruben Estrada   The Future of Making . . . . . . . . . . 56--63
            William Edwards and   
             Judith Gebauer and   
                 Bryan Reinicke   White Space Networks: Architecture,
                                  Application, and Opportunity . . . . . . 64--71
            Alberto Bartoli and   
            Giorgio Davanzo and   
          Andrea De Lorenzo and   
                Eric Medvet and   
                   Enrico Sorio   Automatic Synthesis of Regular
                                  Expressions from Examples  . . . . . . . 72--80
                      Anonymous   House Advertisement  . . . . . . . . . . 81--81
              Eun-Sung Jung and   
            Rajkumar Kettimuthu   Challenges and Opportunities for
                                  Data-Intensive Computing in the Cloud    82--85
             Carmelo Ardito and   
                Paolo Buono and   
             Danilo Caivano and   
  Maria Francesca Costabile and   
            Rosa Lanzilotti and   
                Yvonne Dittrich   Human-Centered Design in Industry:
                                  Lessons from the Trenches  . . . . . . . 86--89
                   Fang Jin and   
                   Wei Wang and   
                 Liang Zhao and   
           Edward Dougherty and   
                   Yang Cao and   
              Chang-Tien Lu and   
             Naren Ramakrishnan   Misinformation Propagation in the Age of
                                  Twitter  . . . . . . . . . . . . . . . . 90--94
                    Hal Berghel   Judson Rosebush on Computer Graphics and
                                  Animation  . . . . . . . . . . . . . . . 95--99
                 Brian Chau and   
              Adam Robinson and   
                 Jason Pace and   
                   Rob Nash and   
                    Kelvin Sung   Corrupted: A Game to Teach Programming
                                  Concepts . . . . . . . . . . . . . . . . 100--103
             Alexander Kott and   
            Ananthram Swami and   
               Patrick McDaniel   Security Outlook: Six Cyber Game
                                  Changers for the Next 15 Years . . . . . 104--106
                      Anonymous   Call and Calendar  . . . . . . . . . . . 107--110
                      Anonymous   Fujii Voted 2015 Computer Society
                                  President-Elect  . . . . . . . . . . . . 111--113
                      Anonymous   Career Opportunities . . . . . . . . . . 114--127
               David Alan Grier   State Secrets  . . . . . . . . . . . . . 128--128
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   If ``Expect the Unexpected'' Weren't So
                                  Expected, We'd Say that's Exactly What
                                  to Expect  . . . . . . . . . . . . . . . c3--c3
                      Anonymous   The Next Big Thing for Business is Here  c2--c2
                      Anonymous   One Giant Leap Forward . . . . . . . . . c4--c4


Computer
Volume 48, Number 1, January, 2015

                      Anonymous   Table of contents  . . . . . . . . . . . 1--2
                      Anonymous   [Masthead] . . . . . . . . . . . . . . . 3--3
                      Tom Conte   A Time of Change . . . . . . . . . . . . 4--6
                     Sumi Helal   Sustaining Computer's Impact and
                                  Adapting to Change . . . . . . . . . . . 7--9
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 10--11
                        Ying Xu   Carrying out Phylogenetic Analyses
                                  through Computational Model Checking . . 12--12
                      Anonymous   Startup Rock Stars [advertisement] . . . 13--13
              Charles Severance   Khan Academy and Computer Science  . . . 14--15
                  Brian M. Gaff   IP Issues for Start-ups  . . . . . . . . 16--18
                      Anonymous   Rock Stars of $3$D Printing
                                  [advertisement]  . . . . . . . . . . . . 19--19
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 20--21
                      Anonymous   News . . . . . . . . . . . . . . . . . . 22--27
                   Roy Want and   
            Bill N. Schilit and   
                   Scott Jenson   Enabling the Internet of Things  . . . . 28--35
             Fadi H. Gebara and   
           H. Peter Hofstee and   
                 Kevin J. Nowka   Second-Generation Big Data Systems . . . 36--41
               Peter Fonash and   
                Phyllis Schneck   Cybersecurity: From Months to
                                  Milliseconds . . . . . . . . . . . . . . 42--50
                      Anonymous   IEEE IRI-2015  . . . . . . . . . . . . . 51--51
      Constantinos Patsakis and   
                 Paul Laird and   
              Michael Clear and   
           Melanie Bouroche and   
                 Agusti Solanas   Interoperable Privacy-Aware
                                  E-Participation within Smart Cities  . . 52--58
           Stephen P. Crago and   
              John Paul Walters   Heterogeneous Cloud Computing: The Way
                                  Forward  . . . . . . . . . . . . . . . . 59--61
            Luca Caviglione and   
             Wojciech Mazurczyk   Understanding Information Hiding in iOS  62--65
            Mitchell E. Daniels   Measuring Great Jobs and Great Lives:
                                  The Gallup--Purdue Index . . . . . . . . 66--69
                     Ari Popper   Transforming Business through Science
                                  Fiction Prototyping  . . . . . . . . . . 70--72
               Jennifer Costley   Leveraging the Standards Life Cycle for
                                  Green IT . . . . . . . . . . . . . . . . 73--75
                    Hal Berghel   A Paperless Gamble . . . . . . . . . . . 76--78
                      Anonymous   CS Connection  . . . . . . . . . . . . . 79--80
                      Anonymous   Call and Calendar  . . . . . . . . . . . 81--83
                      Anonymous   Career Opportunities . . . . . . . . . . 84--91
               David Alan Grier   State Transitions  . . . . . . . . . . . 92--92
                      Anonymous   Call for papers  . . . . . . . . . . . . c3--c3
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   2015 IEEE Services Congress and IEEE Big
                                  Data Congress  . . . . . . . . . . . . . c2--c2
                      Anonymous   One Giant Leap Forward . . . . . . . . . c4--c4

Computer
Volume 48, Number 2, February, 2015

                      Anonymous   Table of contents  . . . . . . . . . . . 1--2
                      Anonymous   [Masthead] . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                  Elisa Bertino   Denial-of-Service Attacks to UMTS  . . . 6--6
              Charles Severance   Guido van Rossum: The Early Years of
                                  Python . . . . . . . . . . . . . . . . . 7--9
                  Brian M. Gaff   BYOD? OMG! . . . . . . . . . . . . . . . 10--11
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                      Anonymous   News . . . . . . . . . . . . . . . . . . 14--20
                 Alf Weaver and   
                    Renee Bryce   Technological Advances in Medicine: It's
                                  Personal [Guest Editors' introduction]   21--23
                    Jingquan Li   Ensuring Privacy in a Personal Health
                                  Record System  . . . . . . . . . . . . . 24--31
            Marina Velikova and   
          Peter J. F. Lucas and   
        Maarten van der Heijden   Intelligent Disease Self-Management with
                                  Mobile Technology  . . . . . . . . . . . 32--39
                      Anonymous   Intuit, Inc. has openings for the
                                  following positions (by location) House
                                  Advertisement  . . . . . . . . . . . . . 40--40
              Kyungtae Kang and   
                 Qixin Wang and   
                Junbeom Hur and   
            Kyung-Joon Park and   
                        Lui Sha   Medical-Grade Quality of Service for
                                  Real-Time Mobile Healthcare  . . . . . . 41--49
             Arshdeep Bahga and   
             Vijay K. Madisetti   Healthcare Data Integration and
                                  Informatics in the Cloud . . . . . . . . 50--57
                Erman Ayday and   
     Emiliano De Cristofaro and   
         Jean-Pierre Hubaux and   
                    Gene Tsudik   Whole Genome Sequencing: Revolutionary
                                  Medicine or Privacy Nightmare? . . . . . 58--66
                 Adam P. Spring   Creating Substance from a Cloud:
                                  Low-Cost Product Generation  . . . . . . 67--74
                      Greg Byrd   Spotlighting Student Innovation  . . . . 75--76
                    Hal Berghel   Cyber Chutzpah: The Sony Hack and the
                                  Celebration of Hyperbole . . . . . . . . 77--80
                Emil Vassev and   
                   Mike Hinchey   KnowLang: Knowledge Representation for
                                  Self-Adaptive Systems  . . . . . . . . . 81--84
              Vincent C. Hu and   
            D. Richard Kuhn and   
             David F. Ferraiolo   Attribute-Based Access Control . . . . . 85--88
                      Anonymous   CS Connection  . . . . . . . . . . . . . 89--90
                      Anonymous   Call and Calendar  . . . . . . . . . . . 91--92
                      Anonymous   Career Opportunities . . . . . . . . . . 93--99
               David Alan Grier   The Tyranny of Geography . . . . . . . . 100--100
                      Anonymous   Call for papers  . . . . . . . . . . . . c2--c2
                      Anonymous   [Front cover]  . . . . . . . . . . . . . c1--c1
                      Anonymous   Instant Access to IEEE Publications
                                  House Advertisement  . . . . . . . . . . c3--c3
                      Anonymous   Startup Rock Stars [Advertisement] . . . c4--c4

Computer
Volume 48, Number 3, March, 2015

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                 Bjorn Schuller   Do Computers Have Personality? . . . . . 6--7
              Charles Severance   Guido van Rossum: The Modern Era of
                                  Python . . . . . . . . . . . . . . . . . 8--10
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 11--12
                     Lee Garber   News . . . . . . . . . . . . . . . . . . 13--19
         Venkat N. Gudivada and   
        Ricardo Baeza-Yates and   
              Vijay V. Raghavan   Big Data: Promises and Problems  . . . . 20--23
   Vito Giovanni Castellana and   
          Alessandro Morari and   
               Jesse Weaver and   
             Antonino Tumeo and   
               David Haglin and   
               Oreste Villa and   
                       John Feo   In-Memory Graph Databases for Web-Scale
                                  Data . . . . . . . . . . . . . . . . . . 24--35
             Zhenyun Zhuang and   
     Haricharan Ramachandra and   
                  Chaoyue Xiong   Taming Replication Latency of Big Data
                                  Events with Capacity Planning  . . . . . 36--41
         Srividya K. Bansal and   
             Sebastian Kagemann   Integrating Big Data: A Semantic
                                  Extract-Transform-Load Framework . . . . 42--50
                      Anonymous   Focus on Your Job Search House
                                  Advertisement  . . . . . . . . . . . . . 51--51
              Karamjit Kaur and   
                    Rinkle Rani   Managing Data in Healthcare Information
                                  Systems: Many Models, One Solution . . . 52--59
               Martin Giese and   
                Ahmet Soylu and   
     Guillermo Vega-Gorgojo and   
               Arild Waaler and   
                Peter Haase and   
       Ernesto Jimenez-Ruiz and   
               Davide Lanti and   
                Martin Rezk and   
                Guohui Xiao and   
                Ozgur Ozcep and   
                Riccardo Rosati   Optique: Zooming in on Big Data  . . . . 60--67
             Hasan Alkhatib and   
           Paolo Faraboschi and   
         Eitan Frachtenberg and   
          Hironori Kasahara and   
                Danny Lange and   
              Phil Laplante and   
              Arif Merchant and   
            Dejan Milojicic and   
                 Karsten Schwan   What Will 2022 Look Like? The IEEE CS
                                  2022 Report  . . . . . . . . . . . . . . 68--76
                      Anonymous   Stay connected House Advertisement . . . 77--77
           Ninad S. Thakoor and   
                      Le An and   
                  Bir Bhanu and   
  Santhoshkumar Sunderrajan and   
                B. S. Manjunath   People Tracking in Camera Networks:
                                  Three Open Questions . . . . . . . . . . 78--86
           Hong-Linh Truong and   
               Schahram Dustdar   Programming Elasticity in the Cloud  . . 87--90
                      Anonymous   Call for Papers  . . . . . . . . . . . . 91--91
                Kasper Hornbaek   Flexible Displays, Rigid Designs?  . . . 92--96
                Tawny Schlieski   Virtual Dystopia . . . . . . . . . . . . 97--98
             James Bret Michael   Trusted Computing: An Elusive Goal . . . 99--101
                    Hal Berghel   Noirware . . . . . . . . . . . . . . . . 102--107
         Christian Timmerer and   
           Touradj Ebrahimi and   
               Fernando Pereira   Toward a New Assessment of Quality . . . 108--110
                     Bob Aiello   Managing the High-Performance Computer
                                  Society Standards Working Group  . . . . 111--113
               Steven Roach and   
                  Mehran Sahami   CS2013: Computer Science Curricula 2013  114--116
                      Anonymous   Call and Calendar  . . . . . . . . . . . 117--119
                      Anonymous   Career Opportunities . . . . . . . . . . 120--135
               David Alan Grier   Building Trust . . . . . . . . . . . . . 136--136
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Instant Access to IEEE Publications
                                  Advertisement  . . . . . . . . . . . . . c3--c3
                      Anonymous   Rock Stars of $3$D Printing House
                                  Advertisement  . . . . . . . . . . . . . c2--c2
                      Anonymous   Are Your Developers Spending Time
                                  Advertisement  . . . . . . . . . . . . . c4--c4

Computer
Volume 48, Number 4, April, 2015

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Computer Highlights Society Magazines    4--5
                  David Forsyth   Representation Learning  . . . . . . . . 6--6
                  Brian M. Gaff   Important IP Cases in 2015, Part One . . 7--9
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 10--11
               D. Frank Hsu and   
          Dorothy Marinucci and   
                Jeffrey M. Voas   Cybersecurity: Toward a Secure and
                                  Sustainable Cyber Ecosystem  . . . . . . 12--14
                      Anonymous   Get More, for Less! House Advertisement  15--15
                    Ruby B. Lee   Rethinking Computers for Cybersecurity   16--25
              David Gillman and   
                    Yin Lin and   
                Bruce Maggs and   
            Ramesh K. Sitaraman   Protecting Websites from Attack with
                                  Secure Delivery Networks . . . . . . . . 26--34
                      Anonymous   Call for Papers Advertisement  . . . . . 35--35
         Kristin E. Heckman and   
             Frank J. Stech and   
            Ben S. Schmoker and   
               Roshan K. Thomas   Denial and Deception in Cyber Defense    36--44
               Tomas Vagoun and   
               George O. Strawn   Implementing the Federal Cybersecurity
                                  R&D Strategy  . . . . . . . . . . . . . . 45--55
                       Sek Chai   Enabling Smart Camera Networks with
                                  Smartphone Processors  . . . . . . . . . 56--63
               Jon D. Hagar and   
          Thomas L. Wissink and   
            D. Richard Kuhn and   
                Raghu N. Kacker   Introducing Combinatorial Testing in a
                                  Large Organization . . . . . . . . . . . 64--72
                      Anonymous   IEEE Computer Society House
                                  Advertisement  . . . . . . . . . . . . . 73--73
                      Greg Byrd   A Little Ingenuity Solves an
                                  Elephant-Sized Problem . . . . . . . . . 74--77
                 Emily Shen and   
               Mayank Varia and   
       Robert K. Cunningham and   
                W. Konrad Vesey   Cryptographically Secure Computation . . 78--81
                    Hal Berghel   Borderline Executive Disorder  . . . . . 82--86
                      Anonymous   CS Connection  . . . . . . . . . . . . . 87--89
                      Anonymous   Call and Calendar  . . . . . . . . . . . 90--93
                      Anonymous   Focus on Your Job Search House
                                  Advertisement  . . . . . . . . . . . . . 94--94
                      Anonymous   Career Opportunities . . . . . . . . . . 95--103
               David Alan Grier   Accidents will happen [The Errant
                                  Hashtag] . . . . . . . . . . . . . . . . 104--104
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Instant Access to IEEE Publications
                                  Advertisement  . . . . . . . . . . . . . c3--c3
                      Anonymous   IEEE Security & Privacy House
                                  Advertisement  . . . . . . . . . . . . . c2--c2
                      Anonymous   Rock Stars of Cybersecurity House
                                  Advertisement  . . . . . . . . . . . . . c4--c4

Computer
Volume 48, Number 5, May, 2015

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                       Ling Liu   Enhancing Cloud Services through
                                  Multitier Workload Analysis  . . . . . . 6--6
              Charles Severance   John Resig: Building JQuery  . . . . . . 7--8
                  Brian M. Gaff   Important IP Cases in 2015, Part Two . . 9--11
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 12--13
                 Ron Vetter and   
                  San Murugesan   The Web: The Next 25 Years . . . . . . . 14--17
         Vishnu S. Pendyala and   
           Simon S. Y. Shim and   
              Christoph Bussler   The Web That Extends beyond the World    18--25
                   Dave Raggett   The Web of Things: Challenges and
                                  Opportunities  . . . . . . . . . . . . . 26--32
                      Anonymous   Compsac Call for Papers House
                                  Advertisement  . . . . . . . . . . . . . 33--33
                 Jorg Heuer and   
              Johannes Hund and   
                   Oliver Pfaff   Toward the Web of Things: Applying Web
                                  Technologies to the Physical World . . . 34--42
                      Anonymous   STC 2015: Call for Presentations House
                                  Advertisement  . . . . . . . . . . . . . 43--43
                 Ron Vetter and   
                  San Murugesan   Roundtable Discussion: The Web We Look
                                  Forward To . . . . . . . . . . . . . . . 44--50
                    Dirk Riehle   How Open Source Is Changing the Software
                                  Developer's Career . . . . . . . . . . . 51--57
           Jason Schlessman and   
                   Marilyn Wolf   Tailoring Design for Embedded Computer
                                  Vision Applications  . . . . . . . . . . 58--62
                      Anonymous   Focus on Your Job Search House
                                  Advertisement  . . . . . . . . . . . . . 63--63
          Alexander De Luca and   
                Janne Lindqvist   Is Secure and Usable Smartphone
                                  Authentication Asking Too Much?  . . . . 64--68
               Alida Draudt and   
            Jonjozuf Hadley and   
                 Ryan Hogan and   
             Leticia Murray and   
              Gregory Stock and   
                Julia Rose West   Six Insights about Science Fiction
                                  Prototyping  . . . . . . . . . . . . . . 69--71
                 Wenqi Zhou and   
                     Yuhong Liu   Online Product Rating Manipulation and
                                  Market Performance . . . . . . . . . . . 72--75
          Susanne Hambrusch and   
            Ran Libeskind-Hadas   The PhD Pipeline . . . . . . . . . . . . 76--79
                Marat Zhanikeev   A Cloud Visitation Platform to
                                  Facilitate Cloud Federation and Fog
                                  Computing  . . . . . . . . . . . . . . . 80--83
                    Hal Berghel   What Makes a Good Column . . . . . . . . 84--87
                George Hurlburt   Cyberhuman Security  . . . . . . . . . . 88--91
             Karen Gundy-Burlet   The Use of Standards on the LADEE
                                  Mission  . . . . . . . . . . . . . . . . 92--95
                   Manfred Broy   Rethinking Nonfunctional Software
                                  Requirements . . . . . . . . . . . . . . 96--99
                      Anonymous   Call and Calendar  . . . . . . . . . . . 100--105
                      Anonymous   Career Opportunities . . . . . . . . . . 106--115
               David Alan Grier   The GitHub Effect  . . . . . . . . . . . 116--116
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Get more, for Less! House Advertisement  c2--c2
                      Anonymous   Learn More House Advertisement . . . . . c3--c3
                      Anonymous   Rock Stars of Wearables House
                                  Advertisement  . . . . . . . . . . . . . c4--c4

Computer
Volume 48, Number 6, June, 2015

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
              Prasant Mohapatra   Distributed Optimal Channel Access in
                                  Cognitive Radio Networks . . . . . . . . 6--6
              Charles Severance   Roy T. Fielding: Understanding the REST
                                  Style  . . . . . . . . . . . . . . . . . 7--9
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 10--11
               Thad Starner and   
                     Tom Martin   Wearable Computing: The New Dress Code
                                  [Guest Editors' introduction]  . . . . . 12--15
                 Anhong Guo and   
                Xiaolong Wu and   
             Zhengyang Shen and   
               Thad Starner and   
             Hannes Baumann and   
                Scott Gilliland   Order Picking with Head-Up Displays  . . 16--24
                 Reuben Kirkham   Can Disability Discrimination Law Expand
                                  the Availability of Wearable Computers?  25--33
              Jon C. Hammer and   
                    Tingxin Yan   Inferring Mobile User Status with Usage
                                  Cues . . . . . . . . . . . . . . . . . . 34--40
             Andrea Rosales and   
              Sergio Sayago and   
                     Josep Blat   Beeping Socks and Chirping Arm Bands:
                                  Wearables That Foster Free Play  . . . . 41--48
                      Anonymous   STC 2015: Call for Presentations House
                                  Advertisement  . . . . . . . . . . . . . 49--49
               Najeeb Ullah and   
           Maurizio Morisio and   
                  Antonio Vetro   Selecting the Best Reliability Model to
                                  Predict Residual Defects in Open Source
                                  Software . . . . . . . . . . . . . . . . 50--58
                      Anonymous   Focus on Your Job Search House
                                  Advertisement  . . . . . . . . . . . . . 59--59
                      Greg Byrd   Tracking Cows Wirelessly . . . . . . . . 60--63
                    Hal Berghel   A Farewell to Air Gaps, Part 1 . . . . . 64--68
                   Jeffrey Voas   Vetting Mobile App Vendors . . . . . . . 69--71
              Reiner Hahnle and   
            Einar Broch Johnsen   Designing Resource-Aware Cloud
                                  Applications . . . . . . . . . . . . . . 72--75
                      Anonymous   CS Connection  . . . . . . . . . . . . . 76--77
                      Anonymous   Call and Calendar  . . . . . . . . . . . 78--82
                      Anonymous   IEEE Computer Society House
                                  Advertisement  . . . . . . . . . . . . . 83--83
                      Anonymous   Career Opportunities . . . . . . . . . . 84--98
                      Anonymous   39th Annual International Computers,
                                  Software & Applications Conference
                                  Advertisement  . . . . . . . . . . . . . 99--99
               David Alan Grier   Disruptive Computing . . . . . . . . . . 100--100
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Get more, for Less! House Advertisement  c2--c2
                      Anonymous   Learn More House Advertisement . . . . . c3--c3
                      Anonymous   Rock Stars of Wearables House
                                  Advertisement  . . . . . . . . . . . . . c4--c4

Computer
Volume 48, Number 7, July, 2015

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
               Jean-Luc Gaudiot   The Times They Are A-Changin'  . . . . . 4--6
                      Anonymous   Call for Participation and Celebration
                                  House Advertisement  . . . . . . . . . . 7--7
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 8--9
             Stephen W. Keckler   Increasing Interconnection Network
                                  Throughput with Virtual Channels . . . . 10--10
                      Anonymous   Symantec Advertisement . . . . . . . . . 11--11
                  Brian M. Gaff   ``Curiouser and Curiouser!'' --- The
                                  Fallout from Alice . . . . . . . . . . . 12--14
                      Anonymous   IEEE Computer Society House
                                  Advertisement  . . . . . . . . . . . . . 15--15
                      Anonymous   32 & 16 years ago . . . . . . . . . . . . 16--17
               Jim Torresen and   
           Christian Plessl and   
                        Xin Yao   Self-Aware and Self-Expressive Systems   18--20
            Bernhard Rinner and   
              Lukas Esterle and   
          Jennifer Simonjan and   
              Georg Nebehay and   
          Roman Pflugfelder and   
Gustavo Fernandez Dominguez and   
                 Peter R. Lewis   Self-Aware and Self-Expressive Camera
                                  Networks . . . . . . . . . . . . . . . . 21--28
           Michele Amoretti and   
                Stefano Cagnoni   Toward Collective Self-Awareness and
                                  Self-Expression in Distributed Systems   29--36
            Jurgo S. Preden and   
             Kalle Tammemae and   
               Axel Jantsch and   
                Mairo Leier and   
                 Andri Riid and   
                    Emine Calis   The Benefits of Self-Awareness and
                                  Attention in Fog and Mist Computing  . . 37--45
           Vincent van Beek and   
          Jesse Donkervliet and   
                Tim Hegeman and   
          Stefan Hugtenburg and   
                Alexandru Iosup   Self-Expressive Management of
                                  Business-Critical Workloads in
                                  Virtualized Datacenters  . . . . . . . . 46--54
                Behrooz Parhami   Amdahl's Reliability Law: A Simple
                                  Quantification of the Weakest-Link
                                  Phenomenon . . . . . . . . . . . . . . . 55--58
                    Hal Berghel   A Farewell to Air Gaps, Part 2 . . . . . 59--63
                    Nir Kshetri   Recent US Cybersecurity Policy
                                  Initiatives: Challenges and Implications 64--69
            Brian David Johnson   Steve the Steampunk Robot  . . . . . . . 70--72
              Soto Montalvo and   
            Raquel Martinez and   
              Victor Fresno and   
                 Rafael Capilla   Multilingual Information Access on the
                                  Web  . . . . . . . . . . . . . . . . . . 73--75
               Dhananjai M. Rao   Computing Efficiency in Education  . . . 76--79
                 Xiaofei Xu and   
              Quan Z. Sheng and   
            Liang-Jie Zhang and   
                 Yushun Fan and   
               Schahram Dustdar   From Big Data to Big Service . . . . . . 80--83
            Per Ola Kristensson   Next-Generation Text Entry . . . . . . . 84--87
                      Anonymous   CS Connection  . . . . . . . . . . . . . 88--89
                      Anonymous   Call and Calendar  . . . . . . . . . . . 90--93
                      Anonymous   Career Opportunities . . . . . . . . . . 94--103
               David Alan Grier   Do We Need a Software Czar?  . . . . . . 104--104
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward [Advertisement] c4--c4
                      Anonymous   Rock Stars of Wearables [Advertisement]  c2--c2
                      Anonymous   STC 2015: Call for Presentations Learn
                                  More . . . . . . . . . . . . . . . . . . c3--c3

Computer
Volume 48, Number 8, August, 2015

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                 Shixia Liu and   
              Leila De Floriani   Multivariate Network Exploration and
                                  Presentations  . . . . . . . . . . . . . 6--6
                      Anonymous   Move Your Career Forward House
                                  Advertisement  . . . . . . . . . . . . . 7--7
              Charles Severance   Anil Jain: 25 Years of Biometric
                                  Recognition  . . . . . . . . . . . . . . 8--10
                      Anonymous   IEEE Computer Society [Advertisement]    11--11
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 12--13
             Antonino Tumeo and   
                       John Feo   Irregular Applications: From
                                  Architectures to Algorithms [Guest
                                  Editors' introduction] . . . . . . . . . 14--16
                      Anonymous   2016 Richard E. Merwin Distinguished
                                  Service Award House Advertisement  . . . 17--17
                Scott Lloyd and   
                   Maya Gokhale   In-Memory Data Rearrangement for
                                  Irregular, Data-Intensive Computing  . . 18--25
              Daniele Buono and   
            John A. Gunnels and   
                  Xinyu Que and   
             Fabio Checconi and   
           Fabrizio Petrini and   
             Tai-Ching Tuan and   
                     Chris Long   Optimizing Sparse Linear Algebra for
                                  Large-Scale Graph Analytics  . . . . . . 26--34
            Andrew Lenharth and   
                 Keshav Pingali   Scaling Runtimes for Irregular
                                  Algorithms to Large-Scale NUMA Systems   35--44
                      Anonymous   Rock Stars of Wearables House
                                  Advertisement  . . . . . . . . . . . . . 45--45
     Mahantesh Halappanavar and   
                Alex Pothen and   
                Ariful Azad and   
              Fredrik Manne and   
          Johannes Langguth and   
                      Arif Khan   Codesign Lessons Learned from
                                  Implementing Graph Matching on
                                  Multithreaded Architectures  . . . . . . 46--55
              Hitesh Rajput and   
                 Tanmoy Som and   
                   Soumitra Kar   An Automated Vehicle License Plate
                                  Recognition System . . . . . . . . . . . 56--61
             Peter R. Lewis and   
              Arjun Chandra and   
           Funmilade Faniyi and   
               Kyrre Glette and   
                   Tao Chen and   
               Rami Bahsoon and   
               Jim Torresen and   
                        Xin Yao   Architectural Aspects of Self-Aware and
                                  Self-Expressive Computing Systems: From
                                  Psychology to Engineering  . . . . . . . 62--70
                      Anonymous   Richard E. Merwin Scholarship House
                                  Advertisement  . . . . . . . . . . . . . 71--71
                      Greg Byrd   Cycling through Cyberspace . . . . . . . 72--75
            Hugo Bruneliere and   
                Jordi Cabot and   
Javier Luis Canovas Izquierdo and   
Leire Orue-Echevarria Arrieta and   
             Oliver Strauss and   
                  Manuel Wimmer   Software Modernization Revisited:
                                  Challenges and Prospects . . . . . . . . 76--80
              Zhi-Kai Zhang and   
       Michael Cheng Yi Cho and   
                 Zong-Yu Wu and   
        Shiuhpyng Winston Shieh   Identifying and Authenticating IoT
                                  Objects in a Natural Context . . . . . . 81--83
                   Darold Davis   Taming the Engineering of Information
                                  Services Websites with Standards . . . . 84--89
                    Hal Berghel   TSA: Mission Creep Meets Waste . . . . . 90--94
                      Anonymous   PerCom Pervasive Computing 2016 House
                                  Advertisement  . . . . . . . . . . . . . 95--95
                      Anonymous   IEEE Computer Society Election . . . . . 96--106
                      Anonymous   COMPSAC 2016 House Advertisement . . . . 107--107
                      Anonymous   IEEE President-Elect Candidates Address
                                  Computer Society Concerns  . . . . . . . 108--111
                      Anonymous   Call and Calendar  . . . . . . . . . . . 112--115
                      Anonymous   Career Opportunities . . . . . . . . . . 116--126
                      Anonymous   Deadline: 31 October House Advertisement 127--127
               David Alan Grier   In Search of the Diabolical Disconnect   128--128
                      Anonymous   Call for Participation and Celebration
                                  House Advertisement  . . . . . . . . . . c3--c3
                      Anonymous   Call for Papers House Advertisement  . . c2--c2
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   30th IEEE International Parallel and
                                  Distributed Processing Symposium House
                                  Advertisement  . . . . . . . . . . . . . c4--c4

Computer
Volume 48, Number 9, September, 2015

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                     Sumi Helal   However You Like It: Computer's Enhanced
                                  Digital Format or Affordable Print
                                  Option . . . . . . . . . . . . . . . . . 6--6
                      Anonymous   The Future's Algorithm Is Here
                                  Advertisement  . . . . . . . . . . . . . 7--7
             Afonso S. Bandeira   An Efficient Algorithm for Exact
                                  Recovery of Vertex Variables from Edge
                                  Measurements . . . . . . . . . . . . . . 8--9
                  Brian M. Gaff   Legal Issues with Wearable Technology    10--12
                      Anonymous   Rock Stars of Cybersecurity
                                  [Advertisement]  . . . . . . . . . . . . 13--13
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 14--15
                   Roy Want and   
               Schahram Dustdar   Activating the Internet of Things [Guest
                                  Editors' introduction] . . . . . . . . . 16--20
                      Anonymous   Focus on Your Job Search [Advertisement] 21--21
                 Jacob Beal and   
             Danilo Pianini and   
                   Mirko Viroli   Aggregate Programming for the Internet
                                  of Things  . . . . . . . . . . . . . . . 22--30
                      Anonymous   IEEE Computer Society 2015 Call for
                                  Major Award Nominations  . . . . . . . . 31--31
                Laura Belli and   
              Simone Cirani and   
                Luca Davoli and   
            Andrea Gorrieri and   
               Mirko Mancin and   
               Marco Picone and   
              Gianluigi Ferrari   Design and Deployment of an IoT
                                  Application-Oriented Testbed . . . . . . 32--40
                      Anonymous   IEEE Computer Society Richard E. Merwin
                                  Student Leadership Scholarship . . . . . 41--41
             Mateusz Mikusz and   
               Sarah Clinch and   
               Rachel Jones and   
               Mike Harding and   
     Christopher Winstanley and   
                   Nigel Davies   Repurposing Web Analytics to Support the
                                  IoT  . . . . . . . . . . . . . . . . . . 42--49
              Keun Sup Shim and   
                Mieszko Lis and   
                  Omer Khan and   
               Srinivas Devadas   The Execution Migration Machine:
                                  Directoryless Shared-Memory Architecture 50--59
       Damian D. G. Gessler and   
                    Evren Sirin   SSWAP: Enabling Transaction-Time
                                  Reasoning for Semantic Workflows . . . . 60--68
              Amir Parssian and   
               William Yeoh and   
                   Mong Shan Ee   Quality-Based SQL: Specifying
                                  Information Quality in Relational
                                  Database Queries . . . . . . . . . . . . 69--74
                    Hal Berghel   STEM Crazy . . . . . . . . . . . . . . . 75--80
                      Anonymous   Software Experts . . . . . . . . . . . . 81--81
                    Steve Brown   The Power of Story . . . . . . . . . . . 82--83
        Constantinos Kolias and   
            Angelos Stavrou and   
                   Jeffrey Voas   Securely Making ``Things'' Right . . . . 84--88
                      Anonymous   IEEE Cloud Computing Call for Papers . . 89--89
                    Ralf Klamma   Near-Real-Time Social Computing  . . . . 90--92
                   Tao Chen and   
                   Rami Bahsoon   Toward a Smarter Cloud: Self-Aware
                                  Autoscaling of Cloud Configurations and
                                  Resources  . . . . . . . . . . . . . . . 93--96
                      Anonymous   IEEE Security & Privacy [Advertisement]   97--97
                     Kevin Gary   Project-Based Learning . . . . . . . . . 98--100
                      Anonymous   Linkedin Corp. Advertisement . . . . . . 101--101
                    Eric Durant   CE2016: Guidelines for Forward-Looking
                                  Computer Engineering Curricula . . . . . 102--104
                      Anonymous   CS Connection  . . . . . . . . . . . . . 105--106
                      Anonymous   Call and Calendar  . . . . . . . . . . . 107--111
                      Anonymous   Career Opportunities . . . . . . . . . . 112--119
               David Alan Grier   Industrial Leadership  . . . . . . . . . 120--120
                      Anonymous   Call for Participation and Celebration   c3--c3
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Learn more [Advertisement] . . . . . . . c4--c4
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership [Advertisement] . . . c2--c2

Computer
Volume 48, Number 10, October, 2015

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                Paolo Montuschi   Spiking Neural Network Architecture  . . 6--6
                      Anonymous   Watch the World's Leading Experts Take
                                  Multi-Core Strategies to New Heights
                                  House Advertisement  . . . . . . . . . . 7--7
              Charles Severance   Anant Agarwal: Inside edX  . . . . . . . 8--9
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 10--11
             Giulio Jacucci and   
         Stephen Fairclough and   
                Erin T. Solovey   Physiological Computing  . . . . . . . . 12--16
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All House Advertisement  . . . . . 17--17
               David Rozado and   
                 Andreas Dunser   Combining EEG with Pupillometry to
                                  Improve Cognitive Workload Detection . . 18--25
             Riccardo Sioni and   
                  Luca Chittaro   Stress Detection Using Physiological
                                  Sensors  . . . . . . . . . . . . . . . . 26--33
               Evan M. Peck and   
               Emily Carlin and   
                   Robert Jacob   Designing Brain-Computer Interfaces for
                                  Attention-Aware Systems  . . . . . . . . 34--42
         Venkat N. Gudivada and   
                  Dhana Rao and   
                   Jordan Paris   Understanding Search-Engine Optimization 43--52
                      Anonymous   Call for Special Issue Proposals House
                                  Advertisement  . . . . . . . . . . . . . 53--53
          Abdelkareem Bedri and   
             Himanshu Sahni and   
            Pavleen Thukral and   
               Thad Starner and   
                 David Byrd and   
               Peter Presti and   
              Gabriel Reyes and   
           Maysam Ghovanloo and   
                      Zehua Guo   Toward Silent-Speech Control of Consumer
                                  Wearables  . . . . . . . . . . . . . . . 54--62
                      Anonymous   Call for Standards Award Nominations
                                  House Advertisement  . . . . . . . . . . 63--63
              Madison Blake and   
               Rabih Younes and   
               Jacob Dennis and   
           Thomas L. Martin and   
                     Mark Jones   A User-Independent and Sensor-Tolerant
                                  Wearable Activity Classifier . . . . . . 64--71
                    Hal Berghel   Legislating Technology (Badly) . . . . . 72--78
                      Anonymous   Computer Write for Us House
                                  Advertisement  . . . . . . . . . . . . . 79--79
                      Greg Byrd   21st Century Pong  . . . . . . . . . . . 80--84
                   Tom Mens and   
              Philippe Grosjean   The Ecology of Software Ecosystems . . . 85--87
              Chia-Wei Wang and   
       Michael Cheng Yi Cho and   
               Chi-Wei Wang and   
        Shiuhpyng Winston Shieh   Combating Software Piracy in Public
                                  Clouds . . . . . . . . . . . . . . . . . 88--91
                      Anonymous   CS Connection  . . . . . . . . . . . . . 92--93
                      Anonymous   Cloud Computing Call for Papers House
                                  Advertisement  . . . . . . . . . . . . . 94--94
                      Anonymous   Call and Calendar  . . . . . . . . . . . 95--98
                      Anonymous   Upsilon Pi Epsilon Student Excellence
                                  Award House Advertisement  . . . . . . . 99--99
                      Anonymous   Career Opportunities . . . . . . . . . . 100--118
                      Anonymous   IEEE Computer Society House
                                  Advertisement  . . . . . . . . . . . . . 119--119
               David Alan Grier   The Voracious Discipline . . . . . . . . 120--120
                      Anonymous   Explore Levels for Beyond the Next House
                                  Advertisement  . . . . . . . . . . . . . c3--c3
                      Anonymous   Endless Possibilities  . . . . . . . . . c2--c2
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Learn more House Advertisement . . . . . c4--c4

Computer
Volume 48, Number 11, November, 2015

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                  Mike Sharples   Seamless Learning: Using Location-Aware
                                  Technology to Support Art Education  . . 6--6
                  Brian M. Gaff   Patent Infringement Damages  . . . . . . 7--9
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 10--11
                 Vladimir Getov   Scientific Grand Challenges: Toward
                                  Exascale Supercomputing and Beyond . . . 12--14
           Takemasa Miyoshi and   
              Keiichi Kondo and   
                  Koji Terasaki   Big Ensemble Data Assimilation in
                                  Numerical Weather Prediction . . . . . . 15--21
                      Anonymous   COMPSAC 2016 House Advertisement . . . . 22--22
                 Dylan Keon and   
          Cherri M. Pancake and   
                      Harry Yeh   Protecting Our Shorelines: Modeling the
                                  Effects of Tsunamis and Storm Waves  . . 23--32
          Nichols A. Romero and   
            Aiichiro Nakano and   
         Katherine M. Riley and   
             Fuyuki Shimojo and   
             Rajiv K. Kalia and   
            Priya Vashishta and   
                Paul C. Messina   Quantum Molecular Dynamics in the
                                  Post-Petaflops Era . . . . . . . . . . . 33--41
           Erich Strohmaier and   
              Hans W. Meuer and   
              Jack Dongarra and   
                 Horst D. Simon   The TOP500 List and Progress in
                                  High-Performance Computing . . . . . . . 42--49
      Simon Portegies Zwart and   
                  Jeroen Bedorf   Using GPUs to Enable Simulation with
                                  Computational Gravitational Dynamics in
                                  Astrophysics . . . . . . . . . . . . . . 50--58
                      Anonymous   Get the Recognition You Deserve House
                                  Advertisement  . . . . . . . . . . . . . 59--59
               Andrea Valdi and   
                 Eros Lever and   
            Simone Benefico and   
              Davide Quarta and   
             Stefano Zanero and   
                 Federico Maggi   Scalable Testing of Mobile Antivirus
                                  Applications . . . . . . . . . . . . . . 60--68
                      Anonymous   Move Your Career Forward House
                                  Advertisement  . . . . . . . . . . . . . 69--69
                    Jia Liu and   
                   Yong Xue and   
       Dominic Palmer-Brown and   
               Ziqiang Chen and   
                     Xingwei He   High-Throughput Geocomputational
                                  Workflows in a Grid Environment  . . . . 70--80
                      Anonymous   ECSEE Advertisement  . . . . . . . . . . 81--81
                    Hal Berghel   The Dystory of Ahmed's Clock . . . . . . 82--85
          Marco A. S. Netto and   
         Renato L. F. Cunha and   
                Nicole Sultanum   Deciding When and How to Move HPC Jobs
                                  to the Cloud . . . . . . . . . . . . . . 86--89
                        Ed Finn   We Can Build the Future  . . . . . . . . 90--91
                Kim B. Schaffer   Expanding Continuous Authentication with
                                  Mobile Devices . . . . . . . . . . . . . 92--95
                   Steve Tockey   Insanity, Hiring, and the Software
                                  Industry . . . . . . . . . . . . . . . . 96--101
               Mukesh Saini and   
         Abdulmotaleb El Saddik   Absence Privacy Loss . . . . . . . . . . 102--105
                 Mark Ardis and   
               David Budgen and   
          Gregory W. Hislop and   
                Jeff Offutt and   
                Mark Sebern and   
                  Willem Visser   SE 2014: Curriculum Guidelines for
                                  Undergraduate Degree Programs in
                                  Software Engineering . . . . . . . . . . 106--109
                   Adam Eck and   
              Leen-Kiat Soh and   
              Kristen Olson and   
        Allan L. McCutcheon and   
               Jolene Smyth and   
                Robert F. Belli   Understanding the Human Condition
                                  through Survey Informatics . . . . . . . 110--114
                      Anonymous   Call and Calendar  . . . . . . . . . . . 115--119
                      Anonymous   CS Connection  . . . . . . . . . . . . . 120--120
                      Anonymous   Call for Special Issue Proposals House
                                  Advertisement  . . . . . . . . . . . . . 121--121
                      Anonymous   Career Opportunities . . . . . . . . . . 122--134
                      Anonymous   Focus on Your Job Search House
                                  Advertisement  . . . . . . . . . . . . . 135--135
               David Alan Grier   Hidden Persuaders  . . . . . . . . . . . 136--136
                      Anonymous   Cool Chips XIX House Advertisement . . . c3--c3
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Learn more Advertisement . . . . . . . . c2--c2
                      Anonymous   Science Minus the Fiction Advertisement  c4--c4

Computer
Volume 48, Number 12, December, 2015

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                    Tim Menzies   Cross-Project Data for Software
                                  Engineering  . . . . . . . . . . . . . . 6--6
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 7--8
                Thomas M. Conte   The Computer Society Must Change . . . . 9--9
            Thomas M. Conte and   
                 Elie Track and   
              Erik DeBenedictis   Rebooting Computing: New Strategies for
                                  Technology Scaling . . . . . . . . . . . 10--13
              John M. Shalf and   
                  Robert Leland   Computing beyond Moore's Law . . . . . . 14--23
       Mohamed M. Sabry Aly and   
                 Mingyu Gao and   
                 Gage Hills and   
              Chi-Shuen Lee and   
                Greg Pitner and   
            Max M. Shulaker and   
                 Tony F. Wu and   
              Mehdi Asheghi and   
                 Jeff Bokor and   
           Franz Franchetti and   
         Kenneth E. Goodson and   
         Christos Kozyrakis and   
                Igor Markov and   
             Kunle Olukotun and   
              Larry Pileggi and   
                   Eric Pop and   
                 Jan Rabaey and   
             Christopher Re and   
          H.-S. Philip Wong and   
                Subhasish Mitra   Energy-Efficient Abundant-Data
                                  Computing: The N3XT 1,000$ \times $  . . 24--33
            D. Scott Holmes and   
              Alan M. Kadin and   
                Mark W. Johnson   Superconducting Computing in Large-Scale
                                  Hybrid Systems . . . . . . . . . . . . . 34--42
                      Anonymous   Computer Write for us House
                                  Advertisement  . . . . . . . . . . . . . 43--43
          Kirk M. Bresniker and   
             Sharad Singhal and   
            R. Stanley Williams   Adapting to Thrive in a New Economy of
                                  Memory Abundance . . . . . . . . . . . . 44--53
          Santosh Khasanvis and   
                  Mingyu Li and   
          Mostafizur Rahman and   
             Ayan K. Biswas and   
    Mohammad Salehi-Fashami and   
       Jayasimha Atulasimha and   
      Supriyo Bandyopadhyay and   
            Csaba Andras Moritz   Architecting for Causal Intelligence at
                                  Nanoscale  . . . . . . . . . . . . . . . 54--64
          David J. Mountain and   
                Mark McLean and   
             Douglas Palmer and   
          Joshua D. Prucnal and   
         Christopher D. Krieger   Ohmic Weave: Memristor-Based Threshold
                                  Gate Networks  . . . . . . . . . . . . . 65--71
     Michael K. Papamichael and   
                   James C. Hoe   The CONNECT Network-on-Chip Generator    72--79
               Jeffrey Voas and   
                George Hurlburt   Third-Party Software's Trust Quagmire    80--87
                    Hal Berghel   What Price Gonzo Ethics? . . . . . . . . 88--93
             Davide Brugali and   
             Rafael Capilla and   
                   Mike Hinchey   Dynamic Variability Meets Robotics . . . 94--97
             Alexander Kott and   
           David S. Alberts and   
                     Cliff Wang   Will Cybersecurity Dictate the Outcome
                                  of Future Wars?  . . . . . . . . . . . . 98--101
                      Anonymous   Gaudiot Voted 2016 Computer Society
                                  President-Elect  . . . . . . . . . . . . 102--104
                      Anonymous   Call and Calendar  . . . . . . . . . . . 105--109
                      Anonymous   CS Connection  . . . . . . . . . . . . . 110--111
                      Anonymous   Career Opportunities . . . . . . . . . . 112--127
               David Alan Grier   Quantum Imagination  . . . . . . . . . . 128--128
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All House Advertisement  . . . . . c2--c2
                      Anonymous   Move Your Career Forward House
                                  Advertisement  . . . . . . . . . . . . . c3--c3
                      Anonymous   Where a Better World Shows Advertisement c4--c4


Computer
Volume 49, Number 1, January, 2016

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                 Roger U. Fujii   Raising the Bar: Ensuring Quality
                                  Products and Services for Our Members    4--4
                     Sumi Helal   2016 Outlook: Humans in the Technology
                                  Loop . . . . . . . . . . . . . . . . . . 7--9
              Paul Nikolich and   
        Kenneth Christensen and   
                   Lori Cameron   802 Standards  . . . . . . . . . . . . . 10--10
                      Anonymous   Focus on Your Job Search House
                                  Advertisement  . . . . . . . . . . . . . 11--11
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 12--13
               Lynette A. Jones   Designing Effective Refreshable Braille
                                  Displays . . . . . . . . . . . . . . . . 14--14
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 15--16
               Gregory D. Abowd   Beyond Weiser: From Ubiquitous to
                                  Collective Computing . . . . . . . . . . 17--23
                  Carl K. Chang   Situation Analytics: A Foundation for a
                                  New Software Engineering Paradigm  . . . 24--33
               Zhihao Jiang and   
              Houssam Abbas and   
               Kuk Jin Jang and   
                Rahul Mangharam   The Challenges of High-Confidence
                                  Medical Device Software  . . . . . . . . 34--42
            Dejan Milojicic and   
                 Timothy Roscoe   Outlook on Operating Systems . . . . . . 43--51
          Lalit Kumar Singh and   
               Gopika Vinod and   
                 A. K. Tripathi   Early Prediction of Software
                                  Reliability: A Case Study with a Nuclear
                                  Power Plant System . . . . . . . . . . . 52--58
              Hitesh Rajput and   
                 Tanmoy Som and   
                   Soumitra Kar   Using Radon Transform to Recognize
                                  Skewed Images of Vehicular License
                                  Plates . . . . . . . . . . . . . . . . . 59--65
              Kjell Jorgen Hole   Building Trust in E-Government Services  66--74
                    Hal Berghel   Digital Politics 2016  . . . . . . . . . 75--79
              Dragutin Petkovic   Using Learning Analytics to Assess
                                  Capstone Project Teams . . . . . . . . . 80--83
                    Gary McGraw   Four Software Security Findings  . . . . 84--87
                   Marilyn Wolf   Embedded Software in Crisis  . . . . . . 88--90
            Brian David Johnson   Beyond Science Fiction: The American
                                  Dream  . . . . . . . . . . . . . . . . . 91--93
                Andreas Bulling   Pervasive Attentive User Interfaces  . . 94--98
              Michael B. Spring   The Future of Standardization: Are We
                                  Destined to Repeat History?  . . . . . . 99--101
                      Greg Byrd   IEEE/IBM Watson Student Showcase . . . . 102--104
                      Anonymous   CS Connection  . . . . . . . . . . . . . 105--105
                      Anonymous   Call and Calendar  . . . . . . . . . . . 106--109
                      Anonymous   Career Opportunities . . . . . . . . . . 110--119
               David Alan Grier   New Cycles of Technology . . . . . . . . 120--120
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All House Advertisement  . . . . . c3--c3
                      Anonymous   Move Your Career Forward House
                                  Advertisement  . . . . . . . . . . . . . c2--c2
                      Anonymous   Watch the World's Leading Experts Take
                                  Multi-Core Strategies to New Heights
                                  House Advertisement  . . . . . . . . . . c4--c4

Computer
Volume 49, Number 2, February, 2016

                      Anonymous   Computer Society IEEE Fellows  . . . . . 3--3
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 4--4
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 5--6
              Charles Severance   Bruce Schneier: The Security Mindset . . 7--8
                  Elisa Bertino   Securing Mobile Applications . . . . . . 9--9
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 10--11
               Schahram Dustdar   Cloud Computing  . . . . . . . . . . . . 12--13
      Fernando Diaz-del-Rio and   
     Javier Salmeron-Garcia and   
            Jose Luis Sevillano   Extending Amdahl's Law for the Cloud
                                  Computing Era  . . . . . . . . . . . . . 14--22
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All  . . . . . . . . . . . . . . . 23--23
 Alireza Khoshkbarforoushha and   
               Meisong Wang and   
               Rajiv Ranjan and   
                 Lizhe Wang and   
                 Leila Alem and   
              Samee U. Khan and   
             Boualem Benatallah   Dimensions for Evaluating Cloud Resource
                                  Orchestration Frameworks . . . . . . . . 24--33
              Talal H. Noor and   
              Quan Z. Sheng and   
             Zakaria Maamar and   
               Sherali Zeadally   Managing Trust in the Cloud: State of
                                  the Art and Research Challenges  . . . . 34--45
                 Quan Zhang and   
                    Weisong Shi   Energy-Efficient Workload Placement in
                                  Enterprise Datacenters . . . . . . . . . 46--52
                      Anonymous   Focus on Your Job Search House
                                  Advertisement  . . . . . . . . . . . . . 53--53
                     Lei Xu and   
             Chunxiao Jiang and   
                   Yan Chen and   
                  Jian Wang and   
                       Yong Ren   A Framework for Categorizing and
                                  Applying Privacy-Preservation Techniques
                                  in Big Data Mining . . . . . . . . . . . 54--62
                    Hal Berghel   Secretocracy . . . . . . . . . . . . . . 63--67
           Mahmoud Barhamgi and   
          Arosha K. Bandara and   
                   Yijun Yu and   
          Khalid Belhajjame and   
                Bashar Nuseibeh   Protecting Privacy in the Cloud: Current
                                  Practices, Future Directions . . . . . . 68--72
                      Anonymous   IEEE Computer Society House
                                  Advertisement  . . . . . . . . . . . . . 73--73
                    Nir Kshetri   Gambling with Source Code  . . . . . . . 74--77
        Brian David Johnson and   
                   David Guston   Futures We Want to Inhabit . . . . . . . 78--79
                  Vint Cerf and   
                     Max Senges   Taking the Internet to the Next Physical
                                  Level  . . . . . . . . . . . . . . . . . 80--86
                      Anonymous   CS Connection  . . . . . . . . . . . . . 87--88
                      Anonymous   Call and Calendar  . . . . . . . . . . . 89--93
                      Anonymous   Career Opportunities . . . . . . . . . . 94--103
               David Alan Grier   The Post-MOOC World  . . . . . . . . . . 104--104
                      Anonymous   Call for Participation House
                                  Advertisement  . . . . . . . . . . . . . c4--c4
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward House
                                  Advertisement  . . . . . . . . . . . . . c2--c2
                      Anonymous   Rock Stars of Risk-Based Security House
                                  Advertisement  . . . . . . . . . . . . . c3--c3

Computer
Volume 49, Number 3, March, 2016

                      Anonymous   Bodies of Knowledge  . . . . . . . . . . 3--3
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 4--4
              Leila De Floriani   Using $2$D Maps for $3$D Localization    5--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--7
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 8--9
               Ying-Dar Lin and   
               Jeffrey Voas and   
            Antonio Pescape and   
                  Peter Mueller   Communications and Privacy under
                                  Surveillance . . . . . . . . . . . . . . 10--13
         Steven M. Bellovin and   
                 Matt Blaze and   
                   Susan Landau   Insecure Surveillance: Technical Issues
                                  with Remote Computer Searches  . . . . . 14--24
              Steven J. Murdoch   Insecure by Design: Protocols for
                                  Encrypted Phone Calls  . . . . . . . . . 25--33
                Stephen Farrell   Requirements Analysis Required ---
                                  Otherwise Targeted Monitoring Enables
                                  Pervasive Monitoring . . . . . . . . . . 34--40
                      Anonymous   Call for Nominees House Advertisement    41--41
                Robert Koch and   
              Mario Golling and   
              Gabi Dreo Rodosek   How Anonymous Is the Tor Network? A
                                  Long-Term Black-Box Investigation  . . . 42--49
           Hassan Metwalley and   
           Stefano Traverso and   
                   Marco Mellia   Using Passive Measurements to Demystify
                                  Online Trackers  . . . . . . . . . . . . 50--55
                Imran Yusof and   
           Al-Sakib Khan Pathan   Mitigating Cross-Site Scripting Attacks
                                  with a Content Security Policy . . . . . 56--63
                 Amit Sheth and   
          Pramod Anantharam and   
                    Cory Henson   Semantic, Cognitive, and Perceptual
                                  Computing: Paradigms That Shape Human
                                  Experience . . . . . . . . . . . . . . . 64--72
                    Hal Berghel   Net Neutrality vs. Net Neutering . . . . 73--77
               Shams Zawoad and   
                    Ragib Hasan   Trustworthy Digital Forensics in the
                                  Cloud  . . . . . . . . . . . . . . . . . 78--81
             Robert N. Charette   The STEM Anxiety Business  . . . . . . . 82--87
          Charlene Chuck Walrad   The IEEE Computer Society and ACM's
                                  Collaboration on Computing Education . . 88--91
                Karen Bartleson   Practical Insights from the Peculiar
                                  World of Standards . . . . . . . . . . . 92--95
               Gaurav Misra and   
                   Jose M. Such   How Socially Aware Are Social Media
                                  Privacy Controls?  . . . . . . . . . . . 96--99
                      Greg Byrd   Immortal Bits: Managing Our Digital
                                  Legacies . . . . . . . . . . . . . . . . 100--103
            Angelos Stavrou and   
               Daniel Fleck and   
            Constantinos Kolias   On the Move: Evading Distributed
                                  Denial-of-Service Attacks  . . . . . . . 104--107
                      Anonymous   Call and Calendar  . . . . . . . . . . . 108--112
                      Anonymous   Conferences in the Palm of Your Hand
                                  House Advertisement  . . . . . . . . . . 113--113
               David Alan Grier   Go, Stop, Go, Stop . . . . . . . . . . . 128--128
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward House
                                  Advertisement  . . . . . . . . . . . . . c3--c3
                      Anonymous   Rock Stars of Big Data House
                                  Advertisement  . . . . . . . . . . . . . c4--c4
                      Anonymous   Rock Stars of Risk-Based Security House
                                  Advertisement  . . . . . . . . . . . . . c2--c2

Computer
Volume 49, Number 4, April, 2016

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   Computer Society Publications  . . . . . 8--9
                  Brian M. Gaff   The Need for Speed . . . . . . . . . . . 10--12
              Charles Severance   Bruce Schneier: Building Cryptographic
                                  Systems  . . . . . . . . . . . . . . . . 13--15
                 Neville Holmes   32 & 16 Years Ago . . . . . . . . . . . . 16--17
                     Qiang Yang   Cross-Domain Data Fusion . . . . . . . . 18--18
                      Anonymous   Call for Papers: House Advertisement . . 19--19
         Naren Ramakrishnan and   
                     Ravi Kumar   Big Data . . . . . . . . . . . . . . . . 20--22
               Jignesh M. Patel   Operational NoSQL Systems: What's New
                                  and What's Next? . . . . . . . . . . . . 23--30
         Venkat N. Gudivada and   
                  Dhana Rao and   
              Vijay V. Raghavan   Renaissance in Database Management:
                                  Navigating the Landscape of Candidate
                                  Systems  . . . . . . . . . . . . . . . . 31--42
         Giovanni Cherubini and   
               Jens Jelitto and   
              Vinodh Venkatesan   Cognitive Storage for Big Data . . . . . 43--51
               Hsiang-Fu Yu and   
              Cho-Jui Hsieh and   
                 Hyokun Yun and   
      S. V. N. Vishwanathan and   
               Inderjit Dhillon   Nomadic Computing for Big Data Analytics 52--60
            Asmaa Elbadrawy and   
           Agoritsa Polyzou and   
                 Zhiyun Ren and   
          Mackenzie Sweeney and   
             George Karypis and   
                Huzefa Rangwala   Predicting Student Performance Using
                                  Personalized Analytics . . . . . . . . . 61--69
                Behrooz Parhami   Low Acceptance Rates of Conference
                                  Papers Considered Harmful  . . . . . . . 70--73
                    Hal Berghel   The Bogus Science Theorem (and the Junk
                                  Science Wager) . . . . . . . . . . . . . 74--78
           Erik P. DeBenedictis   The Boolean Logic Tax  . . . . . . . . . 79--82
                 Jurgen Steimle   Skin --- The Next User Interface . . . . 83--87
             Yuvraj Agarwal and   
                   Anind K. Dey   Toward Building a Safe, Secure, and
                                  Easy-to-Use Internet of Things
                                  Infrastructure . . . . . . . . . . . . . 88--91
                Michael Bennett   Afrofuturism . . . . . . . . . . . . . . 92--93
                John Knight and   
              Jack Davidson and   
           Anh Nguyen-Tuong and   
                Jason Hiser and   
                     Michele Co   Diversity in Cybersecurity . . . . . . . 94--98
                      Anonymous   Call and Calendar  . . . . . . . . . . . 99--103
               David Alan Grier   The Global Profession  . . . . . . . . . 120--120
                      Anonymous   Computer Entrepreneur Award: House
                                  Advertisement  . . . . . . . . . . . . . c3--c3
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward: IEEE Computer
                                  Society Membership: House Advertisement  c2--c2
                      Anonymous   Rock Stars of Big Data: House
                                  Advertisement  . . . . . . . . . . . . . c4--c4

Computer
Volume 49, Number 5, May, 2016

                      Anonymous   Rock Stars of Big Data: House
                                  Advertisement  . . . . . . . . . . . . . 2--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 5--5
                      Anonymous   Hiscox . . . . . . . . . . . . . . . . . 6--7
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 8--9
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 10--11
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership: House Advertisement  12--12
                      Anonymous   IEEE Computer Society Conferences  . . . 13--13
               H. Chad Lane and   
                  David Forsyth   Virtual Learning and Object
                                  Reconstruction . . . . . . . . . . . . . 14--15
           Alfred C. Weaver and   
                  Greg Byrd and   
                    Renee Bryce   Computing Tools and Techniques for
                                  Emergency Response . . . . . . . . . . . 16--18
                Robin R. Murphy   Emergency Informatics: Using Computing
                                  to Improve Disaster Management . . . . . 19--27
             Marco Avvenuti and   
             Stefano Cresci and   
            Fabio Del Vigna and   
               Maurizio Tesconi   Impromptu Crisis Mapping to Prioritize
                                  Emergency Response . . . . . . . . . . . 28--37
              Alper Bozkurt and   
              Edgar Lobaton and   
                Mihail Sichitiu   A Biobotic Distributed Sensor Network
                                  for Under-Rubble Search and Rescue . . . 38--46
         Liliya I. Besaleva and   
               Alfred C. Weaver   Applications of Social Networks and
                                  Crowdsourcing for Disaster Management
                                  Improvement  . . . . . . . . . . . . . . 47--53
                  Henri Bal and   
                 Dick Epema and   
               Cees de Laat and   
         Rob van Nieuwpoort and   
                John Romein and   
             Frank Seinstra and   
                 Cees Snoek and   
                 Harry Wijshoff   A Medium-Scale Distributed System for
                                  Computer Science Research:
                                  Infrastructure for the Long Term . . . . 54--63
            Sebastian Gayer and   
            Andrea Herrmann and   
            Thorsten Keuler and   
          Matthias Riebisch and   
        Pablo Oliveira Antonino   Lightweight Traceability for the Agile
                                  Architect  . . . . . . . . . . . . . . . 64--71
                      Anonymous   IEEE Computer Society Information  . . . 72--72
                    Hal Berghel   Attenuated FAQs  . . . . . . . . . . . . 73--77
                Weisong Shi and   
               Schahram Dustdar   The Promise of Edge Computing  . . . . . 78--81
           John Leslie King and   
                Jonathan Grudin   Will Computers Put Us Out of Work? . . . 82--85
                      Anonymous   Watch the World's Leading Experts Take
                                  Multi-Core Strategies to New Heights:
                                  House Advertisement  . . . . . . . . . . 86--86
        Phillip A. Laplante and   
               Jeffrey Voas and   
                 Nancy Laplante   Standards for the Internet of Things: A
                                  Case Study in Disaster Response  . . . . 87--90
                      Anonymous   IEEE Member Digital Library: House
                                  Advertisement  . . . . . . . . . . . . . 91--91
                Omar Niamut and   
                      Mu Mu and   
             Spyros Denazis and   
                  Nicholas Race   Social Telemedia: The Relationship
                                  between Social Information and Networked
                                  Media  . . . . . . . . . . . . . . . . . 92--97
                      Greg Byrd   Home Sweet Mind-Controlled Home  . . . . 98--101
               Jeffrey Voas and   
                   Kim Schaffer   Insights on Formal Methods in
                                  Cybersecurity  . . . . . . . . . . . . . 102--105
                      Anonymous   CS Connection  . . . . . . . . . . . . . 106--107
                      Anonymous   Call and Calendar  . . . . . . . . . . . 108--111
                      Anonymous   IEEE Computer Society 2016 Call for
                                  Major Award Nominations: House
                                  Advertisement  . . . . . . . . . . . . . 112--112
                      Anonymous   SanDisk Corporation Advertisement  . . . 113--113
                      Anonymous   Career Opportunities . . . . . . . . . . 114--127
               David Alan Grier   Technological Improvisation  . . . . . . 128--128
                      Anonymous   Samsung Galaxy S7 edge . . . . . . . . . c2--1
                      Anonymous   Computer Entrepreneur Award: House
                                  Advertisement  . . . . . . . . . . . . . c3--c3
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Rock Stars of Cybersecurity: House
                                  Advertisement  . . . . . . . . . . . . . c4--c4

Computer
Volume 49, Number 6, June, 2016

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 4--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--7
            Mohamed Ibrahim and   
         Krishnendu Chakrabarty   Digital-Microfluidic Biochips  . . . . . 8--9
                 Mark Paulk and   
                   Lori Cameron   IEEE Floating Point Standard . . . . . . 10--10
                  Elisa Bertino   Security Threats: Protecting the New
                                  Cyberfrontier  . . . . . . . . . . . . . 11--14
           Daniel Vecchiato and   
               Marco Vieira and   
                 Eliane Martins   The Perils of Android Security
                                  Configuration  . . . . . . . . . . . . . 15--21
                 David Kotz and   
             Carl A. Gunter and   
              Santosh Kumar and   
             Jonathan P. Weiner   Privacy and Security in Mobile Health: A
                                  Research Agenda  . . . . . . . . . . . . 22--30
             Ronald P. Loui and   
               Terrence D. Loui   How to Survive a Cyber Pearl Harbor  . . 31--37
         V. S. Subrahmanian and   
                Amos Azaria and   
               Skylar Durst and   
                Vadim Kagan and   
              Aram Galstyan and   
            Kristina Lerman and   
                Linhong Zhu and   
             Emilio Ferrara and   
        Alessandro Flammini and   
                Filippo Menczer   The DARPA Twitter Bot Challenge  . . . . 38--46
                      Anonymous   Computer Write for Us: House
                                  Advertisement  . . . . . . . . . . . . . 47--47
            Tsong Yueh Chen and   
              Fei-Ching Kuo and   
                 Wenjuan Ma and   
               Willy Susilo and   
                 Dave Towey and   
               Jeffrey Voas and   
                  Zhi Quan Zhou   Metamorphic Testing for Cybersecurity    48--55
             Qingpeng Zhang and   
          Daniel Dajun Zeng and   
               Fei-Yue Wang and   
             Ronald Breiger and   
               James A. Hendler   Brokers or Bridges? Exploring Structural
                                  Holes in a Crowdsourcing System  . . . . 56--64
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership: House Advertisement  65--65
                Qiuming Luo and   
                  Feng Xiao and   
                 Zhong Ming and   
                     Hao Li and   
              Jianyong Chen and   
                  Jianhua Zhang   Optimizing the Memory Management of a
                                  Virtual Machine Monitor on a NUMA System 66--74
                      Anonymous   Rock Stars of Big Data: House
                                  Advertisement  . . . . . . . . . . . . . 75--75
                      Anonymous   Call for Nominees: House Advertisement   76--76
              Sorel Reisman and   
                    Eli Shmueli   Opening the Instructional Doors to
                                  Computer Science and IT --- Finally  . . 77--79
                   Jeffrey Voas   Demystifying the Internet of Things  . . 80--83
           Erik P. DeBenedictis   Rebooting Computers as Learning Machines 84--87
             Daniel Ullrich and   
                   Andreas Butz   Social Robots for the 21st Century . . . 88--92
                      Anonymous   Impact a Broader Audience: House
                                  Advertisement  . . . . . . . . . . . . . 93--93
                      Anonymous   IEEE Computer Society 2016 Call for
                                  Major Award Nominations: House
                                  Advertisement  . . . . . . . . . . . . . 94--94
            Brian David Johnson   Science Fiction and the Coming Age of
                                  Sentient Tools . . . . . . . . . . . . . 95--97
            Kate Netkachova and   
            Robin E. Bloomfield   Security-Informed Safety . . . . . . . . 98--102
                      Anonymous   Call and Calendar  . . . . . . . . . . . 103--107
                      Anonymous   Career Opportunities . . . . . . . . . . 108--119
               David Alan Grier   Scientific Conversations . . . . . . . . 120--120
                      Anonymous   Endless Possibilities Advertisement  . . c2--c2
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Galaxy S7 edge . . . . . . . . . . . . . c4--c4
                      Anonymous   Rock Stars of Cybersecurity: House
                                  Advertisement  . . . . . . . . . . . . . c3--c3

Computer
Volume 49, Number 7, July, 2016

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 4--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--7
             Bjorn Schuller and   
                       Jian Pei   Using Computer Intelligence for
                                  Depression Diagnosis and Crowdsourcing   8--9
                      Anonymous   IEEE Computer Society Awards . . . . . . 10--10
           Antti Oulasvirta and   
               Gregory D. Abowd   User Interface Design in the 21st
                                  Century  . . . . . . . . . . . . . . . . 11--13
               Yuta Sugiura and   
             Takeo Igarashi and   
                 Masahiko Inami   Cuddly User Interfaces . . . . . . . . . 14--19
           Daisuke Sakamoto and   
               Yuta Sugiura and   
             Masahiko Inami and   
                 Takeo Igarashi   Graphical Instruction for Home Robots    20--25
            John M. Carroll and   
                Jiawei Chen and   
        Chien Wen Tina Yuan and   
           Benjamin V. Hanrahan   In Search of Coproduction: Smart
                                  Services as Reciprocal Activities  . . . 26--32
                      Anonymous   Computer Write for Us House
                                  Advertisement  . . . . . . . . . . . . . 33--33
                   Jun Kato and   
             Takeo Igarashi and   
                  Masataka Goto   Programming with Examples to Develop
                                  Data-Intensive User Interfaces . . . . . 34--42
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership House Advertisement   43--43
              Brad A. Myers and   
               Andrew J. Ko and   
           Thomas D. LaToza and   
                 YoungSeok Yoon   Programmers Are Users Too:
                                  Human-Centered Methods for Improving
                                  Programming Tools  . . . . . . . . . . . 44--52
              Samuel Kounev and   
             Nikolaus Huber and   
              Fabian Brosig and   
                    Xiaoyun Zhu   A Model-Based Approach to Designing
                                  Self-Aware IT Systems and
                                  Infrastructures  . . . . . . . . . . . . 53--61
                   Xia Yang and   
                   Peng Shi and   
                Haiyong Sun and   
              Wenxuan Zheng and   
                 Jim Alves-Foss   A Fast Boot, Fast Shutdown Technique for
                                  Android OS Devices . . . . . . . . . . . 62--68
                      Anonymous   IEEE Computer Society 2016 Call for
                                  Major Award Nominations House
                                  Advertisement  . . . . . . . . . . . . . 69--69
               Peter Bajcsy and   
         Antoine Vandecreme and   
              Julien Amelot and   
               Joe Chalfoun and   
           Michael Majurski and   
                     Mary Brady   Enabling Stem Cell Characterization from
                                  Large Microscopy Images  . . . . . . . . 70--79
               David Alan Grier   Free Tuition for Community College: A
                                  Role for the Tech Community? . . . . . . 80--82
                      Anonymous   Call for Nominees Education Awards
                                  Nominations House Advertisement  . . . . 83--83
                    Hal Berghel   The Dictator's (False) Dilemma . . . . . 84--87
                 Norman Matloff   The H-1B Visa Controversy  . . . . . . . 88--93
                      Greg Byrd   Let the Sun Shine  . . . . . . . . . . . 94--97
                George Hurlburt   ``Good Enough'' Security: The Best We'll
                                  Ever Have  . . . . . . . . . . . . . . . 98--101
                      Anonymous   CS Connection  . . . . . . . . . . . . . 102--103
                      Anonymous   Call and Calendar  . . . . . . . . . . . 104--107
                      Anonymous   Career Opportunities . . . . . . . . . . 108--119
               David Alan Grier   Aware of the Situation . . . . . . . . . 120--120
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Focus on Your Job House Advertisement    c3--c3
                      Anonymous   Rock Stars of Big Data House
                                  Advertisement  . . . . . . . . . . . . . c4--c4
                      Anonymous   Rock Stars of Pervasive, Predictive
                                  Analytics House Advertisement  . . . . . c2--c2

Computer
Volume 49, Number 8, August, 2016

                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   Call for Nominees Education Awards
                                  Nominations  . . . . . . . . . . . . . . 4--4
                      Anonymous   IEEE Computer Society Digital Library:
                                  IEEE's First Digital Library . . . . . . 5--5
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 6--7
                      Anonymous   Computer Highlights Society Magazines    8--9
                 David A. Bader   Evolving MPI+X Toward Exascale . . . . . 10--10
                      Anonymous   Rock Stars of Pervasive, Predictive
                                  Analytics  . . . . . . . . . . . . . . . 11--11
              Domenic Forte and   
                  Ron Perez and   
                Yongdae Kim and   
                  Swarup Bhunia   Supply-Chain Security for
                                  Cyberinfrastructure [Guest editors'
                                  introduction]  . . . . . . . . . . . . . 12--16
                      Anonymous   Not so Secure  . . . . . . . . . . . . . 17--17
            Parrish Ralston and   
                  David Fry and   
                 Scott Suko and   
              Bryce Winters and   
               Matthew King and   
                   Robert Kober   Defeating counterfeiters with
                                  microscopic dielets embedded in
                                  electronic components  . . . . . . . . . 18--26
                      Anonymous   2017 Richard E. Merwin Award for
                                  Distinguished Service  . . . . . . . . . 27--27
        Joseph P. Skudlarek and   
             Tom Katsioulas and   
                   Michael Chen   A Platform Solution for Secure
                                  Supply-Chain and Chip Life-Cycle
                                  Management . . . . . . . . . . . . . . . 28--34
                      Anonymous   IEEE Security & Privacy . . . . . . . . . 35--35
              Sk Subidh Ali and   
            Mohamed Ibrahim and   
      Jeyavijayan Rajendran and   
            Ozgur Sinanoglu and   
         Krishnendu Chakrabarty   Supply-Chain Security of Digital
                                  Microfluidic Biochips  . . . . . . . . . 36--43
                     Wei Hu and   
                 Baolei Mao and   
                Jason Oberg and   
                   Ryan Kastner   Detecting Hardware Trojans with
                                  Gate-Level Information-Flow Tracking . . 44--52
                      Anonymous   IEEE Computer Society 2016 Call for
                                  Major Award Nominations  . . . . . . . . 53--53
                   Kan Xiao and   
               Adib Nahiyan and   
               Mark Tehranipoor   Security Rule Checking in IC Design  . . 54--61
                 Olav Lysne and   
              Kjell J. Hole and   
        Christian Otterstad and   
             Oyvind Ytrehus and   
            Raymond Aarseth and   
                 Jorgen Tellnes   Vendor Malware: Detection Limits and
                                  Mitigation . . . . . . . . . . . . . . . 62--69
               Kim Schaffer and   
                   Jeffrey Voas   What Happened to Formal Methods for
                                  Security?  . . . . . . . . . . . . . . . 70--79
                     Doug Terry   Toward a New Approach to IoT Fault
                                  Tolerance  . . . . . . . . . . . . . . . 80--83
          Claude Y. Laporte and   
               Rory V. O'Connor   Systems and Software Engineering
                                  Standards for Very Small Entities:
                                  Accomplishments and Overview . . . . . . 84--87
           Erik P. DeBenedictis   The Search for Computing's Secretariat   88--91
                  Celia Paulsen   Cybersecuring Small Businesses . . . . . 92--97
                    Hal Berghel   The Pollyanna Delusion . . . . . . . . . 98--102
                      Anonymous   IEEE Computer Society Information  . . . 103--103
                   Xiangshi Ren   Rethinking the Relationship between
                                  Humans and Computers . . . . . . . . . . 104--108
                  Evan Atherton   Science Fiction Prototyping at Work  . . 109--111
       Amir Vahid Dastjerdi and   
                 Rajkumar Buyya   Fog Computing: Helping the Internet of
                                  Things Realize Its Potential . . . . . . 112--116
                      Anonymous   Facebook, Inc. . . . . . . . . . . . . . 117--117
                      Anonymous   IEEE Computer Society Election . . . . . 118--128
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership . . . . . . . . . . . 129--129
                      Anonymous   IEEE Division V Delegate/Director
                                  Candidates . . . . . . . . . . . . . . . 130--131
                      Anonymous   Proposed Amendment to IEEE's
                                  Constitution . . . . . . . . . . . . . . 132--133
                      Anonymous   IEEE President-Elect Candidates Address
                                  Computer Society Concerns  . . . . . . . 134--136
                      Anonymous   Intuit Inc.  . . . . . . . . . . . . . . 137--137
                      Anonymous   Call and Calendar  . . . . . . . . . . . 138--141
               David Alan Grier   Changing Trust . . . . . . . . . . . . . 156--156
                      Anonymous   Computer Write for us  . . . . . . . . . c3--c3
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   31st IEEE International Parallel and
                                  Distributed Processing Symposium . . . . c2--c2
                      Anonymous   Rock Stars of Cybersecurity  . . . . . . c4--c4

Computer
Volume 49, Number 9, September, 2016

                      Anonymous   New Membership Options for a Better Fit
                                  [Advertisement]  . . . . . . . . . . . . 2
                      Anonymous   Achieve your career goals with the fit
                                  that's right for you [Advertisement] . . 3
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 4
                      Anonymous   Table of contents  . . . . . . . . . . . 5--6
                      Anonymous   IEEE Computer Society Membership . . . . 7
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 8--9
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 10--11
            Paolo Montuschi and   
             Jean-Michel Muller   Modern Computer Arithmetic . . . . . . . 12--12
                      Anonymous   Call for Nominees Education Awards
                                  Nominations  . . . . . . . . . . . . . . 13
              San Murugesan and   
                    Bob Colwell   Next-Generation Computing Paradigms  . . 14--20
            Krysta M. Svore and   
                Matthias Troyer   The Quantum Future of Computation  . . . 21--30
           Rodney Van Meter and   
                Simon J. Devitt   The Path to Scalable Distributed Quantum
                                  Computing  . . . . . . . . . . . . . . . 31--42
               Victoria Coleman   Embodied Molecular Computation:
                                  Potential and Challenges . . . . . . . . 43--51
               Xin-She Yang and   
                  Suash Deb and   
                 Simon Fong and   
                 Xingshi He and   
                    Yu-Xin Zhao   From Swarm Intelligence to
                                  Metaheuristics: Nature-Inspired
                                  Optimization Algorithms  . . . . . . . . 52--59
              Sameer Saproo and   
               Josef Faller and   
                Victor Shih and   
                 Paul Sajda and   
      Nicholas R. Waytowich and   
           Addison Bohannon and   
          Vernon J. Lawhern and   
             Brent J. Lance and   
                  David Jangraw   Cortically Coupled Computing: A New
                                  Paradigm for Synergistic Human-Machine
                                  Interaction  . . . . . . . . . . . . . . 60--68
                    Lui Sha and   
              Marco Caccamo and   
             Renato Mancuso and   
               Jung-Eun Kim and   
                Man-Ki Yoon and   
         Rodolfo Pellizzoni and   
                Heechul Yun and   
          Russell B. Kegley and   
          Dennis R. Perlman and   
              Greg Arundale and   
               Richard Bradford   Real-Time Computing on Multicore
                                  Processors . . . . . . . . . . . . . . . 69--77
                Massimo Maresca   The Spreadsheet Space: Eliminating the
                                  Boundaries of Data Cross-Referencing . . 78--85
                 Xing Zhang and   
                Zhenglei Yi and   
                    Zhi Yan and   
                 Geyong Min and   
                 Wenbo Wang and   
           Ahmed Elmokashfi and   
            Sabita Maharjan and   
                      Yan Zhang   Social Computing for Mobile Big Data . . 86--90
                 Scott Campbell   Teaching Cloud Computing . . . . . . . . 91--93
                      Greg Byrd   Seeing Is Understanding  . . . . . . . . 94--97
           Apostol Vassilev and   
                 Robert Staples   Entropy as a Service: Unlocking
                                  Cryptography's Full Potential  . . . . . 98--102
                      Anonymous   Facebook, Inc. House Advertisement . . . 103
                    Hal Berghel   Coda in the Key of F2654hD4  . . . . . . 104--109
               Sanjay K. Madria   Security and Risk Assessment in the
                                  Cloud  . . . . . . . . . . . . . . . . . 110--113
             Robert N. Charette   Dragging Government Legacy Systems Out
                                  of the Shadows . . . . . . . . . . . . . 114--119
                      Anonymous   CS Connection  . . . . . . . . . . . . . 120--121
                      Anonymous   Call and Calendar  . . . . . . . . . . . 122--125
                      Anonymous   Career Opportunities . . . . . . . . . . 126--143
               David Alan Grier   The Means of Production  . . . . . . . . 144
                      Anonymous   The Universität der Bundeswehr München
                                  [Advertisement]  . . . . . . . . . . . . c2--1
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership [Advertisement] . . . c3--c3
                      Anonymous   SolidThinking  . . . . . . . . . . . . . c4--c4

Computer
Volume 49, Number 10, October, 2016

                      Anonymous   Achieve your career goals with the fit
                                  that's right for you . . . . . . . . . . 1
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 2
                      Anonymous   Table of Contents  . . . . . . . . . . . 3--4
                      Anonymous   IEEE Computer Society Education  . . . . 5
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 6--7
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 8--9
            Simha Sethumadhavan   Hardware-Enforced Privacy  . . . . . . . 10
                      Anonymous   COMPSAC 2017 --- ITiP Symposium  . . . . 11
              Charles Severance   The Living Computer Museum . . . . . . . 12--13
             Vladimir Getov and   
              Adolfy Hoisie and   
                    Pradip Bose   New Frontiers in Energy-Efficient
                                  Computing [Guest Editors' introduction]  14--18
                      Anonymous   IEEE Computer Society  . . . . . . . . . 19
                  Xingfu Wu and   
             Valerie Taylor and   
               Jeanine Cook and   
                Philip J. Mucci   Using Performance-Power Modeling to
                                  Improve Energy Efficiency of HPC
                                  Applications . . . . . . . . . . . . . . 20--29
                 Bilge Acun and   
               Akhil Langer and   
            Esteban Meneses and   
            Harshitha Menon and   
               Osman Sarood and   
               Ehsan Totoni and   
              Laxmikant V. Kale   Power, Reliability, and Performance: One
                                  System to Rule them All  . . . . . . . . 30--37
              Ryan E. Grant and   
         Michael Levenhagen and   
         Stephen L. Olivier and   
              David DeBonis and   
          Kevin T. Pedretti and   
             James H. Laros III   Standardizing Power Monitoring and
                                  Control at Exascale  . . . . . . . . . . 38--46
               Efraim Rotem and   
              Uri C. Weiser and   
              Avi Mendelson and   
                Ran Ginosar and   
          Eliezer Weissmann and   
                     Yoni Aizik   H-EARtH: Heterogeneous Multicore
                                  Platform Energy Management . . . . . . . 47--55
                Cory Merkel and   
              Raqibul Hasan and   
            Nicholas Soures and   
      Dhireesha Kudithipudi and   
                 Tarek Taha and   
              Sapan Agarwal and   
              Matthew Marinella   Neuromemristive Systems: Boosting
                                  Efficiency through Brain-Inspired
                                  Computing  . . . . . . . . . . . . . . . 56--64
             Gowtham Atluri and   
        Angus MacDonald III and   
              Kelvin O. Lim and   
                    Vipin Kumar   The Brain-Network Paradigm: Using
                                  Functional Imaging Data to Study How the
                                  Brain Works  . . . . . . . . . . . . . . 65--71
                David Linthicum   Responsive Data Architecture for the
                                  Internet of Things . . . . . . . . . . . 72--75
       Erik P. DeBenedictis and   
            R. Stanley Williams   Help Wanted: A Modern-Day Turing . . . . 76--79
          Dimitris E. Simos and   
                  Rick Kuhn and   
      Artemios G. Voyiatzis and   
                   Raghu Kacker   Combinatorial Methods in Security
                                  Testing  . . . . . . . . . . . . . . . . 80--83
                    Hal Berghel   Douglas Jones on Today's Voting Machines 84--89
                 Giulio Jacucci   Beyond Search Queries  . . . . . . . . . 90--93
                       Ryan Lee   Threatcasting  . . . . . . . . . . . . . 94--95
                  Fridolin Wild   The Future of Learning at the Workplace
                                  Is Augmented Reality . . . . . . . . . . 96--98
                      Anonymous   Call and Calendar  . . . . . . . . . . . 99--102
                      Anonymous   Career Opportunities . . . . . . . . . . 103--111
               David Alan Grier   Innovating for Tomorrow  . . . . . . . . 112
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership . . . . . . . . . . . c3--c3
                      Anonymous   New Membership Options for a Better Fit  c2--c2

Computer
Volume 49, Number 11, November, 2016

                      Anonymous   IEEE Computer Society Is Where You
                                  Choose the Resources that Fit Your
                                  Career House Advertisement . . . . . . . 1
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 2
                      Anonymous   Table of Contents  . . . . . . . . . . . 3--4
                      Anonymous   IEEE Computer Society Technical
                                  Committees . . . . . . . . . . . . . . . 5
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 6--7
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 8--9
               Matthew B. Dwyer   Finding Flaws in Natural Language
                                  Requirements . . . . . . . . . . . . . . 10
             Upkar Varshney and   
                  Carl K. Chang   Smart Health and Well-Being  . . . . . . 11--13
           S. Jay Olshansky and   
            Bruce A. Carnes and   
           Yang Claire Yang and   
             Norvell Miller and   
             Janet Anderson and   
      Hiram Beltran-Sanchez and   
              Karl Ricanek, Jr.   The Future of Smart Health . . . . . . . 14--21
                   Noel Carroll   Key Success Factors for Smart and
                                  Connected Health Software Solutions  . . 22--28
                Gina Sprint and   
              Diane J. Cook and   
            Roschelle Fritz and   
    Maureen Schmitter-Edgecombe   Using Smart Homes to Detect and Analyze
                                  Health Events  . . . . . . . . . . . . . 29--37
             Shurouq Hijazi and   
                  Alex Page and   
             Burak Kantarci and   
                   Tolga Soyata   Machine Learning in Cardiac Health
                                  Monitoring and Decision Support  . . . . 38--48
                   Xiang Su and   
             Jarkko Hyysalo and   
            Mika Rautiainen and   
               Jukka Riekki and   
             Jaakko Sauvola and   
        Altti Ilari Maarala and   
           Harri Hirvonsalo and   
               Pingjiang Li and   
                    Harri Honko   Privacy as a Service: Protecting the
                                  Individual in Healthcare Data Processing 49--59
         Humberto Cervantes and   
                Rick Kazman and   
               Jungwoo Ryoo and   
               Duyoung Choi and   
                   Duksung Jang   Architectural Approaches to Security:
                                  Four Case Studies  . . . . . . . . . . . 60--67
               Po-Ching Lin and   
               Ying-Dar Lin and   
              Cheng-Ying Wu and   
             Yuan-Cheng Lai and   
                    Yi-Chih Kao   Balanced Service Chaining in
                                  Software-Defined Networks with Network
                                  Function Virtualization  . . . . . . . . 68--76
            Amir Banifatemi and   
               Jean-Luc Gaudiot   Engineering the New Boundaries of AI . . 77--79
                    Vasant Dhar   Equity, Safety, and Privacy in the
                                  Autonomous Vehicle Era . . . . . . . . . 80--83
             Alexander Kott and   
            Ananthram Swami and   
                  Bruce J. West   The Fog of War in Cyberspace . . . . . . 84--87
                      Greg Byrd   Tactile Digital Braille Display  . . . . 88--90
                    Hal Berghel   Chasing Elbridge's Ghost: The Digital
                                  Gerrymander  . . . . . . . . . . . . . . 91--95
        Dimitrios G. Kogias and   
        Michael G. Xevgenis and   
      Charalampos Z. Patrikakis   Cloud Federation and the Evolution of
                                  Cloud Computing  . . . . . . . . . . . . 96--99
                      Anonymous   Call and Calendar  . . . . . . . . . . . 100--103
               David Alan Grier   ``I'm Not a Computer Scientist, but
                                  \ldots . . . . . . . . . . . . . . . . . 104
                      Anonymous   Call for Special Issue Proposals House
                                  Advertisement  . . . . . . . . . . . . . c3--c3
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership House Advertisement   c4--c4
                      Anonymous   New Membership Options for a Better Fit
                                  House Advertisement  . . . . . . . . . . c2--c2

Computer
Volume 49, Number 12, December, 2016

                      Anonymous   IEEE Computer Society Is Where You
                                  Choose the Resources that Fit Your
                                  Career . . . . . . . . . . . . . . . . . 1
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 2
                      Anonymous   Table of Contents  . . . . . . . . . . . 3--4
                      Anonymous   IEEE Computer Society's
                                  \booktitleComputer Magazine  . . . . . . 5
                 Roger U. Fujii   Our Journey to the Future  . . . . . . . 6--9
                      Anonymous   32 & 16 Years Ago . . . . . . . . . . . . 10--11
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 12--13
                      Anonymous   Art of Hacking E-Learning Courses IEEE
                                  Computer Society . . . . . . . . . . . . 14
                  Ali Jadbabaie   Defining Data Clusters . . . . . . . . . 15
                   Roy Want and   
              Trevor Pering and   
                 Yuvraj Agarwal   Multidevice Interaction [Guest Editors'
                                  introduction]  . . . . . . . . . . . . . 16--20
                      Anonymous   Call for Special Issue Proposals . . . . 21
             Jarno Leppanen and   
             Mikko Pelkonen and   
                Haipeng Guo and   
            Samuli Hemminki and   
              Petteri Nurmi and   
                   Sasu Tarkoma   Collaborative and Energy-Efficient
                                  Speech Monitoring on Smart Devices . . . 22--30
                      Anonymous   Can You Invent a Better World through
                                  Technology?  . . . . . . . . . . . . . . 31
            Carlo Pinciroli and   
              Giovanni Beltrame   Swarm-Oriented Programming of
                                  Distributed Robot Networks . . . . . . . 32--41
              Timothy Neate and   
                 Matt Jones and   
                  Michael Evans   Interdevice Media: Choreographing
                                  Content to Maximize Viewer Engagement    42--49
                Tomas Bures and   
           Frantisek Plasil and   
                 Michal Kit and   
                  Petr Tuma and   
                   Nicklas Hoch   Software Abstractions for Component
                                  Interaction in the Internet of Things    50--59
             Charith Perera and   
                  Chang Liu and   
               Rajiv Ranjan and   
                 Lizhe Wang and   
               Albert Y. Zomaya   Privacy-Knowledge Modeling for the
                                  Internet of Things: A Look Back  . . . . 60--68
                      Anonymous   Watch the World's Leading Experts Take
                                  Multi-Core Strategies to New Heights . . 69
             Alexander Kott and   
            Ananthram Swami and   
                  Bruce J. West   The Internet of Battle Things  . . . . . 70--75
           Erik P. DeBenedictis   Computational Complexity and New
                                  Computing Approaches . . . . . . . . . . 76--79
              Vincent C. Hu and   
                      Rick Kuhn   Access Control Policy Verification . . . 80--83
            Brian David Johnson   So Long, and Thanks for All the Robots   84--85
           Kenneth M. Zemrowski   NIST Bases Flagship Security Engineering
                                  Publication on ISO/IEC/IEEE 15288:2015   86--88
                      Anonymous   Nominations are solicited for the
                                  Seymour Cray, Sidney Fernbach & Ken
                                  Kennedy awards . . . . . . . . . . . . . 89
                      Anonymous   Kasahara Voted 2017 Computer Society
                                  President-Elect  . . . . . . . . . . . . 90--92
                      Anonymous   Call and Calendar  . . . . . . . . . . . 93--95
               David Alan Grier   Fifteen Years to Open Source . . . . . . 96
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership . . . . . . . . . . . c3--c3
                      Anonymous   New Membership Options for a Better Fit  c2--c2
                      Anonymous   TechIgnite . . . . . . . . . . . . . . . c4--c4


Computer
Volume 50, Number 1, January, 2017

                      Anonymous   IEEE Computer Society Is Where You
                                  Choose the Resources that Fit Your
                                  Career House Advertisement . . . . . . . 1
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 2
                      Anonymous   Table of Contents  . . . . . . . . . . . 3--4
               Jean-Luc Gaudiot   2017: The New Computer Society . . . . . 5--7
               Shaoshan Liu and   
                 James Peng and   
               Jean-Luc Gaudiot   Computer, Drive My Car!  . . . . . . . . 8
                      Anonymous   ACM--IEEE CS Eckert--Mauchly Award House
                                  Advertisement  . . . . . . . . . . . . . 9
                  Erich Neuhold   \booktitleComputer, January 1967 and
                                  1992 . . . . . . . . . . . . . . . . . . 10--11
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 12--13
                     Sumi Helal   \booktitleComputer's 50th Anniversary    14--18
                      Anonymous   Focus on Your Job Search House
                                  Advertisement  . . . . . . . . . . . . . 19
            Thomas M. Conte and   
       Erik P. DeBenedictis and   
           Paolo A. Gargini and   
                     Elie Track   Rebooting Computing: The Road Ahead  . . 20--29
         Mahadev Satyanarayanan   The Emergence of Edge Computing  . . . . 30--39
               Antti Oulasvirta   User Interface Design with Combinatorial
                                  Optimization . . . . . . . . . . . . . . 40--47
               Daqing Zhang and   
                   Hao Wang and   
                         Dan Wu   Toward Centimeter-Scale Human Activity
                                  Sensing with Wi-Fi Signals . . . . . . . 48--57
              John Atkinson and   
                Alvaro Maurelia   Redundancy-Based Trust in
                                  Question-Answering Systems . . . . . . . 58--65
              G. R. Gangadharan   Open Source Solutions for Cloud
                                  Computing  . . . . . . . . . . . . . . . 66--70
            Brian David Johnson   The Impossible Thing . . . . . . . . . . 71
               Jeffrey Voas and   
                Philip Laplante   Curriculum Considerations for the
                                  Internet of Things . . . . . . . . . . . 72--75
                Nir Kshetri and   
                   Jeffrey Voas   Banking on Availability  . . . . . . . . 76--80
                      Anonymous   My CS House Advertisement  . . . . . . . 81
                    Hal Berghel   Software Sophistry and Political Sleight
                                  of Hand  . . . . . . . . . . . . . . . . 82--87
                      Anonymous   CS Connection  . . . . . . . . . . . . . 88--90
                      Anonymous   Seymour Cray, Sidney Fernbach, & Ken
                                  Kennedy Awards House Advertisement . . . 91
                      Anonymous   Call and Calendar  . . . . . . . . . . . 92--94
                      Anonymous   Can You Invent a Better World through
                                  Technologies? House Advertisement  . . . 95
               David Alan Grier   Local Culture, Global Habits . . . . . . 96
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership House Advertisement   c3--c3
                      Anonymous   New Membership Options for a Better Fit
                                  House Advertisement  . . . . . . . . . . c2--c2
                      Anonymous   TechIgnite: A Rock Star Technology Event
                                  House Advertisement  . . . . . . . . . . c4--c4

Computer
Volume 50, Number 2, February, 2017

                      Anonymous   IEEE Computer Society Is Where You
                                  Choose the Resources that Fit Your
                                  Career . . . . . . . . . . . . . . . . . 1
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 2
                      Anonymous   Table of Contents  . . . . . . . . . . . 3--4
             Bruce McMillin and   
                      Tao Zhang   Fog Computing for Smart Living . . . . . 5
               David Alan Grier   Computer's First Issues and the First
                                  Volunteer  . . . . . . . . . . . . . . . 6--7
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 8--9
          Peter A. Zientara and   
                Sooyeon Lee and   
               Gus H. Smith and   
              Rorry Brenner and   
               Laurent Itti and   
             Mary B. Rosson and   
            John M. Carroll and   
             Kevin M. Irick and   
        Vijaykrishnan Narayanan   Third Eye: A Shopping Assistant for the
                                  Visually Impaired  . . . . . . . . . . . 16--24
                      Anonymous   myCS House . . . . . . . . . . . . . . . 25
               Florian Wahl and   
                  Rui Zhang and   
              Martin Freund and   
                    Oliver Amft   Personalizing $3$D-Printed Smart
                                  Eyeglasses to Augment Daily Life . . . . 26--35
                Cheng Zhang and   
               Sinan Hersek and   
                  Yiming Pu and   
                 Danrui Sun and   
                 Qiuyue Xue and   
            Thad E. Starner and   
           Gregory D. Abowd and   
                   Omer T. Inan   Bioacoustics-Based Human-Body-Mediated
                                  Communication  . . . . . . . . . . . . . 36--46
                      Anonymous   ACM--IEEE CS Eckert--Mauchly Award . . . 47
        Rajan Bhattacharyya and   
           Brian A. Coffman and   
               Jaehoon Choe and   
            Matthew E. Phillips   Does Neurotechnology Produce a Better
                                  Brain? . . . . . . . . . . . . . . . . . 48--58
                   Scott Jenson   The Future IoT: Building Better Legos    68--71
           Erik P. DeBenedictis   It's Time to Redefine Moore's Law Again  72--75
              Elisa Bertino and   
                   Nayeem Islam   Botnets and Internet of Things Security  76--79
                    Barry Brown   The Social Life of Autonomous Cars . . . 92--96
                      Anonymous   IEEE Computer Society 2017 Call for
                                  Major Award Nominations  . . . . . . . . 98
                      Anonymous   Call for Nominees Education Awards
                                  Nominations House Advertisement  . . . . 103
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership . . . . . . . . . . . c3--c3
                      Anonymous   New Membership Options for a Better Fit  c2--c2
                      Anonymous   TechIgnite . . . . . . . . . . . . . . . c4--c4

Computer
Volume 50, Number 3, March, 2017

                      Anonymous   IEEE Computer Society is Where You
                                  Choose the Resources that Fit Your
                                  Career . . . . . . . . . . . . . . . . . 1
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 2
                      Anonymous   Table of Contents  . . . . . . . . . . . 3--4
                      Anonymous   IEEE Computer Society Richard E. Merwin
                                  Student Leadership Scholarship . . . . . 5
               David Alan Grier   When the Field was Young . . . . . . . . 6--7
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 8--9
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 10--11
                Daniel J. Sorin   Persistent Memory  . . . . . . . . . . . 12
                      Anonymous   Focus on Your Job Search . . . . . . . . 13
              Katarzyna Wac and   
               Homero Rivas and   
            Maddalena Fiordelli   Quality-of-Life Technologies . . . . . . 14--19
    Mirana Randriambelonoro and   
                    Yu Chen and   
                       Pearl Pu   Can Fitness Trackers Help Diabetic and
                                  Obese Users Make and Sustain Lifestyle
                                  Changes? . . . . . . . . . . . . . . . . 20--29
       Aarti Sathyanarayana and   
         Jaideep Srivastava and   
           Luis Fernandez-Luque   The Science of Sweet Dreams: Predicting
                                  Sleep Efficiency from Wearable Device
                                  Data . . . . . . . . . . . . . . . . . . 30--38
                      Anonymous   Call for Nominees Education Awards
                                  Nominations  . . . . . . . . . . . . . . 39
               Tongda Zhang and   
            Renate Fruchter and   
                    Maria Frank   Are They Paying Attention? A Model-Based
                                  Method to Identify Individuals' Mental
                                  States . . . . . . . . . . . . . . . . . 40--49
           Adela C. Timmons and   
          Theodora Chaspari and   
              Sohyun C. Han and   
              Laura Perrone and   
     Shrikanth S. Narayanan and   
                 Gayla Margolin   Using Multimodal Wearable Technology to
                                  Detect Conflict among Couples  . . . . . 50--59
              Eisa Zarepour and   
      Mohammadreza Hosseini and   
           Salil S. Kanhere and   
               Arcot Sowmya and   
                Hamid R. Rabiee   Applications and Challenges of Wearable
                                  Visual Lifeloggers . . . . . . . . . . . 60--69
                   Chuck Walrad   Standards for the Enterprise IT
                                  Profession . . . . . . . . . . . . . . . 70--73
                 Scooter Willis   You Never Forget Your First Project  . . 74--76
                      Anonymous   Nominations are Solicited for the
                                  Seymour Cray Sidney Fernbach & Ken
                                  Kennedy Awards House Advertisement . . . 77
            Angelos Stavrou and   
                   Jeffrey Voas   Verified Time  . . . . . . . . . . . . . 78--82
                      Anonymous   Conferences in the Palm of Your Hand . . 83
                    Hal Berghel   On the Problem of (Cyber) Attribution    84--89
                    Steve Brown   The New Diversity: Working with
                                  Nonhumans  . . . . . . . . . . . . . . . 90--91
                      Anonymous   Call and Calendar  . . . . . . . . . . . 92--94
                      Anonymous   IEEE Computer Society 2017 Call for
                                  Major Award Nominations  . . . . . . . . 95
               David Alan Grier   Digital Trade  . . . . . . . . . . . . . 96
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership . . . . . . . . . . . c3--c3
                      Anonymous   New Membership Options for a Better Fit  c2--c2
                      Anonymous   TechIgnite . . . . . . . . . . . . . . . c4--c4

Computer
Volume 50, Number 4, April, 2017

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   Elsewhere in the CS  . . . . . . . . . . 4--5
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 6
                  Sven Dietrich   Cybersecurity and the Future . . . . . . 7
               Stephen P. Morse   The Intel 8086 Chip and the Future of
                                  Microprocessor Design  . . . . . . . . . 8--9
              Charles Severance   Resurrecting the CDC 6500 Supercomputer  10--12
              Leila De Floriani   A High-level Language for Interactive
                                  Data Visualization . . . . . . . . . . . 13
                 Stefano Zanero   Cyber-Physical Systems . . . . . . . . . 14--16
               Gerry Howser and   
                 Bruce McMillin   Using Information-Flow Methods to
                                  Analyze the Security of Cyber-Physical
                                  Systems  . . . . . . . . . . . . . . . . 17--26
           Teodora Sanislav and   
           Sherali Zeadally and   
                George Dan Mois   A Cloud-Integrated, Multilayered,
                                  Agent-Based Cyber-Physical System
                                  Architecture . . . . . . . . . . . . . . 27--37
              Cesare Alippi and   
                  Manuel Roveri   The (Not) Far-Away Path to Smart
                                  Cyber-Physical Systems: An
                                  Information-Centric Framework  . . . . . 38--47
              Rolf Oppliger and   
             Gunther Pernul and   
              Sokratis Katsikas   New Frontiers: Assessing and Managing
                                  Security Risks . . . . . . . . . . . . . 48--51
                   Gaute Wangen   Information Security Risk Assessment: A
                                  Method Comparison  . . . . . . . . . . . 52--61
       Judith E. Y. Rossebo and   
           Reinder Wolthuis and   
              Frank Fransen and   
            Gunnar Bjorkman and   
                  Nuno Medeiros   An Enhanced Risk-Assessment Methodology
                                  for Smart Grids  . . . . . . . . . . . . 62--71
                Pete Burnap and   
         Yulia Cherdantseva and   
               Andrew Blyth and   
                 Peter Eden and   
                Kevin Jones and   
               Hugh Soulsby and   
               Kristan Stoddart   Determining and Sharing Risk Data in
                                  Distributed Interdependent Systems . . . 72--79
               Zahid Akhtar and   
                  Ajita Rattani   A Face in any Form: New Challenges and
                                  Opportunities for Face Recognition
                                  Technology . . . . . . . . . . . . . . . 80--90
           Ruben S. Montero and   
                Elisa Rojas and   
        Alfonso A. Carrillo and   
            Ignacio M. Llorente   Extending the Cloud to the Network Edge  91--95
           Erik P. DeBenedictis   Computer Architecture's Changing Role in
                                  Rebooting Computing  . . . . . . . . . . 96--99
                George Hurlburt   Shining Light on the Dark Web  . . . . . 100--105
        Marta E. Cecchinato and   
                    Anna L. Cox   Smartwatches: Digital Handcuffs or Magic
                                  Bracelets? . . . . . . . . . . . . . . . 106--109
                    Hal Berghel   Alt-News and Post-Truths in the `Fake
                                  News' Era  . . . . . . . . . . . . . . . 110--114
                      Anonymous   Call and Calendar  . . . . . . . . . . . 115--119
               David Alan Grier   The Radical Technology of Industrie 4.0  120
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   myCS . . . . . . . . . . . . . . . . . . c4--c4
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership . . . . . . . . . . . c3--c3
                      Anonymous   New Membership Options for a Better Fit  c2--c2

Computer
Volume 50, Number 5, May, 2017

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 6--7
                 Grace A. Lewis   Cloud Computing  . . . . . . . . . . . . 8--9
        Giovanni De Micheli and   
                    Luca Benini   Networks on Chips: 15 Years Later  . . . 10--11
                 Bjorn Schuller   Can Affective Computing Save Lives? Meet
                                  Mobile Health  . . . . . . . . . . . . . 13
              Carl K. Chang and   
              Sorel Reisman and   
                  Edmundo Tovar   Advances in Learning Technologies  . . . 14--17
           Austin Cory Bart and   
               Javier Tibau and   
               Eli Tilevich and   
        Clifford A. Shaffer and   
                  Dennis Kafura   BlockPy: An Open Access Data-Science
                                  Environment for Introductory Programmers 18--26
           Soroush Ghorashi and   
                  Carlos Jensen   Integrating Collaborative and Live
                                  Coding for Distance Education  . . . . . 27--35
                Sujata Rani and   
                  Parteek Kumar   A Sentiment Analysis System to Improve
                                  Teaching and Learning  . . . . . . . . . 36--43
                Toru Ishida and   
            Tetsuo Sawaragi and   
            Kumiyo Nakakoji and   
                   Takushi Sogo   Interdisciplinary Education for Design
                                  Innovation . . . . . . . . . . . . . . . 44--52
               Henry C. B. Chan   Internet of Education Resources Using a
                                  Chemistry-Inspired Framework . . . . . . 54--60
                   Yang Xie and   
                Chongxi Bao and   
               Ankur Srivastava   Security-Aware 2.5D Integrated Circuit
                                  Design Flow Against Hardware IP Piracy   62--71
               Zoltan Adam Mann   The Top Eight Misconceptions about
                                  NP-Hardness  . . . . . . . . . . . . . . 72--79
         Richard E. Fairley and   
            Mary Jane Willshire   Better Now Than Later: Managing
                                  Technical Debt in Systems Development    80--87
               Jeffrey Voas and   
                      Rick Kuhn   What Happened to Software Metrics? . . . 88--98
            Brian David Johnson   Sentient Tools and the Future of Work    99
                    Gary McGraw   Six Tech Trends Impacting Software
                                  Security . . . . . . . . . . . . . . . . 100--102
             W. Richards Adrion   How Computer Science Departments and
                                  Faculty Can Contribute to the CS for All
                                  Initiative . . . . . . . . . . . . . . . 103--105
             Andrew C. Gray and   
               Eric M. Schwartz   A Successful Approach to the 2016 RobotX
                                  Challenge  . . . . . . . . . . . . . . . 106--109
      Nicholas A. Valentino and   
           John Leslie King and   
                 Walter W. Hill   Polling and Prediction in the 2016
                                  Presidential Election  . . . . . . . . . 110--115
              Joanna Bryson and   
                  Alan Winfield   Standardizing Ethical Design for
                                  Artificial Intelligence and Autonomous
                                  Systems  . . . . . . . . . . . . . . . . 116--119
                    Hal Berghel   A Quick Take on Windows Security
                                  Evolution  . . . . . . . . . . . . . . . 120--124
                      Anonymous   Call and Calendar  . . . . . . . . . . . 125--129
                      Anonymous   CS Connection  . . . . . . . . . . . . . 130--131
               David Alan Grier   A Russian Tragedy  . . . . . . . . . . . 132
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1

Computer
Volume 50, Number 6, June, 2017

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                     Lee Garber   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
               Lynette A. Jones   A Haptic Compass for Navigation  . . . . 6
                  Erich Neuhold   Computer, June 1967 and 1992 . . . . . . 7
                 Tom Snyder and   
                      Greg Byrd   The Internet of Everything . . . . . . . 8--9
               David Alan Grier   The Yau Years: 1981--1984  . . . . . . . 10--11
               Mark D. Hill and   
               Michael R. Marty   Retrospective on Amdahl's Law in the
                                  Multicore Era  . . . . . . . . . . . . . 12--14
                      Anonymous   myCS . . . . . . . . . . . . . . . . . . 15
               Marilyn Wolf and   
            Saibal Mukhopadhyay   VLSI for the Internet of Things  . . . . 16--18
             Chenguang Shen and   
                Mani Srivastava   Exploring Hardware Heterogeneity to
                                  Improve Pervasive Context Inferences . . 19--26
                 Mingze Gao and   
                  Qian Wang and   
           Md Tanvir Arafin and   
              Yongqiang Lyu and   
                        Gang Qu   Approximate Computing for Low Power and
                                  Security in the Internet of Things . . . 27--34
             Mathias Soeken and   
 Pierre-Emmanuel Gaillardon and   
        Saeideh Shirinzadeh and   
             Rolf Drechsler and   
            Giovanni De Micheli   A PLiM Computer for the Internet of
                                  Things . . . . . . . . . . . . . . . . . 35--40
                Aldo Romani and   
             Marco Tartagni and   
               Enrico Sangiorgi   Doing a Lot with a Little: Micropower
                                  Conversion and Management for
                                  Ambient-Powered Electronics  . . . . . . 41--49
                Gagan Gupta and   
              Tony Nowatzki and   
            Vinay Gangadhar and   
      Karthikeyan Sankaralingam   Kickstarting Semiconductor Innovation
                                  with Open Source Hardware  . . . . . . . 50--59
            Patrick Eugster and   
         Chamikara Jayalath and   
               Kirill Kogan and   
                 Julian Stephen   Big Data Analytics beyond the Single
                                  Datacenter . . . . . . . . . . . . . . . 60--68
               Jeffrey Voas and   
            Phillip A. Laplante   The IoT Blame Game . . . . . . . . . . . 69--73
                 Jennifer Davis   Marketing and Engineering --- Working
                                  across the Aisle . . . . . . . . . . . . 74--75
       Erik P. DeBenedictis and   
               Jesse K. Mee and   
               Michael P. Frank   The Opportunities and Controversies of
                                  Reversible Computing . . . . . . . . . . 76--80
           Hsiu-Chuan Huang and   
              Zhi-Kai Zhang and   
              Hao-Wen Cheng and   
        Shiuhpyng Winston Shieh   Web Application Security: Threats,
                                  Countermeasures, and Pitfalls  . . . . . 81--85
               Harold Thimbleby   Improve IT, Improve Healthcare . . . . . 86--91
               Justin Riley and   
                  John Noss and   
             Wes Dillingham and   
                 James Cuff and   
            Ignacio M. Llorente   A High-Availability Cloud for Research
                                  Computing  . . . . . . . . . . . . . . . 92--95
                      Anonymous   CS Connection  . . . . . . . . . . . . . 96--98
                      Anonymous   Call and Calendar  . . . . . . . . . . . 99--103
               David Alan Grier   Global Connections . . . . . . . . . . . 104
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership . . . . . . . . . . . c3--c3
                      Anonymous   New Membership Options for a Better Fit  c2--c2
                      Anonymous   Prepare to Connect . . . . . . . . . . . c4--c4

Computer
Volume 50, Number 7, July, 2017

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--5
                      Anonymous   New Membership Options For a Better Fit  6
                      Anonymous   Achieve your career goals with the fit
                                  that's right for you . . . . . . . . . . 7
                      Anonymous   Computer, July 1967 and 1992 . . . . . . 8--9
                    Rick Kazman   Software Engineering . . . . . . . . . . 10--11
                Jorg Henkel and   
                Paolo Montuschi   Computer Engineers' Challenges for the
                                  Next Decade: The Triangle of Power
                                  Density, Circuit Degradation, and
                                  Reliability  . . . . . . . . . . . . . . 12
             Scooter Willis and   
                  Greg Byrd and   
            Brian David Johnson   Challenge-Based Learning . . . . . . . . 13--16
                    Nancy Boyer   Inspiring the Next Generation of
                                  Scientists and Engineers: K--12 and
                                  Beyond . . . . . . . . . . . . . . . . . 17--19
              Lindsey Hitchcock   Greenpower: Racing to a STEM Finish  . . 20--22
                  Randy Swearer   Industry-Backed Competitions: Helping
                                  Today's Students Prepare for Tomorrow's
                                  Careers  . . . . . . . . . . . . . . . . 23--25
                      Anonymous   Low-Cost High-Altitude Ballooning  . . . 26--28
                   Randy Scheid   Code4GoodPBC: Bridging the Gap between
                                  Innovation and Philanthropy  . . . . . . 29--31
              Richard S. Thomas   Using Design Slam to Foster Lifelong
                                  Learning Solutions . . . . . . . . . . . 32--33
                      Anonymous   Call For Nominees  . . . . . . . . . . . 34
          Juan C. SanMiguel and   
               Andrea Cavallaro   Networked Computer Vision: The
                                  Importance of a Holistic Simulator . . . 35--43
                Jorg Liebig and   
                  Sven Apel and   
             Andreas Janker and   
              Florian Garbe and   
                Sebastian Oster   Handling Static Configurability in
                                  Refactoring Engines  . . . . . . . . . . 44--53
           Liliana Pasquale and   
               Carlo Ghezzi and   
               Edoardo Pasi and   
         Christos Tsigkanos and   
          Menouer Boubekeur and   
    Blanca Florentino-Liano and   
               Tarik Hadzic and   
                Bashar Nuseibeh   Topology-Aware Access Control of Smart
                                  Spaces . . . . . . . . . . . . . . . . . 54--63
                Yamini Allu and   
               Fred Douglis and   
               Mahesh Kamat and   
             Philip Shilane and   
             Hugo Patterson and   
                        Ben Zhu   Backup to the Future: How Workload and
                                  Hardware Changes Continually Redefine
                                  Data Domain File Systems . . . . . . . . 64--72
                      Anonymous   Move Your Career Forward . . . . . . . . 73
     Mohammad A. Salahuddin and   
              Ala Al-Fuqaha and   
             Mohsen Guizani and   
              Khaled Shuaib and   
                  Farag Sallabi   Softwarization of Internet of Things
                                  Infrastructure for Secure and Smart
                                  Healthcare . . . . . . . . . . . . . . . 74--79
        Constantinos Kolias and   
       Georgios Kambourakis and   
            Angelos Stavrou and   
                   Jeffrey Voas   DDoS in the IoT: Mirai and Other Botnets 80--84
                Natalie Vanatta   Envisioning the Future to Empower Action 85
                    Hal Berghel   Which Is More Dangerous --- the Dark Web
                                  or the Deep State? . . . . . . . . . . . 86--91
                  Al Crouch and   
             Michael Laisne and   
                    Martin Keim   Generalizing Access to Instrumentation
                                  Embedded in a Semiconductor Device . . . 92--95
                  Sorel Reisman   Teaching vs. Research--Optimizing Your
                                  Contribution for Society's Well-Being    96--98
                 Scooter Willis   Stand on the Shoulders of Giants . . . . 99--102
                      Anonymous   CS Connection  . . . . . . . . . . . . . 103--105
                      Anonymous   Call and Calendar  . . . . . . . . . . . 106--111
               David Alan Grier   Connecting to Nigeria  . . . . . . . . . 112
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society 2017 Call for
                                  Major Award Nominations  . . . . . . . . c3--c3
                      Anonymous   One membership. Unlimited knowledge  . . c4--c4
                      Anonymous   Prepare to Connect . . . . . . . . . . . c2--c2

Computer
Volume 50, Number 8, August, 2017

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
               David Alan Grier   The Better Mix: 1985--1990 . . . . . . . 4--5
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 6--7
             Pascal Guitton and   
              Philippe Nain and   
        François Sillion   Inria: From Cold-War Computing to
                                  Digital Sciences . . . . . . . . . . . . 8--12
                      Anonymous   IEEE Computer Society Information  . . . 13
           Erik P. DeBenedictis   Computer Design Starts Over  . . . . . . 14--17
               Shaoshan Liu and   
                   Jie Tang and   
                  Zhe Zhang and   
               Jean-Luc Gaudiot   Computer Architectures for Autonomous
                                  Driving  . . . . . . . . . . . . . . . . 18--25
               Rathijit Sen and   
                  David A. Wood   Energy-Proportional Computing: A New
                                  Definition . . . . . . . . . . . . . . . 26--33
                    Fei Xia and   
               Ashur Rafiev and   
                Ali Aalsaud and   
        Mohammed Al-Hayanni and   
                James Davis and   
              Joshua Levine and   
              Andrey Mokhov and   
       Alexander Romanovsky and   
              Rishad Shafik and   
              Alex Yakovlev and   
                     Sheng Yang   Voltage, Throughput, Power, Reliability,
                                  and Multicore Scaling  . . . . . . . . . 34--45
                      Ike Nassi   Scaling the Computer to the Problem:
                                  Application Programming with Unlimited
                                  Memory . . . . . . . . . . . . . . . . . 46--51
              Christof Teuscher   The Weird, the Small, and the
                                  Uncontrollable: Redefining the Frontiers
                                  of Computing . . . . . . . . . . . . . . 52--58
                      Anonymous   IEEE Computer Society Richard E. Merwin
                                  Student Leadership Scholarship . . . . . 59
             Andreas Stefik and   
               Stefan Hanenberg   Methodological Irregularities in
                                  Programming-Language Research  . . . . . 60--63
                 John Hagel and   
               John Seely Brown   Shaping Strategies for the IoT . . . . . 64--68
                      Anonymous   Sustaining Moore's law with $3$D chips   69--73
            Kate Netkachova and   
               Robin Bloomfield   Is Chocolate Good for You --- or, Is the
                                  Cloud Secure?  . . . . . . . . . . . . . 74--78
                      Anonymous   Upsilon Pi Epsilon Student Excellence
                                  Award: Up to Four \$1,000 Awards . . . . 79
                      Anonymous   IEEE Computer Society Election . . . . . 80--93
                      Anonymous   IEEE Division VIII Delegate/Director
                                  Candidates . . . . . . . . . . . . . . . 94--95
                      Anonymous   IEEE President-Elect Candidates Address
                                  Computer Society Concerns  . . . . . . . 96--100
                      Anonymous   CS Connection  . . . . . . . . . . . . . 101--103
               David Alan Grier   The Lingua Franca of Technology  . . . . 104
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Looking for the BEST Tech Job for You?   c2--c2
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership . . . . . . . . . . . c3--c3
                      Anonymous   One membership. Unlimited knowledge  . . c4--c4

Computer
Volume 50, Number 9, September, 2017

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--7
                    Ann DeMarle   Let Us Entertain You . . . . . . . . . . 8--9
                  Kenneth Magel   Revisiting the Impact of the Ada
                                  Programming Language . . . . . . . . . . 10--11
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 12--13
           Philip Treleaven and   
       Richard Gendal Brown and   
                     Danny Yang   Blockchain Technology in Finance . . . . 14--17
                Tomaso Aste and   
                Paolo Tasca and   
              Tiziana Di Matteo   Blockchain Technologies: The Foreseeable
                                  Impact on Society and Industry . . . . . 18--28
                 Chris Khan and   
               Antony Lewis and   
              Emily Rutland and   
                Clemens Wan and   
               Kevin Rutter and   
                 Clark Thompson   A Distributed-Ledger Consortium Model
                                  for Collaborative Innovation . . . . . . 29--37
                     Ittay Eyal   Blockchain Technology: Transforming
                                  Libertarian Cryptocurrency Dreams to
                                  Finance and Banking Realities  . . . . . 38--49
          Daniele Magazzeni and   
             Peter McBurney and   
                   William Nash   Validation and Verification of Smart
                                  Contracts: A Research Agenda . . . . . . 50--57
         Michael Bedford Taylor   The Evolution of Bitcoin Hardware  . . . 58--66
             Fariborz Farahmand   The Importance of Human Information
                                  Processing: A Behavioral Economics Model
                                  for Predicting Domain Name Choice  . . . 67--74
                      Anonymous   Stay Connected . . . . . . . . . . . . . 75
                Mohiuddin Ahmed   Thwarting DoS Attacks: A Framework for
                                  Detection based on Collective Anomalies
                                  and Clustering . . . . . . . . . . . . . 76--82
                Mark Embury and   
                    Jan Clayton   Standardization and Certification
                                  Challenges for Biopharmaceutical Plants  83--86
                    Hal Berghel   Oh, What a Tangled Web: Russian Hacking,
                                  Fake News, and the 2016 US Presidential
                                  Election . . . . . . . . . . . . . . . . 87--91
                 Chii Chang and   
    Satish Narayana Srirama and   
                 Rajkumar Buyya   Indie Fog: An Efficient Fog-Computing
                                  Infrastructure for the Internet of
                                  Things . . . . . . . . . . . . . . . . . 92--98
                      Anonymous   IEEE Computer Society Information  . . . 99
               Hyunji Chung and   
             Michaela Iorga and   
               Jeffrey Voas and   
                    Sangjin Lee   ``Alexa, Can I Trust You?''  . . . . . . 100--104
               David Alan Grier   Bringing the Benefits Home . . . . . . . 105
                 Kyle Rakos and   
               Alex Ruffino and   
                 Charles Li and   
              Katherine Mao and   
                 Luke McBee and   
                 Ryan McBee and   
                  Matt Molo and   
                 Sanay Shah and   
                 Ian Sibley and   
                   Tyler Stagge   Purdue University Team Tackles Global
                                  Underwater-Vehicle Competition . . . . . 106--110
                      Anonymous   Looking for the BEST Tech Job for You?   111
           Julie Jenson Bennett   The Meanings in the Machine  . . . . . . 112
                      Anonymous   Achieve your career goals with the fit
                                  that's right for you . . . . . . . . . . c2--c2
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   Move Your Career Forward IEEE Computer
                                  Society Membership . . . . . . . . . . . c4--c4
                      Anonymous   One membership. Unlimited knowledge  . . c3--c3

Computer
Volume 50, Number 10, October, 2017

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--7
                Ben Shneiderman   Revisiting the Astonishing Growth of
                                  Human--Computer Interaction Research . . 8--11
                 David B. Lomet   The Future of Data Management  . . . . . 12--13
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 14--15
               Antti Oulasvirta   On-Skin Interfaces . . . . . . . . . . . 16--18
             Jurgen Steimle and   
Joanna Bergstrom-Lehtovirta and   
              Martin Weigel and   
     Aditya Shekhar Nittala and   
           Sebastian Boring and   
                 Alex Olwal and   
                 Kasper Hornbak   On-Skin Interaction Using Body Landmarks 19--27
                Pedro Lopes and   
               Patrick Baudisch   Interactive Systems Based on Electrical
                                  Muscle Stimulation . . . . . . . . . . . 28--35
         Mahadev Satyanarayanan   Edge Computing . . . . . . . . . . . . . 36--38
                      Anonymous   One membership. Unlimited knowledge  . . 39
                   Guenter Klas   Edge Computing and the Role of Cellular
                                  Networks . . . . . . . . . . . . . . . . 40--49
                   Peng Liu and   
              Lance Hartung and   
                 Suman Banerjee   Lightweight Multitenancy at the
                                  Network's Extreme Edge . . . . . . . . . 50--57
    Ganesh Ananthanarayanan and   
              Paramvir Bahl and   
                Peter Bodik and   
       Krishna Chintalapudi and   
          Matthai Philipose and   
         Lenin Ravindranath and   
                  Sudipta Sinha   Real-Time Video Analytics: The Killer
                                  App for Edge Computing . . . . . . . . . 58--67
                    Hal Berghel   Net Neutrality Reloaded  . . . . . . . . 68--72
            Brian David Johnson   The Weaponization of AI: A Glimpse into
                                  Future Threats . . . . . . . . . . . . . 73
           Erik P. DeBenedictis   $3$D Software: A New Research Imperative 74--77
               Jeffrey Voas and   
                    Nir Kshetri   Human Tagging  . . . . . . . . . . . . . 78--85
             Robert N. Charette   Low Clearance Ahead: Can Predictable IT
                                  Crashes Be Avoided?  . . . . . . . . . . 86--91
                   Jie Tang and   
                  Dawei Sun and   
               Shaoshan Liu and   
               Jean-Luc Gaudiot   Enabling Deep Learning on IoT Devices    92--96
                      Anonymous   IEEE Computer Society  . . . . . . . . . 97
          Gregory W. Hislop and   
              Heidi J. C. Ellis   Humanitarian Open Source Software in
                                  Computing Education  . . . . . . . . . . 98--101
               Albrecht Schmidt   Technologies to Amplify the Mind . . . . 102--106
                      Anonymous   \booktitleIEEE Transactions on Cloud
                                  Computing  . . . . . . . . . . . . . . . 107
               David Alan Grier   Keeping the Internet Global  . . . . . . 108
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All  . . . . . . . . . . . . . . . c2--c2
                      Anonymous   Looking for the BEST Tech Job for You?   c3--c3
                      Anonymous   Prepare to Connect . . . . . . . . . . . c4--c4

Computer
Volume 50, Number 11, November, 2017

                      Anonymous   Table of contents  . . . . . . . . . . . 1--2
                      Anonymous   [Masthead] . . . . . . . . . . . . . . . 3
                      Anonymous   Highlights Society Magazines . . . . . . 4--7
               Nancy G. Leveson   The Therac-25: 30 Years Later  . . . . . 8--11
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 12--13
              Michael Beigl and   
        Florian Michahelles and   
                Hide Tokuda and   
                   Steve Hodges   Programming the World  . . . . . . . . . 14--17
               Fulvio Corno and   
            Luigi De Russis and   
       Alberto Monge Roffarello   A Semantic Web Approach to Simplifying
                                  Trigger-Action Programming in the IoT    18--24
                      Anonymous   IEEE Computer Society  . . . . . . . . . 25
                Jack Hodges and   
            Kimberly Garcia and   
                     Steven Ray   Semantic Development and Integration of
                                  Standards for Adoption and
                                  Interoperability . . . . . . . . . . . . 26--36
                      Anonymous   IEEE Transactions on Sustainable
                                  Computing  . . . . . . . . . . . . . . . 37
             Thomas Kubitza and   
               Albrecht Schmidt   meSchup: A Platform for Programming
                                  Interconnected Smart Things  . . . . . . 38--49
                 Henry B. Wolfe   The Mobile Phone as Surveillance Device:
                                  Progress, Perils, and Protective
                                  Measures . . . . . . . . . . . . . . . . 50--58
                      Anonymous   Stay connected . . . . . . . . . . . . . 59
               Roja Bandari and   
                Zicong Zhou and   
                   Hai Qian and   
     Timothy R. Tangherlini and   
          Vwani P. Roychowdhury   A Resistant Strain: Revealing the Online
                                  Grassroots Rise of the Antivaccination
                                  Movement . . . . . . . . . . . . . . . . 60--67
                 Daniel Lam and   
             Ethan Stillman and   
           Anthony Cariello and   
            Andrew McCorkle and   
                    Ahmed Fouad   A High School Team's Hard Road to
                                  Success in an International Engineering
                                  Competition  . . . . . . . . . . . . . . 68--71
                    Hal Berghel   The New Science Wars . . . . . . . . . . 72--76
               David Alan Grier   A More National Technology . . . . . . . 77
                Paul Grassi and   
                Mike Garcia and   
                   Katie Boeckl   Government Adopts an Industry Approach
                                  to Open Source Collaboration . . . . . . 78--81
              Adam L. Young and   
                      Moti Yung   On Ransomware and Envisioning the Enemy
                                  of Tomorrow  . . . . . . . . . . . . . . 82--85
       Patricia Takako Endo and   
          Guto Leoni Santos and   
             Daniel Rosendo and   
         Demis Moacir Gomes and   
              Andre Moreira and   
              Judith Kelner and   
               Djamel Sadok and   
   Glauco Estacio Goncalves and   
                 Mozhgan Mahloo   Minimizing and Managing Cloud Failures   86--90
            Brian David Johnson   The Future of Shopping: An Eerie
                                  Silence? . . . . . . . . . . . . . . . . 91
                      Anonymous   CS Connection  . . . . . . . . . . . . . 92--93
                      Anonymous   IEEE Transactions on Big Data  . . . . . 94
                      Anonymous   IEEE Transactions on Multi-Scale
                                  Computing Systems  . . . . . . . . . . . 95
              Peter Brusilovsky   Toward Flexible MOOCs: Student-Sourcing
                                  of Learning Content at Scale . . . . . . 96
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All  . . . . . . . . . . . . . . . c2--c2
                      Anonymous   Looking for the BEST Tech Job for You?   c4--c4
                      Anonymous   myCS . . . . . . . . . . . . . . . . . . c3--c3

Computer
Volume 50, Number 12, December, 2017

                      Anonymous   Table of contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
               Jean-Luc Gaudiot   Embracing Changes  . . . . . . . . . . . 4--6
                Hausi A. Muller   The Rise of Intelligent Cyber-Physical
                                  Systems  . . . . . . . . . . . . . . . . 7--9
                David Patterson   Reduced Instruction Set Computers Then
                                  and Now  . . . . . . . . . . . . . . . . 10--12
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 13--15
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 16--17
                 Mike Daily and   
            Swarup Medasani and   
         Reinhold Behringer and   
                  Mohan Trivedi   Self-Driving Cars  . . . . . . . . . . . 18--23
             Ernst D. Dickmanns   Developing the Sense of Vision for
                                  Autonomous Road Vehicles at UniBwM . . . 24--31
              Mina J. Hanna and   
                Shawn C. Kimmel   Current US Federal Policy Framework for
                                  Self-Driving Vehicles: Opportunities and
                                  Challenges . . . . . . . . . . . . . . . 32--40
                      Anonymous   IEEE Computer Society  . . . . . . . . . 41
               Shaoshan Liu and   
                   Jie Tang and   
                  Chao Wang and   
                  Quan Wang and   
               Jean-Luc Gaudiot   A Unified Cloud Platform for Autonomous
                                  Driving  . . . . . . . . . . . . . . . . 42--49
               Nirav Ajmeri and   
             Chung-Wei Hang and   
           Simon D. Parsons and   
              Munindar P. Singh   Aragorn: Eliciting and Maintaining
                                  Secure Service Policies  . . . . . . . . 50--58
                      Anonymous   COMPSAC 2018 . . . . . . . . . . . . . . 59
            William Knowles and   
               Jose M. Such and   
         Antonios Gouglidis and   
               Gaurav Misra and   
                   Awais Rashid   All That Glitters Is Not Gold: On the
                                  Effectiveness of Cybersecurity
                                  Qualifications . . . . . . . . . . . . . 60--71
                    Hal Berghel   Equifax and the Latest Round of Identity
                                  Theft Roulette . . . . . . . . . . . . . 72--76
                Chris Arkenberg   The Future of Intelligent Assistants . . 77
    Georgios Karakonstantis and   
  Dimitrios S. Nikolopoulos and   
        Dimitris Gizopoulos and   
             Pedro Trancoso and   
         Yiannakis Sazeides and   
   Christos D. Antonopoulos and   
         Srikumar Venugopal and   
                 Shidhartha Das   Error-Resilient Server Ecosystems for
                                  Edge and Cloud Datacenters . . . . . . . 78--81
          John A. Stankovic and   
           James W. Sturges and   
                  Jon Eisenberg   A 21st Century Cyber-Physical Systems
                                  Education  . . . . . . . . . . . . . . . 82--85
           Erik P. DeBenedictis   Plotting a Socially Responsible Course
                                  for Computers Using Cybersecurity as an
                                  Example  . . . . . . . . . . . . . . . . 86--90
                Nir Kshetri and   
                   Jeffrey Voas   Hacking Power Grids: A Current Problem   91--95
             Alexander Kott and   
               David S. Alberts   How Do You Command an Army of
                                  Intelligent Things?  . . . . . . . . . . 96--100
                      Anonymous   Metra Voted 2018 Computer Society
                                  President-Elect  . . . . . . . . . . . . 101--103
               David Alan Grier   The Subway to China  . . . . . . . . . . 104
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All  . . . . . . . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . c3--c3
                      Anonymous   Looking for the BEST Tech Job for You?   c4--c4


Computer
Volume 51, Number 1, January, 2018

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
              Hironori Kasahara   Satisfaction and Sustainability  . . . . 4--6
                      Anonymous   \booktitleIEEE Transactions on Big Data  7
                      Anonymous   Highlights Society Magazines . . . . . . 8--10
                      Anonymous   \booktitleIEEE Cloud Computing Call for
                                  Papers . . . . . . . . . . . . . . . . . 11
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 12--13
                     Sumi Helal   2018 Outlook: The Emerging Web and
                                  Information Sciences . . . . . . . . . . 14--16
                      Anonymous   myCS . . . . . . . . . . . . . . . . . . 17
                 Wendy Hall and   
              Ramine Tinati and   
                  Will Jennings   From Brexit to Trump: Social Media's
                                  Role in Democracy  . . . . . . . . . . . 18--27
       Wojciech Szpankowski and   
                   Ananth Grama   Frontiers of Science of Information:
                                  Shannon Meets Turing . . . . . . . . . . 28--38
                      Anonymous   IEEE Computer Society  . . . . . . . . . 39
             C. Gordon Bell and   
                      Ike Nassi   Revisiting Scalable Coherent Shared
                                  Memory . . . . . . . . . . . . . . . . . 40--49
                   Hong Mei and   
                        Yao Guo   Toward Ubiquitous Operating Systems: A
                                  Software-Defined Perspective . . . . . . 50--56
               Dario Bruneo and   
        Salvatore Distefano and   
            Francesco Longo and   
           Giovanni Merlino and   
              Antonio Puliafito   I/Ocloud: Adding an IoT Dimension to
                                  Cloud Infrastructures  . . . . . . . . . 57--65
        Tanusree Chatterjee and   
               Sushmita Ruj and   
                  Sipra Das Bit   Security Issues in Named Data Networks   66--75
             Connor Tingley and   
              George Serwin and   
                 Rohan Tuli and   
        Jenya Kirsch Posner and   
                 Celvi Lisy and   
                Lily Bresee and   
              Keaton Viadro and   
                  Chip Morimoto   Turning an International Competition
                                  into a Valuable Learning Experience  . . 76--79
               Jeffrey Voas and   
                  Rick Kuhn and   
              Celia Paulsen and   
                   Kim Schaffer   Educating Next-Gen Computer Scientists   80--88
                    Hal Berghel   Disinformatics: The Discipline behind
                                  Grand Deceptions . . . . . . . . . . . . 89--93
           Apostol Vassilev and   
                Nicky Mouha and   
                   Luis Brandao   Psst, Can You Keep a Secret? . . . . . . 94--97
                      Anonymous   CS Connection  . . . . . . . . . . . . . 98--102
                      Anonymous   Got flaws? . . . . . . . . . . . . . . . 103
                Nathan Shedroff   Self-Managing Real Estate  . . . . . . . 104
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All  . . . . . . . . . . . . . . . c2--c2
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . c3--c3
                      Anonymous   Looking for the BEST Tech Job for You?   c4--c4

Computer
Volume 51, Number 2, February, 2018

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   Highlights Society Magazines . . . . . . 4--7
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 8--9
                 Bruce McMillin   Software Engineering . . . . . . . . . . 10--12
                David Harel and   
                   Guy Katz and   
               Rami Marelly and   
                   Assaf Marron   Wise Computing: Toward Endowing System
                                  Development with Proactive Wisdom  . . . 14--26
            Alexander Egyed and   
                Klaus Zeman and   
          Peter Hehenberger and   
                 Andreas Demuth   Maintaining Consistency across
                                  Engineering Artifacts  . . . . . . . . . 28--35
                   Ivan Handler   Data Sharing Defined --- Really! . . . . 36--42
     Stergios Papadimitriou and   
            Lefteris Moussiades   Mac OS versus FreeBSD: A Comparative
                                  Evaluation . . . . . . . . . . . . . . . 44--53
                     Roman Beck   Beyond Bitcoin: The Rise of Blockchain
                                  World  . . . . . . . . . . . . . . . . . 54--58
                    Gary McGraw   The New Killer App for Security:
                                  Software Inventory . . . . . . . . . . . 60--62
                    Hal Berghel   Bruce Schneier on Future Digital Threats 64--67
           Erik P. DeBenedictis   A Future with Quantum Machine Learning   68--71
            Rajendra K. Raj and   
                  Allen Parrish   Toward Standards in Undergraduate
                                  Cybersecurity Education in 2018  . . . . 72--75
             Amitangshu Pal and   
                   Krishna Kant   IoT-Based Sensing and Communications
                                  Infrastructure for the Fresh Food Supply
                                  Chain  . . . . . . . . . . . . . . . . . 76--80
                   F. D. Wright   Standards: Engaging for the Future . . . 81--83
                      Anonymous   CS Connection  . . . . . . . . . . . . . 84--87
                      Anonymous   Computer WRITE FOR US  . . . . . . . . . 88
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society Information  . . . c3--c3

Computer
Volume 51, Number 3, March, 2018

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   Highlights Society Magazines . . . . . . 4--6
                      Anonymous   IEEE Computer Society  . . . . . . . . . 7
                Daniel J. Sorin   Low-Power Content Addressable Memory . . 8--9
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 10--11
               Oresti Banos and   
             Christopher Nugent   E-Coaching for Health  . . . . . . . . . 12--15
            Sergio F. Ochoa and   
         Francisco J. Gutierrez   Architecting E-Coaching Systems: A First
                                  Step for Dealing with Their Intrinsic
                                  Design Complexity  . . . . . . . . . . . 16--23
         Julie M. Robillard and   
                     Jesse Hoey   Emotion and Motivation in Cognitive
                                  Assistive Technologies for Dementia  . . 24--34
                      Anonymous   Impact a broader audience  . . . . . . . 35
              Paolo Pilloni and   
                 Luca Piras and   
            Salvatore Carta and   
                Gianni Fenu and   
             Fabrizio Mulas and   
               Ludovico Boratto   Recommender System Lets Coaches Identify
                                  and Help Athletes Who Begin Losing
                                  Motivation . . . . . . . . . . . . . . . 36--42
             Mario O. Parra and   
               Jesus Favela and   
             Luis A. Castro and   
                 Arturo Morales   Monitoring Eating Behaviors for a
                                  Nutritionist E-Assistant Using
                                  Crowdsourcing  . . . . . . . . . . . . . 43--51
              Chit-Kwan Lin and   
               Andreas Wild and   
          Gautham N. Chinya and   
              Yongqiang Cao and   
                Mike Davies and   
           Daniel M. Lavery and   
                      Hong Wang   Programming Spiking Neural Networks on
                                  Intel's Loihi  . . . . . . . . . . . . . 52--61
                 Scooter Willis   The Maker Revolution . . . . . . . . . . 62--65
                    Hal Berghel   Trolling Pathologies . . . . . . . . . . 66--69
             Dimitrios Serpanos   The Cyber-Physical Systems Revolution    70--73
                Nir Kshetri and   
                   Jeffrey Voas   Hacking's Brand-Equity Nexus . . . . . . 74--77
                      Anonymous   CS Connection  . . . . . . . . . . . . . 78--80
                      Anonymous   Connect on Interface . . . . . . . . . . c4--c4
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All  . . . . . . . . . . . . . . . c3--c3
                      Anonymous   Share the gift of knowledge: Give Your
                                  Favorite Student a Membership to the
                                  IEEE Computer Society! . . . . . . . . . c2--c2

Computer
Volume 51, Number 4, April, 2018

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   Letters  . . . . . . . . . . . . . . . . 4--7
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 8--10
                      Anonymous   IEEE Computer Society Information  . . . 11
           Ronald F. DeMara and   
                Paolo Montuschi   Non-Volatile Memory Trends: Toward
                                  Improving Density and Energy Profiles
                                  across the System Stack  . . . . . . . . 12--13
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 14--15
                  Daniel Prince   Cybersecurity: The Security and
                                  Protection Challenges of Our Digital
                                  World  . . . . . . . . . . . . . . . . . 16--19
           Sulabh Bhattarai and   
                      Yong Wang   End-to-End Trust and Security for
                                  Internet of Things Applications  . . . . 20--27
                    Zhen Ni and   
                  Qianmu Li and   
                       Gang Liu   Game-Model-Based Network Security Risk
                                  Control  . . . . . . . . . . . . . . . . 28--38
                      Anonymous   Impact a broader audience  . . . . . . . 39
                Yongsuk Lee and   
                    Gyungho Lee   Detecting Code Reuse Attacks with Branch
                                  Prediction . . . . . . . . . . . . . . . 40--47
                      Anonymous   Recognizing Excellence in High
                                  Performance Computing Nominations are
                                  Solicited for the Seymour Cray, Sidney
                                  Fernbach, and Ken Kennedy Awards . . . . 48
                      Anonymous   Take the CS Library wherever you go! . . 49
      Kristofer E. Bouchard and   
            James B. Aimone and   
               Miyoung Chun and   
                Thomas Dean and   
             Michael Denker and   
            Markus Diesmann and   
          David D. Donofrio and   
             Loren M. Frank and   
         Narayanan Kasthuri and   
              Christof Koch and   
               Oliver Rubel and   
             Horst D. Simon and   
               F. T. Sommer and   
                        Prabhat   International Neuroscience Initiatives
                                  through the Lens of High-Performance
                                  Computing  . . . . . . . . . . . . . . . 50--59
         Konstantin Rubinov and   
                 Luciano Baresi   What Are We Missing When Testing Our
                                  Android Apps?  . . . . . . . . . . . . . 60--68
                      Anonymous   \booktitleIEEE Transactions on Big Data  69
                    Hal Berghel   Weaponizing Twitter Litter:
                                  Abuse-Forming Networks and Social Media  70--73
            Thomas M. Conte and   
       Erik P. DeBenedictis and   
              Avi Mendelson and   
                Dejan Milojicic   Rebooting Computers to Avoid Meltdown
                                  and Spectre  . . . . . . . . . . . . . . 74--77
                  Mina J. Hanna   Net Neutrality: A Brief Overview of the
                                  Policy and the FCC's Ruling to Upend It  78--81
            Chung-Kuan Chen and   
              Zhi-Kai Zhang and   
              Shan-Hsin Lee and   
                Shiuhpyng Shieh   Penetration Testing in the IoT Age . . . 82--85
               Jeffrey Voas and   
            Phillip A. Laplante   IoT's Certification Quagmire . . . . . . 86--89
                    Jon Rosdahl   Computer Society Standards Drive
                                  Industry . . . . . . . . . . . . . . . . 90--94
                      Anonymous   Looking for the BEST Tech Job for You?   95
                      Anonymous   CS Connection  . . . . . . . . . . . . . 96
                      Anonymous   Connect on Interface . . . . . . . . . . c4--c4
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All  . . . . . . . . . . . . . . . c3--c3
                      Anonymous   Share the Gift of Knowledge: Give Your
                                  Favorite Student a Membership to the
                                  IEEE Computer Society! . . . . . . . . . c2--c2

Computer
Volume 51, Number 5, May, 2018

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   Highlights Society Magazines . . . . . . 4--6
                      Anonymous   2018 CSI-IEEE CS Joint Education Award   7
              Leila De Floriani   Globe Browsing in OpenSpace  . . . . . . 8--9
                  Erich Neuhold   Computer, 1968 and 1993  . . . . . . . . 10--11
           Nicholas D. Lane and   
                    Pete Warden   The Deep (Learning) Transformation of
                                  Mobile and Embedded Computing  . . . . . 12--16
                      Anonymous   2019 Richard E. Merwin Award for
                                  Distinguished Service  . . . . . . . . . 17
           Andreas Moshovos and   
            Jorge Albericio and   
               Patrick Judd and   
     Alberto Delmas Lascorz and   
              Sayeh Sharify and   
              Zissis Poulos and   
        Tayler Hetherington and   
                 Tor Aamodt and   
         Natalie Enright Jerger   Exploiting Typical Values to Accelerate
                                  Deep Learning  . . . . . . . . . . . . . 18--30
                      Anonymous   IEEE Computer Society Harlan D. Mills
                                  Award  . . . . . . . . . . . . . . . . . 31
               Shuochao Yao and   
                 Yiran Zhao and   
                Aston Zhang and   
                 Shaohan Hu and   
                Huajie Shao and   
                 Chao Zhang and   
                      Lu Su and   
               Tarek Abdelzaher   Deep Learning for the Internet of Things 32--41
             Seyed Ali Osia and   
      Ali Shahin Shamsabadi and   
                 Ali Taheri and   
            Hamid R. Rabiee and   
                  Hamed Haddadi   Private and Scalable Personal Data
                                  Analytics Using Hybrid Edge-to-Cloud
                                  Deep Learning  . . . . . . . . . . . . . 42--49
               Thomas Plotz and   
                        Yu Guan   Deep Learning for Human Activity
                                  Recognition in Mobile Computing  . . . . 50--59
           Jagmohan Chauhan and   
        Suranga Seneviratne and   
                  Yining Hu and   
               Archan Misra and   
          Aruna Seneviratne and   
                    Youngki Lee   Breathing-Based Authentication on
                                  Resource-Constrained IoT Devices using
                                  Recurrent Neural Networks  . . . . . . . 60--67
                 Jungmo Ahn and   
           Huynh Nguyen Loc and   
       Rajesh Krishna Balan and   
                Youngki Lee and   
                    JeongGil Ko   Finding Small-Bowel Lesions: Challenges
                                  in Endoscopy-Image-Based Learning
                                  Systems  . . . . . . . . . . . . . . . . 68--76
                      Anonymous   Call for Nominees Education Awards
                                  Nominations  . . . . . . . . . . . . . . 77
             Robert N. Charette   Puncturing Pernicious Project Pufferies  78--83
                    Hal Berghel   Malice Domestic: The Cambridge Analytica
                                  Dystopia . . . . . . . . . . . . . . . . 84--89
                   Marilyn Wolf   Computing in the Real World Is the
                                  Grandest of Challenges . . . . . . . . . 90--91
                Nir Kshetri and   
                   Jeffrey Voas   Cyberthreats under the Bed . . . . . . . 92--95
                      Anonymous   IEEE Computer Society  . . . . . . . . . 96
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   2019 IEEE-CS Charles Babbage Award . . . c4--c4
                      Anonymous   myCS . . . . . . . . . . . . . . . . . . c2--c2
                      Anonymous   Recognizing Excellence in High
                                  Performance Computing Nominations are
                                  Solicited for the Seymour Cray Sidney
                                  Fernbach & Ken Kennedy Awards . . . . . . c3--c3

Computer
Volume 51, Number 6, June, 2018

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   Highlights Society Magazines . . . . . . 4--6
                 Bjorn Schuller   What Affective Computing Reveals about
                                  Autistic Children's Facial Expressions
                                  of Joy or Fear . . . . . . . . . . . . . 7--8
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 9--10
                      Anonymous   Looking for the BEST Tech Job for You?   11
              James Hendler and   
                 Wendy Hall and   
              Noshir Contractor   Web Science: Now More Than Ever  . . . . 12--17
               Kyungsik Han and   
               Hyunggu Jung and   
               Jin Yea Jang and   
                    Dongwon Lee   Understanding Users' Privacy Attitudes
                                  through Subjective and Objective
                                  Assessments: An Instagram Case Study . . 18--28
                      Anonymous   2019 IEEE-CS Charles Babbage Award . . . 29
                John Gastil and   
             Sascha D. Meinrath   Bringing Citizens and Policymakers
                                  Together Online: Imagining the
                                  Possibilities and Taking Stock of
                                  Privacy and Transparency Hazards . . . . 30--40
                      Anonymous   2019 Richard E. Merwin Award for
                                  Distinguished Service  . . . . . . . . . 41
                   Daye Nam and   
                Mayank Kejriwal   How Do Organizations Publish Semantic
                                  Markup? Three Case Studies Using Public
                                  \tt Schema.org Crawls  . . . . . . . . . 42--51
                    Jun Sun and   
              Steffen Staab and   
                 Jerome Kunegis   Understanding Social Networks Using
                                  Transfer Learning  . . . . . . . . . . . 52--60
                      Anonymous   IEEE Letters of the Computer Society . . 61
            Carleen F. Maitland   Now You See It, Now You Don't: Digital
                                  Connectivity in Marginalized Communities 62--71
                Toru Ishida and   
             Yohei Murakami and   
                Donghui Lin and   
            Takao Nakaguchi and   
                 Masayuki Otani   Language Service Infrastructure on the
                                  Web: The Language Grid . . . . . . . . . 72--81
           Erik P. DeBenedictis   Accelerated Architectures Create
                                  Programming Opportunities  . . . . . . . 82--85
             Kristen Greene and   
            Michelle Steves and   
                 Mary Theofanos   No Phishing beyond This Point  . . . . . 86--89
              Trevor Pering and   
           Kathy Farrington and   
                  Thorsten Dahm   Taming the IoT: Operationalized Testing
                                  to Secure Connected Devices  . . . . . . 90--94
                      Anonymous   IEEE Computer Society  . . . . . . . . . 95
                 Richard Vedder   Benefits of College---By Degrees . . . . 96--99
               F. D. Wright and   
                Thomas M. Conte   Standards: Roadmapping Computer
                                  Technology Trends Enlightens Industry    100--103
                      Anonymous   CS Connection  . . . . . . . . . . . . . 104
                      Anonymous   Call for Nominees Education Awards
                                  Nominations  . . . . . . . . . . . . . . c3--c3
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   IEEE Computer Society Harlan D. Mills
                                  Award  . . . . . . . . . . . . . . . . . c4--c4
                      Anonymous   Share the Gift of Knowledge: Give Your
                                  Favorite Student a Membership to the
                                  IEEE Computer Society! . . . . . . . . . c2--c2

Computer
Volume 51, Number 7, July, 2018

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
        Ayten Ozge Akmandor and   
                   Niraj K. Jha   Detecting and Alleviating Stress with
                                  SoDA . . . . . . . . . . . . . . . . . . 4--5
                      Anonymous   Highlights Society Magazines . . . . . . 6--8
                      Anonymous   IEEE Computer Society Information  . . . 9
                      Anonymous   50 & 25 Years Ago . . . . . . . . . . . . 10--11
               Jeffrey Voas and   
                  Rick Kuhn and   
        Constantinos Kolias and   
            Angelos Stavrou and   
           Georgios Kambourakis   Cybertrust in the IoT Age  . . . . . . . 12--15
       Rodrigo Roman-Castro and   
               Javier Lopez and   
             Stefanos Gritzalis   Evolution and Trends in IoT Security . . 16--25
            Natalija Vlajic and   
                    Daiwei Zhou   IoT as a Land of Opportunity for DDoS
                                  Hackers  . . . . . . . . . . . . . . . . 26--34
                      Anonymous   IEEE Computer Society Harlan D. Mills
                                  Award  . . . . . . . . . . . . . . . . . 35
                    Weizhi Meng   Intrusion Detection in the Era of IoT:
                                  Building Trust via Traffic Filtering and
                                  Sampling . . . . . . . . . . . . . . . . 36--43
      Jose Maria de Fuentes and   
    Lorena Gonzalez-Manzano and   
             Agusti Solanas and   
                Fatbardh Veseli   Attribute-Based Credentials for
                                  Privacy-Aware Smart Health Services in
                                  IoT-Based Smart Cities . . . . . . . . . 44--53
             Jatinder Singh and   
        Christopher Millard and   
                 Chris Reed and   
             Jennifer Cobbe and   
                  Jon Crowcroft   Accountability in the IoT: Systems, Law,
                                  and Ways Forward . . . . . . . . . . . . 54--65
              Ryan Gary Kim and   
        Janardhan Rao Doppa and   
        Partha Pratim Pande and   
           Diana Marculescu and   
                Radu Marculescu   Machine Learning and Manycore Systems
                                  Design: A Serendipitous Symbiosis  . . . 66--77
               Timothy Buzzelli   University of Central Florida Takes the
                                  Bronze at Annual International
                                  Programming Competition  . . . . . . . . 78--81
                  Rick Kuhn and   
            Mohammad Raunak and   
                   Raghu Kacker   Can Reducing Faults Prevent
                                  Vulnerabilities? . . . . . . . . . . . . 82--85
                    Hal Berghel   Newton's Great Insight . . . . . . . . . 86--90
        Yoshihiro Shiroishi and   
             Kunio Uchiyama and   
                Norihiro Suzuki   Society 5.0: For Human Security and
                                  Well-Being . . . . . . . . . . . . . . . 91--95
                      Anonymous   CS Connection  . . . . . . . . . . . . . 96
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   2019 Richard E. Merwin Award for
                                  Distinguished Service  . . . . . . . . . c4--c4
                      Anonymous   Share the Gift of Knowledge: Give Your
                                  Favorite Student a Membership to the
                                  IEEE Computer Society! . . . . . . . . . c2--c2
                      Anonymous   TCHPC IEEE Computer Society Technical
                                  Consortium on High Performance Computing c3--c3

Computer
Volume 51, Number 8, August, 2018

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
          Patrick Schaumont and   
                Paolo Montuschi   The Rise of Hardware Security in
                                  Computer Architectures . . . . . . . . . 4--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--8
                      Anonymous   Call for Nominees Education Awards
                                  Nominations  . . . . . . . . . . . . . . 9
                      Anonymous   \booktitleComputer, August 1968 and 1993 10--12
                      Anonymous   2019 Richard E. Merwin Award for
                                  Distinguished Service  . . . . . . . . . 13
               Oresti Banos and   
                   Chris Nugent   M-Coaching: Towards the Next Generation
                                  of Mobile-Driven Healthcare Support
                                  Services . . . . . . . . . . . . . . . . 14--17
              Mauro Tschanz and   
           Tim Lucas Dorner and   
                Jurgen Holm and   
                Kerstin Denecke   Using eMMA to Manage Medication  . . . . 18--25
                Haolin Wang and   
             Qingpeng Zhang and   
                    Mary Ip and   
             Joseph Tak Fai Lau   Social Media-based Conversational Agents
                                  for Health Management and Interventions  26--33
                 Simo Hosio and   
             Jaro Karppinen and   
           Niels van Berkel and   
         Jonas Oppenlaender and   
                Jorge Goncalves   Mobile Decision Support and Data
                                  Provisioning for Low Back Pain . . . . . 34--43
                Hal Berghel and   
                Daniel Berleant   The Online Trolling Ecosystem  . . . . . 44--51
           Erik P. DeBenedictis   A Role for IEEE in Quantum Computing . . 52--55
                  Jim Isaak and   
                  Mina J. Hanna   User Data Privacy: Facebook, Cambridge
                                  Analytica, and Privacy Protection  . . . 56--59
           Robin Bloomfield and   
               Peter Bishop and   
                Eoin Butler and   
                  Robert Stroud   Security-Informed Safety: Supporting
                                  Stakeholders with Codes of Practice  . . 60--65
                   Roy Want and   
                   Wei Wang and   
                  Stan Chesnutt   Accurate Indoor Location for the IoT . . 66--70
                      Anonymous   IEEE Computer Society  . . . . . . . . . 71
                      Anonymous   IEEE Computer Society Election . . . . . 72--85
                      Anonymous   IEEE Division V Delegate/Director
                                  Candidates . . . . . . . . . . . . . . . 86--87
                      Anonymous   IEEE President-Elect Candidates Address
                                  Computer Society Concerns  . . . . . . . 88--93
                      Anonymous   CS Connection  . . . . . . . . . . . . . 94--96
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   2019 IEEE-CS Charles Babbage Award . . . c4--c4
                      Anonymous   IEEE Computer Society: Be at the Center
                                  of It All  . . . . . . . . . . . . . . . c2--c2
                      Anonymous   IEEE Computer Society Harlan D. Mills
                                  Award  . . . . . . . . . . . . . . . . . c3--c3

Computer
Volume 51, Number 9, September, 2018

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   Computer Highlights Society Magazines    4--6
                      Anonymous   Stay connected . . . . . . . . . . . . . 7
                 Jaideep Vaidya   Privacy-Preserving Statistics  . . . . . 8--9
                      Anonymous   IEEE Letters of the Computer Society . . 10
                      Anonymous   September, 1968 and 1993 . . . . . . . . 11--12
                      Anonymous   Call for Nominees Education Awards
                                  Nominations  . . . . . . . . . . . . . . 13
                     Sumi Helal   The Expanding Frontier of Artificial
                                  Intelligence . . . . . . . . . . . . . . 14--17
          Plamen P. Angelov and   
                     Xiaowei Gu   Toward Anthropomorphic Machine Learning  18--27
                    Hani Hagras   Toward Human-Understandable, Explainable
                                  AI . . . . . . . . . . . . . . . . . . . 28--36
                      Anonymous   2018 CSI-IEEE CS Joint Education Award   37
            Dagmar Schuller and   
              Bjorn W. Schuller   The Age of Artificial Emotional
                                  Intelligence . . . . . . . . . . . . . . 38--46
                      Anonymous   IEEE Computer Society Harlan D. Mills
                                  Award  . . . . . . . . . . . . . . . . . 47
              Thang N. Dinh and   
                     My T. Thai   AI and Blockchain: A Disruptive
                                  Integration  . . . . . . . . . . . . . . 48--53
               Wasim Ahmad Bhat   Is a Data-Capacity Gap Inevitable in Big
                                  Data Storage?  . . . . . . . . . . . . . 54--62
                      Anonymous   Looking for the BEST Tech Job for You?   63
              Mahbub Hassan and   
                     Wen Hu and   
                  Guhao Lan and   
          Aruna Seneviratne and   
               Sara Khalifa and   
                   Sajal K. Das   Kinetic-Powered Health Wearables:
                                  Challenges and Opportunities . . . . . . 64--74
                      Anonymous   IEEE Transactions on Big Data  . . . . . 75
                     Rolf Ernst   Automated Driving: The Cyber-Physical
                                  Perspective  . . . . . . . . . . . . . . 76--79
                George Hurlburt   Toward Applied Cyberethics . . . . . . . 80--84
                      Anonymous   IEEE Computer Society  . . . . . . . . . 85
            Florence Hudson and   
                    Chris Clark   Wearables and Medical Interoperability:
                                  The Evolving Frontier  . . . . . . . . . 86--90
                      Anonymous   Computer WRITE FOR US  . . . . . . . . . 91
                      Anonymous   CS Connection  . . . . . . . . . . . . . 92--96
                      Anonymous   Front Cover  . . . . . . . . . . . . . . c1--c1
                      Anonymous   2019 IEEE-CS Charles Babbage Award . . . c4--c4
                      Anonymous   IEEE COMPUTER SOCIETY: Be at the Center
                                  of It All  . . . . . . . . . . . . . . . c2--c2
                      Anonymous   2019 Richard E. Merwin Award for
                                  Distinguished Service  . . . . . . . . . c3--c3

Computer
Volume 51, Number 11, November, 2018

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Staff List . . . . . . . . . . . . . . . 3
                   Lori Cameron   [Elsewhere in the CS]  . . . . . . . . . 4--6
                  Erich Neuhold   [50 & 25 Years Ago] . . . . . . . . . . . 7--9
              Oleg Sokolsky and   
                   Nicola Bezzo   Resiliency in Cyber-Physical Systems
                                  [Guest Editors' Introduction]  . . . . . 10--12
               Darren Cofer and   
               Andrew Gacek and   
                John Backes and   
          Michael W. Whalen and   
                   Lee Pike and   
               Adam Foltzer and   
          Michal Podhradsky and   
               Gerwin Klein and   
                   Ihor Kuz and   
             June Andronick and   
              Gernot Heiser and   
                 Douglas Stuart   A Formal Approach to Constructing Secure
                                  Air Vehicle Software . . . . . . . . . . 14--23
           Tarek Abdelzaher and   
               Nora Ayanian and   
                Tamer Basar and   
              Suhas Diggavi and   
               Jana Diesner and   
             Deepak Ganesan and   
            Ramesh Govindan and   
                 Susmit Jha and   
           Tancrede Lepoint and   
            Benjamin Marlin and   
            Klara Nahrstedt and   
                David Nicol and   
               Raj Rajkumar and   
            Stephen Russell and   
              Sanjit Seshia and   
                    Fei Sha and   
            Prashant Shenoy and   
            Mani Srivastava and   
            Gaurav Sukhatme and   
            Ananthram Swami and   
              Paulo Tabuada and   
                Don Towsley and   
               Nitin Vaidya and   
                Venu Veeravalli   Toward an Internet of Battlefield
                                  Things: A Resilience Perspective . . . . 24--36
    Varun Badrinath Krishna and   
                  Ziping Wu and   
      Vaidehi V. Ambardekar and   
             Richard Macwan and   
             William H. Sanders   Cyberattacks on Primary Frequency
                                  Response Mechanisms in Power Grids . . . 37--45
                Yuchang Won and   
                  Buyeon Yu and   
               Jaegeun Park and   
                In-Hee Park and   
              Haegeon Jeong and   
             Jeanseong Baik and   
              Kyungtae Kang and   
                  Insup Lee and   
              Sang Hyuk Son and   
            Kyung-Joon Park and   
                   Yongsoon Eun   An Attack-Resilient CPS Architecture for
                                  Hierarchical Control: A Case Study on
                                  Train Control Systems  . . . . . . . . . 46--55
    Mohammad Shihabul Haque and   
         Daniel Jun Xian Ng and   
            Arvind Easwaran and   
    Karthikeyan Thangamariappan   Contract-Based Hierarchical Resilience
                                  Management for Cyber-Physical Systems    56--65
               Tanesh Kumar and   
           Pawani Porambage and   
                 Ijaz Ahmad and   
        Madhusanka Liyanage and   
              Erkki Harjula and   
                Mika Ylianttila   Securing Gadget-Free Digital Services    66--77
              Sylvain Halle and   
             Raphael Khoury and   
                  Mewena Awesso   Streamlining the Inclusion of Computer
                                  Experiments In a Research Paper  . . . . 78--89
                     Hal Bergel   Election Integrity 2018: Are We Better
                                  Off Than We Were in 2016? [Aftershock]   90--94
          Christos Koulamas and   
           Athanasios Kalogeras   Cyber-Physical Systems and Digital Twins
                                  in the Industrial Internet of Things
                                  [Cyber-Physical Systems] . . . . . . . . 95--98
                    Nir Kshetri   Cryptocurrencies: Transparency Versus
                                  Privacy [Cybertrust] . . . . . . . . . . 99--111
                    Hal Berghel   The Genesis of Postmodern Disinformatics
                                  [Out of Band]  . . . . . . . . . . . . . 102--105
                   Claudio Lima   Developing Open and Interoperable
                                  DLT/Blockchain Standards [Standards] . . 106--111
                      Anonymous   IEEE Computer Society information  . . . 112
                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1

Computer
Volume 51, Number 12, December, 2018

                      Anonymous   Front cover  . . . . . . . . . . . . . . ??
                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . ??
                   Lori Cameron   [Elsewhere in the CS]  . . . . . . . . . 4--6
                  Erich Neuhold   Computer, December 1968 and 1993 [50 & 25
                                  Years Ago] . . . . . . . . . . . . . . . 7--9
                 Yasha Wang and   
             Katsuyuki Yamazaki   Governments in the Age of Big Data and
                                  Smart Cities [Guest Editors'
                                  Introduction]  . . . . . . . . . . . . . 10--12
                      Anonymous   IEEE Computer Society information  . . . ??
          Takahiro Sumitomo and   
               Noboru Koshizuka   Progress and Initiatives for Open Data
                                  Policy in Japan  . . . . . . . . . . . . 14--23
                    Hui Gao and   
             Chi Harold Liu and   
                   Wendong Wang   Hybrid Vehicular Crowdsourcing With
                                  Driverless Cars: Challenges and a
                                  Solution . . . . . . . . . . . . . . . . 24--31
                  Leye Wang and   
                    Bin Guo and   
                     Qiang Yang   Smart City Development With Urban
                                  Transfer Learning  . . . . . . . . . . . 32--41
              Jiangtao Wang and   
               Junfeng Zhao and   
                 Yong Zhang and   
                   Xin Peng and   
                    Ying Li and   
                        Yun Xie   Enabling Human-Centric Smart Cities:
                                  Crowdsourcing-Based Practice in China    42--49
           Noboru Koshizuka and   
             Stephan Haller and   
                   Ken Sakamura   CPaaS.io: An EU--Japan Collaboration on
                                  Open Smart-City Platforms  . . . . . . . 50--58
                    Nir Kshetri   Blockchain and Electronic Healthcare
                                  Records [Cybertrust] . . . . . . . . . . 59--63
                    Ju Wang and   
             Xiaojiang Chen and   
                Dingyi Fang and   
                  Jie Xiong and   
               Hongbo Jiang and   
           Rajesh Krishna Balan   Material Identification and Target
                                  Imaging with RFIDs [IoT Connection]  . . 64--68
       Erik P. DeBenedictis and   
               Michael P. Frank   The National Quantum Initiative Will
                                  Also Benefit Classical Computers
                                  [Rebooting Computing]  . . . . . . . . . 69--73
                      Anonymous   De Floriani Voted 2019 IEEE Computer
                                  Society President-Elect [Report to
                                  Members] . . . . . . . . . . . . . . . . 74--76
                      Anonymous   [CS Connection]  . . . . . . . . . . . . 78--80


Computer
Volume 52, Number 1, January, 2019

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                  Cecilia Metra   The 2019 IEEE Computer Society:
                                  Targeting Member Satisfaction and
                                  Technical Excellence . . . . . . . . . . 4--6
                   Lori Cameron   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 7--9
                  Erich Neuhold   50 & 25 Years Ago . . . . . . . . . . . . 10--12
               David Alan Grier   A revolutionary outlook [EIC's Message]  13--14
                      Anonymous   \booktitleIEEE Software Call For
                                  Articles . . . . . . . . . . . . . . . . 14
                      Anonymous   IEEE Computer Society  . . . . . . . . . 15
              Elisa Bertino and   
              Shawn Merrill and   
                Alina Nesen and   
                  Christine Utz   Redefining Data Transparency: A
                                  Multidimensional Approach  . . . . . . . 16--26
            Ben Shneiderman and   
             Catherine Plaisant   Interactive Visual Event Analytics:
                                  Opportunities and Challenges . . . . . . 27--35
                  Dong Wang and   
      Boleslaw K. Szymanski and   
           Tarek Abdelzaher and   
                    Heng Ji and   
                   Lance Kaplan   The Age of Social Sensing  . . . . . . . 36--45
              Jiangtao Wang and   
                 Yasha Wang and   
                         Qin Lv   Crowd-Assisted Machine Learning: Current
                                  Issues and Future Directions . . . . . . 46--53
                   Marilyn Wolf   Computer Security as Civil Defense . . . 54--57
                      Anonymous   Erratum [for ``Toward
                                  Human-Understandable, Explainable AI'']  57
                Nir Kshetri and   
                   Jeffrey Voas   Online Advertising Fraud . . . . . . . . 58--61
                      Anonymous   \booktitleIEEE Transactions on Big Data  61
                     Lu Dai and   
                Stan Krolikoski   A unique collaboration: revitalizing
                                  existing standards while preparing for
                                  the future . . . . . . . . . . . . . . . 62--65
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . 65
                    Hal Berghel   Vehicle Telematics: The Good, Bad and
                                  Ugly . . . . . . . . . . . . . . . . . . 66--70
                      Anonymous   B. Ramakrishna Rau Award . . . . . . . . 71
              Hironori Kasahara   Collaboration for the Future . . . . . . 72--76
                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1
                      Anonymous   ACM/IEEE CS Eckert--Mauchly Award  . . . C2
                      Anonymous   IEEE Computer Society Interface  . . . . C3
                      Anonymous   IEEE Computer Society Jobs Board . . . . C4--C4

Computer
Volume 52, Number 2, February, 2019

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                Bjoern Schuller   Microexpressions: A Chance for Computers
                                  to Beat Humans at Detecting Hidden
                                  Emotions?  . . . . . . . . . . . . . . . 4--5
                      Anonymous   \booktitleIEEE Security & Privacy
                                  Subscription . . . . . . . . . . . . . . 5
                   Lori Cameron   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--8
                  Erich Neuhold   50 & 25 Years Ago . . . . . . . . . . . . 9--11
                      Anonymous   \booktitleIEEE Transactions on Big Data  11
               David Alan Grier   Holding Us Together  . . . . . . . . . . 12--13
                      Anonymous   Call For Articles Software Magazine  . . 13
              Vard Antinyan and   
           Anna B. Sandberg and   
                Miroslaw Staron   A Pragmatic View on Code Complexity
                                  Management . . . . . . . . . . . . . . . 14--22
                      Anonymous   \booktitleIT Professional Call for
                                  Articles . . . . . . . . . . . . . . . . 22
              Kjell J. Hole and   
            Christian Otterstad   Software Systems With Antifragility to
                                  Downtime . . . . . . . . . . . . . . . . 23--31
                      Anonymous   \booktitleIEEE Pervasive Computing Call
                                  for Articles . . . . . . . . . . . . . . 31
           Philip Treleaven and   
             Jeremy Barnett and   
              Adriano Koshiyama   Algorithms: Law and Regulation . . . . . 32--40
                K. Siddique and   
                  Z. Akhtar and   
              F. Aslam Khan and   
                         Y. Kim   KDD Cup 99 Data Sets: A Perspective on
                                  the Role of Data Sets in Network
                                  Intrusion Detection Research . . . . . . 41--51
                      Anonymous   \booktitleIEEE Computer Graphics &
                                  Applications Subscription  . . . . . . . 51
          Kirk M. Bresniker and   
           Paolo Faraboschi and   
              Avi Mendelson and   
            Dejan Milojicic and   
             Timothy Roscoe and   
            Robert N. M. Watson   Rack-Scale Capabilities: Fine-Grained
                                  Protection for Large-Scale Memories  . . 52--62
                      Anonymous   \booktitleIEEE Annals of the History of
                                  Computing  . . . . . . . . . . . . . . . 62
             Amitangshu Pal and   
                   Krishna Kant   NFMI: Connectivity for Short-Range IoT
                                  Applications . . . . . . . . . . . . . . 63--67
                      Anonymous   \booktitleIEEE Intelligent Systems . . . 67
                      Anonymous   \booktitleIEEE Multimedia  . . . . . . . 67
                  Rick Kuhn and   
                 Dylan Yaga and   
                   Jeffrey Voas   Rethinking Distributed Ledger Technology 68--72
                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1--C1
                      Anonymous   B. Ramakrishna Rau Award . . . . . . . . C2--C2
                      Anonymous   IEEE Computer Society Information  . . . C3--C3
                      Anonymous   IEEE Computer Society Job Boards . . . . C4--C4

Computer
Volume 52, Number 3, March, 2019

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3
                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
               Albert Y. Zomaya   A Novel Hierarchical Two-Tier
                                  Node-Deployment Strategy for Sustainable
                                  Wireless Sensor Networks . . . . . . . . 4--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--8
                      Anonymous   IT Professional Call for Articles  . . . 8--8
                      Anonymous   \booktitleIT Professional Call for
                                  Articles . . . . . . . . . . . . . . . . 8
                  Erich Neuhold   50 & 25 Years Ago . . . . . . . . . . . . 9--11
               David Alan Grier   Learning to Live in an Insecure World    12--13
                      Anonymous   \booktitleSecurity & Privacy Subscribe    13--13
                  Ann Sobel and   
              Allen Parrish and   
                Rajendra K. Raj   Curricular Foundations for Cybersecurity 14--17
                      Anonymous   \booktitleIEEE Transactions on Big Data  17--17
                Matthew Hudnall   Educational and Workforce Cybersecurity
                                  Frameworks: Comparing, Contrasting, and
                                  Mapping  . . . . . . . . . . . . . . . . 18--28
            Diana L. Burley and   
            Alfred H. Lewis Jr.   Cybersecurity Curricula 2017 and Boeing:
                                  Linking Curricular Guidance to
                                  Professional Practice  . . . . . . . . . 29--37
               David Gibson and   
                Vijay Anand and   
             Josh Dehlinger and   
           Charles Dierbach and   
             Tracy Emmersen and   
                Andrew Phillips   Accredited Undergraduate Cybersecurity
                                  Degrees: Four Approaches . . . . . . . . 38--47
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . 47--47
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . 47
             Tracy Emmersen and   
         Joseph M. Hatfield and   
               Jeff Kosseff and   
               Steven R. Orr IV   The USNA's Interdisciplinary Approach to
                                  Cybersecurity Education  . . . . . . . . 48--57
           Jean R. S. Blair and   
             Andrew O. Hall and   
                 Edward Sobiesk   Educating Future Multidisciplinary
                                  Cybersecurity Teams  . . . . . . . . . . 58--66
                Jessica Ivy and   
               Sarah B. Lee and   
                 Dana Franz and   
                Joseph Crumpton   Seeding Cybersecurity Workforce Pathways
                                  With Secondary Education . . . . . . . . 67--75
                      Anonymous   \booktitleIEEE Pervasive Computing Call
                                  for Articles . . . . . . . . . . . . . . 75--75
                      Anonymous   \booktitleIEEE Pervasive Computing Call
                                  for Articles . . . . . . . . . . . . . . 75
                    Hal Berghel   Codes of Ethics in a Post-Truth World    76--80
             Robert N. Charette   Evolving From Know-How to Know-What  . . 81--86
                      Anonymous   \booktitleIEEE Annals of the History of
                                  Computing  . . . . . . . . . . . . . . . 86--86
                      Anonymous   \booktitleIEEE Annals of the History of
                                  Computing  . . . . . . . . . . . . . . . 86
                Nir Kshetri and   
                   Jeffrey Voas   Trusting Pirated Software  . . . . . . . 87--90
                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1
                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1--C1
                      Anonymous   Letters of the Computer Society  . . . . C2
                      Anonymous   Letters of the Computer Society  . . . . C2--C2
                      Anonymous   IEEE Computer Society information  . . . C3--C3
                      Anonymous   IEEE Computer Society Jobs Board . . . . C4--C4

Computer
Volume 52, Number 4, April, 2019

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--6
                      Anonymous   \booktitleIEEE Software & Privacy . . . . 6--6
                     E. Neuhold   50 & 25 Years Ago . . . . . . . . . . . . 7--9
                      Anonymous   \booktitleIEEE Software Call for
                                  Articles . . . . . . . . . . . . . . . . 9--9
                    D. A. Grier   The Path Across the Great Deep . . . . . 10--11
                      Anonymous   \booktitleIEEE Transactions on Big Data  11--11
                     N. Nag and   
                        R. Jain   A Navigational Approach to Health:
                                  Actionable Guidance for Improved Quality
                                  of Life  . . . . . . . . . . . . . . . . 12--20
                 J. M. Such and   
                 P. Ciholas and   
                  A. Rashid and   
                  J. Vidler and   
                    T. Seabrook   Basic Cyber Hygiene: Does It Work? . . . 21--31
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . 31--31
             G. P. De Francesco   The General Data Protection Regulation's
                                  Practical Impact on Software
                                  Architecture . . . . . . . . . . . . . . 32--39
                   K. Fawaz and   
                     K. G. Shin   Security and Privacy in the Internet of
                                  Things . . . . . . . . . . . . . . . . . 40--49
                      Anonymous   \booktitleIEEE Annals of the History of
                                  Computing  . . . . . . . . . . . . . . . 49--49
               F. Farahmand and   
                   F. Farahmand   Privacy Decision Making: The Brain
                                  Approach . . . . . . . . . . . . . . . . 50--58
                      Anonymous   \booktitleIEEE Computer Graphics &
                                  Applications Subscribe . . . . . . . . . 58--58
                      D. Riehle   The Innovations of Open Source . . . . . 59--63
                      Anonymous   IT Professional Call for Articles  . . . 63--63
                 N. Kshetri and   
                        J. Voas   Thoughts on Cyberbullying  . . . . . . . 64--68
                      Anonymous   \booktitleIEEE Persuasive Computing Call
                                  for Articles . . . . . . . . . . . . . . 68--68
               J. C. Havens and   
                     A. Hessami   From Principles and Standards to
                                  Certification  . . . . . . . . . . . . . 69--72
                      Anonymous   Erratum  . . . . . . . . . . . . . . . . 72--72
                      Anonymous   \booktitleIEEE MultiMedia  . . . . . . . 72--72
                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1--C1
                      Anonymous   IEEE World Congress on Services 2019 . . C2--C2
                      Anonymous   \booktitleIEEE Computer Society
                                  information  . . . . . . . . . . . . . . C3--C3
                      Anonymous   COMPSAC 2019 . . . . . . . . . . . . . . C4--C4

Computer
Volume 52, Number 5, May, 2019

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--6
                      Anonymous   IEEE World Congress on Services 2019 . . 6--6
                     E. Neuhold   50 & 25 Years Ago . . . . . . . . . . . . 7--10
                      Anonymous   \booktitleComputer Graphics &
                                  Applications Subscribe . . . . . . . . . 10--10
                    D. A. Grier   A Familiar Vision  . . . . . . . . . . . 11--12
                      Anonymous   \booktitleIEEE Annals of the History of
                                  Computing  . . . . . . . . . . . . . . . 12--12
             V. N. Gudivada and   
                S. Pankanti and   
             G. Seetharaman and   
                       Y. Zhang   Cognitive Computing Systems: Their
                                  Potential and the Future . . . . . . . . 13--18
                      Anonymous   \booktitleIEEE Pervasive Computing Call
                                  for Articles . . . . . . . . . . . . . . 18--18
                      Anonymous   Letters of the Computer Society  . . . . 19--19
               M. V. DeBole and   
                    B. Taba and   
                    A. Amir and   
                 F. Akopyan and   
            A. Andreopoulos and   
                 W. P. Risk and   
                 J. Kusnitz and   
            C. Ortega Otero and   
                T. K. Nayak and   
               R. Appuswamy and   
              P. J. Carlson and   
              A. S. Cassidy and   
                   P. Datta and   
                S. K. Esser and   
              G. J. Garreau and   
              K. L. Holland and   
                  S. Lekuch and   
                  M. Mastro and   
               J. McKinstry and   
                C. di Nolfo and   
              B. Paulovicks and   
                  J. Sawada and   
               K. Schleupen and   
                 B. G. Shaw and   
                J. L. Klamo and   
             M. D. Flickner and   
               J. V. Arthur and   
                    D. S. Modha   TrueNorth: Accelerating From Zero to 64
                                  Million Neurons in 10 Years  . . . . . . 20--29
                 S. D. Pyle and   
                 J. D. Sapp and   
                   R. F. DeMara   Leveraging Stochasticity for In Situ
                                  Learning in Binarized Deep Neural
                                  Networks . . . . . . . . . . . . . . . . 30--39
                      Anonymous   Subscribe to \booktitleSecurity & Privacy
                                  Magazine . . . . . . . . . . . . . . . . 39--39
                   N. Rasiwasia   Perspectives on Becoming an Applied
                                  Machine Learning Scientist . . . . . . . 40--47
                      Z. Ma and   
                      J. Wu and   
                   S. Zhong and   
                   J. Jiang and   
                   S. J. Heinen   Human Eye Movements Reveal Video Frame
                                  Importance . . . . . . . . . . . . . . . 48--57
                S. O. Hwang and   
                     A. Mehmood   Blockchain-Based Resource Syndicate  . . 58--66
                      B. Rinner   Can We Trust Smart Cameras?  . . . . . . 67--70
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . 70--70
                      Anonymous   \booktitleSecurity & Privacy Magazine . . 71--71
                   L. M. Morman   How Do We Prepare the Next Generation
                                  for a Career in Our Digital Era? . . . . 72--74
                      Anonymous   \booktitleIEEE Intelligent Systems
                                  Magazine . . . . . . . . . . . . . . . . 74--74
                      Anonymous   \booktitleIEEE MultiMedia Magazine . . . 74--74
                      Anonymous   \booktitleIEEE Transactions on Big Data  75--75
                      Anonymous   CS Connection  . . . . . . . . . . . . . 76--76
                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1--C1
                      Anonymous   IEEE Computer Society Website Launch . . C2--C2
                      Anonymous   IEEE Computer Society information  . . . C3--C3
                      Anonymous   IEEE Jobs Board  . . . . . . . . . . . . C4--C4

Computer
Volume 52, Number 6, June, 2019

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      J. Vaidya   Advances in Hardware Trojan Detection    4--5
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . 5--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--8
                      Anonymous   \booktitleIEEE Security & Privacy
                                  Magazine Subscribe . . . . . . . . . . . 8--8
                     E. Neuhold   50 & 25 Years Ago . . . . . . . . . . . . 9--11
                      Anonymous   \booktitleIEEE Software Magazine Call
                                  For Articles . . . . . . . . . . . . . . 11--11
                    D. A. Grier   Exploring the Current State of Quantum
                                  Computing  . . . . . . . . . . . . . . . 12--12
               T. S. Humble and   
             E. P. DeBenedictis   Quantum Realism  . . . . . . . . . . . . 13--17
                      Anonymous   \booktitleIEEE Transactions on Big Data  17--17
               R. Shaydulin and   
       H. Ushijima-Mwesigwa and   
             C. F. A. Negre and   
                   I. Safro and   
           S. M. Mniszewski and   
                     Y. Alexeev   A Hybrid Approach for Solving
                                  Optimization Problems on Small Quantum
                                  Computers  . . . . . . . . . . . . . . . 18--26
                   A. Paler and   
                    D. Herr and   
                   S. J. Devitt   Really Small Shoe Boxes: On Realistic
                                  Quantum Resource Estimation  . . . . . . 27--37
                      Anonymous   \booktitleIEEE Pervasive Computing Call
                                  for Articles . . . . . . . . . . . . . . 37--37
              C. C. McGeoch and   
                  R. Harris and   
            S. P. Reinhardt and   
                    P. I. Bunyk   Practical Annealing-Based Quantum
                                  Computing  . . . . . . . . . . . . . . . 38--46
                      S. Hu and   
                     P. Liu and   
                 C. R. Chen and   
                 M. Pistoia and   
                    J. Gambetta   Reduction-Based Problem Mapping for
                                  Quantum Computing  . . . . . . . . . . . 47--57
                     P. Liu and   
                      S. Hu and   
                 M. Pistoia and   
                 C. R. Chen and   
                 J. M. Gambetta   Stochastic Optimization of Quantum
                                  Programs . . . . . . . . . . . . . . . . 58--67
                      Anonymous   \booktitleIEEE IT Professionals Call for
                                  Articles . . . . . . . . . . . . . . . . 67--67
                 G. F. Hurlburt   The Tyranny of Urgency . . . . . . . . . 68--72
                      Anonymous   \booktitleIEEE Computer Graphics &
                                  Applications Magazine  . . . . . . . . . 72--72
                P. Laplante and   
                   S. Applebaum   NIST's 18 Internet of Things Trust
                                  Concerns . . . . . . . . . . . . . . . . 73--76
                      Anonymous   Social Networking  . . . . . . . . . . . 77--77
                    D. Serpanos   There Is No Safety Without Security and
                                  Dependability  . . . . . . . . . . . . . 78--81
                      Anonymous   \booktitleIEEE Annals of the History of
                                  Computing  . . . . . . . . . . . . . . . 81--81
                  M. Ballhausen   Free and Open Source Software Licenses
                                  Explained  . . . . . . . . . . . . . . . 82--86
                      Anonymous   \booktitleIEEE Intelligent Systems
                                  Magazine . . . . . . . . . . . . . . . . 86--86
                      Anonymous   IEEE Jobs Board  . . . . . . . . . . . . 87--87
                      D. Wright   Meeting Industry's Standardization Needs 88--92
                      Anonymous   \booktitleIEEE MultiMedia Magazine . . . 92--92
                      Anonymous   IEEE Letters of the Computer Society . . 93--93
                      Anonymous   CS Connections . . . . . . . . . . . . . 94--96
                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1--C1
                      Anonymous   IEEE World Congress on Services 2019 . . C2--C2
                      Anonymous   IEEE Computer Society information  . . . C3--C3
                      Anonymous   \booktitleSecurity & Privacy Magazine . . C4--C4

Computer
Volume 52, Number 7, July, 2019

                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--6
                     E. Neuhold   50 & 25 Years Ago . . . . . . . . . . . . 7--9
                    D. A. Grier   Transforming the Field . . . . . . . . . 10--11
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . 11--11
                 M. Youssef and   
                      F. Kawsar   Transformative Computing and
                                  Communication  . . . . . . . . . . . . . 12--14
                      Anonymous   \booktitleIEEE Annals of the History of
                                  Computing  . . . . . . . . . . . . . . . 14--14
                      Anonymous   IEEE Computer Society Technical
                                  Consortium on High Performance Computing 15--15
                M. Alloulah and   
                       H. Huang   Future Millimeter-Wave Indoor Systems: A
                                  Blueprint for Joint Communication and
                                  Sensing  . . . . . . . . . . . . . . . . 16--24
                 S. Savazzi and   
                    S. Sigg and   
               F. Vicentini and   
                S. Kianoush and   
                    R. Findling   On the Use of Stray Wireless Signals for
                                  Sensing: a Look Beyond 5G for the Next
                                  Generation of Industry . . . . . . . . . 25--36
                      Anonymous   \booktitleIEEE Software Call for
                                  Articles . . . . . . . . . . . . . . . . 36--36
          M. Satyanarayanan and   
                      N. Davies   Augmenting Cognition Through Edge
                                  Computing  . . . . . . . . . . . . . . . 37--46
                      Anonymous   \booktitleIEEE Multimedia Magazine . . . 46--46
                  L. Moreno and   
                    P. Martinez   The Harmonization of Accessibility
                                  Standards for Public Policies  . . . . . 57--66
                      Anonymous   \booktitleIEEE Transactions on Big Data  66--66
                   G. C. Bowker   The Computerization Time Crunch  . . . . 67--71
                      Anonymous   \booktitleIEEE Security & Privacy
                                  Subscription . . . . . . . . . . . . . . 71--71
                 M. T. Khan and   
                      H. Shrobe   Security of Cyberphysical Systems:
                                  Chaining Induction and Deduction . . . . 72--75
                 J. D. Roth and   
               C. E. Lutton and   
                  J. B. Michael   Security Through Simplicity: a Case
                                  Study in Logical Segmentation Inference  76--79
                      Anonymous   CS Connections . . . . . . . . . . . . . 80--83
                      Anonymous   IT Professional Call For Papers  . . . . 83--83
                      Anonymous   IEEE Computer Society information  . . . 84--84
                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1--C1
                      Anonymous   IEEE Computer Society Job Board  . . . . C2--C2
                      Anonymous   IEEE Computer Society Social Networking  C3--C3
                      Anonymous   \booktitleIEEE Computing Edge Magazine   C4--C4

Computer
Volume 52, Number 8, August, 2019

                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1--C1
                      Anonymous   IEEE Job Boards  . . . . . . . . . . . . C2--C2
                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                     K. Mueller   Advances in Visualization Recommender
                                  Systems  . . . . . . . . . . . . . . . . 4--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--8
                     E. Neuhold   50 & 25 Years Ago . . . . . . . . . . . . 9--11
                     E. Akleman   Computing Through Time . . . . . . . . . 10--10
                    D. A. Grier   Go/No Go . . . . . . . . . . . . . . . . 12--13
                      Anonymous   \booktitleIEEE Annals of the History of
                                  Computing  . . . . . . . . . . . . . . . 13--13
                 M. Villari and   
                   M. Fazio and   
                 S. Dustdar and   
                    O. Rana and   
                  D. N. Jha and   
                      R. Ranjan   Osmosis: The Osmotic Computing Platform
                                  for Microelements in the Cloud, Edge,
                                  and Internet of Things . . . . . . . . . 14--26
            H. Silva Borges and   
                  M. T. Valente   How Do Developers Promote Open Source
                                  Projects?  . . . . . . . . . . . . . . . 27--33
                A. Figueroa and   
                    J. Atkinson   Dual-View Learning for Detecting Web
                                  Query Intents  . . . . . . . . . . . . . 34--42
                     H. Kim and   
                  E. A. Lee and   
                     S. Dustdar   Creating a Resilient IoT With Edge
                                  Computing  . . . . . . . . . . . . . . . 43--53
                  G. Mcgraw and   
                  R. Bonett and   
                H. Figueroa and   
                  V. Shepardson   Security Engineering for Machine
                                  Learning . . . . . . . . . . . . . . . . 54--57
                      Anonymous   \booktitleIEEE Multimedia Magazine . . . 57--57
      H. Habibi Gharakheili and   
              A. Sivanathan and   
                   A. Hamza and   
                   V. Sivaraman   Network-Level Security for the Internet
                                  of Things: Opportunities and Challenges  58--62
                      Anonymous   \booktitleIEEE Software Magazine Call
                                  for Articles . . . . . . . . . . . . . . 62--62
                   H. Schoettle   Open Source License Compliance --- Why
                                  and How? . . . . . . . . . . . . . . . . 63--67
                      Anonymous   \booktitleIEEE Computer Graphics
                                  Applications Call for Articles . . . . . 67--67
                     R. Simpson   The IEEE Standards Association Corporate
                                  Program: Engaging Industry in Standards
                                  Development  . . . . . . . . . . . . . . 68--71
                      Anonymous   \booktitleIEEE IT Professionals Call for
                                  Articles . . . . . . . . . . . . . . . . 71--71
                 K. J. Hole and   
                       S. Ahmad   Biologically Driven Artificial
                                  Intelligence . . . . . . . . . . . . . . 72--75
                      Anonymous   \booktitleIEEE Pervasive Computing Call
                                  for Articles . . . . . . . . . . . . . . 75--75
                      Anonymous   \booktitleIEEE Computer Magazine Call
                                  for 2019 Major Awards Nominations  . . . 76--76
                      Anonymous   IEEE Computer Society Election . . . . . 77--90
                      Anonymous   \booktitleIEEE Security & Privacy
                                  Subscribe  . . . . . . . . . . . . . . . 90--90
                      Anonymous   IEEE Division VIII Delegate/Director
                                  Candidates . . . . . . . . . . . . . . . 91--92
                      Anonymous   IEEE President-Elect Candidates Address
                                  Computer Society Concerns  . . . . . . . 93--96
                      Anonymous   IEEE Computer Society Information  . . . C3--C3
                      Anonymous   \booktitleIEEE Computing Edge Subscribe  C4--C4

Computer
Volume 52, Number 9, September, 2019

                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1--C1
                      Anonymous   \booktitleComputer Call for Special
                                  Issue Proposals  . . . . . . . . . . . . C2--C2
                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                  Q. Fettes and   
                   M. Clark and   
                 R. Bunescu and   
                 A. Karanth and   
                       A. Louri   Dynamic Voltage and Frequency Scaling in
                                  NoCs With Supervised and Reinforcement
                                  Learning Techniques  . . . . . . . . . . 4--5
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 6--8
                      Anonymous   \booktitleIEEE Multimedia Magazine . . . 8--8
                     E. Neuhold   50 & 25 Years Ago . . . . . . . . . . . . 9--11
                    D. A. Grier   Translational Computing: What Needs the
                                  Translation? . . . . . . . . . . . . . . 12--14
                      Anonymous   2019 IEEE Computer Society Election  . . 14--14
                      Anonymous   Richard E. Merwin Award  . . . . . . . . 15--15
                D. Abramson and   
                    M. Parashar   Translational Research in Computer
                                  Science  . . . . . . . . . . . . . . . . 16--23
                      Anonymous   \booktitleIEEE IT Professional Call For
                                  Papers . . . . . . . . . . . . . . . . . 23--23
                    R. Kuhn and   
                    J. Voas and   
                    P. Laplante   Taking Score on the Success of
                                  Blockchain, So Far . . . . . . . . . . . 24--34
                      Anonymous   \booktitleIEEE Pervasive Computing Call
                                  for Articles . . . . . . . . . . . . . . 34--34
                A. Zamansky and   
          D. van der Linden and   
                   I. Hadar and   
               S. Bleuer-Elsner   Log My Dog: Perceived Impact of Dog
                                  Activity Tracking  . . . . . . . . . . . 35--43
                      Anonymous   \booktitleIEEE Transactions on Big Data  43--43
                   M. Salisbury   When Computers Advise Us: How to
                                  Represent the Types of Knowledge Users
                                  Seek for Expert Advice . . . . . . . . . 44--51
                      Anonymous   2019 IEEE Computer Society Election  . . 51--51
                   P. Hukal and   
                 N. Berente and   
              M. Germonprez and   
                    A. Schecter   Bots Coordinating Work in Open Source
                                  Software Projects  . . . . . . . . . . . 52--60
                   C. Huang and   
                    T. Wang and   
                         C. Lin   Early Results on the Business Value of
                                  Internet of Things Initiatives . . . . . 61--67
                B. Varghese and   
                 P. Leitner and   
                     S. Ray and   
                   K. Chard and   
                  A. Barker and   
                Y. Elkhatib and   
                   H. Herry and   
                    C. Hong and   
                  J. Singer and   
                  F. P. Tso and   
                  E. Yoneki and   
                       M. Zhani   Cloud Futurology . . . . . . . . . . . . 68--77
            A. P. Fournaris and   
                A. S. Lalos and   
                    D. Serpanos   Generative Adversarial Networks in
                                  AI-Enabled Safety-Critical Systems:
                                  Friend or Foe? . . . . . . . . . . . . . 78--81
              R. Bloomfield and   
                  H. Khlaaf and   
              P. Ryan Conmy and   
                    G. Fletcher   Disruptive Innovations and Disruptive
                                  Assurance: Assuring Machine Learning and
                                  Autonomy . . . . . . . . . . . . . . . . 82--89
                      Anonymous   IEEE Social Networking . . . . . . . . . 90--90
                      Anonymous   CS Connection  . . . . . . . . . . . . . 91--92
                      Anonymous   IEEE Computer Society  . . . . . . . . . C3--C3
                      Anonymous   IEEE Jobs Board  . . . . . . . . . . . . C4--C4

Computer
Volume 52, Number 10, October, 2019

                      Anonymous   [Front cover]  . . . . . . . . . . . . . C1--C1
                      Anonymous   \booktitleIEEE Computer Architecture
                                  Letters  . . . . . . . . . . . . . . . . C2--C2
                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 4--6
                   P. Montuschi   New and Emerging Topics in Computing . . 7--8
                      Anonymous   \booktitleIEEE Intelligent Systems . . . 8--8
                      Anonymous   50 25 Years Ago  . . . . . . . . . . . . 9--11
                     E. Akleman   Computing Through Time . . . . . . . . . 11--11
                    D. A. Grier   A Good Party . . . . . . . . . . . . . . 12--13
                  S. D. Crocker   The Arpanet and Its Impact on the State
                                  of Networking  . . . . . . . . . . . . . 14--23
                      Anonymous   \booktitleIEEE Computer Graphics
                                  Applications . . . . . . . . . . . . . . 23--23
                     P. Stimers   The U.S. National Quantum Initiative . . 24--29
                      Y. Lu and   
        G. K. Thiruvathukal and   
                A. S. Kaseb and   
                   K. Gauen and   
                D. Rijhwani and   
                  R. Dailey and   
                   D. Malik and   
                   Y. Huang and   
            S. Aghajanzadeh and   
                      M. M. Guo   See the World Through Network Cameras    30--40
                      Anonymous   IEEE IT Professionals Call for Articles  40--40
                   A. Jukan and   
                  F. Carpio and   
                   X. Masip and   
               A. J. Ferrer and   
                  N. Kemper and   
                  B. U. Stetina   Fog-to-Cloud Computing for Farming:
                                  Low-Cost Technologies, Data Exchange,
                                  and Animal Welfare . . . . . . . . . . . 41--51
                 F. Bertini and   
                S. G. Rizzo and   
                     D. Montesi   Can Information Hiding in Social Media
                                  Posts Represent a Threat?  . . . . . . . 52--60
                      Anonymous   \booktitleIEEE Pervasive Computing Call
                                  for Papers . . . . . . . . . . . . . . . 60--60
                    X. Wang and   
                     W. Sun and   
                      L. Hu and   
                    Y. Zhao and   
                 W. E. Wong and   
                        Z. Chen   Software-Testing Contests: Observations
                                  and Lessons Learned  . . . . . . . . . . 61--69
                      Anonymous   \booktitleIEEE Security & Privacy
                                  Magazine Subscribe . . . . . . . . . . . 69--69
                  T. W. Kim and   
                       S. Mejia   From Artificial Intelligence to
                                  Artificial Wisdom: What Socrates Teaches
                                  Us . . . . . . . . . . . . . . . . . . . 70--74
                      Anonymous   IEEE DataPort  . . . . . . . . . . . . . 75--75
                    A. Vassilev   Can Deep Learning Save Us and Itself
                                  From the Avalanche of Threats in
                                  Cyberspace?  . . . . . . . . . . . . . . 76--82
                      Anonymous   \booktitleComputer Call for Special
                                  Issue Proposals  . . . . . . . . . . . . 83--83
                   P. Zhang and   
                     S. Pan and   
              M. Mirshekari and   
                  J. Fagert and   
                      H. Y. Noh   Structures as Sensors: Indirect Sensing
                                  for Inferring Users and Environments . . 84--88
                      Anonymous   \booktitleIEEE Transactions on Big Data  88--88
                    M. Campbell   Synthetic Data: How AI Is Transitioning
                                  From Data Consumer to Data Producer
                                  \ldots and Why That's Important  . . . . 89--91
                     J. McAffer   Getting Started With Open Source
                                  Governance . . . . . . . . . . . . . . . 92--96
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . 96--96
                 A. E. K. Sobel   A New (?) Educational View of Computing  97--98
                      Anonymous   \booktitleIEEE Software Magazine Call
                                  for Articles . . . . . . . . . . . . . . 98--98
                     H. Berghel   Huawei, BIS, and the IEEE: It's Déj\`a Vu
                                  All Over Again . . . . . . . . . . . . . 99--104
                      Anonymous   IEEE Social Networking . . . . . . . . . 105--105
                    G. Thompson   Ethernet: From Office to Data Center to
                                  IoT  . . . . . . . . . . . . . . . . . . 106--109
                      Anonymous   \booktitleIEEE Annals of the History of
                                  Computing  . . . . . . . . . . . . . . . 109--109
             E. P. DeBenedictis   Powerball and Quantum Supremacy  . . . . 110--112
                      Anonymous   IEEE Computer Society Information  . . . C3--C3
                      Anonymous   IEEE Job Board . . . . . . . . . . . . . C4--C4

Computer
Volume 52, Number 11, November, 2019

                      Anonymous   Front Cover  . . . . . . . . . . . . . . C1--C1
                      Anonymous   IEEE Social Networking . . . . . . . . . C2--C2
                      Anonymous   Table of Contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                      Anonymous   50 25 Years Ago  . . . . . . . . . . . . 4--6
                      Anonymous   \booktitleIEEE Multimedia Magazine . . . 6--6
                    M. Parashar   The Reproducibility Initiative . . . . . 7--8
                      Anonymous   \booktitleIEEE Transactions on Big Data  8--8
                      Anonymous   Elsewhere in the CS  . . . . . . . . . . 9--11
                      Anonymous   \booktitleIEEE Intelligent Systems
                                  Magazine . . . . . . . . . . . . . . . . 11--11
                    D. A. Grier   Toward Healthier Lifestyles  . . . . . . 12--13
                      Anonymous   \booktitleIEEE Security and Privacy
                                  Magazine Subscribe . . . . . . . . . . . 13--13
                   S. Helal and   
                        R. Jain   Digital Health-Active and Healthy Living 14--17
                M. Gadaleta and   
                   M. Rossi and   
                E. J. Topol and   
            S. R. Steinhubl and   
                        G. Quer   On the Effectiveness of Deep
                                  Representation Learning: The Atrial
                                  Fibrillation Case  . . . . . . . . . . . 18--29
                  N. Homdee and   
                    R. Alam and   
                J. A. Hayes and   
                   T. Hamid and   
                    J. Park and   
                   S. Wolfe and   
                   H. Goins and   
                   N. Fyffe and   
                 T. Newbold and   
           T. Smith-Jackson and   
                 A. Bankole and   
             M. S. Anderson and   
                        J. Lach   Agitation Monitoring and Prevention
                                  System for Dementia Caregiver
                                  Empowerment  . . . . . . . . . . . . . . 30--39
                   C. Tseng and   
                     C. Lin and   
                   H. Chang and   
                     C. Liu and   
          B. M. F. Serafico and   
                      L. Wu and   
                     C. Lin and   
                     T. Hsu and   
                   C. Huang and   
                          M. Lo   Cloud-Based Artificial Intelligence
                                  System for Large-Scale Arrhythmia
                                  Screening  . . . . . . . . . . . . . . . 40--51
                  W. C. Chu and   
                    C. Shih and   
                    W. Chou and   
               S. I. Ahamed and   
                      P. Hsiung   Artificial Intelligence of Things in
                                  Sports Science: Weight Training as an
                                  Example  . . . . . . . . . . . . . . . . 52--61
                 O. Pinarer and   
                     A. Ozgovde   Application-Aware Dynamic Energy
                                  Management for Portable Devices  . . . . 62--72
               Y. Shiroishi and   
                K. Uchiyama and   
                      N. Suzuki   Better Actions for Society 5.0: Using AI
                                  for Evidence-Based Policy Making That
                                  Keeps Humans in the Loop . . . . . . . . 73--78
                      Anonymous   \booktitleIEEE Computer Architecture
                                  Letters  . . . . . . . . . . . . . . . . 79--79
                  J. B. Michael   Assessing the Trustworthiness of
                                  Electronic Systems . . . . . . . . . . . 80--83
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . 83--83
                      Anonymous   CS Connection  . . . . . . . . . . . . . 84--84
                      Anonymous   \booktitleIEEE Software Magazine Call
                                  for Articles . . . . . . . . . . . . . . 84--84
                      Anonymous   IEEE Computer Society information  . . . C3--C3
                      Anonymous   IEEE Jobs Board  . . . . . . . . . . . . C4--C4

Computer
Volume 52, Number 12, December, 2019

                      Anonymous   [Front cover]  . . . . . . . . . . . . . C1--C1
                      Anonymous   \booktitleIEEE Transactions on Computers C2--C2
                      Anonymous   Table of contents  . . . . . . . . . . . 1--2
                      Anonymous   Masthead . . . . . . . . . . . . . . . . 3--3
                       C. Metra   The 2019 IEEE Computer Society: Hit
                                  Target on Member Satisfaction and
                                  Technical Excellence . . . . . . . . . . 4--11
                      Anonymous   IEEE Computer Society  . . . . . . . . . 11--11
                      Anonymous   \booktitleComputer Highlights Society
                                  Magazines  . . . . . . . . . . . . . . . 12--14
                      Anonymous   \booktitleIEEE Internet Computing
                                  Magazine . . . . . . . . . . . . . . . . 15--15
                     H. Lei and   
                     C. Qiu and   
                     H. Yao and   
                         S. Guo   When Blockchain-Enabled Internet of
                                  Things Meets Cloud Computing . . . . . . 16--17
                      Anonymous   \booktitleIEEE Software Magazine Call
                                  For Articles . . . . . . . . . . . . . . 17--17
                     E. Neuhold   50 & 25 Years Ago . . . . . . . . . . . . 18--21
                      Anonymous   \booktitleIEEE Multimedia Magazine . . . 19--19
                     E. Akleman   Computing Through Time . . . . . . . . . 20--20
                      Anonymous   \booktitleIEEE Transactions on
                                  Sustainable Computing  . . . . . . . . . 21--21
                      Anonymous   IEEE Computer Society Awards . . . . . . 22--27
                    D. A. Grier   The IEEE Computer Society and the Tools
                                  of the Past  . . . . . . . . . . . . . . 28--30
                      Anonymous   \booktitleIEEE Intelligent Systems
                                  Magazine . . . . . . . . . . . . . . . . 30--30
                   D. Milojicic   Technology Predictions . . . . . . . . . 31--33
              P. Faraboschi and   
            E. Frachtenberg and   
                P. Laplante and   
               K. Mansfield and   
                   D. Milojicic   Technology Predictions: Art, Science,
                                  and Fashion  . . . . . . . . . . . . . . 34--38
                       D. Lange   Cognitive Robotics: Making Robots Sense,
                                  Understand, and Interact . . . . . . . . 39--44
               K. Bresniker and   
             A. Gavrilovska and   
                    J. Holt and   
               D. Milojicic and   
                        T. Tran   Grand Challenge: Applying Artificial
                                  Intelligence and Machine Learning to
                                  Cybersecurity  . . . . . . . . . . . . . 45--52
                E. Frachtenberg   Practical Drone Delivery . . . . . . . . 53--57
                     R. Saracco   Digital Twins: Bridging Physical Space
                                  and Cyberspace . . . . . . . . . . . . . 58--64
                   A. Mendelson   Security and Privacy in the Age of Big
                                  Data and Machine Learning  . . . . . . . 65--70
                    T. Coughlin   Nonvolatile Memory Express: The Link
                                  That Binds Them  . . . . . . . . . . . . 71--79
                        J. Voas   Predictions on Predictions . . . . . . . 80--82
                     A. Hoffman   Moral Hazards in Cyber Vulnerability
                                  Markets  . . . . . . . . . . . . . . . . 83--88
                P. E. Black and   
                       M. Singh   Opaque Wrappers and Patching: Negative
                                  Results  . . . . . . . . . . . . . . . . 89--93
                     A. Pal and   
                        K. Kant   Using Blockchain for Provenance and
                                  Traceability in Internet of
                                  Things-Integrated Food Logistics . . . . 94--98
                    M. Campbell   Smart Edge: The Effects of Shifting the
                                  Center of Data Gravity Out of the Cloud  99--102
                   D. Spinellis   How to Select Open Source Components . . 103--106
                 A. E. K. Sobel   Revisiting Whether Everyone Should Go to
                                  College  . . . . . . . . . . . . . . . . 107--108
                      Anonymous   Erratum  . . . . . . . . . . . . . . . . 108--108
                 David G. Hough   The IEEE Standard 754: One for the
                                  History Books  . . . . . . . . . . . . . 109--112
                      Anonymous   \booktitleIEEE Security Privacy Magazine
                                  Subscribe  . . . . . . . . . . . . . . . 113--113
             E. P. DeBenedictis   Moore's Law: A Hard Act to Follow  . . . 114--117
                      Anonymous   \booktitleIEEE Transactions on Big Data  117--117
                      Anonymous   Shull Voted 2020 IEEE Computer Society
                                  President-Elect  . . . . . . . . . . . . 118--120
                      Anonymous   IEEE Computer Society  . . . . . . . . . C3--C3
                      Anonymous   \booktitleIEEE Social Networking . . . . C4--C4