Last update:
Thu Dec 21 07:14:09 MST 2023
Anonymous Computer Highlights Society Magazines 4--5 James D. Isaak Computer Society 2010: Innovation, Leadership, Community, and Careers . . . 6--8 David Alan Grier Designing the Future . . . . . . . . . . 9--11 Anonymous 32 and 16 Years Ago . . . . . . . . . . 12--13 Sixto Ortiz Jr. Is $3$D Finally Ready for the Web? . . . 14--16 Linda Dailey Paulson New Lithography Approach Promises Powerful Chips . . . . . . . . . . . . . 17--20 Larry Smarr Project GreenLight: Optimizing Cyber-infrastructure for a Carbon-Constrained World . . . . . . . . 22--27 David Lorge Parnas Really Rethinking `Formal Methods' . . . 28--34 Simon Dobson and Roy Sterritt and Paddy Nixon and Mike Hinchey Fulfilling the Vision of Autonomic Computing . . . . . . . . . . . . . . . 35--41 Marco Conti and Mohan Kumar Opportunities in Opportunistic Computing 42--50 Robert P. Schumaker and Hsinchun Chen A Discrete Stock Price Prediction Engine Based on Financial News . . . . . . . . 51--56 Thomas F. Stafford and Robin Poston Online Security Threats and Computer User Intentions . . . . . . . . . . . . 58--64 Bob Ward Computer Society Programs Serve Members 65--69 Bob Ward Call and Calendar . . . . . . . . . . . 70--71 James Hendler Web 3.0: The Dawn of Semantic Search . . 77--80 Mark Woh and Scott Mahlke and Trevor Mudge and Chaitali Chakrabarti Mobile Supercomputers for the Next-Generation Cell Phone . . . . . . . 81--85 Dirk Riehle The Economic Case for Open Source Foundations . . . . . . . . . . . . . . 86--90 Bruce Nordman and Ken Christensen Proxying: The Next Step in Reducing IT Energy Use . . . . . . . . . . . . . . . 91--93
Neville Holmes The Profession . . . . . . . . . . . . . 96, 94--95 David Alan Grier Raising Barns . . . . . . . . . . . . . 7--9 Anonymous 32 and 16 Years Ago . . . . . . . . . . 10--11 Neal Leavitt Will NoSQL Databases Live Up to Their Promise? . . . . . . . . . . . . . . . . 12--14 Linda Dailey Paulson Onboard Cooler Keeps Chips Comfortable 15--18 Awais Rashid and Thomas Cottenier and Phil Greenwood and Ruzanna Chitchyan and Regine Meunier and Roberta Coelho and Mario Sudholt and Wouter Joosen Aspect-Oriented Software Development in Practice: Tales from AOSD--Europe . . . 19--26 Ron Vetter Authentication by Biometric Verification 28--29 Arun Ross Iris Recognition: The Path Forward . . . 30--35 Anil K. Jain and Jianjiang Feng and Karthik Nandakumar Fingerprint Matching . . . . . . . . . . 36--44 Rama Chellappa and Pawan Sinha and P. Jonathon Phillips Face Recognition by Computers and Humans 46--55 Marios Savvides and Karl Ricanek, Jr. and Damon L. Woodard and Gerry Dozier Unconstrained Biometric Identification: Emerging Technologies . . . . . . . . . 56--62 Mikko Siponen and Seppo Pahnila and M. Adam Mahmood Compliance with Information Security Policies: An Empirical Investigation . . 64--71 Anonymous Bookshelf . . . . . . . . . . . . . . . 78 Bob Ward Moore Wins Karlsson Award . . . . . . . 79--84 Anonymous Call and Calendar . . . . . . . . . . . 85--86 Jay Liebowitz Strategic Intelligence, Social Networking, and Knowledge Retention . . 87--89 Patricia O'Hagan and Edward Hanna and Roy Sterritt Addressing the Corrections Crisis with Software Technology . . . . . . . . . . 90--93 Albrecht Schmidt Ubiquitous Computing: Are We There Yet? 95--97 Ann Q. Gates Discovery, Innovation, and Creativity: The Core of Computing . . . . . . . . . 98--100 William W. Agresti The Four Forces Shaping Cybersecurity 101--104
Swen Kiesewetter-Köbinger Programmers' Capital . . . . . . . . . . 108, 106--107 Anonymous Letters to the Editor . . . . . . . . . 6--9 David Alan Grier Someday, You Will Understand . . . . . . 11--13 Anonymous 32 and16 Years Ago . . . . . . . . . . . 14--15 David Geer Is It Really Time for Real-Time Search? 16--19 Linda Dailey Paulson Scientists Develop Camera Made of Fabric 20--22 Angela C. Sodan and Jacob Machina and Arash Deshmeh and Kevin Macnaughton and Bryan Esbaugh Parallelism via Multithreaded and Multicore CPUs . . . . . . . . . . . . . 24--32 Moshe (Maury) Bach and Mark Charney and Robert Cohn and Elena Demikhovsky and Tevi Devor and Kim Hazelwood and Aamer Jaleel and Chi-Keung Luk and Gail Lyons and Harish Patil and Ady Tal Analyzing Parallel Programs with Pin . . 34--41 Roger D. Chamberlain and Mark A. Franklin and Eric J. Tyson and James H. Buckley and Jeremy Buhler and Greg Galloway and Saurabh Gayen and Michael Hall and E. F. Berkley Shands and Naveen Singla Auto-Pipe: Streaming Applications on Architecturally Diverse Systems . . . . 42--49 Davide Pasetto and Fabrizio Petrini and Virat Agarwal Tools for Very Fast Regular Expression Matching . . . . . . . . . . . . . . . . 50--58 Sylvain Hall and Tevfik Bultan and Graham Hughes and Muath Alkhalaf and Roger Villemaire Runtime Verification of Web Service Interface Contracts . . . . . . . . . . 59--66 Suman K. Mandal and Rabi N. Mahapatra and Praveen S. Bhojwani and Saraju P. Mohanty IntellBatt: Toward a Smarter Battery . . 67--71 Bob Ward Computer Society Names Award Recipients 77--80 Bob Ward Call and Calendar . . . . . . . . . . . 81--82 Kirk W. Cameron Trading in Green IT . . . . . . . . . . 83--85 Nicholas Bowen and Jim Spohrer Viewpoint: The Future of Computing Practice and Education . . . . . . . . . 86--89 Wil M. P. van Aalst and Kees M. van Hee and Jan Martijn van Werf and Marc Verdonk Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor . . . . . . . 90--93 Thomas M. Chen and Victoria Wang Web Filtering and Censoring . . . . . . 94--97
Neville Holmes The Digital Climate of English Change 100, 98--99 David Alan Grier Utter Chaos . . . . . . . . . . . . . . 6--9 Anonymous 32 and 16 years ago . . . . . . . . . . 10--11 Steven J. Vaughan-Nichols Will HTML 5 Restandardize the Web? . . . 13--15 Linda Dailey Paulson New Technique Provides Energy Wirelessly 16--19 Nickolas Falkner and Raja Sooriamurthi and Zbigniew Michalewicz Puzzle-Based Learning for Engineering and Computer Science . . . . . . . . . . 20--28 Peter Aiken and Robert M. Stanley and Juanita Billings and Luke Anderson Using Codes of Conduct to Resolve Legal Disputes . . . . . . . . . . . . . . . . 29--34 Arutyun I. Avetisyan and Roy Campbell and Indranil Gupta and Michael T. Heath and Steven Y. Ko and Gregory R. Ganger and Michael A. Kozuch and David O'Hallaron and Marcel Kunze and Thomas T. Kwan and Kevin Lai and Martha Lyons and Dejan S. Milojicic and Hing Yan Lee and Yeng Chai Soh and Ng Kwang Ming and Jing-Yuan Luke and Han Namgoong Open Cirrus: a Global Cloud Computing Testbed . . . . . . . . . . . . . . . . 35--43 Edward Walker and Walter Brisken and Jonathan Romney To Lease or Not to Lease from Storage Clouds . . . . . . . . . . . . . . . . . 44--50 Karthik Kumar and Yung-Hsiang Lu Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? . . 51--56 Victor R. Basili and Mikael Lindvall and Myrna Regardie and Carolyn Seaman and Jens Heidrich and Jürgen Münch and Dieter Rombach and Adam Trendowicz Linking Software Development and Business Strategy Through Measurement 57--65 Bob Ward Ken Birman Wins Kanai Award . . . . . . 66--68 Rajesh P. N. Rao Probabilistic Analysis of an Ancient Undeciphered Script . . . . . . . . . . 76--80 Karin Breitman and Markus Endler and Rafael Pereira and Marcello Azambuja When TV Dies, Will It Go to the Cloud? 81--83 Leah Buechley Questioning Invisibility . . . . . . . . 84--86 Jim Vallino Cutting Across the Disciplines . . . . . 87--89 James Bret Michael and John F. Sarkesain and Thomas C. Wingfield and Georgios Dementis and Gonzalo Nuno Baptista Sousa Integrating Legal and Policy Factors in Cyberpreparedness . . . . . . . . . . . 90--92 Anonymous Bookshelf . . . . . . . . . . . . . . . 93
Kai A. Olsen Computing a Better World . . . . . . . . 96, 94--95 David Alan Grier The Age of Accountability . . . . . . . 6--8 Anonymous 32 and 16 Years Ago . . . . . . . . . . 10--11 George Lawton Fighting Intrusions into Wireless Networks . . . . . . . . . . . . . . . . 12--15 Linda Dailey Paulson Libraries Face the Challenge of Archiving Digital Material . . . . . . . 16--19 Yun Wan and Gang Peng What's Next for Shopbots? . . . . . . . 20--26 Lorcan Coyle and Mike Hinchey and Bashar Nuseibeh and José Luiz Fiadeiro Guest Editors' Introduction: Evolving Critical Systems . . . . . . . . . . . . 28--33 Gabor Karsai and Fabio Massacci and Leon Osterweil and Ina Schieferdecker Evolving Embedded Systems . . . . . . . 34--40 Tom Mens and Jeff Magee and Bernhard Rumpe Evolving Software Architecture Descriptions of Critical Systems . . . . 42--48 Mass Soldal Lund and Bjòrnar Solhaug and Ketil Stòlen Evolution in Relation to Risk and Trust Management . . . . . . . . . . . . . . . 49--55 Bernard Cohen and Philip Boxer Why Critical Systems Need Help to Evolve 56--63 William Robinson A Roadmap for Comprehensive Requirements Modeling . . . . . . . . . . . . . . . . 64--72 Anonymous Bookshelf . . . . . . . . . . . . . . . 73 Bob Ward Bertrand Meyer Receives 2010 Mills Award 77--79 Kirk W. Cameron The Challenges of Energy-Proportional Computing . . . . . . . . . . . . . . . 82--83 Yoshiaki Kushiki The Future of Embedded Software: Adapting to Drastic Change . . . . . . . 84--86 Vishnu Vinekar and Christopher L. Huntley Agility versus Maturity: Is There Really a Trade-Off? . . . . . . . . . . . . . . 87--89 David De Roure e-Science and the Web . . . . . . . . . 90--93 Neville Holmes The Rise and Rise of Digital Gluttony 96, 94--95
Anonymous Computer Highlights Society Magazines 4--5 David Alan Grier The Value of a Good Name . . . . . . . . 7--9 Anonymous 32 and 16 Years Ago . . . . . . . . . . 10--11 David Geer Are Companies Actually Using Secure Development Life Cycles? . . . . . . . . 12--16 Linda Dailey Paulson Steganography Development Offers Promise 18--21 Oliver Bimber Capturing the World . . . . . . . . . . 22--23 Franz Leberl and Horst Bischof and Thomas Pock and Arnold Irschara and Stefan Kluckner Aerial Computer Vision for a $3$D Virtual Habitat . . . . . . . . . . . . 24--31 Dragomir Anguelov and Carole Dulong and Daniel Filip and Christian Frueh and Stéphane Lafon and Richard Lyon and Abhijit Ogale and Luc Vincent and Josh Weaver Google Street View: Capturing the World at Street Level . . . . . . . . . . . . 32--38 Sameer Agarwal and Yasutaka Furukawa and Noah Snavely and Brian Curless and Steven M. Seitz and Richard Szeliski Reconstructing Rome . . . . . . . . . . 40--47 Michael Goesele and Jens Ackermann and Simon Fuhrmann and Ronny Klowsky and Fabian Langguth and Patrick Mücke and Martin Ritz Scene Reconstruction from Community Photo Collections . . . . . . . . . . . 48--53 Jaak Tepandi and Ilja T\vsahhirov and Stanislav Vassiljev Wireless PKI Security and Mobile Voting 54--60 Anita Sarma and David Redmiles and André van der Hoek Categorizing the Spectrum of Coordination Technology . . . . . . . . 61--67 Bob Ward Computer Society Announces Award Winners 72--73 Cees G. M. Snoek and Arnold W. M. Smeulders Visual-Concept Search Solved? . . . . . 76--78 D. Richard Kuhn and Edward J. Coyne and Timothy R. Weil Adding Attributes to Role-Based Access Control . . . . . . . . . . . . . . . . 79--81 Lecia Barker and Joanne McGrath Cohoon and Lucy Sanders Strategy Trumps Money: Recruiting Undergraduate Women into Computing . . . 82--85 Chris Harrison Appropriated Interaction Surfaces . . . 86--89 Tiziana Margaria and Bernhard Steffen Simplicity as a Driver for Agile Innovation . . . . . . . . . . . . . . . 90--92 Anne-F. Rutkowski and Carol S. Saunders Growing Pains with Information Overload 96, 94--95
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier The Spirit of Combination . . . . . . . 6--9 Anonymous 32 and 16 Years Ago . . . . . . . . . . 10--11 Sixto Ortiz Jr. Taking Business Intelligence to the Masses . . . . . . . . . . . . . . . . . 12--15 Linda Dailey Paulson New Approach Combines TV and Social Networking . . . . . . . . . . . . . . . 16--19 Mari Carmen Domingo Managing Healthcare through Social Networks . . . . . . . . . . . . . . . . 20--25 Brigitte Piniewski and Johan Muskens and Leonardo Estevez and Randy Carroll and Rick Cnossen Empowering Healthcare Patients with Smart Technology . . . . . . . . . . . . 27--34 Jatinder R. Palta and Vincent A. Frouhar and Robert A. Zlotecki Leveraging Pervasive Technologies to Improve Collection of Prostate Cancer Outcome Data . . . . . . . . . . . . . . 35--42 Mark Weitzel and Andy Smith and Scott de Deugd and Robert Yates A Web 2.0 Model for Patient-Centered Health Informatics Applications . . . . 43--50 Kenneth Fleischmann and William Wallace Value Conflicts in Computational Modeling . . . . . . . . . . . . . . . . 57--63 Eduardo Huedo and Ruben Montero and Ignacio Llorente Grid Architecture from a Metascheduling Perspective . . . . . . . . . . . . . . 51--56 Anonymous Bookshelf . . . . . . . . . . . . . . . 75 John Carter and Karthick Rajamani Designing Energy-Efficient Servers and Data Centers . . . . . . . . . . . . . . 76--78 Art Gowan and Han Reichgelt Emergence of the Information Technology Discipline . . . . . . . . . . . . . . . 79--81 Daniel Schall and Schahram Dustdar and M. Brian Blake Programming Human and Software-Based Web Services . . . . . . . . . . . . . . . . 82--85 Neville Holmes The Future of the Computing Profession 88, 86--87
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier Mental Discipline . . . . . . . . . . . 6--8 Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10 Neal Leavitt Researchers Fight to Keep Implanted Medical Devices Safe from Hackers . . . 11--14 Linda Dailey Paulson Project Converts Arms and Hands into Input Devices . . . . . . . . . . . . . 15--18 Jacek Izydorczyk and Michal Izydorczyk Microprocessor Scaling: What Limits Will Hold? . . . . . . . . . . . . . . . . . 20--26 Yonghong Tian and Jaideep Srivastava and Tiejun Huang and Noshir Contractor Social Multimedia Computing . . . . . . 27--36 Moo Nam Ko and Gorrell P. Cheek and Mohamed Shehab and Ravi Sandhu Social-Networks Connect Services . . . . 37--43 Fei-Yue Wang and Daniel Zeng and James A. Hendler and Qingpeng Zhang and Zhuo Feng and Yanqing Gao and Hui Wang and Guanpi Lai A Study of the Human Flesh Search Engine: Crowd-Powered Expansion of Online Knowledge . . . . . . . . . . . . 45--53 Henri E. Bal and Jason Maassen and Rob V. van Nieuwpoort and Niels Drost and Roelof Kemp and Nick Palmer and Thilo Kielmann and Frank Seinstra and Ceriel Jacobs Real-World Distributed Computer with Ibis . . . . . . . . . . . . . . . . . . 54--62 Simon Portegies Zwart and Derek Groen and Tomoaki Ishiyama and Keigo Nitadori and Junichiro Makino and Cees de Laat and Steve McMillan and Kei Hiraki and Stefan Harfst and Paola Grosso Simulating the Universe on an Intercontinental Grid . . . . . . . . . 63--70 Anonymous IEEE Computer Society Election . . . . . 71--78 Anonymous IEEE President-Elect Candidates Address Computer Society Concerns . . . . . . . 79--83 Anonymous Bookshelf . . . . . . . . . . . . . . . 90 James Bret Michael and Eneken Tikk and Peter Wahlgren and Thomas C. Wingfield From Chaos to Collective Defense . . . . 91--94 S. S. Iyengar and Supratik Mukhopadhyay and Christopher Steinmuller and Xin Li Preventing Future Oil Spills with Software-Based Event Detection . . . . . 95--97 Stephen T. Frezza Computer Science: Is It Really the Scientific Foundation for Software Engineering? . . . . . . . . . . . . . . 98--101 James C. Spohrer IBM's University Programs . . . . . . . 102--104 Steve Hodges and Nicolas Villar The Hardware Is Not a Given . . . . . . 106--109 Anthony Cleve and Tom Mens and Jean-Luc Hainaut Data-Intensive System Evolution . . . . 110--112 Noel Sharkey and Marc Goodman and Nick Ross The Coming Robot Crime Wave . . . . . . 116, 114--115
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier Finding What You Want . . . . . . . . . 8--10 Anonymous 32 and 16 Years Ago . . . . . . . . . . 11--12 David Geer Whatever Happened to Network-Access-Control Technology? . . . 13--16 Linda Dailey Paulson New Service Promises to Improve Online Search . . . . . . . . . . . . . . . . . 17--20 Nancy R. Mead and Joe Jarzombek Advancing Software Assurance with Public-Private Collaboration . . . . . . 21--30 Frederick T. Sheldon and Claire Vishik Moving Toward Trustworthy Systems: R&D Essentials . . . . . . . . . . . . . . . 31--40 Samuel T. Redwine, Jr. Fitting Software Assurance into Higher Education . . . . . . . . . . . . . . . 41--46 Ann E. K. Sobel and Gary McGraw Interview: Software Security in the Real World . . . . . . . . . . . . . . . . . 47--53 Wei Tan and Jia Zhang and Ian Foster Network Analysis of Scientific Workflows: a Gateway to Reuse . . . . . 54--61 Todd Mytkowicz and Amer Diwan and Matthias Hauswirth and Peter Sweeney The Effect of Omitted-Variable Bias on the Evaluation of Compiler Optimizations 62--67 Bob Ward Society Honors Five Top Computing Professionals . . . . . . . . . . . . . 74--76 Bob Ward Call and Calendar . . . . . . . . . . . 77--78 George P. Schell IT Value: From Moore's Law to a Flat World . . . . . . . . . . . . . . . . . 79--81 Ron Kohavi and Roger Longbotham and Toby Walker Online Experiments: Practical Lessons 82--85 Kirk W. Cameron A Tale of Two Green Lists . . . . . . . 86--88 Neville Holmes Seven Digital Steps to Avoid Utter Hell 92, 90--91
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous Letters . . . . . . . . . . . . . . . . 6 Anonymous In Memoriam: Scott Hamilton . . . . . . 7 David Alan Grier The Curious and the Confident . . . . . 8--10 Anonymous 32 and 16 Years Ago . . . . . . . . . . 11--12 Neal Leavitt Network-Usage Changes Push Internet Traffic to the Edge . . . . . . . . . . 13--15 Linda Dailey Paulson How Safe Are Secure Websites? . . . . . 17--20 Sergio Toral Marin and Maria del Rocio Martinez-Torres and Federico Barrero Reforming ICT Graduate Programs to Meet Professional Needs . . . . . . . . . . . 22--29 Jarrod A. Roy and Farinaz Koushanfar and Igor L. Markov Ending Piracy of Integrated Circuits . . 30--38 Ramesh Karri and Jeyavijayan Rajendran and Kurt Rosenfeld and Mohammad Tehranipoor Trustworthy Hardware: Identifying and Classifying Hardware Trojans . . . . . . 39--46 Nir Kshetri Cloud Computing in Developing Economies 47--55 Juan Hamers and Lieven Eeckhout Scenario-Based Resource Prediction for QoS-Aware Media Processing . . . . . . . 56--63 Bob Ward Society Forms New Technical Committee on Semantic Computing . . . . . . . . . . . 64--65 Anonymous Bookshelf . . . . . . . . . . . . . . . 76--76 Naren Ramakrishnan and David Hanauer and Benjamin Keller Mining Electronic Health Records . . . . 77--81 Richard J. LeBlanc What Should All CS Graduates Know? . . . 82--84 Keith W. Miller and Jeffrey Voas and Phil Laplante In Trust We Trust . . . . . . . . . . . 85--87 Manfred Broy and Ralf Reussner Architectural Concepts in Programming Languages . . . . . . . . . . . . . . . 88--91 Paul Lukowicz and Oliver Amft and Daniel Roggen and Jingyuan Cheng On-Body Sensing: From Gesture-Based Input to Activity-Driven Interaction . . 92--96 Neville Holmes The Future of the Computing Profession: Readers' E-mails . . . . . . . . . . . . 100, 98--99
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier Sabotage! . . . . . . . . . . . . . . . 6--8 Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10 Steven J. Vaughan-Nichols Gigabit Wi-Fi Is on Its Way . . . . . . 11--14 Anonymous Worm Targets Industrial-Plant Operations 15--18 Peter Pirolli and Jenny Preece and Ben Shneiderman Cyberinfrastructure for Social Action on National Priorities . . . . . . . . . . 20--21 Robert Kraut and Mary Lou Maher and Judith Olson and Thomas W. Malone and Peter Pirolli and John C. Thomas Scientific Foundations: a Case for Technology-Mediated Social-Participation Theory . . . . . . . . . . . . . . . . . 22--28 Ed H. Chi and Sean Munson and Gerhard Fischer and Sarah Vieweg and Cynthia Parr Advancing the Design of Technology-Mediated Social Participation Systems . . . . . . . . . . . . . . . . 29--35 Gary Olson and Gloria Mark and Elizabeth Churchill and Dana Rotman New Missions for a Sociotechnical Infrastructure . . . . . . . . . . . . . 37--43 Bradford W. Hesse and Derek Hansen and Thomas Finholt and Sean Munson and Wendy Kellogg and John C. Thomas Social Participation in Health 2.0 . . . 45--52 John Carlo Bertot and Paul T. Jaeger and Sean Munson and Tom Glaisyer Social Media Technology and Government Transparency . . . . . . . . . . . . . . 53--59 Cliff Lampe and Paul Resnick and Andrea Forte and Sarita Yardi and Dana Rotman and Todd Marshall and Wayne Lutters Educational Priorities for Technology-Mediated Social Participation 60--67 Bob Ward Blue Gene Architect Gara Receives 2010 Cray Award . . . . . . . . . . . . . . . 78--80 Anonymous Call and Calendar . . . . . . . . . . . 81--82 Anonymous Bookshelf . . . . . . . . . . . . . . . 83 Timo Hannay What Can the Web Do for Science? . . . . 84--87 Prith Banerjee and Rich Friedrich and Lueny Morell Open Innovation at HP Labs . . . . . . . 88--90 Karthikeyan Umapathy and Sandeep Purao Systems Integration and Web Services . . 91--94 Kirk W. Cameron Green with Envy . . . . . . . . . . . . 95--96 Neville Holmes Some Social Aspects of Computers and Numbers . . . . . . . . . . . . . . . . 100, 98--99
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous Letters to the Editor . . . . . . . . . 6--8 Carl K. Chang It Has Been a Long Journey --- From the Heart of a Loyal Computer Society Volunteer . . . . . . . . . . . . . . . 9--10 James D. Isaak 2010 to 2020 --- Looking Forward . . . . 11--13 David A. Grier Investing in Ignorance . . . . . . . . . 14--16 Anonymous 32 and 16 Years Ago . . . . . . . . . . 17--18 Neal Leavitt Payment Applications Make E-Commerce Mobile . . . . . . . . . . . . . . . . . 19--22 Linda Dailey Paulson Energy-Saving PCs Work while Sleeping 23--26 Tiejun Huang and Yonghong Tian and Wen Gao and Jian Lu Mediaprinting: Identifying Multimedia Content for Digital Rights Management 28--35 Chaiyakorn Yingsaeree and Giuseppe Nuti and Philip Treleaven Computational Finance . . . . . . . . . 36--43 Badrish Chandramouli and Mohamed Ali and Jonathan Goldstein and Beysim Sezgin and Balan Sethu Raman Data Stream Management Systems for Computational Finance . . . . . . . . . 45--52 Brad Spiers and Denis Wallez High-Performance Computing on Wall Street . . . . . . . . . . . . . . . . . 53--59 Antonio Coronato and Giuseppe De Pietro Formal Design of Ambient Intelligence Applications . . . . . . . . . . . . . . 60--68 Anonymous Bookshelf . . . . . . . . . . . . . . . 85 Evan M. Peck and Erin Treacy Solovey and Krysta Chauncey and Angelo Sassaroli and Sergio Fantini and Robert J. K. Jacob and Audrey Girouard and Leanne M. Hirshfield Your Brain, Your Computer, and You . . . 86--89 George Hurlburt and Jeffrey Voas and Keith Miller and Phil Laplante and Bret Michael A Nonlinear Perspective on Higher Education . . . . . . . . . . . . . . . 90--92 Emil Vassev and Mike Hinchey The Challenge of Developing Autonomic Systems . . . . . . . . . . . . . . . . 93--96
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Sorel Reisman Planning for an Inevitable Future . . . 6--8 Ron Vetter Print, Mobile, and Online . . . . . . . 9--11 David Alan Grier The Migration to the Middle . . . . . . 12--14 Anonymous 32 and 16 Years Ago . . . . . . . . . . 15--16 George Lawton $3$D Displays without Glasses: Coming to a Screen near You . . . . . . . . . . . 17--19 Linda Dailey Paulson Scanning the Future with New Barcodes 20--23 Geetha Thiagarajan and Venkatesh Sarangan and Ramasubramanian Suriyanarayanan and Pragathichitra Sethuraman and Anand Sivasubramaniam and Avinash Yegyanarayanan Automating a Building's Carbon Management . . . . . . . . . . . . . . . 24--30 Samuel H. Fuller and Lynette I. Millett Computing Performance: Game Over or Next Level? . . . . . . . . . . . . . . . . . 31--38 Parthasarathy Ranganathan From Microprocessors to Nanostores: Rethinking Data-Centric Systems . . . . 39--48 Daniel S. Stevenson and Robert O. Conn Bridging the Interconnection Density Gap for Exascale Computation . . . . . . . . 49--57 Roy Sterritt Apoptotic Computing: Programmed Death by Default for Computer-Based Systems . . . 59--65 Anna Squicciarini and Sathya Dev Rajasekaran and Marco Casassa Mont Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks . . . . . . . . . . . . 66--73 Anonymous Bookshelf . . . . . . . . . . . . . . . 81 Anonymous Computer Society Winner Nets \$50,000 Prize . . . . . . . . . . . . . . . . . 82--84 Anonymous Call and Calendar . . . . . . . . . . . 85--86 Bill Tomlinson and M. Six Silberman and Jim White Can More Efficient IT Be Worse for the Environment? . . . . . . . . . . . . . . 87--89 Neil Ferguson Achieving Synergy in the Industry-Academia Relationship . . . . . 90--92 John Riedl The Promise and Peril of Social Computing . . . . . . . . . . . . . . . 93--95 Karl Ricanek, Jr. Dissecting the Human Identity . . . . . 96--97 Neville Holmes Computers and Their Users . . . . . . . 100, 98--99
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier A Very Bad Idea . . . . . . . . . . . . 6--8 Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10 Sixto Ortiz Jr. Is Peer-to-Peer on the Decline? . . . . 11--13 Linda Dailey Paulson IBM Project Proposes Using Light to Make Chips Faster . . . . . . . . . . . . . . 14--17 Vivek Menon and Shamik Das and Bharat Jayaraman and Venu Govindaraju Transitioning from Microelectronics to Nanoelectronics . . . . . . . . . . . . 18--19 Greg Snider and Rick Amerson and Dick Carter and Hisham Abdalla and Muhammad Shakeel Qureshi and Jasmin Leveille and Massimiliano Versace and Heather Ames and Sean Patrick and Benjamin Chandler and Anatoli Gorchetchnikov and Ennio Mingolla From Synapses to Circuitry: Using Memristive Memory to Explore the Electronic Brain . . . . . . . . . . . . 21--28 Daniel Schinke and Neil Di Spigna and Mihir Shiveshwarkar and Paul Franzon Computing with Novel Floating-Gate Devices . . . . . . . . . . . . . . . . 29--36 Andre DeHon and Benjamin Gojman Crystals and Snowflakes: Building Computation from Nanowire Crossbars . . 37--45 Wenjing Rao and Chengmo Yang and Ramesh Karri and Alex Orailoglu Toward Future Systems with Nanoscale Devices: Overcoming the Reliability Challenge . . . . . . . . . . . . . . . 46--53 Jeff Yan and Ahmad Salah El Ahmad Captcha Robustness: a Security Engineering Perspective . . . . . . . . 54--60 Richard Welke and Rudy Hirschheim and Andrew Schwarz Service-Oriented Architecture Maturity 61--67 Bob Ward Tom Williams Wins TTTC Award . . . . . . 74--76 Phil Laplante and George Hurlburt and Keith Miller and Jeffrey Voas Certainty through Uncertainty? . . . . . 79--81 Ina Schaefer and Reiner Hahnle Formal Methods in Software Product Line Engineering . . . . . . . . . . . . . . 82--85 Albrecht Schmidt and Marc Langheinrich and Kritian Kersting Perception beyond the Here and Now . . . 86--88 Ann E. K. Sobel Academic Misconduct in the Early 21st Century . . . . . . . . . . . . . . . . 89--90 Kelvin Sung Recent Videogame Console Technologies 91--93 Robert Fabian Computing Professionals . . . . . . . . 96, 94--95
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous Letters to the Editor . . . . . . . . . 6 David Alan Grier The Voice of Wisdom . . . . . . . . . . 8--10 Anonymous 32 and 16 Years Ago . . . . . . . . . . 11--12 George Lawton 4G: Engineering versus Marketing . . . . 14--16 Linda Dailey Paulson Accessing the Internet via Overhead Lights . . . . . . . . . . . . . . . . . 18--21 Savitha Srinivasan and Vladimir Getov Navigating the Cloud Computing Landscape --- Technologies, Services, and Adopters 22--23 Balakrishna Narasimhan and Ryan Nichols State of Cloud Applications and Platforms: The Cloud Adopters' View . . 24--28 Yousef Khalidi Building a Cloud Computing Platform for New Possibilities . . . . . . . . . . . 29--34 Prith Banerjee and Richard Friedrich and Cullen Bash and Patrick Goldsack and Bernardo Huberman and John Manley and Chandrakant Patel and Parthasarathy Ranganathan and Alistair Veitch Everything as a Service: Powering the New Information Economy . . . . . . . . 36--43 Benny Rochwerger and David Breitgand and Amir Epstein and David Hadas and Irit Loy and Kenneth Nagin and Johan Tordsson and Carmelo Ragusa and Massimo Villari and Stuart Clayman and Eliezer Levy and Alessandro Maraschini and Philippe Massonet and Henar Munoz and Giovanni Toffetti Reservoir --- When One Cloud Is Not Enough . . . . . . . . . . . . . . . . . 44--51 Eric Olden Architecting a Cloud-Scale Identity Fabric . . . . . . . . . . . . . . . . . 52--59 Robin Vasan A Venture Perspective on Cloud Computing 60--62 Orathai Sukwong and Hyong Kim and James Hoe Commercial Antivirus Software Effectiveness: An Empirical Study . . . 63--70 Bob Ward Chen, Hescott Win Society Education Awards . . . . . . . . . . . . . . . . . 71--73 Anonymous Bookshelf . . . . . . . . . . . . . . . 83 P. Jonathon Phillips Improving Face Recognition Technology 84--86 Shyong (Tony) K. Lam and John Riedl The Past, Present, and Future of Wikipedia . . . . . . . . . . . . . . . 87--90 Kirk W. Cameron Computing's Role in Resource Accounting 91--92 Peter J. Denning and Neville Holmes Computer Science: An Interview . . . . . 96, 94--95
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous Letters to the Editor . . . . . . . . . 6--7 David Alan Grier and Erin Dian Dumbacher Where Are You From? . . . . . . . . . . 8--10 Anonymous 32 and 16 Years Ago . . . . . . . . . . 11--12 Sixto Ortiz Jr. Chipmakers ARM for Battle in Traditional Computing Market . . . . . . . . . . . . 14--17 Linda Dailey Paulson Some Users Find the Speed of Light Too Slow for Their Networks . . . . . . . . 18--21 Sasu Tarkoma and Eemil Lagerspetz Arching over the Mobile Computing Chasm: Platforms and Runtimes . . . . . . . . . 22--28 Steven Fontana Technology Development as an Alternative to Traditional Technology Transfer Models . . . . . . . . . . . . . . . . . 30--36 Thomas Miller III and Stephen Walsh and Seth Hollar and Elaine Rideout and Beryl Pittman Engineering and Innovation: An Immersive Start-up Experience . . . . . . . . . . 38--46 Ann Gates and Rodrigo Romero and Miguel Alonso, Jr. and Fanny Klett and J. Fernando Naveda and Dina Requena Cultivating Entrepreneurial Thinking through IEEE-CS Student Chapters . . . . 48--55 Alberto Savoia and Patrick Copeland Entrepreneurial Innovation at Google . . 56--61 Toby Myers and R. Geoff Dromey and Peter Fritzson Comodeling: From Requirements to an Integrated Software/Hardware Model . . . 62--70 Bob Ward Akyildiz Wins W. Wallace McDowell Award 71--73 Antonio Kruger and Johannes Schoning and Patrick Olivier How Computing Will Change the Face of Retail . . . . . . . . . . . . . . . . . 84--87 Hans Vandierendonck and Tom Mens Averting the Next Software Crisis . . . 88--90 Thomas M. Chen and Saeed Abu-Nimeh Lessons from Stuxnet . . . . . . . . . . 91--93 Tommer Leyvand and Casey Meekhof and Yi-Chen Wei and Jian Sun and Baining Guo Kinect Identity: Technology and Experience . . . . . . . . . . . . . . . 94--96 James J. Sluss, Jr. Engineering Education Activities in Electric Energy Systems . . . . . . . . 97--98 Jieping Ye and Teresa Wu and Jing Li and Kewei Chen Machine Learning Approaches for the Neuroimaging Study of Alzheimer's Disease . . . . . . . . . . . . . . . . 99--101 Dejan Milojicic and Rich Wolski Eucalyptus: Delivering a Private Cloud 102--104 Chris Morris and Kai A. Olsen Democracy and Technology . . . . . . . . 108, 106--107
Bob Ward \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier Not for All Markets . . . . . . . . . . 6--8 Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10 Linda World Forecasting in Geologic Time: The Tohoku Quake and Tsunami . . . . . . . . . . . 11--13 Anonymous Flying Robots Designed to Form Emergency Network . . . . . . . . . . . . . . . . 14--16 Lourdes Moreno and Paloma Martinez and Belen Ruiz and Ana Iglesias Toward an Equal Opportunity Web: Applications, Standards, and Tools that Increase Accessibility . . . . . . . . . 18--26 Bill N. Schilit Mobile Computing: Looking to the Future 28--29 Tommi Mikkonen and Antero Taivalsaari Reports of the Web's Death Are Greatly Exaggerated . . . . . . . . . . . . . . 30--36 Anna Spagnolli and Nicola Corradi and Luciano Gamberini and Eve Hoggan and Giulio Jacucci and Cecilia Katzeff and Loove Broms and Li Jonsson Eco-Feedback on the Go: Motivating Energy Awareness . . . . . . . . . . . . 38--45 J. Antonio Garcia-Macias and Jorge Alvarez-Lozano and Paul Estrada-Martinez and Edgardo Aviles-Lopez Browsing the Internet of Things with Sentient Visors . . . . . . . . . . . . 46--52 Raja Bose and Jorg Brakensiek and Keun-Young Park and Jonathan Lester Morphing Smartphones into Automotive Application Platforms . . . . . . . . . 53--61 Nenad Medvidovic and Hossein Tajalli and Joshua Garcia and Ivo Krka and Yuriy Brun and George Edwards Engineering Heterogeneous Robotics Systems: a Software Architecture-Based Approach . . . . . . . . . . . . . . . . 62--71 Bob Ward Grid Pioneer Foster Named 2011 Kanai Award Winner . . . . . . . . . . . . . . 83--85 Christopher L. Huntley The Developer's Perspective . . . . . . 88--90 Parthasarathy Ranganathan and Jichuan Chang Saving the World, One Server at a Time, Together . . . . . . . . . . . . . . . . 91--93 Anil K. Jain and Brendan Klare Matching Forensic Sketches and Mug Shots to Apprehend Criminals . . . . . . . . . 94--96 Shilad Sen and John Riedl Folksonomy Formation . . . . . . . . . . 97--101 Neville Holmes Aspects of Data Obesity . . . . . . . . 104, 102--103
Bob Ward \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier Dumb Grids and Smart Markets . . . . . . 6--8 Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10 Neal Leavitt Mobile Security: Finally a Serious Problem? . . . . . . . . . . . . . . . . 11--14 Anonymous News Briefs . . . . . . . . . . . . . . 18--20 R. J. Honicky Understanding and Using Rendezvous to Enhance Mobile Crowdsourcing Applications . . . . . . . . . . . . . . 22--28 Sumi Helal IT Footprinting --- Groundwork for Future Smart Cities . . . . . . . . . . 30--31 Milind Naphade and Guruduth Banavar and Colin Harrison and Jurij Paraszczak and Robert Morris Smarter Cities and Their Innovation Challenges . . . . . . . . . . . . . . . 32--39 Kai Kuikkaniemi and Giulio Jacucci and Marko Turpeinen and Eve Hoggan and Jorg Muller From Space to Stage: How Interactive Screens Will Change Urban Life . . . . . 40--47 Felipe Gil-Castineira and Enrique Costa-Montenegro and Francisco J. Gonzalez-Castano and Cristina Lopez-Bravo and Timo Ojala and Raja Bose Experiences inside the Ubiquitous Oulu Smart City . . . . . . . . . . . . . . . 48--55 Jungwoo Lee and Songhoon Baik and Choonhwa Lee Building an Integrated Service Management Platform for Ubiquitous Cities . . . . . . . . . . . . . . . . . 56--63 Nilanjan Mukherjee and Janusz Rajski and Grzegorz Mrugalski and Artur Pogiel and Jerzy Tyszer Ring Generator: An Ultimate Linear Feedback Shift Register . . . . . . . . 64--71 Dejan Milojicic and Phil Laplante Special Technical Communities . . . . . 84--88 Bob Ward Kuck Receives Computer Pioneer Award; VMware's Greene and Rosenblum Win Computer Entrepreneur Award; Dozens of New CSDP and CSDA Holders Named . . . . 89--91 Bob Ward Call and Calendar . . . . . . . . . . . 92--93 Cesar Pardo and Francisco J. Pino and Felix Garcia and Mario Piattini Harmonizing Quality Assurance Processes and Product Characteristics . . . . . . 94--96 John Solaro The Kinect Digital Out-of-Box Experience 97--99 Dan Breznitz and Michael Murphree and Seymour Goodman Ubiquitous Data Collection: Rethinking Privacy Debates . . . . . . . . . . . . 100--102 Cynthia Rudin and Rebecca J. Passonneau and Axinia Radeva and Steve Ierome and Delfina F. Isaac 21st-Century Data Miners Meet 19th-Century Electrical Cables . . . . . 103--105 Jan Cuny Transforming Computer Science Education in High Schools . . . . . . . . . . . . 107--109 Neville Holmes Computing and the Step Function . . . . 112, 110--111
David Alan Grier Experienced Hands . . . . . . . . . . . 6--8 Brian M. Gaff and Catherine J. Toppin Ten Things to Know When Applying for a Patent . . . . . . . . . . . . . . . . . 11--12 Sixto Ortiz Jr. The Problem with Cloud-Computing Standardization . . . . . . . . . . . . 13--16 Lee Garber News Briefs . . . . . . . . . . . . . . 17--19 Daqing Zhang and Bin Guo and Zhiwen Yu The Emergence of Social and Community Intelligence . . . . . . . . . . . . . . 21--28 Oliver Bimber and Carl K. Chang Computational Archaeology: Reviving the Past with Present-Day Tools . . . . . . 30--31 Michael Edmunds and Tony Freeth Using Computation to Decode the First Known Computer . . . . . . . . . . . . . 32--39 Eugene Ch'ng and Henry Chapman and Vincent Gaffney and Phil Murgatroyd and Chris Gaffney and Wolfgang Neubauer From Sites to Landscapes: How Computing Technology Is Shaping Archaeological Practice . . . . . . . . . . . . . . . . 40--46 Roberto Scopigno and Marco Callieri and Paolo Cignoni and Massimiliano Corsini and Matteo Dellepiane and Federico Ponchio and Guido Ranzuglia $3$D Models for Cultural Heritage: Beyond Plain Visualization . . . . . . . 48--55 Vid Petrovic and Aaron Gidding and Tom Wypych and Falko Kuester and Thomas A. DeFanti and Thomas E. Levy Dealing with Archaeology's Data Avalanche . . . . . . . . . . . . . . . 56--60 Renju Li and Tao Luo and Hongbin Zha and Wei Lu Computer-Assisted Archaeological Line Drawing . . . . . . . . . . . . . . . . 62--65 Mohammad Tehranipoor and Hassan Salmani and Xuehui Zhang and Xiaoxiao Wang and Ramesh Karri and Jeyavijayan Rajendran and Kurt Rosenfeld Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges . . . . 66--74 Dirk Riehle Controlling and Steering Open Source Projects . . . . . . . . . . . . . . . . 93--96 Richard P. Larrick and Kirk W. Cameron Consumption-Based Metrics: From Autos to IT . . . . . . . . . . . . . . . . . . . 97--99 Kevin W. Bowyer What Surprises Do Identical Twins Have for Identity Science? . . . . . . . . . 100--102 Shyong (Tony) K. Lam and John Riedl Expressing My Inner Gnome: Appearance and Behavior in Virtual Worlds . . . . . 103--105 Kai A. Olsen Programmed Politeness . . . . . . . . . 108, 106--107
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier The Chicken Bus . . . . . . . . . . . . 6--8 Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10 Brian M. Gaff and Catherine J. Toppin Ten Things to Know When Your Patent Application Is Pending . . . . . . . . . 11--12 Steven J. Vaughan-Nichols OpenFlow: The Next Generation of the Network? . . . . . . . . . . . . . . . . 13--15 Anonymous News Briefs . . . . . . . . . . . . . . 16--18 Greg Goth IBM PC Retrospective: There Was Enough Right to Make It Work . . . . . . . . . 26--33 David Bradley A Personal History of the IBM PC . . . . 19--25 Edward Bride The IBM Personal Computer: a Software-Driven Market . . . . . . . . . 34--39 Gurbir Singh The IBM PC: The Silicon Story . . . . . 40--45 Pieter Simoens and Filip De Turck and Bart Dhoedt and Piet Demeester Remote Display Solutions for Mobile Cloud Computing . . . . . . . . . . . . 46--53 Sungkap Yeo and Hsien-Hsin Lee Using Mathematical Modeling in Provisioning a Heterogeneous Cloud Computing Environment . . . . . . . . . 55--62 Alain Chesnais and Sorel Reisman From the Presidents of the IEEE Computer Society and ACM . . . . . . . . . . . . 63--64 Anonymous IEEE Computer Society Election . . . . . 65--73 Anonymous IEEE President-Elect Candidates Address Computer Society Concerns . . . . . . . 75--80 Anonymous Call and Calendar . . . . . . . . . . . 81--82 John Bryant and Jason Bay Stereoscopic Technologies and Effects 93--95 Emil Vassev and Mike Hinchey Knowledge Representation and Reasoning for Intelligent Software Systems . . . . 96--99 Manfred Tscheligi and Alexander Meschtscherjakov and David Wilfinger Interactive Computing on Wheels . . . . 100--102 Manish Marwah and Amip Shah and Cullen Bash and Chandrakant Patel and Naren Ramakrishnan Using Data Mining to Help Design Sustainable Products . . . . . . . . . . 103--106 Charles Severance Toward Developing an Education App Store 107--109 Neville Holmes The Cultural Potential of Keyboards . . 112, 110--111
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier Leisure Science . . . . . . . . . . . . 6--8 Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10 Brian M. Gaff and Catherine J. Toppin Ten Things to Know When Your Patent Application Is Allowed . . . . . . . . . 11--13 Neal Leavitt IPv6: Any Closer to Adoption? . . . . . 14--16 Anonymous News Briefs . . . . . . . . . . . . . . 18--20 Rolf Oppliger Security and Privacy in an Online World 21--22 Saeed Abu-Nimeh and Thomas M. Chen and Omar Alzubi Malicious and Spam Posts in Online Social Networks . . . . . . . . . . . . 23--28 Hossein Saiedian and Dan S. Broyles Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives . . . . . . . . . . . . . . 29--36 Florian Kerschbaum and Axel Schropfer and Antonio Zilli and Richard Pibernik and Octavian Catrina and Sebastiaan de Hoogh and Berry Schoenmakers and Stelvio Cimato and Ernesto Damiani Secure Collaborative Supply-Chain Management . . . . . . . . . . . . . . . 38--43 Francisco Rocha and Salvador Abreu and Miguel Correia The Final Frontier: Confidentiality and Privacy in the Cloud . . . . . . . . . . 44--50 Rodrigo Roman and Pablo Najera and Javier Lopez Securing the Internet of Things . . . . 51--58 Siani Pearson and Marco Casassa Mont Sticky Policies: An Approach for Managing Privacy across Multiple Parties 60--68 Frederick Ryckbosch and Stijn Polfliet and Lieven Eeckhout Trends in Server Energy Proportionality 69--72 Vivek Menon and Bharat Jayaraman and Venu Govindaraju The Three Rs of Cyberphysical Spaces . . 73--79 Anonymous Bookshelf . . . . . . . . . . . . . . . 87 Anonymous Barrett Wins Pre-College Education Award 88--90 Anonymous Call and Calendar . . . . . . . . . . . 91--92 Henry Lieberman and Karthik Dinakar and Birago Jones Let's Gang Up on Cyberbullying . . . . . 93--96 Suparna Bhattacharya and K. Gopinath and Karthick Rajamani and Manish Gupta Software Bloat and Wasted Joules: Is Modularity a Hurdle to Green Software? 97--101 Christopher L. Huntley Onshore Mobile App Development: Successes and Challenges . . . . . . . . 102--104 Karl Ricanek, Jr. and Benjamin Barbour What Are Soft Biometrics and How Can They Be Used? . . . . . . . . . . . . . 106--108 Alessio Malizia and Kai A. Olsen Has Everything Been Invented? On Software Development and the Future of Apps . . . . . . . . . . . . . . . . . . 112, 110--111
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier The Habit of Change . . . . . . . . . . 6--8 Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10 Sixto Ortiz Jr. Bringing $3$D to the Small Screen . . . 11--13 Anonymous News Briefs . . . . . . . . . . . . . . 14--16 Carl K. Chang and David M. Weiss and Mike Hinchey Where Software Engineering Meets \ldots 17--18 Manfred Broy Can Practitioners Neglect Theory and Theoreticians Neglect Practice? . . . . 19--24 Brian Fitzgerald Open Source Software: Lessons from and for Software Engineering . . . . . . . . 25--30 Mark Harman Software Engineering Meets Evolutionary Computation . . . . . . . . . . . . . . 31--39 Robyn Lutz Software Engineering for Space Exploration . . . . . . . . . . . . . . 41--46 Stephen Yau and Ho An Software Engineering Meets Services and Cloud Computing . . . . . . . . . . . . 47--53 David Parnas Software Engineering --- Missing in Action: a Personal Perspective . . . . . 54--58 Jae Min Kim and Minyong Kim and Joonho Kong and Hyung Beom Jang and Sung Woo Chung Display Power Management That Detects User Intent . . . . . . . . . . . . . . 60--66 Anonymous UTA's Yale Patt Wins First IEEE CS Rau Award . . . . . . . . . . . . . . . . . 67--69 Justin Clark Object Digitization for Everyone . . . . 81--83 Min Chen and Anne Trefethen and Rene Banares-Alcantara and Marina Jirotka and Bob Coecke and Thomas Ertl and Albrecht Schmidt From Data Analysis and Visualization to Causality Discovery . . . . . . . . . . 84--87 Dirk Basten and Ali Sunyaev Guidelines for Software Development Effort Estimation . . . . . . . . . . . 88--90 Johan Bollen and Huina Mao Twitter Mood as a Stock Market Predictor 91--94 Mark Guzdial Learning How to Prepare Computer Science High School Teachers . . . . . . . . . . 95--97 Neville Holmes Digital Machinery and Analog Brains . . 100, 98--99
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier The Honest Give-and-Take . . . . . . . . 6--8 Anonymous 32 and 16 Years Ago . . . . . . . . . . 9--10 Lee Garber Turning on the Lights for Wireless Communications . . . . . . . . . . . . . 11--14 Anonymous System Identifies User Location without GPS or Wi-Fi . . . . . . . . . . . . . . 15--17 Vladimir Getov and Adolfy Hoisie and Harvey J. Wasserman Codesign for Systems and Applications: Charting the Path to Exascale Computing 19--21 John Shalf and Dan Quinlan and Curtis Janssen Rethinking Hardware--Software Codesign for Exascale Systems . . . . . . . . . . 22--30 Sayantan Sur and Sreeram Potluri and Krishna Kandalla and Hari Subramoni and Dhabaleswar K. Panda and Karen Tomko Codesign for InfiniBand Clusters . . . . 31--36 Darren Kerbyson and Abhinav Vishnu and Kevin Barker and Adolfy Hoisie Codesign Challenges for Exascale Systems: Performance, Power, and Reliability . . . . . . . . . . . . . . 37--43 Dan Stanzione The iPlant Collaborative: Cyberinfrastructure to Feed the World 44--52 Bindu Madhavi Padmanabhuni and Hee Beng Kuan Tan Defending against Buffer-Overflow Vulnerabilities . . . . . . . . . . . . 53--60 Giuseppe Nuti and Mahnoosh Mirghaemi and Philip Treleaven and Chaiyakorn Yingsaeree Algorithmic Trading . . . . . . . . . . 61--69 Anonymous Chuck Seitz Wins Cray Award . . . . . . 70--70 Anonymous Cleve Moler Wins Fernbach Award . . . . 71--71 David Walden Fiftieth Anniversary of MIT's Compatible Time-Sharing System . . . . . . . . . . 71--71 Anonymous Susan Graham receives Kennedy Award . . 72--72 Anonymous Call and Calendar . . . . . . . . . . . 73--74 Yung-Hsiang Lu and Qinru Qiu and Ali R. Butt and Kirk W. Cameron End-to-End Energy Management . . . . . . 75--77 Arun Ross and Ayman Abaza Human Ear Recognition . . . . . . . . . 79--81 Jose Luis Gomez-Barroso and Claudio Feijoo and Ramon Compano Opportunities in the Mobile Search Market . . . . . . . . . . . . . . . . . 83--85 Shubu Mukherjee If Anything in This Life Is Certain, It's That You Can Kill Any ISA . . . . . 87--88 Mikhil Masli Crowdsourcing Maps . . . . . . . . . . . 90--93 Kai A. Olsen and Alessio Malizia Automated Personal Assistants . . . . . 112, 110--111
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Sorel Reisman Looking Back, Looking Forward . . . . . 8--10 David Alan Grier Uncharted Territory . . . . . . . . . . 12--14 Anonymous 32 and 16 Years Ago . . . . . . . . . . 15--16 Neal Leavitt Internet Security under Attack: The Undermining of Digital Certificates . . 17--20 Anonymous Serious Security Flaws Identified in Cloud Systems . . . . . . . . . . . . . 21--23 Jesse M. Heines and Gena R. Greher and S. Alex Ruthmann and Brendan L. Reilly Two Approaches to Interdisciplinary Computing $+$ Music Courses . . . . . . 25--32 Joe Geigel and Marla Schweppe and David Huynh and Brian Johnstone Adapting a Virtual World for Theatrical Performance . . . . . . . . . . . . . . 33--38 So Yamaoka and Lev Manovich and Jeremy Douglass and Falko Kuester Cultural Analytics in Large-Scale Visualization Environments . . . . . . . 39--48 Ami Marowka Back to Thin-Core Massively Parallel Processors . . . . . . . . . . . . . . . 49--54 Mary Lacity and Erran Carmel and Joseph Rottman Rural Outsourcing: Delivering ITO and BPO Services from Remote Domestic Locations . . . . . . . . . . . . . . . 55--62 Laura Ferrari and Marco Mamei Discovering City Dynamics through Sports Tracking Applications . . . . . . . . . 63--68 Anonymous Grier Voted 2012 Computer Society President-Elect . . . . . . . . . . . . 69--70 Anonymous North America New PhD Numbers Hold Steady . . . . . . . . . . . . . . . . . 71--73 Anonymous Call and Calendar . . . . . . . . . . . 74--76 Wil van der Aalst Using Process Mining to Bridge the Gap between BI and BPM . . . . . . . . . . . 77--80 Douglas Baldwin Is Computer Science a Relevant Academic Discipline for the 21st Century? . . . . 81--83 Emi Tamaki and Jun Rekimoto PossessedHand: Controlling Hand Movements with Computer Output . . . . . 84--86 Alexander Hills Museums at Your Fingertips . . . . . . . 87--89 Kim Schaffer Are Password Requirements too Difficult? 90--92 Rafael Capilla and Jan Bosch The Promise and Challenge of Runtime Variability . . . . . . . . . . . . . . 93--95 Neville Holmes The Profession and Digital Technology 116, 114--115
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 John W. Walz Creating Our Future . . . . . . . . . . 6--7 Ron Vetter Digital Computer: The Next-Generation Flagship Publication . . . . . . . . . . 8--9 Charles Severance The Second-Order Effects of Steve Jobs 10--11 Anonymous 32 & 16 years ago . . . . . . . . . . . . 12--13 Brian M. Gaff and Ralph A. Loren and Gabriel J. McCool Intellectual Property, Part I . . . . . 14--16 Lee Garber The Challenges of Securing the Virtualized Environment . . . . . . . . 17--20 Anonymous News Briefs . . . . . . . . . . . . . . 21--23 Daniel A. Reed and Dennis B. Gannon and James R. Larus Imagining the Future: Thoughts on Computing . . . . . . . . . . . . . . . 25--30 Dawn Song and Elaine Shi and Ian Fischer and Umesh Shankar Cloud Data Protection for the Masses . . 39--45 Bjarne Stroustrup Software Development for Infrastructure 47--58 S. S. Iyengar and Xin Li and Huanhuan Xu and Supratik Mukhopadhyay and N. Balakrishnan and Amit Sawant and Puneeth Iyengar Toward More Precise Radiotherapy Treatment of Lung Tumors . . . . . . . . 59--65 Antonia Bertolino and Guglielmo De Angelis and Sampo Kellomaki and Andrea Polini Enhancing Service Federation Trustworthiness through Online Testing 66--72 Anonymous Two CS Members Win US Presidential Honors . . . . . . . . . . . . . . . . . 73--76 Anonymous Call and Calendar . . . . . . . . . . . 77--78 Anil K. Jain and Soweon Yoon Automatic Detection of Altered Fingerprints . . . . . . . . . . . . . . 79--82 Doug Lyon The Java Tree Withers . . . . . . . . . 83--85 Hal Berghel Identity Theft and Financial Fraud: Some Strangeness in the Proportions . . . . . 86--89 Shyong (Tony) K. Lam and John Riedl Are Our Online ``Friends'' Really Friends? . . . . . . . . . . . . . . . . 91--93 Matthew Tolentino and Kirk W. Cameron The Optimist, the Pessimist, and the Global Race to Exascale in 20 Megawatts 95--97 David Alan Grier and Erin Dian Dumbacher The Common Future . . . . . . . . . . . 108
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous Letters . . . . . . . . . . . . . . . . 6 Charles Severance JavaScript: Designing a Language in 10 Days . . . . . . . . . . . . . . . . . . 7--8 Brian M. Gaff and Ralph A. Loren and Elizabeth A. Spinney Intellectual Property, Part II . . . . . 9--11 Anonymous 32 & 16 years ago . . . . . . . . . . . . 12--13 George Lawton Cloud Streaming Brings Video to Mobile Devices . . . . . . . . . . . . . . . . 14--16 Lee Garber News Briefs . . . . . . . . . . . . . . 17--19 Simon S. Y. Shim Guest Editor's Introduction: The CAP Theorem's Growing Impact . . . . . . . . 21--22 Eric Brewer Pushing the CAP: Strategies for Consistency and Availability . . . . . . 23--29 Seth Gilbert and Nancy A. Lynch Perspectives on the CAP Theorem . . . . 30--36 Daniel J. Abadi Consistency Tradeoffs in Modern Distributed Database System Design: CAP is Only Part of the Story . . . . . . . 37--42 Raghu Ramakrishnan CAP and Cloud Data Management . . . . . 43--49 Kenneth P. Birman and Daniel A. Freedman and Qi Huang and Patrick Dowell Overcoming CAP with Consistent Soft-State Replication . . . . . . . . . 50--58 Gary C. Kessler Information Security: New Threats or Familiar Problems? . . . . . . . . . . . 59--65 Nuno Antunes and Marco Vieira Defending against Web Application Vulnerabilities . . . . . . . . . . . . 66--72 Justin Jee and Lee Case Klippel and M. Shahriar Hossain and Naren Ramakrishnan and Bud Mishra Discovering the Ebb and Flow of Ideas from Text Corpora . . . . . . . . . . . 73--77 Christian Muller-Tomfelde and Morten Fjeld Tabletops: Interactive Horizontal Displays for Ubiquitous Computing . . . 78--81 Angelos Stavrou and Jeffrey Voas and Tom Karygiannis and Steve Quirolgico Building Security into Off-the-Shelf Smartphones . . . . . . . . . . . . . . 82--84 Jimmy Gambier An Independent Social Game Company's Perspective . . . . . . . . . . . . . . 85--87 Bo Brinkman The Next Step for Ethics Education Is Enforcing the Code . . . . . . . . . . . 88--90 Francis Hsu The Impossible and the Possible . . . . 91--92 Bob Ward Computer Society Names Winners of Three Key Awards . . . . . . . . . . . . . . . 93--95 Anonymous Call and Calendar . . . . . . . . . . . 97--98 David Alan Grier and Erin Dian Dumbacher The New Internationalists . . . . . . . 112
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Monash Museum of Computing History . . . 6--7 Brian M. Gaff and Thomas J. Smedinghoff and Socheth Sor Privacy and Data Security . . . . . . . 8--10 Anonymous 32 & 16 years ago . . . . . . . . . . . . 11--12 Lee Garber Wi-Fi Races into a Faster Future . . . . 13--16 Lee Garber News Briefs . . . . . . . . . . . . . . 18--20 T. M. Murali Guest Editor's Introduction: Computationally Driven Experimental Biology . . . . . . . . . . . . . . . . 22--23 Michael B. Mayhew and Xin Guo and Steven B. Haase and Alexander J. Hartemink Close Encounters of the Collaborative Kind . . . . . . . . . . . . . . . . . . 24--30 Mehmet Koyuturk Using Protein Interaction Networks to Understand Complex Diseases . . . . . . 31--38 Fabio Vandin and Eli Upfal and Benjamin J. Raphael Algorithms and Genome Sequencing: Identifying Driver Pathways in Cancer 39--46 Steven S. Skiena Redesigning Viral Genomes . . . . . . . 47--53 Lwin Khin Shar and Hee Beng Kuan Tan Defending against Cross-Site Scripting Attacks . . . . . . . . . . . . . . . . 55--62 Xiaojun Quan and Liu Wenyin and Wenyu Dou and Hui Xiong and Yong Ge Link Graph Analysis for Business Site Selection . . . . . . . . . . . . . . . 64--69 Hal Berghel WikiLeaks and the Matter of Private Manning . . . . . . . . . . . . . . . . 70--73 Kirk W. Cameron and Rong Ge Generalizing Amdahl's Law for Power and Energy . . . . . . . . . . . . . . . . . 75--77 Aaron Halfaker and John Riedl Bots and Cyborgs: Wikipedia's Immune System . . . . . . . . . . . . . . . . . 79--82 Cornelius Held and Julia Krumm and Petra Markel and Ralf P. Schenke Intelligent Video Surveillance . . . . . 83--84 Anonymous Computer Society Connection . . . . . . 85--87 Bob Ward Call and Calendar . . . . . . . . . . . 88--89 David Alan Grier and Erin Dian Dumbacher Free Agency . . . . . . . . . . . . . . 104
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Discovering JavaScript Object Notation 6--8 Brian M. Gaff and Brian P. Murphy and Peter J. Cuomo Defending Against Patent Infringement 9--12 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 13--14 Sixto Ortiz Jr. New Approach Keeps Security in Context 15--17 Anonymous News Briefs . . . . . . . . . . . . . . 18--20 Albrecht Schmidt and Elizabeth Churchill Interaction Beyond the Keyboard . . . . 21--24 Jan B. F. van Erp and Fabien Lotte and Michael Tangermann Brain-Computer Interfaces: Beyond Medical Applications . . . . . . . . . . 26--34 Hans Gellersen and Florian Block Novel Interactions on the Keyboard . . . 36--40 Andreas Riener Gestural Interaction in Vehicular Applications . . . . . . . . . . . . . . 42--47 Michel Beaudouin-Lafon and Stephane Huot and Mathieu Nancel and Wendy Mackay and Emmanuel Pietriga and Romain Primet and Julie Wagner and Olivier Chapuis and Clement Pillias and James R. Eagan and Tony Gjerlufsen and Clemens Klokmose Multisurface Interaction in the WILD Room . . . . . . . . . . . . . . . . . . 48--56 Andrea Bianchi and Ian Oakley and Dong-Soo Kwon Open Sesame: Design Guidelines for Invisible Passwords . . . . . . . . . . 58--65 Kai-hui Chang and Chris Browy Parallel Logic Simulation: Myth or Reality? . . . . . . . . . . . . . . . . 67--73 Daniel Yellin and Yifat Yulevich and Alexander Pyasic and Avshalom Houri Optimized Interactive Processes . . . . 74--81 Gary Marsden and Edward Cutrell and Matt Jones and Amit A. Nanavati and Nitendra Rajput Making Technology Invisible in the Developing World . . . . . . . . . . . . 82--85 David C. Hodge Increasing Tuition's Affordability . . . 86--88 Brian Fitzgerald Software Crisis 2.0 . . . . . . . . . . 89--91 Anthony Patrick Melaragno and Damindra Bandara and Duminda Wijesekera and James Bret Michael Securing the ZigBee Protocol in the Smart Grid . . . . . . . . . . . . . . . 92--94 Henry Tsai and Kelvin Sung Mobile Applications and Museum Visitation . . . . . . . . . . . . . . . 95--98 Anonymous Computer Society Recognizes Outstanding Professionals . . . . . . . . . . . . . 99--101 Anonymous Call and Calendar . . . . . . . . . . . 102--103 David Alan Grier and Erin Dian Dumbacher Learning from the Best . . . . . . . . . 116
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Van Jacobson: Getting NSFNet off the Ground . . . . . . . . . . . . . . . . . 6--9 Brian M. Gaff and Stephen G. Huggard and Gregory W. Carey Do I Need A Lawyer? If You Have to Ask, You Probably Do . . . . . . . . . . . . 10--12 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 13--14 Neal Leavitt Will Power Problems Curtail Processor Progress? . . . . . . . . . . . . . . . 15--17 Lee Garber News Briefs . . . . . . . . . . . . . . 18--20 Roy Want and Bill N. Schilit Interactive Digital Signage . . . . . . 21--24 Nick Taylor and Keith Cheverst Supporting Community Awareness with Interactive Displays . . . . . . . . . . 26--32 Adrian Friday and Nigel Davies and Christos Efstratiou Reflections on Long-Term Experiments with Public Displays . . . . . . . . . . 34--41 Timo Ojala and Vassilis Kostakos and Hannu Kukka and Tommi Heikkinen and Tomas Linden and Marko Jurmu and Simo Hosio and Fabio Kruger and Daniele Zanni Multipurpose Interactive Public Displays in the Wild: Three Years Later . . . . . 42--49 Florian Alt and Jorg Muller and Albrecht Schmidt Advertising on Public Display Networks 50--56 Nigel Davies and Marc Langheinrich and Rui Jose and Albrecht Schmidt Open Display Networks: a Communications Medium for the 21st Century . . . . . . 58--64 Jamie Erbes and Hamid R. Motahari-Nezhad and Sven Graupner The Future of Enterprise IT in the Cloud 66--72 Lars Hopland Nestas and Kjell J. Hole Building and Maintaining Trust in Internet Voting . . . . . . . . . . . . 74--80 Tony Hey and Dennis Gannon and Jim Pinkelman The Future of Data-Intensive Science . . 81--82 Zhiwei Xu Measuring Green IT in Society . . . . . 83--85 Hal Berghel Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians . . . . 86--88 Alessio Malizia and Kai A. Olsen Toward a New Search Paradigm --- Can We Learn from Ants? . . . . . . . . . . . . 89--91 Anil K. Jain and Rong Jin and Jung-Eun Lee Tattoo Image Matching and Retrieval . . 93--96 Anonymous Computer Society Honors Top Scientists 97--99 Anonymous Call and Calendar . . . . . . . . . . . 100--102 David Alan Grier and Erin Dian Dumbacher Teaching the Intangible . . . . . . . . 116
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Alan Turing and Bletchley Park . . . . . 6--8 Brian M. Gaff and Gregory J. Ploussios Open Source Software . . . . . . . . . . 9--11 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Lee Garber Tangible User Interfaces: Technology You Can Touch . . . . . . . . . . . . . . . 15--18 Anonymous News Briefs . . . . . . . . . . . . . . 19--21 Carl Chang and Vladimir Getov and Kelvin Sung Computing in Asia: a Sampling of Recent Success Stories . . . . . . . . . . . . 23--25 Hong Mei and Gang Huang and Tao Xie Internetware: a Software Paradigm for Internet Computing . . . . . . . . . . . 26--31 Mikio Aoyama Computing for the Next-Generation Automobile . . . . . . . . . . . . . . . 32--37 Lijuan Wang and Yao Qian and Matthew Scott and Gang Chen and Frank Soong Computer-Assisted Audiovisual Language Learning . . . . . . . . . . . . . . . . 38--47 Wing-Kin Sung Bioinformatics Applications in Genomics 57--63 Zhenyu Zhang and W. K. Chan and T. H. Tse Fault Localization Based Only on Failed Runs . . . . . . . . . . . . . . . . . . 64--71 Jerome Israel Why the FBI Can't Build a Case Management System . . . . . . . . . . . 73--80 Virginia N. L. Franqueira and Roel J. Wieringa Role-Based Access Control in Retrospect 81--88 Jeff Munson and Phillip Pasqual Using Technology in Autism Research: The Promise and the Perils . . . . . . . . . 89--91 Devon M. Simmonds The Programming Paradigm Evolution . . . 93--95 Richard J. Lipton Might Turing Have Won a Turing Award? 96--97 Robert Harle and Andy Hopper Sports Sensing: An Olympic Challenge for Computing . . . . . . . . . . . . . . . 98--101 Rolf Oppliger and Bruno Wildhaber Common Misconceptions in Computer and Information Security . . . . . . . . . . 102--104 Anonymous Society Honors Fagin for Work on Databases . . . . . . . . . . . . . . . 105--106 Anonymous Call and Calendar . . . . . . . . . . . 107--109 David Alan Grier and Erin Dian Dumbacher Controlling Share . . . . . . . . . . . 128
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous Letters . . . . . . . . . . . . . . . . 6--7 Charles Severance The Art of Teaching Computer Science: Niklaus Wirth . . . . . . . . . . . . . 8--10 Brian M. Gaff and Richard N. Kimball and Jill M. Hanson Raising Capital: Where to Find It, How to Secure It, and Tips on What to Avoid 11--13 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 14--15 Sixto Ortiz Jr. Computing Trends Lead to New Programming Languages . . . . . . . . . . . . . . . 17--20 Anonymous News Briefs . . . . . . . . . . . . . . 21--23 Oliver Bimber What's Real About Augmented Reality? . . 24--25 Michael Gervautz and Dieter Schmalstieg Anywhere Interfaces Using Handheld Augmented Reality . . . . . . . . . . . 26--31 Mark Mine and David Rose and Bei Yang and Jeroen van Baar and Anselm Grundhöfer Projection-Based Augmented Reality in Disney Theme Parks . . . . . . . . . . . 32--40 Ailsa Barry and Jonathan Trout and Paul Debenham and Graham Thomas Augmented Reality in a Public Space: The Natural History Museum, London . . . . . 42--47 Nassir Navab and Tobias Blum and Lejing Wang and Aslì and Okur and Thomas Wendler First Deployments of Augmented Reality in Operating Rooms . . . . . . . . . . . 48--55 Mark Billinghurst and Andreas Dünser Augmented Reality in the Classroom . . . 56--63 Daniel E. O'Leary Computer-Based Political Action: The Battle and Internet Blackout over PIPA 64--72 Jianyong Chen and Yang Wang and Xiaomin Wang On-Demand Security Architecture for Cloud Computing . . . . . . . . . . . . 73--78 Hal Berghel The OuijAmazon Desktop Metaphor . . . . 80--82 Eitan Frachtenberg Holistic Datacenter Design in the Open Compute Project . . . . . . . . . . . . 83--85 Patrizio Campisi and Daria La Rocca and Gaetano Scarano EEG for Automatic Person Recognition . . 87--89 Anuradha Uduwage and Joseph A. Konstan The Answer Is Out There: Online Q&A Sites 90--92 Anonymous Avi\vzienis Wins Eckert--Mauchly Award 93--95 Anonymous Call and Calendar . . . . . . . . . . . 96--98 David Alan Grier and Erin Dian Dumbacher Repurposers . . . . . . . . . . . . . . 116
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous Letters . . . . . . . . . . . . . . . . 6--7 Charles Severance Teaching the World: Daphne Koller and Coursera . . . . . . . . . . . . . . . . 8--9 Brian M. Gaff and Kenneth Choy and Jamie Chan Doing Business in China . . . . . . . . 11--13 Anonymous 32 & 16 years ago . . . . . . . . . . . . 14--15 Lee Garber Converged Infrastructure: Addressing the Efficiency Challenge . . . . . . . . . . 17--20 Anonymous News Briefs . . . . . . . . . . . . . . 21--23 Stephen W. Keckler and Steven K. Reinhardt Massively Multithreaded Computing Systems . . . . . . . . . . . . . . . . 24--25 John A. Stratton and Christopher Rodrigues and I-Jui Sung and Li-Wen Chang and Nasser Anssari and Geng Liu and Wen-mei W. Hwu and Nady Obeid Algorithm and Data Optimization Techniques for Scaling to Massively Threaded Systems . . . . . . . . . . . . 26--32 Stanley Tzeng and Brandon Lloyd and John D. Owens A GPU Task-Parallel Model with Dependency Resolution . . . . . . . . . 34--41 Benedict R. Gaster and Lee Howes Can GPGPU Programming Be Liberated from the Data-Parallel Bottleneck? . . . . . 42--52 Antonino Tumeo and Simone Secchi and Oreste Villa Designing Next-Generation Massively Multithreaded Architectures for Irregular Applications . . . . . . . . . 53--61 Stephen Davies and Stacey Aylor Seal and Jesse Hatfield Cinefile: a Category-Based Analytic Browser . . . . . . . . . . . . . . . . 62--69 Lorraine J. Haricombe and L. Ada Emmett and Perry Alexander Open Access: An Evolving Alternative . . 70--72 Victor Ng-Thow-Hing and Sandra Okita Playdates with Robots . . . . . . . . . 73--75 Franco Zambonelli Toward Sociotechnical Urban Superorganisms . . . . . . . . . . . . . 76--78 Tom Mens On the Complexity of Software Systems 79--81 William H. Boothby and Wolff Heintschel von Heinegg and James Bret Michael and Michael N. Schmitt and Thomas C. Wingfield When Is a Cyberattack a Use of Force or an Armed Attack? . . . . . . . . . . . . 82--84 Anonymous IEEE Computer Society Election . . . . . 85--93 Anonymous IEEE President-Elect Candidates Address Computer Society Concerns . . . . . . . 94--99 Anonymous Call and Calendar . . . . . . . . . . . 100--103 David Alan Grier and Erin Dian Dumbacher The Winner Takes It All . . . . . . . . 120
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Bertrand Meyer: Software Engineering and the Eiffel Programming Language . . . . 6--8 Brian M. Gaff and Brian P. Murphy and Ralph A. Loren and Christine A. Dudzik and Lisa Swiszcz Patent Reform: New Tools for Challenging Patent Validity as of September 2012 . . 9--11 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Neal Leavitt Are Mobile Payments Ready to Cash in Yet? . . . . . . . . . . . . . . . . . . 15--18 Anonymous News Briefs . . . . . . . . . . . . . . 19--20 Kaushik R. Chowdhury and Dave Cavalcanti and Mostafa El-Said and Tommaso Mazza and Chittabrata Ghosh Modeling and Simulation of Smart and Green Computing Systems . . . . . . . . 22--23 Swades De and Riya Singhal Toward Uninterrupted Operation of Wireless Sensor Networks . . . . . . . . 24--30 Prabhakar T. Venkata and S. N. Akshay Uttama Nambi and R. Venkatesha Prasad and Ignas Niemegeers Bond Graph Modeling for Energy-Harvesting Wireless Sensor Networks . . . . . . . . . . . . . . . . 31--38 Murat Kocaoglu and Derya Malak and Ozgur B. Akan Fundamentals of Green Communications and Computing: Modeling and Simulation . . . 40--46 Sungkap Yeo and Hsien-Hsin S. Lee SimWare: a Holistic Warehouse-Scale Computer Simulator . . . . . . . . . . . 48--55 Baris Aksanli and Jagannathan Venkatesh and Tajana Simunic Rosing Using Datacenter Simulation to Evaluate Green Energy Integration . . . . . . . . 56--64 Mahinthan Chandramohan and Hee Beng Kuan Tan Detection of Mobile Malware in the Wild 65--71 Julian Ohrt and Volker Turau Cross-Platform Development Tools for Smartphone Applications . . . . . . . . 72--79 Xiaoqi Yan and Chi-Wing Fu and Andrew J. Hanson Multitouching the Fourth Dimension . . . 80--88 Bruce Nordman and Ken Christensen and Alan Meier Think Globally, Distribute Power Locally: The Promise of Nanogrids . . . 89--91 Hal Berghel The Dumbing Down of SportPhishing . . . 92--94 Karl Ricanek, Jr. and Chris Boehnen Facial Analytics: From Big Data to Law Enforcement . . . . . . . . . . . . . . 95--97 Cliff Lampe and Nicole Ellison Understanding Facebook: Social Computing Isn't `Just' Social . . . . . . . . . . 98--100 Dejan S. Milojicic and Martin Arlitt and Doree Duncan Seligmann and George K. Thiruvathukal and Christian Timmerer Innovation Mashups: Academic Rigor Meets Social Networking Buzz . . . . . . . . . 101--105 Anonymous Call and Calendar . . . . . . . . . . . 106--108 David Alan Grier and Erin Dian Dumbacher It's Complicated . . . . . . . . . . . . 124
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous Letters . . . . . . . . . . . . . . . . 6--7 Charles Severance The Apache Software Foundation: Brian Behlendorf . . . . . . . . . . . . . . . 8--9 Brian M. Gaff and Karl P. Fryzel Starting a Business: Which Entity Structure Is Best for You? . . . . . . . 10--12 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 14--15 Lee Garber Using In-Memory Analytics to Quickly Crunch Big Data . . . . . . . . . . . . 16--18 Anonymous News Briefs . . . . . . . . . . . . . . 19--21 Mike Hinchey and Sooyong Park and Klaus Schmid Building Dynamic Software Product Lines 22--26 Jan Bosch and Rafael Capilla Dynamic Variability in Software-Intensive Embedded System Families . . . . . . . . . . . . . . . . 28--35 Nelly Bencomo and Svein Hallsteinsen and Eduardo Santana de Almeida A View of the Dynamic Software Product Line Landscape . . . . . . . . . . . . . 36--41 Luciano Baresi and Sam Guinea and Liliana Pasquale Service-Oriented Dynamic Software Product Lines . . . . . . . . . . . . . 42--48 Jaejoon Lee and Gerald Kotonya and Daniel Robinson Engineering Service-Based Dynamic Software Product Lines . . . . . . . . . 49--55 Pete Sawyer and Raúl Mazo and Daniel Diaz and Camille Salinesi and Danny Hughes Using Constraint Programming to Manage Configurations in Self-Adaptive Systems 56--63 Mark Hedley and Jian Zhang Accurate Wireless Localization in Sports 64--70 Moustafa AbdelBaky and Manish Parashar and Hyunjoo Kim and Kirk E. Jordan and Vipin Sachdeva and James Sexton and Hani Jamjoom and Zon-Yin Shae and Gergina Pencheva and Reza Tavakoli and Mary F. Wheeler Enabling High-Performance Computing as a Service . . . . . . . . . . . . . . . . 72--80 Ann E. K. Sobel Should Everyone Go to College? . . . . . 82--83 James D. Hollan Activity-Enriched Computing: Capturing and Mining Activity Histories . . . . . 84--87 Tim Boland and Paul E. Black Juliet 1.1 C/C++ and Java Test Suite . . 88--90 Peter Gruenbaum Underrepresented Youth Creating Culturally Relevant Games . . . . . . . 91--93 Krishna P. C. Madhavan and Mihaela Vorvoreanu and Niklas Elmqvist and Aditya Johri and Naren Ramakrishnan and G. Alan Wang and Ann McKenna Portfolio Mining . . . . . . . . . . . . 95--99 Bryan Reinicke It's 2012, So Why Am I Driving a 1972 Bug? . . . . . . . . . . . . . . . . . . 100--103 Anonymous New EICs Named for IEEE Computer Society Publications . . . . . . . . . . . . . . 104--106 Anonymous Call and Calendar . . . . . . . . . . . 107--109 David Alan Grier and Erin Dian Dumbacher The Computer in the Mirror . . . . . . . 128
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Inventing PHP: Rasmus Lerdorf . . . . . 6--7 Brian M. Gaff and Ralph A. Loren and Amy M. DeCloux A Brief Overview of the America Invents Act . . . . . . . . . . . . . . . . . . 8--10 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Neal Leavitt Big Iron Moves Toward Exascale Computing 14--17 Anonymous News Briefs . . . . . . . . . . . . . . 18--20 Ann E. K. Sobel The Move Toward Electronic Health Records . . . . . . . . . . . . . . . . 22--23 Doug Fridsma Electronic Health Records: The HHS Perspective . . . . . . . . . . . . . . 24--26 Inmaculada Carrión Señor and José Luis Fernández Alemán and Ambrosio Toval Personal Health Records: New Means to Safely Handle Health Data? . . . . . . . 27--33 Raik Kuhlisch and Ben Kraufmann and Hannes Restel Electronic Case Records in a Box: Integrating Patient Data in Healthcare Networks . . . . . . . . . . . . . . . . 34--40 Sujoy Basu and Alan H. Karp and Jun Li and James Pruyne and Jerry Rolia and Sharad Singhal and Jaap Suermondt and Ram Swaminathan Fusion: Managing Healthcare Records at Cloud Scale . . . . . . . . . . . . . . 42--49 Kevin Brady and Ram D. Sriram and Bettijoyce Lide and Kathleen Roberts Testing the Nation's Healthcare Information Infrastructure: NIST Perspective . . . . . . . . . . . . . . 50--57 Barry Fagin and Dale Skrien Debugging on the Shoulders of Giants: von Neumann's Programs 65 Years Later 59--68 Jason Dedrick and Jian Tang and Kenneth L. Kraemer China's Indigenous Innovation Policy: Impact on Multi-national R&D . . . . . . 70--78 Edward Curry and Bill Guyon and Charles Sheridan and Brian Donnellan Sustainable IT: Challenges, Postures, and Outcomes . . . . . . . . . . . . . . 79--81 Hal Berghel Stratfor or Stratagainst . . . . . . . . 82--85 Anil K. Jain and Karthik Nandakumar Biometric Authentication: System Security and User Privacy . . . . . . . 87--92 Frank Bi and Joseph A. Konstan Customer Service 2.0: Where Social Computing Meets Customer Relations . . . 93--95 Anonymous Computer Society Connection . . . . . . 96--98 Anonymous Call and Calendar . . . . . . . . . . . 99--101 David Alan Grier and Erin Dian Dumbacher Love the Show! . . . . . . . . . . . . . 120
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 John W. Walz Implementing SP7: a Review of Progress in 2012 . . . . . . . . . . . . . . . . 6--9 Charles Severance Vint Cerf: a Brief History of Packets 10--12 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 16--17 Anonymous News Briefs . . . . . . . . . . . . . . 22--24 Gary C. Kessler Advancing the Science of Digital Forensics . . . . . . . . . . . . . . . 25--27 Joel Young and Kristina Foster and Simson Garfinkel and Kevin Fairbanks Distinct Sector Hashes for Target File Detection . . . . . . . . . . . . . . . 28--35 Ray Hunt and Sherali Zeadally Network Forensics: An Analysis of Techniques, Tools, and Trends . . . . . 36--43 Irfan Ahmed and Sebastian Obermeier and Martin Naedele and Golden G. Richard III SCADA Systems: Challenges for Forensic Investigators . . . . . . . . . . . . . 44--51 Yong Wang and Kevin Streff and Sonell Raman Smartphone Security Challenges . . . . . 52--58 Aaron Spear and Markus Levy and Mathieu Desnoyers Using Tracing to Solve the Multicore System Debug Problem . . . . . . . . . . 60--64 Rafael Moreno-Vozmediano and Ruben S. Montero and Ignacio M. Llorente IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures . . . . . . . . . 65--72 Naren Sundaravaradan and Naren Ramakrishnan and David A. Hanauer Factorizing Event Sequences . . . . . . 73--75 Manfred Lau and Jun Mitani and Takeo Igarashi Digital Fabrication . . . . . . . . . . 76--79 Arnold Brown and Benjamin Apple and James Bret Michael and Michael Schumann Atomic-Level Security for Web Applications in a Cloud Environment . . 80--83 Emil Vassev and Mike Hinchey Awareness in Software-Intensive Systems 84--87 Brad Hallisey Building a Virtual World: The Pipeline and Process . . . . . . . . . . . . . . 90--92 Anonymous Milojicic Voted 2013 Computer Society President-Elect . . . . . . . . . . . . 93--95 Anonymous CS Announces 2012 Winners of Kennedy and Rau Awards . . . . . . . . . . . . . . . 96--98 Anonymous Call and Calendar . . . . . . . . . . . 99--101 David Alan Grier and Erin Dian Dumbacher Work/Play . . . . . . . . . . . . . . . 116
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier The Unseen and the Seen . . . . . . . . 6--7 Ron Vetter Embracing Digital Publishing . . . . . . 8--10 Charles Severance Van Jacobson: Content-Centric Networking 11--13 Brian M. Gaff and Ralph A. Loren and Gareth Dickson Protecting Bioinformatics as Intellectual Property . . . . . . . . . 15--17 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 18--19 Neal Leavitt Bringing Big Analytics to the Masses . . 20--23 Lee Garber News Briefs . . . . . . . . . . . . . . 24--26 Santosh Kumar and Wendy Nilsen and Misha Pavel and Mani Srivastava Mobile Health: Revolutionizing Healthcare Through Transdisciplinary Research . . . . . . . . . . . . . . . . 28--35 Gunar Schirner and Deniz Erdogmus and Kaushik Chowdhury and Taskin Padir The Future of Human-in-the-Loop Cyber-Physical Systems . . . . . . . . . 36--45 Thanassis Rikakis and Aisling Kelliher and Nicole Lehrer Experiential Media and Digital Culture 46--54 Noel Sharkey and Amanda Sharkey Robotic Surgery: On the Cutting Edge of Ethics . . . . . . . . . . . . . . . . . 56--64 Kjell Jòrgen Hole Management of Hidden Risks . . . . . . . 65--70 Upkar Varshney A Smart Approach to Medication Management . . . . . . . . . . . . . . . 71--76 San Murugesan Cloud Computing: The New Normal? . . . . 77--79 Brian David Johnson When Science Fiction and Science Fact Meet . . . . . . . . . . . . . . . . . . 80--82 Kirk W. Cameron Energy Oddities, Part 1: Why the Energy World Is Odd . . . . . . . . . . . . . . 83--84 Hal Berghel RFIDiocy: It's Déj\`a Vu All over Again 85--88 John Riedl and Eric Riedl Crowdsourcing Medical Research . . . . . 89--92 David Alan Grier The Here and Now . . . . . . . . . . . . 108
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Lee Garber Letters . . . . . . . . . . . . . . . . 6 Charles Severance Mitchell Baker: The Mozilla Foundation 7--9 Brian M. Gaff and Stephen G. Huggard and Gregory W. Carey Paying Bribes Abroad Will Get You in Hot Water in the US . . . . . . . . . . . . 11--13 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 14--15 Lee Garber GPUs Go Mobile . . . . . . . . . . . . . 16--19 Lee Garber News Briefs . . . . . . . . . . . . . . 20--23 Mohamed Ali Feki and Fahim Kawsar and Mathieu Boussard and Lieven Trappeniers The Internet of Things: The Next Technological Revolution . . . . . . . . 24--25 Steve Hodges and Stuart Taylor and Nicolas Villar and James Scott and Dominik Bial and Patrick Tobias Fischer Prototyping Connected Devices for the Internet of Things . . . . . . . . . . . 26--34 Daniel Roggen and Gerhard Tröster and Paul Lukowicz and Alois Ferscha and José del R. Millán and Ricardo Chavarriaga Opportunistic Human Activity and Context Recognition . . . . . . . . . . . . . . 36--45 Sang Wan Lee and Oliver Prenzel and Zeungnam Bien Applying Human Learning Principles to User-Centered IoT Systems . . . . . . . 46--52 Gerd Kortuem and Arosha K. Bandara and Neil Smith and Mike Richards and Marian Petre Educating the Internet-of-Things Generation . . . . . . . . . . . . . . . 53--61 Sasitharan Balasubramaniam and Jussi Kangasharju Realizing the Internet of Nano Things: Challenges, Solutions, and Applications 62--68 Jane W. S. Liu and Chi-Sheng Shih and Edward T.-H. Chu Cyberphysical Elements of Disaster-Prepared Smart Environments . . 69--75 Mukesh Singhal and Santosh Chandrasekhar and Tingjian Ge and Ravi Sandhu and Ram Krishnan and Gail-Joon Ahn and Elisa Bertino Collaboration in Multicloud Computing Environments: Framework and Security Issues . . . . . . . . . . . . . . . . . 76--84 Jon G. Hall and Lucia Rapanotti Beauty in Software Engineering . . . . . 85--87 Michael Lutz Undergraduate Software Engineering at RIT: Past, Present, and Future . . . . . 88--90 Rinku Dewri and Ramakrishna Thurimella Can a Phone's GPS `Lie' Intelligently? 91--93 Jason Pace The Ways We Play, Part 1: From PCs to Consoles to Mobile Phones . . . . . . . 94--96 Anonymous EIC Applicants Sought for CS Periodicals, 2014--2015 Terms . . . . . 106--108 Anonymous Call and Calendar . . . . . . . . . . . 109--111 David Alan Grier The Ethical Dimension . . . . . . . . . 112
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Pooja Sankar: Building the Piazza Collaboration System . . . . . . . . . . 6--7 Brian M. Gaff and Peter J. Cuomo Design Patents . . . . . . . . . . . . . 8--10 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Neal Leavitt A Technology that Comes Highly Recommended . . . . . . . . . . . . . . 14--17 Lee Garber News Briefs . . . . . . . . . . . . . . 18--20 Jane Chu Prey and Alfred C. Weaver Fostering Gender Diversity in Computing 22--23 Wendy M. DuBow Diversity in Computing: Why It Matters and How Organizations Can Achieve It . . 24--29 Telle Whitney and Denise Gammal and Barbara Gee and Jody Mahoney and Caroline Simard Priming the Pipeline: Addressing Gender-Based Barriers in Computing . . . 30--36 Mary Fernandez A Path Between: Mentoring the Next Generation of Computing Professionals 38--41 Chris Stephenson and Rebecca Dovi More than Gender: Taking a Systemic Approach to Improving K-12 Computer Science Education . . . . . . . . . . . 42--46 Crystal Eney and Ed Lazowska and Helene Martin and Stuart Reges Broadening Participation: The Why and the How . . . . . . . . . . . . . . . . 48--51 James P. Cohoon and J. McGrath Cohoon and Mary Lou Soffa Educating Diverse Computing Students at the University of Virginia . . . . . . . 52--55 Maria Klawe Increasing Female Participation in Computing: The Harvey Mudd College Story 56--58 Deepak Kumar Serving Women with a Purposeful Vision 60--61 Robert B. Schnabel Personal Reflections on Gender Diversity in Computing . . . . . . . . . . . . . . 62--63 Kate Starbird Returning to My Inner Nerd: Following the `Social' Disruption of Computing . . 63--65 Annie I. Anton Facing Challenges and Having Fun . . . . 65--66 Alice Bonhomme-Biais and Raquel Romano Pursuing Professional Changes . . . . . 66--68 Lwin Khin Shar and Hee Beng Kuan Tan Defeating SQL Injection . . . . . . . . 69--77 Chung-Wei Hang and Zhe Zhang and Munindar P. Singh Shin: Generalized Trust Propagation with Limited Evidence . . . . . . . . . . . . 78--85 Nir Kshetri and San Murugesan Cloud Computing and EU Data Privacy Regulations . . . . . . . . . . . . . . 86--89 Kirk W. Cameron Energy Oddities, Part 2: Why Green Computing Is Odd . . . . . . . . . . . . 90--93 Karl Ricanek, Jr. and Gayathri Mahalingam Biometrically, How Identical Are Identical Twins? . . . . . . . . . . . . 94--96 Hal Berghel The SCDOR Hack: Great Security Theater in Five Stages . . . . . . . . . . . . . 97--99 John Riedl Crowdfunding Technology Innovation . . . 100--103 Brian David Johnson Jimmy: The Robot That Changed It All . . 104--107 Anonymous Computer SocietyConnection . . . . . . . 120--121 Anonymous Call and Calendar . . . . . . . . . . . 122--123 David Alan Grier Attention to Context . . . . . . . . . . 124
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Larry Smarr: Building Mosaic . . . . . . 6--8 Brian M. Gaff and Ralph A. Loren Patent Monetization . . . . . . . . . . 9--11 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Lee Garber Analytics Goes on Location with New Approaches . . . . . . . . . . . . . . . 14--17 Lee Garber News Briefs . . . . . . . . . . . . . . 18--20 Sherali Zeadally and Gregorio Martinez and Han-Chieh Chao Securing Cyberspace in the 21st Century 22--23 Pavlos Basaras and Dimitrios Katsaros and Leandros Tassiulas Detecting Influential Spreaders in Complex, Dynamic Networks . . . . . . . 24--29 Cristina Alcaraz and Javier Lopez Wide-Area Situational Awareness for Critical Infrastructure Protection . . . 30--37 Ignasi Paredes-Oliva and Pere Barlet-Ros and Josep Sole-Pareta Scan Detection under Sampling: A New Perspective . . . . . . . . . . . . . . 38--44 Huansheng Ning and Hong Liu and Laurence T. Yang Cyberentity Security in the Internet of Things . . . . . . . . . . . . . . . . . 46--53 Awais Rashid and Alistair Baron and Paul Rayson and Corinne May-Chahal and Phil Greenwood and James Walkerdine Who Am I? Analyzing Digital Personas in Cybercrime Investigations . . . . . . . 54--61 Adeeb Alhomoud and Irfan Awan and Jules Ferdinand Pagna Disso and Muhammad Younas A Next-Generation Approach to Combating Botnets . . . . . . . . . . . . . . . . 62--66 Iyad Rahwan and Sohan Dsouza and Alex Rutherford and Victor Naroditskiy and James McInerney and Matteo Venanzi and Nicholas R. Jennings and Manuel Cebrian Global Manhunt Pushes the Limits of Social Mobilization . . . . . . . . . . 68--75 Xiaohan Ma and Zhigang Deng and Mian Dong and Lin Zhong Characterizing the Performance and Power Consumption of $3$D Mobile Games . . . . 76--82 Ruth H. Sanders Why Learn a Foreign Language? . . . . . 83--85 Niklas Elmqvist and Pourang Irani Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime . . . . . . . 86--89 Steve Hodges Batteries Not Included: Powering the Ubiquitous Computing Dream . . . . . . . 90--93 David Ferraiolo and Serban Gavrila and Wayne Jansen Enabling an Enterprise-Wide, Data-Centric Operating Environment . . . 94--96 Jason Pace The Ways We Play, Part 2: Mobile Game Changers . . . . . . . . . . . . . . . . 97--99 Ana M. Moreno and Ahmed Seffah and Rafael Capilla and Maria-Isabel Sanchez-Segura HCI Practices for Building Usable Software . . . . . . . . . . . . . . . . 100--102 Anonymous Computer Society Connection . . . . . . 110--113 Anonymous Call and Calendar . . . . . . . . . . . 114--115 David Alan Grier Equal before the Bar . . . . . . . . . . 116
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Bob Metcalfe: Ethernet at Forty . . . . 6--9 Brian M. Gaff Who Invents What . . . . . . . . . . . . 10--12 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 13--14 Neal Leavitt Hybrid Clouds Move to the Forefront . . 15--18 Lee Garber News Briefs . . . . . . . . . . . . . . 19--21 Theresa-Marie Rhyne and Min Chen Cutting-Edge Research in Visualization 22--24 Aditi Majumder and Behzad Sajadi Large Area Displays: The Changing Face of Visualization . . . . . . . . . . . . 26--33 Hank Childs and Berk Geveci and Will Schroeder and Jeremy Meredith and Kenneth Moreland and Christopher Sewell and Torsten Kuhlen and E. Wes Bethel Research Challenges for Visualization Software . . . . . . . . . . . . . . . . 34--42 Robert Kosara and Jock Mackinlay Storytelling: The Next Step for Visualization . . . . . . . . . . . . . 44--50 Daniel F. Keefe and Tobias Isenberg Reimagining the Scientific Visualization Interaction Paradigm . . . . . . . . . . 51--57 Ben Shneiderman and Catherine Plaisant and Bradford W. Hesse Improving Healthcare with Interactive Visualization . . . . . . . . . . . . . 58--66 Tobias Schreck and Daniel Keim Visual Analysis of Social Media Data . . 68--75 Qing Li and Chris Larsen and Tim van der Horst IPv6: A Catalyst and Evasion Tool for Botnets and Malware Delivery Networks 76--82 A. F. Szczepanski and Jian Huang and T. Baer and Y. C. Mack and S. Ahern Data Analysis and Visualization in High-Performance Computing . . . . . . . 84--92 Hal Berghel Computing Technology and Survivable Journalism . . . . . . . . . . . . . . . 93--97 Domenico Talia Clouds for Scalable Big Data Analytics 98--101 Ahmad Poursaberi and Svetlana Yanushkevich and Marina L. Gavrilova and Vlad P. Shmerko and Patrick S. P. Wang Situational Awareness through Biometrics 102--104 Brian David Johnson Secret Science Fiction . . . . . . . . . 105--107 Joseph Turner Power Management as Choice Architecture 108--111 Anonymous Computer Society Connection . . . . . . 118--120 Anonymous Call and Calendar . . . . . . . . . . . 121--123 David Alan Grier Working in Conference . . . . . . . . . 124
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Gordon Bell: Building Blocks of Computing . . . . . . . . . . . . . . . 6--7 Anonymous Letters . . . . . . . . . . . . . . . . 8 Brian M. Gaff Are You Exhausted by Your First Sale? 9--11 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Lee Garber Game Accessibility: Enabling Everyone to Play . . . . . . . . . . . . . . . . . . 14--18 Lee Garber News Briefs . . . . . . . . . . . . . . 19--21 Katina Michael and Keith W. Miller Big Data: New Opportunities and New Challenges [Guest Editors' introduction] 22--24 Jess Hemerly Public Policy Considerations for Data-Driven Innovation . . . . . . . . . 25--31 Paul P. Tallon Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost 32--38 Jeremy Pitt and Aikaterini Bourazeri and Andrzej Nowak and Magda Roszczynska-Kurasinska and Agnieszka Rychwalska and Inmaculada Rodriguez Santiago and Maite Lopez Sanchez and Monica Florea and Mihai Sanduleac Transforming Big Data into Collective Awareness . . . . . . . . . . . . . . . 40--45 Marcus R. Wigan and Roger Clarke Big Data's Big Unintended Consequences 46--53 Carolyn McGregor Big Data in Neonatal Intensive Care . . 54--59 Pauline Anthonysamy and Phil Greenwood and Awais Rashid Social Networking Privacy: Understanding the Disconnect from Policy to Controls 60--67 E. Thomas Ewing and Samah Gad and Naren Ramakrishnan Gaining Insights into Epidemics by Mining Historical Newspapers . . . . . . 68--72 Niels Henze and Alireza Sahami Shrazi and Albrecht Schmidt and Martin Pielot and Florian Michahelles Empirical Research through Ubiquitous Data Collection . . . . . . . . . . . . 74--76 Alexander Repenning Making Programming Accessible and Exciting . . . . . . . . . . . . . . . . 78--81 Ann E. K. Sobel The Modern Educator . . . . . . . . . . 82--83 James Bret Michael Empowering Users through Secure On-Demand Data Provisioning . . . . . . 84--85 Gerard J. Holzmann A Three-Step Program for Recovering Hackers . . . . . . . . . . . . . . . . 86--88 Anonymous Computer Society Connection . . . . . . 90--91 Anonymous Call and Calendar . . . . . . . . . . . 92--96 David Alan Grier The Comfort Zone . . . . . . . . . . . . 104
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Katie Hafner: The Origins of the Internet . . . . . . . . . . . . . . . . 6--7 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 8--9 Sixto Ortiz Jr. Software-Defined Networking: On the Verge of a Breakthrough? . . . . . . . . 10--12 Lee Garber News Briefs . . . . . . . . . . . . . . 13--15 Brian M. Gaff The Troll under the Bridge . . . . . . . 17--19 Marc Streit and Oliver Bimber Visual Analytics: Seeking the Unknown 20--21 Jean-Daniel Fekete Visual Analytics Infrastructures: From Data Management to Exploration . . . . . 22--29 Carsten Gorg and Youn-ah Kang and Zhicheng Liu and John Stasko Visual Analytics Support for Intelligence Analysis . . . . . . . . . 30--38 Kwan-Liu Ma and Chris W. Muelder Large-Scale Graph Visualization and Analytics . . . . . . . . . . . . . . . 39--46 Daniel A. Keim and Milos Krstajic and Christian Rohrdantz and Tobias Schreck Real-Time Visual Analytics for Text Streams . . . . . . . . . . . . . . . . 47--55 Jarke J. van Wijk Evaluation: A Challenge for Visual Analytics . . . . . . . . . . . . . . . 56--60 Diane J. Cook and Aaron S. Crandall and Brian L. Thomas and Narayanan C. Krishnan CASAS: A Smart Home in a Box . . . . . . 62--69 Tsahee Zidenberg and Isaac Keslassy and Uri Weiser Optimal Resource Allocation with MultiAmdahl . . . . . . . . . . . . . . 70--77 Brian David Johnson From NASA . . . . . . . . . . . . . . . 78--81 Paul Witman Social Media for Social Value . . . . . 82--85 Hal Berghel Through the PRISM Darkly . . . . . . . . 86--90 Matt Stansberry The Future of Green IT: Solving the Accountability Issue . . . . . . . . . . 91--93 Khaled M. Khan and Qutaibah Malluhi Trust in Cloud Services: Providing More Controls to Clients . . . . . . . . . . 94--96 Anonymous Computer Society Connection . . . . . . 97--98 Anonymous Call and Calendar . . . . . . . . . . . 99--102 David Alan Grier Short-Term Loan . . . . . . . . . . . . 112
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Charles Severance Len Kleinrock: The Theory of Packets [Computing Conversations] . . . . . . . 6--8 Brian M. Gaff and Joanna M. Dombrowski Ten Things to Know about Applying for Non-US Patents . . . . . . . . . . . . . 9--11 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Lee Garber The Lowly API Is Ready to Step Front and Center . . . . . . . . . . . . . . . . . 14--17 Lee Garber News Briefs . . . . . . . . . . . . . . 18--20 Greg Atwood and Soo-Ik Chae and Simon S. Y. Shim Next-Generation Memory [Guest Editors' introduction] . . . . . . . . . . . . . 21--22 Yan Li and Khandker N. Quader NAND Flash Memory: Challenges and Opportunities . . . . . . . . . . . . . 23--29 Yoon-Jong Song and Gitae Jeong and In-Gyu Baek and Jungdal Choi What Lies Ahead for Resistance-Based Memory Technologies? . . . . . . . . . . 30--36 Amber Huffman and Dale Juenemann The Nonvolatile Memory Transformation of Client Storage . . . . . . . . . . . . . 38--44 Anirudh Badam How Persistent Memory Will Change Software Systems . . . . . . . . . . . . 45--51 Steven Swanson and Adrian M. Caulfield Refactor, Reduce, Recycle: Restructuring the I/O Stack for the Future of Storage 52--59 Kaiping Liu and Hee Beng Kuan Tan and Xu Chen Binary Code Analysis . . . . . . . . . . 60--68 Elise van den Hoven and Evelien van de Garde-Perik and Serge Offermans and Koen van Boerdonk and Kars-Michiel H. Lenssen Moving Tangible Interaction Systems to the Next Level . . . . . . . . . . . . . 70--76 Eric Brechner Getting Diagonal on the Xbox One Trifecta . . . . . . . . . . . . . . . . 77--78 Lawrence O'Gorman Putting a Kinder Face on Public Cameras 79--81 Emil Vassev and Mike Hinchey Autonomy Requirements Engineering . . . 82--84 Bjorn Hartmann and Paul K. Wright Designing Bespoke Interactive Devices 85--89 Patrick Fiaux and Maoyuan Sun and Lauren Bradel and Chris North and Naren Ramakrishnan and Alex Endert Bixplorer: Visual Analytics with Biclusters . . . . . . . . . . . . . . . 90--94 Cameron Wilson What's Up Next for Code.org? . . . . . . 95--97 Anonymous IEEE Computer Society Election . . . . . 98--106 Anonymous IEEE President-Elect Candidates Address Computer Society Concerns . . . . . . . 107--112 Anonymous Call and Calendar . . . . . . . . . . . 113--117 David Alan Grier The Tenor of Our Times . . . . . . . . . 128
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--7 Anonymous Letters . . . . . . . . . . . . . . . . 10--12 Charles Severance John C. Hollar: History of Computing . . 13--14 Brian M. Gaff and Alyssa Harvey Dawson Working with Your Legal Department . . . 17--19 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 20--21 Neal Leavitt Storage Challenge: Where Will All That Big Data Go? . . . . . . . . . . . . . . 22--25 Anonymous News Briefs . . . . . . . . . . . . . . 26--28 Mark Guzdial and Betsy DiSalvo Computing Education: Beyond the Classroom . . . . . . . . . . . . . . . 30--31 Maria Knobelsdorf and Jan Vahrenhold Addressing the Full Range of Students: Challenges in K--12 Computer Science Education . . . . . . . . . . . . . . . 32--37 Kylie Peppler STEAM-Powered Computing Education: Using E-Textiles to Integrate the Arts and STEM . . . . . . . . . . . . . . . . . . 38--43 Sally Fincher and Daniel Knox The Porous Classroom: Professional Practices in the Computing Curriculum 44--51 Karen Brennan Learning Computing through Creating and Connecting . . . . . . . . . . . . . . . 52--59 Allison Elliott Tew and Brian Dorn The Case for Validated Tools in Computer Science Education Research . . . . . . . 60--66 Dean N. Williams and Timo Bremer and Charles Doutriaux and John Patchett and Sean Williams and Galen Shipman and Ross Miller and David R. Pugmire and Brian Smith and Chad Steed and E. Wes Bethel and Hank Childs and Harinarayan Krishnan and Prabhat Prabhat and Michael Wehner and Claudio T. Silva and Emanuele Santos and David Koop and Tommy Ellqvist and Jorge Poco and Berk Geveci and Aashish Chaudhary and Andy Bauer and Alexander Pletzer and Dave Kindig and Gerald L. Potter and Thomas P. Maxwell Ultrascale Visualization of Climate Data 68--76 Jianwei Niu and Jing Peng and Lei Shu and Chao Tong and Wanjiun Liao An Empirical Study of a Chinese Online Social Network --- Renren . . . . . . . 78--84 Rogerio Luis de Carvalho Costa and Pedro Furtado Providing Quality of Experience for Users: The Next DBMS Challenge . . . . . 86--93 Karl Ricanek The Next Biometric Challenge: Medical Alterations . . . . . . . . . . . . . . 94--96 Beth Cohen PaaS: New Opportunities for Cloud Application Development . . . . . . . . 97--100 Brian David Johnson That Copernican Moment . . . . . . . . . 101--103 Hal Berghel Toxic Cookies . . . . . . . . . . . . . 104--107 Anonymous Computer Society Connection . . . . . . 108--109 Anonymous Call and Calendar . . . . . . . . . . . 110--113 David Alan Grier The Errant Hashtag: For the Common Good 124
Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--7 Anonymous Letters . . . . . . . . . . . . . . . . 10--12 Charles Severance Eben Upton: Raspberry Pi . . . . . . . . 14--16 Brian M. Gaff and Greg Hendershott So, You Want to Start a Software Company? . . . . . . . . . . . . . . . . 17--19 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 20--21 Lee Garber Gestural Technology: Moving Interfaces in a New Direction [Technology News] . . 22--25 Anonymous News Briefs . . . . . . . . . . . . . . 26--28 Srinivas Devadas Toward a Coherent Multicore Memory Model 30--31 Matthew Schuchhardt and Abhishek Das and Nikos Hardavellas and Gokhan Memik and Alok Choudhary The Impact of Dynamic Directories on Multicore Interconnects . . . . . . . . 32--39 Arrvindh Shriraman and Hongzhou Zhao and Sandhya Dwarkadas An Application-Tailored Approach to Hardware Cache Coherence . . . . . . . . 40--47 Tushar Krishna and Chia-Hsin Owen Chen and Sunghyun Park and Woo-Cheol Kwon and Suvinay Subramanian and Anantha P. Chandrakasan and Li-Shiuan Peh Single-Cycle Multihop Asynchronous Repeated Traversal: A SMART Future for Reconfigurable On-Chip Networks . . . . 48--55 Qingchuan Shi and Omer Khan Toward Holistic Soft-Error-Resilient Shared-Memory Multicores . . . . . . . . 56--64 Michiel van Genuchten and Les Hatton Quantifying Software's Impact . . . . . 66--72 Cristina Alcaraz and Sherali Zeadally Critical Control System Protection in the 21st Century . . . . . . . . . . . . 74--83 Nir Kshetri and San Murugesan EU and US Cybersecurity Strategies and Their Impact on Businesses and Consumers 84--88 Grace Metri and Manuj Sabharwal and Sundar Iyer and Abhishek Agrawal Hardware/Software Codesign to Optimize SoC Device Battery Life . . . . . . . . 89--92 Charles Severance MOOCs: An Insider's View . . . . . . . . 93--96 Lorraine Morgan and Kieran Conboy Key Factors Impacting Cloud Computing Adoption . . . . . . . . . . . . . . . . 97--99 Keri Johnson and Jebediah Pavleas and Jack Chang Kinecting to Mathematics through Embodied Interactions . . . . . . . . . 101--104 Kai Kunze and Masakazu Iwamura and Koichi Kise and Seiichi Uchida and Shinichiro Omachi Activity Recognition for the Mind: Toward a Cognitive ``Quantified Self'' 105--108 Anonymous Computer Society Connection . . . . . . 109--110 Anonymous Call and Calendar . . . . . . . . . . . 114--119 David Alan Grier Not Part of the Plan . . . . . . . . . . 136
Anonymous [Front cover] . . . . . . . . . . . . . c1 Anonymous [Masthead] . . . . . . . . . . . . . . . 1 Anonymous Table of contents . . . . . . . . . . . 2--3 Anonymous IEEE Computer Society Membership [Advertisement] . . . . . . . . . . . . 4--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--7 Charles Severance Ian Horrocks: Standardizing OWL . . . . 8--9 Brian M. Gaff and David J. Levine and Raymond Gabriel Understanding US Trade Controls . . . . 10--13 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 14--15 Neal Leavitt Today's Mobile Security Requires a New Approach . . . . . . . . . . . . . . . . 16--19 Lee Garber News Briefs . . . . . . . . . . . . . . 20--22 Tiziana Margaria and Mike Hinchey Simplicity in IT: The Power of Less . . 23--25 Barry D. Floyd and Steve Bosselmann ITSy --- Simplicity Research in Information and Communication Technology 26--32 Jan Bosch Achieving Simplicity with the Three-Layer Product Model . . . . . . . 34--39 Cristina Seceleanu and Ivica Crnkovic Component Models for Reasoning . . . . . 40--47 Anna-Lena Lamprecht and Stefan Naujokat and Ina Schaefer Variability Management beyond Feature Models . . . . . . . . . . . . . . . . . 48--54 Johannes Neubauer and Bernhard Steffen Plug-and-Play Higher-Order Process Integration . . . . . . . . . . . . . . 56--62 Chandra Prasad and Wolfram Schulte Taking Control of Your Engineering Tools 63--66 Anonymous IEEE Computer Society Information . . . 67 Tiberiu Seceleanu and Gaetana Sapienza A Tool Integration Framework for Sustainable Embedded Systems Development 68--71 Regina Herzlinger and Margo Seltzer and Mark Gaynor Applying KISS to Healthcare Information Technology . . . . . . . . . . . . . . . 72--74 Arshdeep Bahga and Vijay K. Madisetti Rapid Prototyping of Multitier Cloud-Based Services and Systems . . . . 76--83 James Bret Michael and Phillip A. Laplante and Jeffery Payne and Paul E. Black and Jeffrey M. Voas Does Security Trump Reliability? . . . . 84--86 David S. L. Wei and San Murugesan and Sy-Yen Kuo and Kshirasagar Naik and Danny Krizanc Enhancing Data Integrity and Privacy in the Cloud: An Agenda . . . . . . . . . . 87--90 Joshua C. Klontz and Anil K. Jain A Case Study of Automated Face Recognition: The Boston Marathon Bombings Suspects . . . . . . . . . . . 91--94 Brian David Johnson Jimmy Takes Manhattan . . . . . . . . . 95--98 Anonymous Computer Society Connection . . . . . . 99--101 Anonymous Call and Calendar . . . . . . . . . . . 102--105 David Alan Grier The Trappings of Power . . . . . . . . . 120 Anonymous CES [Advertisement] . . . . . . . . . . c4
Anonymous [Front cover] . . . . . . . . . . . . . c1 Anonymous IEEE Cloud Computing . . . . . . . . . . c2 Anonymous [Masthead] . . . . . . . . . . . . . . . 1 Anonymous Table of contents . . . . . . . . . . . 2--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Alan Grier The Cycles of Continuous Improvement . . 6--8 Charles Severance Andrew Tanenbaum: Writing the Book on Networks . . . . . . . . . . . . . . . . 9--10 Brian M. Gaff and Judy St. John Legal Careers for Engineers . . . . . . 11--13 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 14--15 Lee Garber Robot OS: A New Day for Robot Design . . 16--20 Anonymous News Briefs . . . . . . . . . . . . . . 21--23 Vladimir Getov Computing Laws: Origins, Standing, and Impact [Guest editors' introduction] . . 24--25 Bob Metcalfe Metcalfe's Law after 40 Years of Ethernet . . . . . . . . . . . . . . . . 26--31 Tsugio Makimoto Implications of Makimoto's Wave . . . . 32--37 Gene M. Amdahl Computer Architecture and Amdahl's Law 38--46 Andrew A. Chien and Vijay Karamcheti Moore's Law: The First Ending and a New Beginning . . . . . . . . . . . . . . . 48--53 Patrick S. Ryan and Sarah Falvey and Ronak Merchant When the Cloud Goes Local: The Global Problem with Data Localization . . . . . 54--59 Roy van Pelt and Anna Vilanova Understanding Blood-Flow Dynamics: New Challenges for Visualization . . . . . . 60--67 Karim El Defrawy and Sky Faber Blindfolded Data Search via Secure Pattern Matching . . . . . . . . . . . . 68--75 Kim Schaffer Passwords, Privacy, and Policies: Can They Do Business Together? . . . . . . . 76--79 Ting Hua and Chang-Tien Lu and Naren Ramakrishnan and Feng Chen and Jaime Arredondo and David Mares and Kristen Summers Analyzing Civil Unrest through Social Media . . . . . . . . . . . . . . . . . 80--84 Ann E. K. Sobel The Escalating Cost of College . . . . . 85--87 Hy Resnick Busted: A Digital Group Game to Help At-Risk Youth Stay out of Jail . . . . . 88--90 Hal Berghel The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications . . . 91--95 Hao Han and Yinxing Xue Mashup technology: Beyond open programming interfaces . . . . . . . . . 96--99 Anonymous IEEE Computer Society Information . . . 100 Anonymous Conte Voted 2014 Computer Society President-Elect . . . . . . . . . . . . 101--103 Anonymous Computer Society Connection . . . . . . 105--106 Anonymous IEEE Computer Society Membership [Advertisement] . . . . . . . . . . . . 107 Anonymous Call and Calendar . . . . . . . . . . . 108--111 David Alan Grier The Way We Organize Ourselves . . . . . 124
Anonymous IEEE 10th World Congress on Services (Services 2014) [House Advertisement] c2 Anonymous Masthead . . . . . . . . . . . . . . . . 1 Anonymous Table of Contents . . . . . . . . . . . 2--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Dejan S. Milojicic Reinventing Relevance . . . . . . . . . 6--8 Raghu Machiraju Fixing the Mercator Projection for the Internet Age . . . . . . . . . . . . . . 9 Anonymous IEEE Computer Society [House Advertisement] . . . . . . . . . . . . . 10 Charles Severance Massimo Banzi: Building Arduino . . . . 11--12 Brian M. Gaff Corporate Risks from Social Media . . . 13--15 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 16--17 Anonymous News Briefs . . . . . . . . . . . . . . 18--21 Ron Vetter Digital Magazines: The Future of Publishing Is Here . . . . . . . . . . . 22--23 Karin Strauss and Doug Burger What the Future Holds for Solid-State Memory . . . . . . . . . . . . . . . . . 24--31 Shyamnath Gollakota and Matthew S. Reynolds and Joshua R. Smith and David J. Wetherall The Emergence of RF-Powered Computing 32--39 Anuj Kumar and Florian Metze and Matthew Kam Enabling the Rapid Development and Adoption of Speech-User Interfaces . . . 40--47 Emerson Murphy-Hill The Future of Social Learning in Software Engineering . . . . . . . . . . 48--54 Hye-Chung Kum and Ashok Krishnamurthy and Ashwin Machanavajjhala and Stanley C. Ahalt Social Genome: Putting Big Data to Work for Population Informatics . . . . . . . 56--63 Paolo Montuschi and Alfredo Benso Augmented Reading: The Present and Future of Electronic Scientific Publications . . . . . . . . . . . . . . 64--74 Eli Tilevich and Young-Woo Kwon Cloud-Based Execution to Improve Mobile Application Energy Efficiency . . . . . 75--77 Hal Berghel Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege . . . . . . . . . . . . . . . . . 78--82 Nir Kshetri Japan's Changing Cybersecurity Landscape 83--86 Brian David Johnson Utopia Rising . . . . . . . . . . . . . 87--89 Anonymous Computer Society Connection . . . . . . 90 Anonymous Call and Calendar . . . . . . . . . . . 91--93 David Alan Grier Just Out of It . . . . . . . . . . . . . 104 Anonymous IEEE Cloud Computing [House Advertisement] . . . . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society Membership House Advertisement . . . . . . . . . . . . . c2--c2 Anonymous Masthead . . . . . . . . . . . . . . . . 1 Anonymous Table of Contents . . . . . . . . . . . 2--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 David Forsyth Object Detection with Discriminatively Trained Part-Based Models . . . . . . . 6--7 Charles Severance Joseph Hardin: NCSA Mosaic . . . . . . . 8--10 Brian M. Gaff IP 2013--2014: Looking Forward and Looking Back . . . . . . . . . . . . . . 11--13 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 14--15 Lee Garber News Briefs . . . . . . . . . . . . . . 16--20 Renee Bryce and Rick Kuhn Software Testing [Guest editors' introduction] . . . . . . . . . . . . . 21--22 Midhat Ali and Francesco De Angelis and Daniele Fani and Antonia Bertolino and Guglielmo De Angelis and Andrea Polini An Extensible Framework for Online Testing of Choreographed Services . . . 23--29 Nuno Antunes and Marco Vieira Penetration Testing for Web Services . . 30--36 Cemal Yilmaz and Sandro Fouche and Myra B. Cohen and Adam Porter and Gulsen Demiroz and Ugur Koc Moving Forward with Combinatorial Interaction Testing . . . . . . . . . . 37--45 Jerry Gao and Xiaoying Bai and Wei-Tek Tsai and Tadahiro Uehara Mobile Application Testing: A Tutorial 46--55 Andreas Dahn and Clemens H. Cap Application Transparency and Manipulation . . . . . . . . . . . . . . 56--61 William J. Chimiak and Samuel T. Patton and Stephen Janansky Enhanced IP: IPv4 with 64-Bit Addresses 62--69 Manfred Broy and Albrecht Schmidt Challenges in Engineering Cyber-Physical Systems . . . . . . . . . . . . . . . . 70--72 Hal Berghel Moral Hazards, Negative Externalities, and the Surveillance Economy . . . . . . 73--77 Apostol Vassilev and Timothy A. Hall The Importance of Entropy to Information Security . . . . . . . . . . . . . . . . 78--81 Peter Gruenbaum Undergraduates Teach Game Programming Using Scratch . . . . . . . . . . . . . 82--84 Rafael Capilla and Oscar Ortiz and Mike Hinchey Context Variability for Context-Aware Systems . . . . . . . . . . . . . . . . 85--87 Jeffrey E. Froyd The Nature of Scholarship in Computing Education: An Approach from \booktitleIEEE Transactions on Education 88--90 Anonymous Computer Society Connection . . . . . . 91 Anonymous Call and Calendar . . . . . . . . . . . 92--93 David Alan Grier Practice and Theory . . . . . . . . . . 104 Anonymous IEEE Cloud Computing Magazine [House Advertisement] . . . . . . . . . . . . . c3--c3 Anonymous Rock Stars of Mobile Cloud [House Advertisement] . . . . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Software Experts Summit [House Advertisement] . . . . . . . . . . . . . c2--c2 Anonymous Masthead . . . . . . . . . . . . . . . . 1 Anonymous Table of Contents . . . . . . . . . . . 2--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Peter Brusilovsky Collective Class Wisdom: Collaborative Lecture Annotation . . . . . . . . . . . 6 Anonymous Letters . . . . . . . . . . . . . . . . 7--9 Charles Severance Computing Conversations: Len Kleinrock: The First Two Packets on the Internet 10--11 Brian M. Gaff Contracts 101 . . . . . . . . . . . . . 12--15 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 16--17 Lee Garber News Briefs . . . . . . . . . . . . . . 18--21 Chirag Shah and Robert Capra and Preben Hansen Collaborative Information Seeking [Guest editors' introduction] . . . . . . . . . 22--25 Zhe Xu and Jay Ramanathan and Rajiv Ramnath Identifying Knowledge Brokers and Their Role in Enterprise Research through Social Media . . . . . . . . . . . . . . 26--31 Yihan Tao and Anastasios Tombros Investigating Collaborative Sensemaking Behavior in Collaborative Information Seeking . . . . . . . . . . . . . . . . 38--45 Zhen Yue and Shuguang Han and Daqing He and Jiepu Jiang Influences on Query Reformulation in Collaborative Web Search . . . . . . . . 46--53 Marti A. Hearst What's Missing from Collaborative Search? . . . . . . . . . . . . . . . . 58--61 Zheng Chen and Jian-Tao Sun and Xuedong Huang Web Information at Your Fingertips: Paper as an Interaction Metaphor . . . . 62--66 Christian Timmerer and Benjamin Rainer The Social Multimedia Experience . . . . 67--69 Hal Berghel STEM, Revisited . . . . . . . . . . . . 70--73 Hugo Placido da Silva and Ana Fred Harnessing the Power of Biosignals . . . 74--77 Kirk Cameron The Evolution of Power Measurement . . . 78--80 Gary McGraw Security Fatigue? Shift Your Paradigm 81--83 Brian David Johnson The Darwin App . . . . . . . . . . . . . 84--86 Anonymous Computer Society Connection . . . . . . 87 Anonymous Call and Calendar . . . . . . . . . . . 88--89 David Alan Grier Assets to the Table . . . . . . . . . . 100 Anonymous Rock Stars of Mobile Cloud [House Advertisement] . . . . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1 Anonymous Fuel Your Imagination [House Advertisement] . . . . . . . . . . . . . c2 Anonymous Masthead . . . . . . . . . . . . . . . . 1 Anonymous Table of Contents . . . . . . . . . . . 2--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Ling Liu Service Selection and Recommendation through Collective Intelligence . . . . 6 Charles Severance Doug Van Houweling: Building the NSFNet 7--9 Brian M. Gaff Readers' Choice [Intellectual Property laws] . . . . . . . . . . . . . . . . . 10--12 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 13--14 Anonymous News Briefs . . . . . . . . . . . . . . 15--19 Carl Chang and Bill N. Schilit Aware Computing [Guest Editors' introduction] . . . . . . . . . . . . . 20--21 Sarah Vieweg and Adam Hodges Rethinking Context: Leveraging Human and Machine Computation in Disaster Response 22--27 Mohammed Ehsan Hoque and Rosalind W. Picard Rich Nonverbal Sensing Technology for Automated Social Skills Training . . . . 28--35 Mark Matthews and Saeed Abdullah and Geri Gay and Tanzeem Choudhury Tracking Mental Well-Being: Balancing Rich Sensing and Patient Needs . . . . . 36--43 Giampiero E. G. Beroggi Internet Voting: An Empirical Evaluation 44--50 Anonymous Software Experts Summit [House Advertisement] . . . . . . . . . . . . . 51 Juan R. Terven and Joaquin Salas and Bogdan Raducanu New Opportunities for Computer Vision-Based Assistive Technology Systems for the Visually Impaired . . . 52--58 Ying-Dar Lin and Chia-Yin Lee and Yu-Sung Wu and Pei-Hsiu Ho and Fu-Yu Wang and Yi-Lang Tsai Active versus Passive Malware Collection 59--65 Hal Berghel Mr. Snowden's Legacy . . . . . . . . . . 66--70 Katia Vega and Hugo Fuks Beauty Technology: Body Surface Computing . . . . . . . . . . . . . . . 71--75 Jooyoung Kim and Dong Sun Shin and Dae Ok Kim and Dae Hyun Lee and Jaekeun Kwak and Antonio Di Carlo and Alberto Paoluzzi and Kazuomi Sugamoto and Young Lae Moon Standardizing $3$D Medical Imaging . . . 76--79 Sarah Beecham and Padraig O'Leary and Sean Baker and Ita Richardson and John Noll Making Software Engineering Research Relevant . . . . . . . . . . . . . . . . 80--83 George F. Hurlburt and Jeffrey Voas Big Data, Networked Worlds . . . . . . . 84--87 Fernando Arnez and Jason Pace and Kelvin Sung Learning while Building Games for Teaching . . . . . . . . . . . . . . . . 88--91 Sorel Reisman The Future of Online Instruction, Part 1 92--93 Patrick Butler and Naren Ramakrishnan and Elaine O. Nsoesie and John S. Brownstein Satellite Imagery Analysis: What Can Hospital Parking Lots Tell Us about a Disease Outbreak? . . . . . . . . . . . 94--97 Gopal Pingali and T. S. Mohan The Cloud Ascends in Emerging Markets: Highlights of IEEE CCEM 2013 . . . . . . 98--101 Anonymous Computer Society Connection . . . . . . 102 Anonymous Call and Calendar . . . . . . . . . . . 103--105 David Alan Grier All That Glitters Is Not Gold . . . . . 116 Anonymous Instant Access to IEEE Publications [House Advertisement] . . . . . . . . . c3 Anonymous Rock Stars of Mobile Cloud [House Advertisement] . . . . . . . . . . . . . c4
Anonymous Front Cover . . . . . . . . . . . . . . c1 Anonymous Masthead . . . . . . . . . . . . . . . . 1 Anonymous Table of Contents . . . . . . . . . . . 2--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Albert Zomaya Power-Performance Tradeoff in a Federated Cloud . . . . . . . . . . . . 6--7 Anonymous Conferences in the Palm of Your Hand [House Advertisement] . . . . . . . . . 8 Charles Severance Nathaniel Borenstein: Multipurpose Internet Mail Extensions (MIME) . . . . 9--11 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Anonymous Stay Connected [House Advertisement] . . 14 Anonymous Letters . . . . . . . . . . . . . . . . 15--17 Anonymous News Briefs . . . . . . . . . . . . . . 18--22 Martin Reisslein and Bernhard Rinner and Amit Roy-Chowdhury Smart Camera Networks [Guest editors' introduction] . . . . . . . . . . . . . 23--25 Ching-Hui Chen and Julien Favre and Gregorij Kurillo and Thomas P. Andriacchi and Ruzena Bajcsy and Rama Chellappa Camera Networks for Healthcare, Teleimmersion, and Surveillance . . . . 26--36 Kevin Abas and Caio Porto and Katia Obraczka Wireless Smart Camera Networks for the Surveillance of Public Spaces . . . . . 37--44 Andrea Prati and Faisal Z. Qureshi Integrating Consumer Smart Cameras into Camera Networks: Opportunities and Obstacles . . . . . . . . . . . . . . . 45--51 Kaushik Mitra and Ashok Veeraraghavan and Aswin C. Sankaranarayanan and Richard G. Baraniuk Toward Compressive Camera Networks . . . 52--59 Zhangyu Guan and Tommaso Melodia Cloud-Assisted Smart Camera Networks for Energy-Efficient $3$D Video Streaming 60--66 Juan C. SanMiguel and Christian Micheloni and Karen Shoop and Gian Luca Foresti and Andrea Cavallaro Self-Reconfigurable Smart Camera Networks . . . . . . . . . . . . . . . . 67--73 Xian-He Sun and Dawei Wang Concurrent Average Memory Access Time 74--80 Wen Gao and Tiejun Huang and Cliff Reader and Weibei Dou and Xilin Chen IEEE Standards for Advanced Audio and Video Coding in Emerging Applications 81--83 Symeon Papadopoulos and Yiannis Kompatsiaris Social Multimedia Crawling for Mining and Search . . . . . . . . . . . . . . . 84--87 Michael Cheng Yi Cho and Pokai Chen and Shiuhpyng Winston Shieh Dmail: A Globally Authenticated Email Service . . . . . . . . . . . . . . . . 88--91 Chris Preist and Dan Schien and Paul Shabajee and Stephen Wood and Christopher Hodgson Analyzing End-to-End Energy Consumption for Digital Services . . . . . . . . . . 92--95 Kevin W. Bowyer and James S. Doyle Cosmetic Contact Lenses and Iris Recognition Spoofing . . . . . . . . . . 96--98 Brian David Johnson A New Doorway into Time . . . . . . . . 99--101 Hal Berghel PII, the FTC, Car Dealers, and You . . . 102--106 Anonymous Computer Society Connection . . . . . . 107 Anonymous Call and Calendar . . . . . . . . . . . 108--111 Anonymous Focus on Your Job Search [House Advertisement] . . . . . . . . . . . . . 119 David Alan Grier The Real Change [The Errant Hashtag] . . 120 Anonymous Membership Matters [House Advertisement] c3
Anonymous Front Cover . . . . . . . . . . . . . . c1 Anonymous Rock Stars of Cybersecurity [House Advertisement] . . . . . . . . . . . . . c2 Anonymous Masthead . . . . . . . . . . . . . . . . 1 Anonymous Table of Contents . . . . . . . . . . . 2--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Song Guo On-Time Warning Delivery for Vehicular Ad Hoc Networks . . . . . . . . . . . . 6 Brian M. Gaff and Heather Egan Sussman and Jennifer Geetter Privacy and Big Data . . . . . . . . . . 7--9 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11 Lee Garber News Briefs . . . . . . . . . . . . . . 12--17 Anonymous Letters . . . . . . . . . . . . . . . . 18--19 Anonymous IEEE Security & Privacy [House Advertisement] . . . . . . . . . . . . . 20 Ying-Dar Lin and Chun-Ying Huang and Matthew Wright and Georgios Kambourakis Mobile Application Security . . . . . . 21--23 Guillermo Suarez-Tangil and Juan E. Tapiador and Flavio Lombardi and Roberto Di Pietro Thwarting Obfuscated Malware via Differential Fault Analysis . . . . . . 24--31 Yuru Shao and Xiapu Luo and Chenxiong Qian RootGuard: Protecting Rooted Android Phones . . . . . . . . . . . . . . . . . 32--40 Anonymous Membership Matters [House Advertisement] 41 Felix Gomez Marmol and Gregor Rozinaj and Sebastian Schumann and Ondrej Labaj and Juraj Kacur Smart AppStore: Expanding the Frontiers of Smartphone Ecosystems . . . . . . . . 42--47 Alessandro Armando and Gabriele Costa and Luca Verderame and Alessio Merlo Securing the ``Bring Your Own Device'' Paradigm . . . . . . . . . . . . . . . . 48--56 Olga Gadyatskaya and Fabio Massacci and Yury Zhauniarovich Security in the Firefox OS and Tizen Mobile Platforms . . . . . . . . . . . . 57--63 Hal Berghel Leadership Failures in the National Security Complex . . . . . . . . . . . . 64--67 Benoit Combemale and Julien DeAntoni and Benoit Baudry and Robert B. France and Jean-Marc Jezequel and Jeff Gray Globalizing Modeling Languages . . . . . 68--71 Irena Bojanova and George Hurlburt and Jeffrey Voas Imagineering an Internet of Anything . . 72--77 Jason Pace Working with Students Where Theory and Practice Intersect . . . . . . . . . . . 78--80 Anonymous IEEE Computer Society Information [House Advertisement] . . . . . . . . . . . . . 81 Sorel Reisman The Future of Online Instruction, Part 2 82--84 Edwin Sturrus and Olga Kulikova Orchestrating Hybrid Cloud Deployment: An Overview . . . . . . . . . . . . . . 85--87 Anonymous Computer Society Connection . . . . . . 88--89 Anonymous Call and Calendar . . . . . . . . . . . 90--93 David Alan Grier Peace in Our Time . . . . . . . . . . . 104
Anonymous Front Cover . . . . . . . . . . . . . . c1 Anonymous Masthead . . . . . . . . . . . . . . . . 1 Anonymous Table of Contents . . . . . . . . . . . 2--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Jian Pei Managing Data-Intensive Applications in the Cloud . . . . . . . . . . . . . . . 6 Charles Severance Andrew S. Tanenbaum: The Impact of MINIX 7--8 Brian M. Gaff Supreme Court IP Update . . . . . . . . 9--12 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 13--14 Anonymous Letters . . . . . . . . . . . . . . . . 15 Anonymous News Briefs . . . . . . . . . . . . . . 16--21 Oliver Bimber Thinking Virtual . . . . . . . . . . . . 22--23 Mel Slater and Maria V. Sanchez-Vives Transcending the Self in Immersive Virtual Reality . . . . . . . . . . . . 24--30 Albert Rizzo and Arno Hartholt and Mario Grimani and Andrew Leeds and Matt Liewer Virtual Reality Exposure Therapy for Combat-Related Posttraumatic Stress Disorder . . . . . . . . . . . . . . . . 31--37 John R. Stowers and Anton Fuhrmann and Maximilian Hofbauer and Martin Streinzer and Axel Schmid and Michael H. Dickinson and Andrew D. Straw Reverse Engineering Animal Vision with Virtual Reality and Genetics . . . . . . 38--45 Henry Fuchs and Andrei State and Jean-Charles Bazin Immersive $3$D Telepresence . . . . . . 46--52 Xia Yang and Nan Sang and Jim Alves-Foss Shortening the Boot Time of Android OS 53--58 Minyong Kim and Young Geun Kim and Sung Woo Chung and Cheol Hong Kim Measuring Variance between Smartphone Energy Consumption and Battery Life . . 59--65 Youngjung Ahn and Yongsuk Lee and Jin-Young Choi and Gyungho Lee and Dongkyun Ahn Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks . . . . 66--72 Brian David Johnson Talking to the Future . . . . . . . . . 73--75 Hal Berghel Robert David Steele on OSINT . . . . . . 76--81 Dimitrios S. Nikolopoulos and Hans Vandierendonck and Nikolaos Bellas and Christos D. Antonopoulos and Spyros Lalis and Georgios Karakonstantis and Andreas Burg and Uwe Naumann Energy Efficiency through Significance-Based Computing . . . . . . 82--85 Pablo Cesar and Rene Kaiser and Marian F. Ursu Toward Connected Shared Experiences . . 86--89 Chi-Wei Wang and Chia-Wei Wang and Chu-An Hsieh and Shiuhpyng Winston Shieh Cloudebug: A Programmable Online Malware Testbed . . . . . . . . . . . . . . . . 90--92 Paul Nikolich 802 LAN/MAN Standards: High Quality and Market Relevant . . . . . . . . . . . . 93--95 Anonymous Computer Society Connection . . . . . . 96--97 Anonymous Call and Calendar . . . . . . . . . . . 98--101 David Alan Grier The Half-Told Lie . . . . . . . . . . . 108 Anonymous IEEE International Conference on Cloud Engineering (IC2E 2015) . . . . . . . . c4
Anonymous Fuel your imagination [House Advertisement] . . . . . . . . . . . . . c2 Anonymous Masthead . . . . . . . . . . . . . . . . 1 Anonymous Table of Contents . . . . . . . . . . . 2--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 John Grundy Determining the Cause of Design Model Inconsistencies . . . . . . . . . . . . 6 Charles Severance Elizabeth Fong: Creating the SQL Database Standards . . . . . . . . . . . 7--8 Brian M. Gaff and Bruce Rubinger The Significance of Prior Art . . . . . 9--11 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Anonymous News Briefs . . . . . . . . . . . . . . 14--18 Anonymous 2015 Richard E. Merwin Distinguished Service Award [Call for award nominations] . . . . . . . . . . . . . . 19 Ron Vetter Technology Commercialization in the Innovation Economy [Guest Editor's introduction] . . . . . . . . . . . . . 20--21 Gary L. Miller and Robert R. Hoon The Role of Public Comprehensive Universities in Closing the Innovation Deficit . . . . . . . . . . . . . . . . 22--27 Elyse N. Ball and Kenneth G. Preston University Commercialization Models: The University of Akron . . . . . . . . . . 28--36 Audrey Speicher tekMountain: A Community-Driven Corporate Incubator . . . . . . . . . . 37--39 Savitha Srinivasan and Isaac Barchas and Mark Gorenberg and Evangelos Simoudis Venture Capital: Fueling the Innovation Economy . . . . . . . . . . . . . . . . 40--47 Ian Gorton Cyberinfrastructures: Bridging the Divide between Scientific Research and Software Engineering . . . . . . . . . . 48--55 Sebastian Boring and Saul Greenberg and Jo Vermeulen and Jakub Dostal and Nicolai Marquardt The Dark Patterns of Proxemic Sensing 56--60 Anonymous Rock Stars of Cybersecurity [House Advertisement] . . . . . . . . . . . . . 61 Nabor C. Mendonca Architectural Options for Cloud Migration . . . . . . . . . . . . . . . 62--66 Ernest L. McDuffie and Victor P. Piotrowski The Future of Cybersecurity Education 67--69 Hal Berghel The Future of Digital Money Laundering 70--75 Dirk Basten and Thomas Hoerstrup Organizational Effort Estimation . . . . 76--79 David A. Wheeler Preventing Heartbleed . . . . . . . . . 80--83 Christiane Gresse von Wangenheim and Aldo von Wangenheim Teaching Game Programming in Family Workshops . . . . . . . . . . . . . . . 84--87 Anonymous IEEE Computer Society Election . . . . . 88--97 Anonymous IEEE President-Elect Candidates Address Computer Society Concerns . . . . . . . 98--102 Anonymous Call and Calendar . . . . . . . . . . . 103--107 David Alan Grier The Guest at the Feast . . . . . . . . . 116 Anonymous Call for Papers [House Advertisement] c3
Anonymous [Masthead] . . . . . . . . . . . . . . . 1--1 Anonymous Table of contents . . . . . . . . . . . 2--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Prasant Mohapatra Channel Bonding in Evolving Wireless LANs . . . . . . . . . . . . . . . . . . 6--6 Charles Severance Nii Quaynor: Bringing the Internet to Africa . . . . . . . . . . . . . . . . . 7--9 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11 Anonymous Richard E. Merwin Distinguished Service Award . . . . . . . . . . . . . . . . . 12--12 Anonymous Instant Access to IEEE Publications [advertisement] . . . . . . . . . . . . 13--13 Anonymous Letters . . . . . . . . . . . . . . . . 14--16 Anonymous News Briefs . . . . . . . . . . . . . . 17--21 Anonymous Rock Stars of Big Data Analytics [advertisement] . . . . . . . . . . . . 22--22 Victor Pankratius and Chris Mattmann Computing in Astronomy: To See the Unseen . . . . . . . . . . . . . . . . . 23--25 Mark Jenne and Owen Boberg and Hasan Kurban and Mehmet Dalkilic Studying the Milky Way Galaxy Using ParaHeap-k . . . . . . . . . . . . . . . 26--33 Daniel Frascarelli and Sergio Nesmachnow and Gonzalo Tancredi High-Performance Computing of Self-Gravity for Small Solar System Bodies . . . . . . . . . . . . . . . . . 34--39 Anonymous Membership Matters [advertisement] . . . 40--40 Stefan C. Muller and Gustavo Alonso and Andre Csillaghy Scaling Astroinformatics: Python + Automatic Parallelization . . . . . . . 41--47 Rik Jongerius and Stefan Wijnholds and Ronald Nijboer and Henk Corporaal An End-to-End Computing Model for the Square Kilometre Array . . . . . . . . . 48--54 Anonymous IEEE Computer Society Harlan D. Mills Award: Call for software engineering award nominations . . . . . . . . . . . 55--55 Lisa Gerhardt and Juan Carlos Diaz Velez and Spencer R. Klein Adventures in Antarctic Computing, or How I Learned to Stop Worrying and Love the Neutrino . . . . . . . . . . . . . . 56--61 F. Alexander Bogert and Nicholas Smith and John Holdener and Eric M. De Jong and Andrew F. Hart and Luca Cinquini and Shakeh E. Khudikyan and David R. Thompson and Chris A. Mattmann and Kiri Wagstaff and Joseph Lazio and Dayton L. Jones and Alice Allen and Lior Shamir and Peter Teuben Computing in Astronomy: Applications and Examples . . . . . . . . . . . . . . . . 62--69 Zachary A. Collier and Daniel DiMase and Steve Walters and Mark Mohammad Tehranipoor and James H. Lambert and Igor Linkov Cybersecurity Standards: Managing Risk and Creating Resilience . . . . . . . . 70--76 Anonymous Call for papers . . . . . . . . . . . . 77--77 Hillery Hunter and Luis A. Lastras-Montano and Bishwaranjan Bhattacharjee Adapting Server Systems for New Memory Technologies . . . . . . . . . . . . . . 78--84 Julie Hubschman My Summer with a Robot . . . . . . . . . 85--86 Karl Ricanek Beyond Recognition: The Promise of Biometric Analytics . . . . . . . . . . 87--89 Hal Berghel Sticky Wikis . . . . . . . . . . . . . . 90--93 John Wack IEEE VSSC/1622: Voting System Standards 94--97 Tobias Hossfeld and Christian Keimel and Christian Timmerer Crowdsourcing Quality-of-Experience Assessments . . . . . . . . . . . . . . 98--102 Robin A. Gandhi and Keesha Crosby and Harvey Siy and Sayonnha Mandal Gauging the Impact of FISMA on Software Security . . . . . . . . . . . . . . . . 103--107 Anonymous Computer Society Connection . . . . . . 108--108 Anonymous Call and Calendar . . . . . . . . . . . 109--112 Anonymous Symantec House Advertisement . . . . . . 113--113 Anonymous Career opportunities . . . . . . . . . . 114--119 David Alan Grier The Point of Recognition . . . . . . . . 120--120 Anonymous IEEE Advertisement . . . . . . . . . . . c3--c3 Anonymous 2015 International CES House Advertisement . . . . . . . . . . . . . c2--c2 Anonymous Keep the Office Safe wherever you work c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 1--1 Anonymous Call for Papers House Advertisement . . 3--3 Anonymous IEEE SOSE 2015 Advertisement . . . . . . 5--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--7 Leonard Heilig A View on Cloud Computing from above the Clouds . . . . . . . . . . . . . . . . . 8--8 Brian M. Gaff $3$D IP . . . . . . . . . . . . . . . . 9--11 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Anonymous News Briefs . . . . . . . . . . . . . . 14--20 Anonymous 2015 International CES Advertisement . . 21--21 Carlos E. Jimenez and Agusti Solanas and Francisco Falcone E-Government Interoperability: Linking Open and Smart Government . . . . . . . 22--24 Konstantinos Bovalis and Vassilios Peristeras and Margarida Abecasis and Raul-Mario Abril-Jimenez and Miguel Alvarez Rodriguez and Corinne Gattegno and Athanasios Karalopoulos and Ioannis Sagias and Szabolcs Szekacs and Suzanne Wigard Promoting Interoperability in Europe's E-Government . . . . . . . . . . . . . . 25--33 Mario Kovac E-Health Demystified: An E-Government Showcase . . . . . . . . . . . . . . . . 34--42 Anonymous IEEE Advertisement . . . . . . . . . . . 43--43 Marijn Janssen and Elsa Estevez and Tomasz Janowski Interoperability in Big, Open, and Linked Data --- Organizational Maturity, Capabilities, and Data Portfolios . . . 44--49 Pieter Colpaert and Mathias Van Compernolle and Laurens De Vocht and Anastasia Dimou and Miel Vander Sande and Ruben Verborgh and Peter Mechant and Erik Mannens Quantifying the Interoperability of Open Government Datasets . . . . . . . . . . 50--56 Martin le Vrang and Agis Papantoniou and Erika Pauwels and Pieter Fannes and Dominique Vandensteen and Johan De Smedt ESCO: Boosting Job Matching in Europe with Semantic Interoperability . . . . . 57--64 Jesus Cano and Roberto Hernandez and Salvador Ros Distributed Framework for Electronic Democracy in Smart Cities . . . . . . . 65--71 Pu Liu and Zhenghong Peng China's Smart City Pilots: A Progress Report . . . . . . . . . . . . . . . . . 72--81 Stefano Secci and San Murugesan Cloud Networks: Enhancing Performance and Resiliency . . . . . . . . . . . . . 82--85 Jonathan P. Bowen and Mike Hinchey and Helge Janicke and Martin Ward and Hussein Zedan Formality, Agility, Security, and Evolution in Software Development . . . 86--89 Wendy DuBow Attracting and Retaining Women in Computing . . . . . . . . . . . . . . . 90--93 Hal Berghel Defending against Big Dada: Defensive Tactics for Weapons of Mass Deception 94--98 Jason W. Bay Turning Video Gamers into Software Developers . . . . . . . . . . . . . . . 99--101 Apostol Vassilev and Christopher Celi Avoiding Cyberspace Catastrophes through Smarter Testing . . . . . . . . . . . . 102--106 Anonymous Call and Calendar . . . . . . . . . . . 107--109 Anonymous Career Opportunities . . . . . . . . . . 110--125 Anonymous Rock Stars of Big Data Analytics House Advertisement . . . . . . . . . . . . . 126--126 Anonymous IEEE Cloud Computing House Advertisement 127--127 David Alan Grier Lying to the Future . . . . . . . . . . 128--128 Anonymous IEEE Advertisement . . . . . . . . . . . c3--c3 Anonymous Samsung Advertisement: The Next Big Thing for Business is Here . . . . . . . c2--c2 Anonymous Samsung Advertisement: One Giant Leap Forward . . . . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 1--1 Anonymous Bring IT to Life Advertisement . . . . . 3--3 Anonymous Bring IT to Life Advertisement . . . . . 5--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--7 Roberta L. Klatzky and J. Edward Colgate Rendering Tactile Features on Touchscreens . . . . . . . . . . . . . . 8--8 Anonymous Discover the Best Tools and Solutions from Wiley and Wiley-IEEE Computer Press House Advertisement . . . . . . . . . . 9--9 Charles Severance Ian Foster and the Globus Project . . . 10--11 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Lee Garber News Briefs . . . . . . . . . . . . . . 14--18 Ying-Dar Lin and Dan Pitt and David Hausheer and Erica Johnson and Yi-Bing Lin Software-Defined Networking: Standardization for Cloud Computing's Second Wave . . . . . . . . . . . . . . 19--21 Jean Tourrilhes and Puneet Sharma and Sujata Banerjee and Justin Pettit SDN and OpenFlow Evolution: A Standards Perspective . . . . . . . . . . . . . . 22--29 Rick Bauer and Ron Milford and Li Zhen Aligning Technology and Market Drivers in an Open Source Standards Testing Program . . . . . . . . . . . . . . . . 30--36 Anonymous 2015 International CES Advertisement . . 37--37 Paul Quinn and Jim Guichard Service Function Chaining: Creating a Service Plane via Network Service Headers . . . . . . . . . . . . . . . . 38--44 Anonymous IEEE BigDataService 2015 House Advertisement . . . . . . . . . . . . . 45--45 Christian Esteve Rothenberg and Roy Chua and Josh Bailey and Martin Winter and Carlos N. A. Correa and Sidney C. de Lucena and Marcos Rogerio Salvador and Thomas D. Nadeau When Open Source Meets Network Control Planes . . . . . . . . . . . . . . . . . 46--54 Anonymous COOL Chips XVIII House Advertisement . . 55--55 Marco Canini and Anja Feldmann and Dan Levin and Fabian Schaffert and Stefan Schmid Software-Defined Networks: Incremental Deployment with Panopticon . . . . . . . 56--60 Anonymous Instant Access to IEEE Publications House Advertisement . . . . . . . . . . 61--61 Marion Dillon and Timothy Winters Virtualization of Home Network Gateways 62--65 Lindsey Lowther Defensive Biometrics . . . . . . . . . . 66--69 m.c. schraefel and Elizabeth F. Churchill Wellth Creation: Using Computer Science to Support Proactive Health . . . . . . 70--72 Anonymous Symantec Advertisement . . . . . . . . . 73--73 James H. Faghmous and Arindam Banerjee and Shashi Shekhar and Michael Steinbach and Vipin Kumar and Auroop R. Ganguly and Nagiza Samatova Theory-Guided Data Science for Climate Change . . . . . . . . . . . . . . . . . 74--78 Brian David Johnson Imagining and Building Robots (in Capes!) . . . . . . . . . . . . . . . . 79--81 Hal Berghel Why Clouds Give Me a Case of the Vapors 82--85 Ramesh Jain Toward Social Life Networks . . . . . . 86--88 Kirk W. Cameron Energy Efficiency in the Wild: Why Datacenters Fear Power Management . . . 89--92 Anonymous Fuel Your Imagination Advertisement . . 93--93 George Hurlburt and Irena Bojanova and Ann Sobel and Keesha Crosby Security or Privacy? A Matter of Perspective . . . . . . . . . . . . . . 94--98 Paul Joannou and Alan Wassyng Understanding Integrity Level Concepts 99--101 Anonymous Computer Society Connection . . . . . . 102--102 Anonymous 2015 IEEE Services Congress IEEE BigData Congress House Advertisement . . . . . . 103--103 Anonymous Call and Calendar . . . . . . . . . . . 104--107 Anonymous Career Opportunities . . . . . . . . . . 108--123 David Alan Grier The External Environment . . . . . . . . 124--124 Anonymous 29th IEEE International Parallel & Distributed Processing Symposium House Advertisement . . . . . . . . . . . . . c3--c3 Anonymous The Next Big Thing for Business is Here c2--c2 Anonymous One Giant Leap Forward . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 1--1 Anonymous The Ultimate Competitive Advantage Bring IT to Life Advertisement . . . . . . . . 3--3 Anonymous Technology to Empower the Workforce Bring IT to Life Advertisement . . . . . 5--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--7 Hai Jin When Data Grows Big . . . . . . . . . . 8--8 Anonymous Discover the Best Tools and Solutions from Wiley and Wiley-IEEE Computer Press House Advertisement . . . . . . . . . . 9--9 Dejan S. Milojicic Revitalization . . . . . . . . . . . . . 10--13 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 14--15 Anonymous News Briefs . . . . . . . . . . . . . . 16--20 Anonymous Fuel your imagination House Advertisement . . . . . . . . . . . . . 21--21 Brian David Johnson Making in the 21st Century [Guest Editor's introduction] . . . . . . . . . 22--23 Jun Axup and AnnMarie Thomas and Ariel Waldman and Susan Faulkner and Carolina Odman-Govender and Jim St. Leger and Jessica Polka and Melissa Gregg and Brian David Johnson The World of Making . . . . . . . . . . 24--40 Anonymous 2015 IEEE Service Congress and IEEE BigData Congress House Advertisement . . 41--41 Crystal Beasley and Emmeline Parsons and Melissa Pierce and Sam Baumgarten and Andrius Neviera and Shubham Banerjee and Tyesha Snow and Carla Diana and Nicholas Nakadate and Shruti Satsangi Passionate Projects: This Is What I Made 42--54 Anonymous Linkedin Corp. Advertisement . . . . . . 55--55 Yasaman Sheri and Enrique Gabriel Legaspi and Cynthia Erenas and Brian Kessler and Eri Gentry and Ruben Estrada The Future of Making . . . . . . . . . . 56--63 William Edwards and Judith Gebauer and Bryan Reinicke White Space Networks: Architecture, Application, and Opportunity . . . . . . 64--71 Alberto Bartoli and Giorgio Davanzo and Andrea De Lorenzo and Eric Medvet and Enrico Sorio Automatic Synthesis of Regular Expressions from Examples . . . . . . . 72--80 Anonymous House Advertisement . . . . . . . . . . 81--81 Eun-Sung Jung and Rajkumar Kettimuthu Challenges and Opportunities for Data-Intensive Computing in the Cloud 82--85 Carmelo Ardito and Paolo Buono and Danilo Caivano and Maria Francesca Costabile and Rosa Lanzilotti and Yvonne Dittrich Human-Centered Design in Industry: Lessons from the Trenches . . . . . . . 86--89 Fang Jin and Wei Wang and Liang Zhao and Edward Dougherty and Yang Cao and Chang-Tien Lu and Naren Ramakrishnan Misinformation Propagation in the Age of Twitter . . . . . . . . . . . . . . . . 90--94 Hal Berghel Judson Rosebush on Computer Graphics and Animation . . . . . . . . . . . . . . . 95--99 Brian Chau and Adam Robinson and Jason Pace and Rob Nash and Kelvin Sung Corrupted: A Game to Teach Programming Concepts . . . . . . . . . . . . . . . . 100--103 Alexander Kott and Ananthram Swami and Patrick McDaniel Security Outlook: Six Cyber Game Changers for the Next 15 Years . . . . . 104--106 Anonymous Call and Calendar . . . . . . . . . . . 107--110 Anonymous Fujii Voted 2015 Computer Society President-Elect . . . . . . . . . . . . 111--113 Anonymous Career Opportunities . . . . . . . . . . 114--127 David Alan Grier State Secrets . . . . . . . . . . . . . 128--128 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous If ``Expect the Unexpected'' Weren't So Expected, We'd Say that's Exactly What to Expect . . . . . . . . . . . . . . . c3--c3 Anonymous The Next Big Thing for Business is Here c2--c2 Anonymous One Giant Leap Forward . . . . . . . . . c4--c4
Anonymous Table of contents . . . . . . . . . . . 1--2 Anonymous [Masthead] . . . . . . . . . . . . . . . 3--3 Tom Conte A Time of Change . . . . . . . . . . . . 4--6 Sumi Helal Sustaining Computer's Impact and Adapting to Change . . . . . . . . . . . 7--9 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 10--11 Ying Xu Carrying out Phylogenetic Analyses through Computational Model Checking . . 12--12 Anonymous Startup Rock Stars [advertisement] . . . 13--13 Charles Severance Khan Academy and Computer Science . . . 14--15 Brian M. Gaff IP Issues for Start-ups . . . . . . . . 16--18 Anonymous Rock Stars of $3$D Printing [advertisement] . . . . . . . . . . . . 19--19 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 20--21 Anonymous News . . . . . . . . . . . . . . . . . . 22--27 Roy Want and Bill N. Schilit and Scott Jenson Enabling the Internet of Things . . . . 28--35 Fadi H. Gebara and H. Peter Hofstee and Kevin J. Nowka Second-Generation Big Data Systems . . . 36--41 Peter Fonash and Phyllis Schneck Cybersecurity: From Months to Milliseconds . . . . . . . . . . . . . . 42--50 Anonymous IEEE IRI-2015 . . . . . . . . . . . . . 51--51 Constantinos Patsakis and Paul Laird and Michael Clear and Melanie Bouroche and Agusti Solanas Interoperable Privacy-Aware E-Participation within Smart Cities . . 52--58 Stephen P. Crago and John Paul Walters Heterogeneous Cloud Computing: The Way Forward . . . . . . . . . . . . . . . . 59--61 Luca Caviglione and Wojciech Mazurczyk Understanding Information Hiding in iOS 62--65 Mitchell E. Daniels Measuring Great Jobs and Great Lives: The Gallup--Purdue Index . . . . . . . . 66--69 Ari Popper Transforming Business through Science Fiction Prototyping . . . . . . . . . . 70--72 Jennifer Costley Leveraging the Standards Life Cycle for Green IT . . . . . . . . . . . . . . . . 73--75 Hal Berghel A Paperless Gamble . . . . . . . . . . . 76--78 Anonymous CS Connection . . . . . . . . . . . . . 79--80 Anonymous Call and Calendar . . . . . . . . . . . 81--83 Anonymous Career Opportunities . . . . . . . . . . 84--91 David Alan Grier State Transitions . . . . . . . . . . . 92--92 Anonymous Call for papers . . . . . . . . . . . . c3--c3 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous 2015 IEEE Services Congress and IEEE Big Data Congress . . . . . . . . . . . . . c2--c2 Anonymous One Giant Leap Forward . . . . . . . . . c4--c4
Anonymous Table of contents . . . . . . . . . . . 1--2 Anonymous [Masthead] . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Elisa Bertino Denial-of-Service Attacks to UMTS . . . 6--6 Charles Severance Guido van Rossum: The Early Years of Python . . . . . . . . . . . . . . . . . 7--9 Brian M. Gaff BYOD? OMG! . . . . . . . . . . . . . . . 10--11 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Anonymous News . . . . . . . . . . . . . . . . . . 14--20 Alf Weaver and Renee Bryce Technological Advances in Medicine: It's Personal [Guest Editors' introduction] 21--23 Jingquan Li Ensuring Privacy in a Personal Health Record System . . . . . . . . . . . . . 24--31 Marina Velikova and Peter J. F. Lucas and Maarten van der Heijden Intelligent Disease Self-Management with Mobile Technology . . . . . . . . . . . 32--39 Anonymous Intuit, Inc. has openings for the following positions (by location) House Advertisement . . . . . . . . . . . . . 40--40 Kyungtae Kang and Qixin Wang and Junbeom Hur and Kyung-Joon Park and Lui Sha Medical-Grade Quality of Service for Real-Time Mobile Healthcare . . . . . . 41--49 Arshdeep Bahga and Vijay K. Madisetti Healthcare Data Integration and Informatics in the Cloud . . . . . . . . 50--57 Erman Ayday and Emiliano De Cristofaro and Jean-Pierre Hubaux and Gene Tsudik Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare? . . . . . 58--66 Adam P. Spring Creating Substance from a Cloud: Low-Cost Product Generation . . . . . . 67--74 Greg Byrd Spotlighting Student Innovation . . . . 75--76 Hal Berghel Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole . . . . . . . . 77--80 Emil Vassev and Mike Hinchey KnowLang: Knowledge Representation for Self-Adaptive Systems . . . . . . . . . 81--84 Vincent C. Hu and D. Richard Kuhn and David F. Ferraiolo Attribute-Based Access Control . . . . . 85--88 Anonymous CS Connection . . . . . . . . . . . . . 89--90 Anonymous Call and Calendar . . . . . . . . . . . 91--92 Anonymous Career Opportunities . . . . . . . . . . 93--99 David Alan Grier The Tyranny of Geography . . . . . . . . 100--100 Anonymous Call for papers . . . . . . . . . . . . c2--c2 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous Instant Access to IEEE Publications House Advertisement . . . . . . . . . . c3--c3 Anonymous Startup Rock Stars [Advertisement] . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Bjorn Schuller Do Computers Have Personality? . . . . . 6--7 Charles Severance Guido van Rossum: The Modern Era of Python . . . . . . . . . . . . . . . . . 8--10 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 11--12 Lee Garber News . . . . . . . . . . . . . . . . . . 13--19 Venkat N. Gudivada and Ricardo Baeza-Yates and Vijay V. Raghavan Big Data: Promises and Problems . . . . 20--23 Vito Giovanni Castellana and Alessandro Morari and Jesse Weaver and Antonino Tumeo and David Haglin and Oreste Villa and John Feo In-Memory Graph Databases for Web-Scale Data . . . . . . . . . . . . . . . . . . 24--35 Zhenyun Zhuang and Haricharan Ramachandra and Chaoyue Xiong Taming Replication Latency of Big Data Events with Capacity Planning . . . . . 36--41 Srividya K. Bansal and Sebastian Kagemann Integrating Big Data: A Semantic Extract-Transform-Load Framework . . . . 42--50 Anonymous Focus on Your Job Search House Advertisement . . . . . . . . . . . . . 51--51 Karamjit Kaur and Rinkle Rani Managing Data in Healthcare Information Systems: Many Models, One Solution . . . 52--59 Martin Giese and Ahmet Soylu and Guillermo Vega-Gorgojo and Arild Waaler and Peter Haase and Ernesto Jimenez-Ruiz and Davide Lanti and Martin Rezk and Guohui Xiao and Ozgur Ozcep and Riccardo Rosati Optique: Zooming in on Big Data . . . . 60--67 Hasan Alkhatib and Paolo Faraboschi and Eitan Frachtenberg and Hironori Kasahara and Danny Lange and Phil Laplante and Arif Merchant and Dejan Milojicic and Karsten Schwan What Will 2022 Look Like? The IEEE CS 2022 Report . . . . . . . . . . . . . . 68--76 Anonymous Stay connected House Advertisement . . . 77--77 Ninad S. Thakoor and Le An and Bir Bhanu and Santhoshkumar Sunderrajan and B. S. Manjunath People Tracking in Camera Networks: Three Open Questions . . . . . . . . . . 78--86 Hong-Linh Truong and Schahram Dustdar Programming Elasticity in the Cloud . . 87--90 Anonymous Call for Papers . . . . . . . . . . . . 91--91 Kasper Hornbaek Flexible Displays, Rigid Designs? . . . 92--96 Tawny Schlieski Virtual Dystopia . . . . . . . . . . . . 97--98 James Bret Michael Trusted Computing: An Elusive Goal . . . 99--101 Hal Berghel Noirware . . . . . . . . . . . . . . . . 102--107 Christian Timmerer and Touradj Ebrahimi and Fernando Pereira Toward a New Assessment of Quality . . . 108--110 Bob Aiello Managing the High-Performance Computer Society Standards Working Group . . . . 111--113 Steven Roach and Mehran Sahami CS2013: Computer Science Curricula 2013 114--116 Anonymous Call and Calendar . . . . . . . . . . . 117--119 Anonymous Career Opportunities . . . . . . . . . . 120--135 David Alan Grier Building Trust . . . . . . . . . . . . . 136--136 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Instant Access to IEEE Publications Advertisement . . . . . . . . . . . . . c3--c3 Anonymous Rock Stars of $3$D Printing House Advertisement . . . . . . . . . . . . . c2--c2 Anonymous Are Your Developers Spending Time Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous Computer Highlights Society Magazines 4--5 David Forsyth Representation Learning . . . . . . . . 6--6 Brian M. Gaff Important IP Cases in 2015, Part One . . 7--9 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11 D. Frank Hsu and Dorothy Marinucci and Jeffrey M. Voas Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem . . . . . . 12--14 Anonymous Get More, for Less! House Advertisement 15--15 Ruby B. Lee Rethinking Computers for Cybersecurity 16--25 David Gillman and Yin Lin and Bruce Maggs and Ramesh K. Sitaraman Protecting Websites from Attack with Secure Delivery Networks . . . . . . . . 26--34 Anonymous Call for Papers Advertisement . . . . . 35--35 Kristin E. Heckman and Frank J. Stech and Ben S. Schmoker and Roshan K. Thomas Denial and Deception in Cyber Defense 36--44 Tomas Vagoun and George O. Strawn Implementing the Federal Cybersecurity R&D Strategy . . . . . . . . . . . . . . 45--55 Sek Chai Enabling Smart Camera Networks with Smartphone Processors . . . . . . . . . 56--63 Jon D. Hagar and Thomas L. Wissink and D. Richard Kuhn and Raghu N. Kacker Introducing Combinatorial Testing in a Large Organization . . . . . . . . . . . 64--72 Anonymous IEEE Computer Society House Advertisement . . . . . . . . . . . . . 73--73 Greg Byrd A Little Ingenuity Solves an Elephant-Sized Problem . . . . . . . . . 74--77 Emily Shen and Mayank Varia and Robert K. Cunningham and W. Konrad Vesey Cryptographically Secure Computation . . 78--81 Hal Berghel Borderline Executive Disorder . . . . . 82--86 Anonymous CS Connection . . . . . . . . . . . . . 87--89 Anonymous Call and Calendar . . . . . . . . . . . 90--93 Anonymous Focus on Your Job Search House Advertisement . . . . . . . . . . . . . 94--94 Anonymous Career Opportunities . . . . . . . . . . 95--103 David Alan Grier Accidents will happen [The Errant Hashtag] . . . . . . . . . . . . . . . . 104--104 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Instant Access to IEEE Publications Advertisement . . . . . . . . . . . . . c3--c3 Anonymous IEEE Security & Privacy House Advertisement . . . . . . . . . . . . . c2--c2 Anonymous Rock Stars of Cybersecurity House Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Ling Liu Enhancing Cloud Services through Multitier Workload Analysis . . . . . . 6--6 Charles Severance John Resig: Building JQuery . . . . . . 7--8 Brian M. Gaff Important IP Cases in 2015, Part Two . . 9--11 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Ron Vetter and San Murugesan The Web: The Next 25 Years . . . . . . . 14--17 Vishnu S. Pendyala and Simon S. Y. Shim and Christoph Bussler The Web That Extends beyond the World 18--25 Dave Raggett The Web of Things: Challenges and Opportunities . . . . . . . . . . . . . 26--32 Anonymous Compsac Call for Papers House Advertisement . . . . . . . . . . . . . 33--33 Jorg Heuer and Johannes Hund and Oliver Pfaff Toward the Web of Things: Applying Web Technologies to the Physical World . . . 34--42 Anonymous STC 2015: Call for Presentations House Advertisement . . . . . . . . . . . . . 43--43 Ron Vetter and San Murugesan Roundtable Discussion: The Web We Look Forward To . . . . . . . . . . . . . . . 44--50 Dirk Riehle How Open Source Is Changing the Software Developer's Career . . . . . . . . . . . 51--57 Jason Schlessman and Marilyn Wolf Tailoring Design for Embedded Computer Vision Applications . . . . . . . . . . 58--62 Anonymous Focus on Your Job Search House Advertisement . . . . . . . . . . . . . 63--63 Alexander De Luca and Janne Lindqvist Is Secure and Usable Smartphone Authentication Asking Too Much? . . . . 64--68 Alida Draudt and Jonjozuf Hadley and Ryan Hogan and Leticia Murray and Gregory Stock and Julia Rose West Six Insights about Science Fiction Prototyping . . . . . . . . . . . . . . 69--71 Wenqi Zhou and Yuhong Liu Online Product Rating Manipulation and Market Performance . . . . . . . . . . . 72--75 Susanne Hambrusch and Ran Libeskind-Hadas The PhD Pipeline . . . . . . . . . . . . 76--79 Marat Zhanikeev A Cloud Visitation Platform to Facilitate Cloud Federation and Fog Computing . . . . . . . . . . . . . . . 80--83 Hal Berghel What Makes a Good Column . . . . . . . . 84--87 George Hurlburt Cyberhuman Security . . . . . . . . . . 88--91 Karen Gundy-Burlet The Use of Standards on the LADEE Mission . . . . . . . . . . . . . . . . 92--95 Manfred Broy Rethinking Nonfunctional Software Requirements . . . . . . . . . . . . . . 96--99 Anonymous Call and Calendar . . . . . . . . . . . 100--105 Anonymous Career Opportunities . . . . . . . . . . 106--115 David Alan Grier The GitHub Effect . . . . . . . . . . . 116--116 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Get more, for Less! House Advertisement c2--c2 Anonymous Learn More House Advertisement . . . . . c3--c3 Anonymous Rock Stars of Wearables House Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Prasant Mohapatra Distributed Optimal Channel Access in Cognitive Radio Networks . . . . . . . . 6--6 Charles Severance Roy T. Fielding: Understanding the REST Style . . . . . . . . . . . . . . . . . 7--9 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11 Thad Starner and Tom Martin Wearable Computing: The New Dress Code [Guest Editors' introduction] . . . . . 12--15 Anhong Guo and Xiaolong Wu and Zhengyang Shen and Thad Starner and Hannes Baumann and Scott Gilliland Order Picking with Head-Up Displays . . 16--24 Reuben Kirkham Can Disability Discrimination Law Expand the Availability of Wearable Computers? 25--33 Jon C. Hammer and Tingxin Yan Inferring Mobile User Status with Usage Cues . . . . . . . . . . . . . . . . . . 34--40 Andrea Rosales and Sergio Sayago and Josep Blat Beeping Socks and Chirping Arm Bands: Wearables That Foster Free Play . . . . 41--48 Anonymous STC 2015: Call for Presentations House Advertisement . . . . . . . . . . . . . 49--49 Najeeb Ullah and Maurizio Morisio and Antonio Vetro Selecting the Best Reliability Model to Predict Residual Defects in Open Source Software . . . . . . . . . . . . . . . . 50--58 Anonymous Focus on Your Job Search House Advertisement . . . . . . . . . . . . . 59--59 Greg Byrd Tracking Cows Wirelessly . . . . . . . . 60--63 Hal Berghel A Farewell to Air Gaps, Part 1 . . . . . 64--68 Jeffrey Voas Vetting Mobile App Vendors . . . . . . . 69--71 Reiner Hahnle and Einar Broch Johnsen Designing Resource-Aware Cloud Applications . . . . . . . . . . . . . . 72--75 Anonymous CS Connection . . . . . . . . . . . . . 76--77 Anonymous Call and Calendar . . . . . . . . . . . 78--82 Anonymous IEEE Computer Society House Advertisement . . . . . . . . . . . . . 83--83 Anonymous Career Opportunities . . . . . . . . . . 84--98 Anonymous 39th Annual International Computers, Software & Applications Conference Advertisement . . . . . . . . . . . . . 99--99 David Alan Grier Disruptive Computing . . . . . . . . . . 100--100 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Get more, for Less! House Advertisement c2--c2 Anonymous Learn More House Advertisement . . . . . c3--c3 Anonymous Rock Stars of Wearables House Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Jean-Luc Gaudiot The Times They Are A-Changin' . . . . . 4--6 Anonymous Call for Participation and Celebration House Advertisement . . . . . . . . . . 7--7 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 8--9 Stephen W. Keckler Increasing Interconnection Network Throughput with Virtual Channels . . . . 10--10 Anonymous Symantec Advertisement . . . . . . . . . 11--11 Brian M. Gaff ``Curiouser and Curiouser!'' --- The Fallout from Alice . . . . . . . . . . . 12--14 Anonymous IEEE Computer Society House Advertisement . . . . . . . . . . . . . 15--15 Anonymous 32 & 16 years ago . . . . . . . . . . . . 16--17 Jim Torresen and Christian Plessl and Xin Yao Self-Aware and Self-Expressive Systems 18--20 Bernhard Rinner and Lukas Esterle and Jennifer Simonjan and Georg Nebehay and Roman Pflugfelder and Gustavo Fernandez Dominguez and Peter R. Lewis Self-Aware and Self-Expressive Camera Networks . . . . . . . . . . . . . . . . 21--28 Michele Amoretti and Stefano Cagnoni Toward Collective Self-Awareness and Self-Expression in Distributed Systems 29--36 Jurgo S. Preden and Kalle Tammemae and Axel Jantsch and Mairo Leier and Andri Riid and Emine Calis The Benefits of Self-Awareness and Attention in Fog and Mist Computing . . 37--45 Vincent van Beek and Jesse Donkervliet and Tim Hegeman and Stefan Hugtenburg and Alexandru Iosup Self-Expressive Management of Business-Critical Workloads in Virtualized Datacenters . . . . . . . . 46--54 Behrooz Parhami Amdahl's Reliability Law: A Simple Quantification of the Weakest-Link Phenomenon . . . . . . . . . . . . . . . 55--58 Hal Berghel A Farewell to Air Gaps, Part 2 . . . . . 59--63 Nir Kshetri Recent US Cybersecurity Policy Initiatives: Challenges and Implications 64--69 Brian David Johnson Steve the Steampunk Robot . . . . . . . 70--72 Soto Montalvo and Raquel Martinez and Victor Fresno and Rafael Capilla Multilingual Information Access on the Web . . . . . . . . . . . . . . . . . . 73--75 Dhananjai M. Rao Computing Efficiency in Education . . . 76--79 Xiaofei Xu and Quan Z. Sheng and Liang-Jie Zhang and Yushun Fan and Schahram Dustdar From Big Data to Big Service . . . . . . 80--83 Per Ola Kristensson Next-Generation Text Entry . . . . . . . 84--87 Anonymous CS Connection . . . . . . . . . . . . . 88--89 Anonymous Call and Calendar . . . . . . . . . . . 90--93 Anonymous Career Opportunities . . . . . . . . . . 94--103 David Alan Grier Do We Need a Software Czar? . . . . . . 104--104 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward [Advertisement] c4--c4 Anonymous Rock Stars of Wearables [Advertisement] c2--c2 Anonymous STC 2015: Call for Presentations Learn More . . . . . . . . . . . . . . . . . . c3--c3
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Shixia Liu and Leila De Floriani Multivariate Network Exploration and Presentations . . . . . . . . . . . . . 6--6 Anonymous Move Your Career Forward House Advertisement . . . . . . . . . . . . . 7--7 Charles Severance Anil Jain: 25 Years of Biometric Recognition . . . . . . . . . . . . . . 8--10 Anonymous IEEE Computer Society [Advertisement] 11--11 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 12--13 Antonino Tumeo and John Feo Irregular Applications: From Architectures to Algorithms [Guest Editors' introduction] . . . . . . . . . 14--16 Anonymous 2016 Richard E. Merwin Distinguished Service Award House Advertisement . . . 17--17 Scott Lloyd and Maya Gokhale In-Memory Data Rearrangement for Irregular, Data-Intensive Computing . . 18--25 Daniele Buono and John A. Gunnels and Xinyu Que and Fabio Checconi and Fabrizio Petrini and Tai-Ching Tuan and Chris Long Optimizing Sparse Linear Algebra for Large-Scale Graph Analytics . . . . . . 26--34 Andrew Lenharth and Keshav Pingali Scaling Runtimes for Irregular Algorithms to Large-Scale NUMA Systems 35--44 Anonymous Rock Stars of Wearables House Advertisement . . . . . . . . . . . . . 45--45 Mahantesh Halappanavar and Alex Pothen and Ariful Azad and Fredrik Manne and Johannes Langguth and Arif Khan Codesign Lessons Learned from Implementing Graph Matching on Multithreaded Architectures . . . . . . 46--55 Hitesh Rajput and Tanmoy Som and Soumitra Kar An Automated Vehicle License Plate Recognition System . . . . . . . . . . . 56--61 Peter R. Lewis and Arjun Chandra and Funmilade Faniyi and Kyrre Glette and Tao Chen and Rami Bahsoon and Jim Torresen and Xin Yao Architectural Aspects of Self-Aware and Self-Expressive Computing Systems: From Psychology to Engineering . . . . . . . 62--70 Anonymous Richard E. Merwin Scholarship House Advertisement . . . . . . . . . . . . . 71--71 Greg Byrd Cycling through Cyberspace . . . . . . . 72--75 Hugo Bruneliere and Jordi Cabot and Javier Luis Canovas Izquierdo and Leire Orue-Echevarria Arrieta and Oliver Strauss and Manuel Wimmer Software Modernization Revisited: Challenges and Prospects . . . . . . . . 76--80 Zhi-Kai Zhang and Michael Cheng Yi Cho and Zong-Yu Wu and Shiuhpyng Winston Shieh Identifying and Authenticating IoT Objects in a Natural Context . . . . . . 81--83 Darold Davis Taming the Engineering of Information Services Websites with Standards . . . . 84--89 Hal Berghel TSA: Mission Creep Meets Waste . . . . . 90--94 Anonymous PerCom Pervasive Computing 2016 House Advertisement . . . . . . . . . . . . . 95--95 Anonymous IEEE Computer Society Election . . . . . 96--106 Anonymous COMPSAC 2016 House Advertisement . . . . 107--107 Anonymous IEEE President-Elect Candidates Address Computer Society Concerns . . . . . . . 108--111 Anonymous Call and Calendar . . . . . . . . . . . 112--115 Anonymous Career Opportunities . . . . . . . . . . 116--126 Anonymous Deadline: 31 October House Advertisement 127--127 David Alan Grier In Search of the Diabolical Disconnect 128--128 Anonymous Call for Participation and Celebration House Advertisement . . . . . . . . . . c3--c3 Anonymous Call for Papers House Advertisement . . c2--c2 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous 30th IEEE International Parallel and Distributed Processing Symposium House Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Sumi Helal However You Like It: Computer's Enhanced Digital Format or Affordable Print Option . . . . . . . . . . . . . . . . . 6--6 Anonymous The Future's Algorithm Is Here Advertisement . . . . . . . . . . . . . 7--7 Afonso S. Bandeira An Efficient Algorithm for Exact Recovery of Vertex Variables from Edge Measurements . . . . . . . . . . . . . . 8--9 Brian M. Gaff Legal Issues with Wearable Technology 10--12 Anonymous Rock Stars of Cybersecurity [Advertisement] . . . . . . . . . . . . 13--13 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 14--15 Roy Want and Schahram Dustdar Activating the Internet of Things [Guest Editors' introduction] . . . . . . . . . 16--20 Anonymous Focus on Your Job Search [Advertisement] 21--21 Jacob Beal and Danilo Pianini and Mirko Viroli Aggregate Programming for the Internet of Things . . . . . . . . . . . . . . . 22--30 Anonymous IEEE Computer Society 2015 Call for Major Award Nominations . . . . . . . . 31--31 Laura Belli and Simone Cirani and Luca Davoli and Andrea Gorrieri and Mirko Mancin and Marco Picone and Gianluigi Ferrari Design and Deployment of an IoT Application-Oriented Testbed . . . . . . 32--40 Anonymous IEEE Computer Society Richard E. Merwin Student Leadership Scholarship . . . . . 41--41 Mateusz Mikusz and Sarah Clinch and Rachel Jones and Mike Harding and Christopher Winstanley and Nigel Davies Repurposing Web Analytics to Support the IoT . . . . . . . . . . . . . . . . . . 42--49 Keun Sup Shim and Mieszko Lis and Omer Khan and Srinivas Devadas The Execution Migration Machine: Directoryless Shared-Memory Architecture 50--59 Damian D. G. Gessler and Evren Sirin SSWAP: Enabling Transaction-Time Reasoning for Semantic Workflows . . . . 60--68 Amir Parssian and William Yeoh and Mong Shan Ee Quality-Based SQL: Specifying Information Quality in Relational Database Queries . . . . . . . . . . . . 69--74 Hal Berghel STEM Crazy . . . . . . . . . . . . . . . 75--80 Anonymous Software Experts . . . . . . . . . . . . 81--81 Steve Brown The Power of Story . . . . . . . . . . . 82--83 Constantinos Kolias and Angelos Stavrou and Jeffrey Voas Securely Making ``Things'' Right . . . . 84--88 Anonymous IEEE Cloud Computing Call for Papers . . 89--89 Ralf Klamma Near-Real-Time Social Computing . . . . 90--92 Tao Chen and Rami Bahsoon Toward a Smarter Cloud: Self-Aware Autoscaling of Cloud Configurations and Resources . . . . . . . . . . . . . . . 93--96 Anonymous IEEE Security & Privacy [Advertisement] 97--97 Kevin Gary Project-Based Learning . . . . . . . . . 98--100 Anonymous Linkedin Corp. Advertisement . . . . . . 101--101 Eric Durant CE2016: Guidelines for Forward-Looking Computer Engineering Curricula . . . . . 102--104 Anonymous CS Connection . . . . . . . . . . . . . 105--106 Anonymous Call and Calendar . . . . . . . . . . . 107--111 Anonymous Career Opportunities . . . . . . . . . . 112--119 David Alan Grier Industrial Leadership . . . . . . . . . 120--120 Anonymous Call for Participation and Celebration c3--c3 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Learn more [Advertisement] . . . . . . . c4--c4 Anonymous Move Your Career Forward IEEE Computer Society Membership [Advertisement] . . . c2--c2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Paolo Montuschi Spiking Neural Network Architecture . . 6--6 Anonymous Watch the World's Leading Experts Take Multi-Core Strategies to New Heights House Advertisement . . . . . . . . . . 7--7 Charles Severance Anant Agarwal: Inside edX . . . . . . . 8--9 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11 Giulio Jacucci and Stephen Fairclough and Erin T. Solovey Physiological Computing . . . . . . . . 12--16 Anonymous IEEE Computer Society: Be at the Center of It All House Advertisement . . . . . 17--17 David Rozado and Andreas Dunser Combining EEG with Pupillometry to Improve Cognitive Workload Detection . . 18--25 Riccardo Sioni and Luca Chittaro Stress Detection Using Physiological Sensors . . . . . . . . . . . . . . . . 26--33 Evan M. Peck and Emily Carlin and Robert Jacob Designing Brain-Computer Interfaces for Attention-Aware Systems . . . . . . . . 34--42 Venkat N. Gudivada and Dhana Rao and Jordan Paris Understanding Search-Engine Optimization 43--52 Anonymous Call for Special Issue Proposals House Advertisement . . . . . . . . . . . . . 53--53 Abdelkareem Bedri and Himanshu Sahni and Pavleen Thukral and Thad Starner and David Byrd and Peter Presti and Gabriel Reyes and Maysam Ghovanloo and Zehua Guo Toward Silent-Speech Control of Consumer Wearables . . . . . . . . . . . . . . . 54--62 Anonymous Call for Standards Award Nominations House Advertisement . . . . . . . . . . 63--63 Madison Blake and Rabih Younes and Jacob Dennis and Thomas L. Martin and Mark Jones A User-Independent and Sensor-Tolerant Wearable Activity Classifier . . . . . . 64--71 Hal Berghel Legislating Technology (Badly) . . . . . 72--78 Anonymous Computer Write for Us House Advertisement . . . . . . . . . . . . . 79--79 Greg Byrd 21st Century Pong . . . . . . . . . . . 80--84 Tom Mens and Philippe Grosjean The Ecology of Software Ecosystems . . . 85--87 Chia-Wei Wang and Michael Cheng Yi Cho and Chi-Wei Wang and Shiuhpyng Winston Shieh Combating Software Piracy in Public Clouds . . . . . . . . . . . . . . . . . 88--91 Anonymous CS Connection . . . . . . . . . . . . . 92--93 Anonymous Cloud Computing Call for Papers House Advertisement . . . . . . . . . . . . . 94--94 Anonymous Call and Calendar . . . . . . . . . . . 95--98 Anonymous Upsilon Pi Epsilon Student Excellence Award House Advertisement . . . . . . . 99--99 Anonymous Career Opportunities . . . . . . . . . . 100--118 Anonymous IEEE Computer Society House Advertisement . . . . . . . . . . . . . 119--119 David Alan Grier The Voracious Discipline . . . . . . . . 120--120 Anonymous Explore Levels for Beyond the Next House Advertisement . . . . . . . . . . . . . c3--c3 Anonymous Endless Possibilities . . . . . . . . . c2--c2 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Learn more House Advertisement . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Mike Sharples Seamless Learning: Using Location-Aware Technology to Support Art Education . . 6--6 Brian M. Gaff Patent Infringement Damages . . . . . . 7--9 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11 Vladimir Getov Scientific Grand Challenges: Toward Exascale Supercomputing and Beyond . . . 12--14 Takemasa Miyoshi and Keiichi Kondo and Koji Terasaki Big Ensemble Data Assimilation in Numerical Weather Prediction . . . . . . 15--21 Anonymous COMPSAC 2016 House Advertisement . . . . 22--22 Dylan Keon and Cherri M. Pancake and Harry Yeh Protecting Our Shorelines: Modeling the Effects of Tsunamis and Storm Waves . . 23--32 Nichols A. Romero and Aiichiro Nakano and Katherine M. Riley and Fuyuki Shimojo and Rajiv K. Kalia and Priya Vashishta and Paul C. Messina Quantum Molecular Dynamics in the Post-Petaflops Era . . . . . . . . . . . 33--41 Erich Strohmaier and Hans W. Meuer and Jack Dongarra and Horst D. Simon The TOP500 List and Progress in High-Performance Computing . . . . . . . 42--49 Simon Portegies Zwart and Jeroen Bedorf Using GPUs to Enable Simulation with Computational Gravitational Dynamics in Astrophysics . . . . . . . . . . . . . . 50--58 Anonymous Get the Recognition You Deserve House Advertisement . . . . . . . . . . . . . 59--59 Andrea Valdi and Eros Lever and Simone Benefico and Davide Quarta and Stefano Zanero and Federico Maggi Scalable Testing of Mobile Antivirus Applications . . . . . . . . . . . . . . 60--68 Anonymous Move Your Career Forward House Advertisement . . . . . . . . . . . . . 69--69 Jia Liu and Yong Xue and Dominic Palmer-Brown and Ziqiang Chen and Xingwei He High-Throughput Geocomputational Workflows in a Grid Environment . . . . 70--80 Anonymous ECSEE Advertisement . . . . . . . . . . 81--81 Hal Berghel The Dystory of Ahmed's Clock . . . . . . 82--85 Marco A. S. Netto and Renato L. F. Cunha and Nicole Sultanum Deciding When and How to Move HPC Jobs to the Cloud . . . . . . . . . . . . . . 86--89 Ed Finn We Can Build the Future . . . . . . . . 90--91 Kim B. Schaffer Expanding Continuous Authentication with Mobile Devices . . . . . . . . . . . . . 92--95 Steve Tockey Insanity, Hiring, and the Software Industry . . . . . . . . . . . . . . . . 96--101 Mukesh Saini and Abdulmotaleb El Saddik Absence Privacy Loss . . . . . . . . . . 102--105 Mark Ardis and David Budgen and Gregory W. Hislop and Jeff Offutt and Mark Sebern and Willem Visser SE 2014: Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering . . . . . . . . . . 106--109 Adam Eck and Leen-Kiat Soh and Kristen Olson and Allan L. McCutcheon and Jolene Smyth and Robert F. Belli Understanding the Human Condition through Survey Informatics . . . . . . . 110--114 Anonymous Call and Calendar . . . . . . . . . . . 115--119 Anonymous CS Connection . . . . . . . . . . . . . 120--120 Anonymous Call for Special Issue Proposals House Advertisement . . . . . . . . . . . . . 121--121 Anonymous Career Opportunities . . . . . . . . . . 122--134 Anonymous Focus on Your Job Search House Advertisement . . . . . . . . . . . . . 135--135 David Alan Grier Hidden Persuaders . . . . . . . . . . . 136--136 Anonymous Cool Chips XIX House Advertisement . . . c3--c3 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Learn more Advertisement . . . . . . . . c2--c2 Anonymous Science Minus the Fiction Advertisement c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Tim Menzies Cross-Project Data for Software Engineering . . . . . . . . . . . . . . 6--6 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 7--8 Thomas M. Conte The Computer Society Must Change . . . . 9--9 Thomas M. Conte and Elie Track and Erik DeBenedictis Rebooting Computing: New Strategies for Technology Scaling . . . . . . . . . . . 10--13 John M. Shalf and Robert Leland Computing beyond Moore's Law . . . . . . 14--23 Mohamed M. Sabry Aly and Mingyu Gao and Gage Hills and Chi-Shuen Lee and Greg Pitner and Max M. Shulaker and Tony F. Wu and Mehdi Asheghi and Jeff Bokor and Franz Franchetti and Kenneth E. Goodson and Christos Kozyrakis and Igor Markov and Kunle Olukotun and Larry Pileggi and Eric Pop and Jan Rabaey and Christopher Re and H.-S. Philip Wong and Subhasish Mitra Energy-Efficient Abundant-Data Computing: The N3XT 1,000$ \times $ . . 24--33 D. Scott Holmes and Alan M. Kadin and Mark W. Johnson Superconducting Computing in Large-Scale Hybrid Systems . . . . . . . . . . . . . 34--42 Anonymous Computer Write for us House Advertisement . . . . . . . . . . . . . 43--43 Kirk M. Bresniker and Sharad Singhal and R. Stanley Williams Adapting to Thrive in a New Economy of Memory Abundance . . . . . . . . . . . . 44--53 Santosh Khasanvis and Mingyu Li and Mostafizur Rahman and Ayan K. Biswas and Mohammad Salehi-Fashami and Jayasimha Atulasimha and Supriyo Bandyopadhyay and Csaba Andras Moritz Architecting for Causal Intelligence at Nanoscale . . . . . . . . . . . . . . . 54--64 David J. Mountain and Mark McLean and Douglas Palmer and Joshua D. Prucnal and Christopher D. Krieger Ohmic Weave: Memristor-Based Threshold Gate Networks . . . . . . . . . . . . . 65--71 Michael K. Papamichael and James C. Hoe The CONNECT Network-on-Chip Generator 72--79 Jeffrey Voas and George Hurlburt Third-Party Software's Trust Quagmire 80--87 Hal Berghel What Price Gonzo Ethics? . . . . . . . . 88--93 Davide Brugali and Rafael Capilla and Mike Hinchey Dynamic Variability Meets Robotics . . . 94--97 Alexander Kott and David S. Alberts and Cliff Wang Will Cybersecurity Dictate the Outcome of Future Wars? . . . . . . . . . . . . 98--101 Anonymous Gaudiot Voted 2016 Computer Society President-Elect . . . . . . . . . . . . 102--104 Anonymous Call and Calendar . . . . . . . . . . . 105--109 Anonymous CS Connection . . . . . . . . . . . . . 110--111 Anonymous Career Opportunities . . . . . . . . . . 112--127 David Alan Grier Quantum Imagination . . . . . . . . . . 128--128 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society: Be at the Center of It All House Advertisement . . . . . c2--c2 Anonymous Move Your Career Forward House Advertisement . . . . . . . . . . . . . c3--c3 Anonymous Where a Better World Shows Advertisement c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Roger U. Fujii Raising the Bar: Ensuring Quality Products and Services for Our Members 4--4 Sumi Helal 2016 Outlook: Humans in the Technology Loop . . . . . . . . . . . . . . . . . . 7--9 Paul Nikolich and Kenneth Christensen and Lori Cameron 802 Standards . . . . . . . . . . . . . 10--10 Anonymous Focus on Your Job Search House Advertisement . . . . . . . . . . . . . 11--11 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 12--13 Lynette A. Jones Designing Effective Refreshable Braille Displays . . . . . . . . . . . . . . . . 14--14 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 15--16 Gregory D. Abowd Beyond Weiser: From Ubiquitous to Collective Computing . . . . . . . . . . 17--23 Carl K. Chang Situation Analytics: A Foundation for a New Software Engineering Paradigm . . . 24--33 Zhihao Jiang and Houssam Abbas and Kuk Jin Jang and Rahul Mangharam The Challenges of High-Confidence Medical Device Software . . . . . . . . 34--42 Dejan Milojicic and Timothy Roscoe Outlook on Operating Systems . . . . . . 43--51 Lalit Kumar Singh and Gopika Vinod and A. K. Tripathi Early Prediction of Software Reliability: A Case Study with a Nuclear Power Plant System . . . . . . . . . . . 52--58 Hitesh Rajput and Tanmoy Som and Soumitra Kar Using Radon Transform to Recognize Skewed Images of Vehicular License Plates . . . . . . . . . . . . . . . . . 59--65 Kjell Jorgen Hole Building Trust in E-Government Services 66--74 Hal Berghel Digital Politics 2016 . . . . . . . . . 75--79 Dragutin Petkovic Using Learning Analytics to Assess Capstone Project Teams . . . . . . . . . 80--83 Gary McGraw Four Software Security Findings . . . . 84--87 Marilyn Wolf Embedded Software in Crisis . . . . . . 88--90 Brian David Johnson Beyond Science Fiction: The American Dream . . . . . . . . . . . . . . . . . 91--93 Andreas Bulling Pervasive Attentive User Interfaces . . 94--98 Michael B. Spring The Future of Standardization: Are We Destined to Repeat History? . . . . . . 99--101 Greg Byrd IEEE/IBM Watson Student Showcase . . . . 102--104 Anonymous CS Connection . . . . . . . . . . . . . 105--105 Anonymous Call and Calendar . . . . . . . . . . . 106--109 Anonymous Career Opportunities . . . . . . . . . . 110--119 David Alan Grier New Cycles of Technology . . . . . . . . 120--120 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society: Be at the Center of It All House Advertisement . . . . . c3--c3 Anonymous Move Your Career Forward House Advertisement . . . . . . . . . . . . . c2--c2 Anonymous Watch the World's Leading Experts Take Multi-Core Strategies to New Heights House Advertisement . . . . . . . . . . c4--c4
Anonymous Computer Society IEEE Fellows . . . . . 3--3 Anonymous Masthead . . . . . . . . . . . . . . . . 4--4 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 5--6 Charles Severance Bruce Schneier: The Security Mindset . . 7--8 Elisa Bertino Securing Mobile Applications . . . . . . 9--9 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11 Schahram Dustdar Cloud Computing . . . . . . . . . . . . 12--13 Fernando Diaz-del-Rio and Javier Salmeron-Garcia and Jose Luis Sevillano Extending Amdahl's Law for the Cloud Computing Era . . . . . . . . . . . . . 14--22 Anonymous IEEE Computer Society: Be at the Center of It All . . . . . . . . . . . . . . . 23--23 Alireza Khoshkbarforoushha and Meisong Wang and Rajiv Ranjan and Lizhe Wang and Leila Alem and Samee U. Khan and Boualem Benatallah Dimensions for Evaluating Cloud Resource Orchestration Frameworks . . . . . . . . 24--33 Talal H. Noor and Quan Z. Sheng and Zakaria Maamar and Sherali Zeadally Managing Trust in the Cloud: State of the Art and Research Challenges . . . . 34--45 Quan Zhang and Weisong Shi Energy-Efficient Workload Placement in Enterprise Datacenters . . . . . . . . . 46--52 Anonymous Focus on Your Job Search House Advertisement . . . . . . . . . . . . . 53--53 Lei Xu and Chunxiao Jiang and Yan Chen and Jian Wang and Yong Ren A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining . . . . . . . . . . . 54--62 Hal Berghel Secretocracy . . . . . . . . . . . . . . 63--67 Mahmoud Barhamgi and Arosha K. Bandara and Yijun Yu and Khalid Belhajjame and Bashar Nuseibeh Protecting Privacy in the Cloud: Current Practices, Future Directions . . . . . . 68--72 Anonymous IEEE Computer Society House Advertisement . . . . . . . . . . . . . 73--73 Nir Kshetri Gambling with Source Code . . . . . . . 74--77 Brian David Johnson and David Guston Futures We Want to Inhabit . . . . . . . 78--79 Vint Cerf and Max Senges Taking the Internet to the Next Physical Level . . . . . . . . . . . . . . . . . 80--86 Anonymous CS Connection . . . . . . . . . . . . . 87--88 Anonymous Call and Calendar . . . . . . . . . . . 89--93 Anonymous Career Opportunities . . . . . . . . . . 94--103 David Alan Grier The Post-MOOC World . . . . . . . . . . 104--104 Anonymous Call for Participation House Advertisement . . . . . . . . . . . . . c4--c4 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward House Advertisement . . . . . . . . . . . . . c2--c2 Anonymous Rock Stars of Risk-Based Security House Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Bodies of Knowledge . . . . . . . . . . 3--3 Anonymous Masthead . . . . . . . . . . . . . . . . 4--4 Leila De Floriani Using $2$D Maps for $3$D Localization 5--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--7 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 8--9 Ying-Dar Lin and Jeffrey Voas and Antonio Pescape and Peter Mueller Communications and Privacy under Surveillance . . . . . . . . . . . . . . 10--13 Steven M. Bellovin and Matt Blaze and Susan Landau Insecure Surveillance: Technical Issues with Remote Computer Searches . . . . . 14--24 Steven J. Murdoch Insecure by Design: Protocols for Encrypted Phone Calls . . . . . . . . . 25--33 Stephen Farrell Requirements Analysis Required --- Otherwise Targeted Monitoring Enables Pervasive Monitoring . . . . . . . . . . 34--40 Anonymous Call for Nominees House Advertisement 41--41 Robert Koch and Mario Golling and Gabi Dreo Rodosek How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation . . . 42--49 Hassan Metwalley and Stefano Traverso and Marco Mellia Using Passive Measurements to Demystify Online Trackers . . . . . . . . . . . . 50--55 Imran Yusof and Al-Sakib Khan Pathan Mitigating Cross-Site Scripting Attacks with a Content Security Policy . . . . . 56--63 Amit Sheth and Pramod Anantharam and Cory Henson Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human Experience . . . . . . . . . . . . . . . 64--72 Hal Berghel Net Neutrality vs. Net Neutering . . . . 73--77 Shams Zawoad and Ragib Hasan Trustworthy Digital Forensics in the Cloud . . . . . . . . . . . . . . . . . 78--81 Robert N. Charette The STEM Anxiety Business . . . . . . . 82--87 Charlene Chuck Walrad The IEEE Computer Society and ACM's Collaboration on Computing Education . . 88--91 Karen Bartleson Practical Insights from the Peculiar World of Standards . . . . . . . . . . . 92--95 Gaurav Misra and Jose M. Such How Socially Aware Are Social Media Privacy Controls? . . . . . . . . . . . 96--99 Greg Byrd Immortal Bits: Managing Our Digital Legacies . . . . . . . . . . . . . . . . 100--103 Angelos Stavrou and Daniel Fleck and Constantinos Kolias On the Move: Evading Distributed Denial-of-Service Attacks . . . . . . . 104--107 Anonymous Call and Calendar . . . . . . . . . . . 108--112 Anonymous Conferences in the Palm of Your Hand House Advertisement . . . . . . . . . . 113--113 David Alan Grier Go, Stop, Go, Stop . . . . . . . . . . . 128--128 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward House Advertisement . . . . . . . . . . . . . c3--c3 Anonymous Rock Stars of Big Data House Advertisement . . . . . . . . . . . . . c4--c4 Anonymous Rock Stars of Risk-Based Security House Advertisement . . . . . . . . . . . . . c2--c2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous Computer Society Publications . . . . . 8--9 Brian M. Gaff The Need for Speed . . . . . . . . . . . 10--12 Charles Severance Bruce Schneier: Building Cryptographic Systems . . . . . . . . . . . . . . . . 13--15 Neville Holmes 32 & 16 Years Ago . . . . . . . . . . . . 16--17 Qiang Yang Cross-Domain Data Fusion . . . . . . . . 18--18 Anonymous Call for Papers: House Advertisement . . 19--19 Naren Ramakrishnan and Ravi Kumar Big Data . . . . . . . . . . . . . . . . 20--22 Jignesh M. Patel Operational NoSQL Systems: What's New and What's Next? . . . . . . . . . . . . 23--30 Venkat N. Gudivada and Dhana Rao and Vijay V. Raghavan Renaissance in Database Management: Navigating the Landscape of Candidate Systems . . . . . . . . . . . . . . . . 31--42 Giovanni Cherubini and Jens Jelitto and Vinodh Venkatesan Cognitive Storage for Big Data . . . . . 43--51 Hsiang-Fu Yu and Cho-Jui Hsieh and Hyokun Yun and S. V. N. Vishwanathan and Inderjit Dhillon Nomadic Computing for Big Data Analytics 52--60 Asmaa Elbadrawy and Agoritsa Polyzou and Zhiyun Ren and Mackenzie Sweeney and George Karypis and Huzefa Rangwala Predicting Student Performance Using Personalized Analytics . . . . . . . . . 61--69 Behrooz Parhami Low Acceptance Rates of Conference Papers Considered Harmful . . . . . . . 70--73 Hal Berghel The Bogus Science Theorem (and the Junk Science Wager) . . . . . . . . . . . . . 74--78 Erik P. DeBenedictis The Boolean Logic Tax . . . . . . . . . 79--82 Jurgen Steimle Skin --- The Next User Interface . . . . 83--87 Yuvraj Agarwal and Anind K. Dey Toward Building a Safe, Secure, and Easy-to-Use Internet of Things Infrastructure . . . . . . . . . . . . . 88--91 Michael Bennett Afrofuturism . . . . . . . . . . . . . . 92--93 John Knight and Jack Davidson and Anh Nguyen-Tuong and Jason Hiser and Michele Co Diversity in Cybersecurity . . . . . . . 94--98 Anonymous Call and Calendar . . . . . . . . . . . 99--103 David Alan Grier The Global Profession . . . . . . . . . 120--120 Anonymous Computer Entrepreneur Award: House Advertisement . . . . . . . . . . . . . c3--c3 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward: IEEE Computer Society Membership: House Advertisement c2--c2 Anonymous Rock Stars of Big Data: House Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Rock Stars of Big Data: House Advertisement . . . . . . . . . . . . . 2--2 Anonymous Masthead . . . . . . . . . . . . . . . . 5--5 Anonymous Hiscox . . . . . . . . . . . . . . . . . 6--7 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 8--9 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11 Anonymous Move Your Career Forward IEEE Computer Society Membership: House Advertisement 12--12 Anonymous IEEE Computer Society Conferences . . . 13--13 H. Chad Lane and David Forsyth Virtual Learning and Object Reconstruction . . . . . . . . . . . . . 14--15 Alfred C. Weaver and Greg Byrd and Renee Bryce Computing Tools and Techniques for Emergency Response . . . . . . . . . . . 16--18 Robin R. Murphy Emergency Informatics: Using Computing to Improve Disaster Management . . . . . 19--27 Marco Avvenuti and Stefano Cresci and Fabio Del Vigna and Maurizio Tesconi Impromptu Crisis Mapping to Prioritize Emergency Response . . . . . . . . . . . 28--37 Alper Bozkurt and Edgar Lobaton and Mihail Sichitiu A Biobotic Distributed Sensor Network for Under-Rubble Search and Rescue . . . 38--46 Liliya I. Besaleva and Alfred C. Weaver Applications of Social Networks and Crowdsourcing for Disaster Management Improvement . . . . . . . . . . . . . . 47--53 Henri Bal and Dick Epema and Cees de Laat and Rob van Nieuwpoort and John Romein and Frank Seinstra and Cees Snoek and Harry Wijshoff A Medium-Scale Distributed System for Computer Science Research: Infrastructure for the Long Term . . . . 54--63 Sebastian Gayer and Andrea Herrmann and Thorsten Keuler and Matthias Riebisch and Pablo Oliveira Antonino Lightweight Traceability for the Agile Architect . . . . . . . . . . . . . . . 64--71 Anonymous IEEE Computer Society Information . . . 72--72 Hal Berghel Attenuated FAQs . . . . . . . . . . . . 73--77 Weisong Shi and Schahram Dustdar The Promise of Edge Computing . . . . . 78--81 John Leslie King and Jonathan Grudin Will Computers Put Us Out of Work? . . . 82--85 Anonymous Watch the World's Leading Experts Take Multi-Core Strategies to New Heights: House Advertisement . . . . . . . . . . 86--86 Phillip A. Laplante and Jeffrey Voas and Nancy Laplante Standards for the Internet of Things: A Case Study in Disaster Response . . . . 87--90 Anonymous IEEE Member Digital Library: House Advertisement . . . . . . . . . . . . . 91--91 Omar Niamut and Mu Mu and Spyros Denazis and Nicholas Race Social Telemedia: The Relationship between Social Information and Networked Media . . . . . . . . . . . . . . . . . 92--97 Greg Byrd Home Sweet Mind-Controlled Home . . . . 98--101 Jeffrey Voas and Kim Schaffer Insights on Formal Methods in Cybersecurity . . . . . . . . . . . . . 102--105 Anonymous CS Connection . . . . . . . . . . . . . 106--107 Anonymous Call and Calendar . . . . . . . . . . . 108--111 Anonymous IEEE Computer Society 2016 Call for Major Award Nominations: House Advertisement . . . . . . . . . . . . . 112--112 Anonymous SanDisk Corporation Advertisement . . . 113--113 Anonymous Career Opportunities . . . . . . . . . . 114--127 David Alan Grier Technological Improvisation . . . . . . 128--128 Anonymous Samsung Galaxy S7 edge . . . . . . . . . c2--1 Anonymous Computer Entrepreneur Award: House Advertisement . . . . . . . . . . . . . c3--c3 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Rock Stars of Cybersecurity: House Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 4--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--7 Mohamed Ibrahim and Krishnendu Chakrabarty Digital-Microfluidic Biochips . . . . . 8--9 Mark Paulk and Lori Cameron IEEE Floating Point Standard . . . . . . 10--10 Elisa Bertino Security Threats: Protecting the New Cyberfrontier . . . . . . . . . . . . . 11--14 Daniel Vecchiato and Marco Vieira and Eliane Martins The Perils of Android Security Configuration . . . . . . . . . . . . . 15--21 David Kotz and Carl A. Gunter and Santosh Kumar and Jonathan P. Weiner Privacy and Security in Mobile Health: A Research Agenda . . . . . . . . . . . . 22--30 Ronald P. Loui and Terrence D. Loui How to Survive a Cyber Pearl Harbor . . 31--37 V. S. Subrahmanian and Amos Azaria and Skylar Durst and Vadim Kagan and Aram Galstyan and Kristina Lerman and Linhong Zhu and Emilio Ferrara and Alessandro Flammini and Filippo Menczer The DARPA Twitter Bot Challenge . . . . 38--46 Anonymous Computer Write for Us: House Advertisement . . . . . . . . . . . . . 47--47 Tsong Yueh Chen and Fei-Ching Kuo and Wenjuan Ma and Willy Susilo and Dave Towey and Jeffrey Voas and Zhi Quan Zhou Metamorphic Testing for Cybersecurity 48--55 Qingpeng Zhang and Daniel Dajun Zeng and Fei-Yue Wang and Ronald Breiger and James A. Hendler Brokers or Bridges? Exploring Structural Holes in a Crowdsourcing System . . . . 56--64 Anonymous Move Your Career Forward IEEE Computer Society Membership: House Advertisement 65--65 Qiuming Luo and Feng Xiao and Zhong Ming and Hao Li and Jianyong Chen and Jianhua Zhang Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System 66--74 Anonymous Rock Stars of Big Data: House Advertisement . . . . . . . . . . . . . 75--75 Anonymous Call for Nominees: House Advertisement 76--76 Sorel Reisman and Eli Shmueli Opening the Instructional Doors to Computer Science and IT --- Finally . . 77--79 Jeffrey Voas Demystifying the Internet of Things . . 80--83 Erik P. DeBenedictis Rebooting Computers as Learning Machines 84--87 Daniel Ullrich and Andreas Butz Social Robots for the 21st Century . . . 88--92 Anonymous Impact a Broader Audience: House Advertisement . . . . . . . . . . . . . 93--93 Anonymous IEEE Computer Society 2016 Call for Major Award Nominations: House Advertisement . . . . . . . . . . . . . 94--94 Brian David Johnson Science Fiction and the Coming Age of Sentient Tools . . . . . . . . . . . . . 95--97 Kate Netkachova and Robin E. Bloomfield Security-Informed Safety . . . . . . . . 98--102 Anonymous Call and Calendar . . . . . . . . . . . 103--107 Anonymous Career Opportunities . . . . . . . . . . 108--119 David Alan Grier Scientific Conversations . . . . . . . . 120--120 Anonymous Endless Possibilities Advertisement . . c2--c2 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Galaxy S7 edge . . . . . . . . . . . . . c4--c4 Anonymous Rock Stars of Cybersecurity: House Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 4--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--7 Bjorn Schuller and Jian Pei Using Computer Intelligence for Depression Diagnosis and Crowdsourcing 8--9 Anonymous IEEE Computer Society Awards . . . . . . 10--10 Antti Oulasvirta and Gregory D. Abowd User Interface Design in the 21st Century . . . . . . . . . . . . . . . . 11--13 Yuta Sugiura and Takeo Igarashi and Masahiko Inami Cuddly User Interfaces . . . . . . . . . 14--19 Daisuke Sakamoto and Yuta Sugiura and Masahiko Inami and Takeo Igarashi Graphical Instruction for Home Robots 20--25 John M. Carroll and Jiawei Chen and Chien Wen Tina Yuan and Benjamin V. Hanrahan In Search of Coproduction: Smart Services as Reciprocal Activities . . . 26--32 Anonymous Computer Write for Us House Advertisement . . . . . . . . . . . . . 33--33 Jun Kato and Takeo Igarashi and Masataka Goto Programming with Examples to Develop Data-Intensive User Interfaces . . . . . 34--42 Anonymous Move Your Career Forward IEEE Computer Society Membership House Advertisement 43--43 Brad A. Myers and Andrew J. Ko and Thomas D. LaToza and YoungSeok Yoon Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools . . . . . . . . . . . 44--52 Samuel Kounev and Nikolaus Huber and Fabian Brosig and Xiaoyun Zhu A Model-Based Approach to Designing Self-Aware IT Systems and Infrastructures . . . . . . . . . . . . 53--61 Xia Yang and Peng Shi and Haiyong Sun and Wenxuan Zheng and Jim Alves-Foss A Fast Boot, Fast Shutdown Technique for Android OS Devices . . . . . . . . . . . 62--68 Anonymous IEEE Computer Society 2016 Call for Major Award Nominations House Advertisement . . . . . . . . . . . . . 69--69 Peter Bajcsy and Antoine Vandecreme and Julien Amelot and Joe Chalfoun and Michael Majurski and Mary Brady Enabling Stem Cell Characterization from Large Microscopy Images . . . . . . . . 70--79 David Alan Grier Free Tuition for Community College: A Role for the Tech Community? . . . . . . 80--82 Anonymous Call for Nominees Education Awards Nominations House Advertisement . . . . 83--83 Hal Berghel The Dictator's (False) Dilemma . . . . . 84--87 Norman Matloff The H-1B Visa Controversy . . . . . . . 88--93 Greg Byrd Let the Sun Shine . . . . . . . . . . . 94--97 George Hurlburt ``Good Enough'' Security: The Best We'll Ever Have . . . . . . . . . . . . . . . 98--101 Anonymous CS Connection . . . . . . . . . . . . . 102--103 Anonymous Call and Calendar . . . . . . . . . . . 104--107 Anonymous Career Opportunities . . . . . . . . . . 108--119 David Alan Grier Aware of the Situation . . . . . . . . . 120--120 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Focus on Your Job House Advertisement c3--c3 Anonymous Rock Stars of Big Data House Advertisement . . . . . . . . . . . . . c4--c4 Anonymous Rock Stars of Pervasive, Predictive Analytics House Advertisement . . . . . c2--c2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous Call for Nominees Education Awards Nominations . . . . . . . . . . . . . . 4--4 Anonymous IEEE Computer Society Digital Library: IEEE's First Digital Library . . . . . . 5--5 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 6--7 Anonymous Computer Highlights Society Magazines 8--9 David A. Bader Evolving MPI+X Toward Exascale . . . . . 10--10 Anonymous Rock Stars of Pervasive, Predictive Analytics . . . . . . . . . . . . . . . 11--11 Domenic Forte and Ron Perez and Yongdae Kim and Swarup Bhunia Supply-Chain Security for Cyberinfrastructure [Guest editors' introduction] . . . . . . . . . . . . . 12--16 Anonymous Not so Secure . . . . . . . . . . . . . 17--17 Parrish Ralston and David Fry and Scott Suko and Bryce Winters and Matthew King and Robert Kober Defeating counterfeiters with microscopic dielets embedded in electronic components . . . . . . . . . 18--26 Anonymous 2017 Richard E. Merwin Award for Distinguished Service . . . . . . . . . 27--27 Joseph P. Skudlarek and Tom Katsioulas and Michael Chen A Platform Solution for Secure Supply-Chain and Chip Life-Cycle Management . . . . . . . . . . . . . . . 28--34 Anonymous IEEE Security & Privacy . . . . . . . . . 35--35 Sk Subidh Ali and Mohamed Ibrahim and Jeyavijayan Rajendran and Ozgur Sinanoglu and Krishnendu Chakrabarty Supply-Chain Security of Digital Microfluidic Biochips . . . . . . . . . 36--43 Wei Hu and Baolei Mao and Jason Oberg and Ryan Kastner Detecting Hardware Trojans with Gate-Level Information-Flow Tracking . . 44--52 Anonymous IEEE Computer Society 2016 Call for Major Award Nominations . . . . . . . . 53--53 Kan Xiao and Adib Nahiyan and Mark Tehranipoor Security Rule Checking in IC Design . . 54--61 Olav Lysne and Kjell J. Hole and Christian Otterstad and Oyvind Ytrehus and Raymond Aarseth and Jorgen Tellnes Vendor Malware: Detection Limits and Mitigation . . . . . . . . . . . . . . . 62--69 Kim Schaffer and Jeffrey Voas What Happened to Formal Methods for Security? . . . . . . . . . . . . . . . 70--79 Doug Terry Toward a New Approach to IoT Fault Tolerance . . . . . . . . . . . . . . . 80--83 Claude Y. Laporte and Rory V. O'Connor Systems and Software Engineering Standards for Very Small Entities: Accomplishments and Overview . . . . . . 84--87 Erik P. DeBenedictis The Search for Computing's Secretariat 88--91 Celia Paulsen Cybersecuring Small Businesses . . . . . 92--97 Hal Berghel The Pollyanna Delusion . . . . . . . . . 98--102 Anonymous IEEE Computer Society Information . . . 103--103 Xiangshi Ren Rethinking the Relationship between Humans and Computers . . . . . . . . . . 104--108 Evan Atherton Science Fiction Prototyping at Work . . 109--111 Amir Vahid Dastjerdi and Rajkumar Buyya Fog Computing: Helping the Internet of Things Realize Its Potential . . . . . . 112--116 Anonymous Facebook, Inc. . . . . . . . . . . . . . 117--117 Anonymous IEEE Computer Society Election . . . . . 118--128 Anonymous Move Your Career Forward IEEE Computer Society Membership . . . . . . . . . . . 129--129 Anonymous IEEE Division V Delegate/Director Candidates . . . . . . . . . . . . . . . 130--131 Anonymous Proposed Amendment to IEEE's Constitution . . . . . . . . . . . . . . 132--133 Anonymous IEEE President-Elect Candidates Address Computer Society Concerns . . . . . . . 134--136 Anonymous Intuit Inc. . . . . . . . . . . . . . . 137--137 Anonymous Call and Calendar . . . . . . . . . . . 138--141 David Alan Grier Changing Trust . . . . . . . . . . . . . 156--156 Anonymous Computer Write for us . . . . . . . . . c3--c3 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous 31st IEEE International Parallel and Distributed Processing Symposium . . . . c2--c2 Anonymous Rock Stars of Cybersecurity . . . . . . c4--c4
Anonymous New Membership Options for a Better Fit [Advertisement] . . . . . . . . . . . . 2 Anonymous Achieve your career goals with the fit that's right for you [Advertisement] . . 3 Anonymous Masthead . . . . . . . . . . . . . . . . 4 Anonymous Table of contents . . . . . . . . . . . 5--6 Anonymous IEEE Computer Society Membership . . . . 7 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 8--9 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 10--11 Paolo Montuschi and Jean-Michel Muller Modern Computer Arithmetic . . . . . . . 12--12 Anonymous Call for Nominees Education Awards Nominations . . . . . . . . . . . . . . 13 San Murugesan and Bob Colwell Next-Generation Computing Paradigms . . 14--20 Krysta M. Svore and Matthias Troyer The Quantum Future of Computation . . . 21--30 Rodney Van Meter and Simon J. Devitt The Path to Scalable Distributed Quantum Computing . . . . . . . . . . . . . . . 31--42 Victoria Coleman Embodied Molecular Computation: Potential and Challenges . . . . . . . . 43--51 Xin-She Yang and Suash Deb and Simon Fong and Xingshi He and Yu-Xin Zhao From Swarm Intelligence to Metaheuristics: Nature-Inspired Optimization Algorithms . . . . . . . . 52--59 Sameer Saproo and Josef Faller and Victor Shih and Paul Sajda and Nicholas R. Waytowich and Addison Bohannon and Vernon J. Lawhern and Brent J. Lance and David Jangraw Cortically Coupled Computing: A New Paradigm for Synergistic Human-Machine Interaction . . . . . . . . . . . . . . 60--68 Lui Sha and Marco Caccamo and Renato Mancuso and Jung-Eun Kim and Man-Ki Yoon and Rodolfo Pellizzoni and Heechul Yun and Russell B. Kegley and Dennis R. Perlman and Greg Arundale and Richard Bradford Real-Time Computing on Multicore Processors . . . . . . . . . . . . . . . 69--77 Massimo Maresca The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing . . 78--85 Xing Zhang and Zhenglei Yi and Zhi Yan and Geyong Min and Wenbo Wang and Ahmed Elmokashfi and Sabita Maharjan and Yan Zhang Social Computing for Mobile Big Data . . 86--90 Scott Campbell Teaching Cloud Computing . . . . . . . . 91--93 Greg Byrd Seeing Is Understanding . . . . . . . . 94--97 Apostol Vassilev and Robert Staples Entropy as a Service: Unlocking Cryptography's Full Potential . . . . . 98--102 Anonymous Facebook, Inc. House Advertisement . . . 103 Hal Berghel Coda in the Key of F2654hD4 . . . . . . 104--109 Sanjay K. Madria Security and Risk Assessment in the Cloud . . . . . . . . . . . . . . . . . 110--113 Robert N. Charette Dragging Government Legacy Systems Out of the Shadows . . . . . . . . . . . . . 114--119 Anonymous CS Connection . . . . . . . . . . . . . 120--121 Anonymous Call and Calendar . . . . . . . . . . . 122--125 Anonymous Career Opportunities . . . . . . . . . . 126--143 David Alan Grier The Means of Production . . . . . . . . 144 Anonymous The Universität der Bundeswehr München [Advertisement] . . . . . . . . . . . . c2--1 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward IEEE Computer Society Membership [Advertisement] . . . c3--c3 Anonymous SolidThinking . . . . . . . . . . . . . c4--c4
Anonymous Achieve your career goals with the fit that's right for you . . . . . . . . . . 1 Anonymous Masthead . . . . . . . . . . . . . . . . 2 Anonymous Table of Contents . . . . . . . . . . . 3--4 Anonymous IEEE Computer Society Education . . . . 5 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 6--7 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 8--9 Simha Sethumadhavan Hardware-Enforced Privacy . . . . . . . 10 Anonymous COMPSAC 2017 --- ITiP Symposium . . . . 11 Charles Severance The Living Computer Museum . . . . . . . 12--13 Vladimir Getov and Adolfy Hoisie and Pradip Bose New Frontiers in Energy-Efficient Computing [Guest Editors' introduction] 14--18 Anonymous IEEE Computer Society . . . . . . . . . 19 Xingfu Wu and Valerie Taylor and Jeanine Cook and Philip J. Mucci Using Performance-Power Modeling to Improve Energy Efficiency of HPC Applications . . . . . . . . . . . . . . 20--29 Bilge Acun and Akhil Langer and Esteban Meneses and Harshitha Menon and Osman Sarood and Ehsan Totoni and Laxmikant V. Kale Power, Reliability, and Performance: One System to Rule them All . . . . . . . . 30--37 Ryan E. Grant and Michael Levenhagen and Stephen L. Olivier and David DeBonis and Kevin T. Pedretti and James H. Laros III Standardizing Power Monitoring and Control at Exascale . . . . . . . . . . 38--46 Efraim Rotem and Uri C. Weiser and Avi Mendelson and Ran Ginosar and Eliezer Weissmann and Yoni Aizik H-EARtH: Heterogeneous Multicore Platform Energy Management . . . . . . . 47--55 Cory Merkel and Raqibul Hasan and Nicholas Soures and Dhireesha Kudithipudi and Tarek Taha and Sapan Agarwal and Matthew Marinella Neuromemristive Systems: Boosting Efficiency through Brain-Inspired Computing . . . . . . . . . . . . . . . 56--64 Gowtham Atluri and Angus MacDonald III and Kelvin O. Lim and Vipin Kumar The Brain-Network Paradigm: Using Functional Imaging Data to Study How the Brain Works . . . . . . . . . . . . . . 65--71 David Linthicum Responsive Data Architecture for the Internet of Things . . . . . . . . . . . 72--75 Erik P. DeBenedictis and R. Stanley Williams Help Wanted: A Modern-Day Turing . . . . 76--79 Dimitris E. Simos and Rick Kuhn and Artemios G. Voyiatzis and Raghu Kacker Combinatorial Methods in Security Testing . . . . . . . . . . . . . . . . 80--83 Hal Berghel Douglas Jones on Today's Voting Machines 84--89 Giulio Jacucci Beyond Search Queries . . . . . . . . . 90--93 Ryan Lee Threatcasting . . . . . . . . . . . . . 94--95 Fridolin Wild The Future of Learning at the Workplace Is Augmented Reality . . . . . . . . . . 96--98 Anonymous Call and Calendar . . . . . . . . . . . 99--102 Anonymous Career Opportunities . . . . . . . . . . 103--111 David Alan Grier Innovating for Tomorrow . . . . . . . . 112 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward IEEE Computer Society Membership . . . . . . . . . . . c3--c3 Anonymous New Membership Options for a Better Fit c2--c2
Anonymous IEEE Computer Society Is Where You Choose the Resources that Fit Your Career House Advertisement . . . . . . . 1 Anonymous Masthead . . . . . . . . . . . . . . . . 2 Anonymous Table of Contents . . . . . . . . . . . 3--4 Anonymous IEEE Computer Society Technical Committees . . . . . . . . . . . . . . . 5 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 6--7 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 8--9 Matthew B. Dwyer Finding Flaws in Natural Language Requirements . . . . . . . . . . . . . . 10 Upkar Varshney and Carl K. Chang Smart Health and Well-Being . . . . . . 11--13 S. Jay Olshansky and Bruce A. Carnes and Yang Claire Yang and Norvell Miller and Janet Anderson and Hiram Beltran-Sanchez and Karl Ricanek, Jr. The Future of Smart Health . . . . . . . 14--21 Noel Carroll Key Success Factors for Smart and Connected Health Software Solutions . . 22--28 Gina Sprint and Diane J. Cook and Roschelle Fritz and Maureen Schmitter-Edgecombe Using Smart Homes to Detect and Analyze Health Events . . . . . . . . . . . . . 29--37 Shurouq Hijazi and Alex Page and Burak Kantarci and Tolga Soyata Machine Learning in Cardiac Health Monitoring and Decision Support . . . . 38--48 Xiang Su and Jarkko Hyysalo and Mika Rautiainen and Jukka Riekki and Jaakko Sauvola and Altti Ilari Maarala and Harri Hirvonsalo and Pingjiang Li and Harri Honko Privacy as a Service: Protecting the Individual in Healthcare Data Processing 49--59 Humberto Cervantes and Rick Kazman and Jungwoo Ryoo and Duyoung Choi and Duksung Jang Architectural Approaches to Security: Four Case Studies . . . . . . . . . . . 60--67 Po-Ching Lin and Ying-Dar Lin and Cheng-Ying Wu and Yuan-Cheng Lai and Yi-Chih Kao Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization . . . . . . . . 68--76 Amir Banifatemi and Jean-Luc Gaudiot Engineering the New Boundaries of AI . . 77--79 Vasant Dhar Equity, Safety, and Privacy in the Autonomous Vehicle Era . . . . . . . . . 80--83 Alexander Kott and Ananthram Swami and Bruce J. West The Fog of War in Cyberspace . . . . . . 84--87 Greg Byrd Tactile Digital Braille Display . . . . 88--90 Hal Berghel Chasing Elbridge's Ghost: The Digital Gerrymander . . . . . . . . . . . . . . 91--95 Dimitrios G. Kogias and Michael G. Xevgenis and Charalampos Z. Patrikakis Cloud Federation and the Evolution of Cloud Computing . . . . . . . . . . . . 96--99 Anonymous Call and Calendar . . . . . . . . . . . 100--103 David Alan Grier ``I'm Not a Computer Scientist, but \ldots . . . . . . . . . . . . . . . . . 104 Anonymous Call for Special Issue Proposals House Advertisement . . . . . . . . . . . . . c3--c3 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward IEEE Computer Society Membership House Advertisement c4--c4 Anonymous New Membership Options for a Better Fit House Advertisement . . . . . . . . . . c2--c2
Anonymous IEEE Computer Society Is Where You Choose the Resources that Fit Your Career . . . . . . . . . . . . . . . . . 1 Anonymous Masthead . . . . . . . . . . . . . . . . 2 Anonymous Table of Contents . . . . . . . . . . . 3--4 Anonymous IEEE Computer Society's \booktitleComputer Magazine . . . . . . 5 Roger U. Fujii Our Journey to the Future . . . . . . . 6--9 Anonymous 32 & 16 Years Ago . . . . . . . . . . . . 10--11 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 12--13 Anonymous Art of Hacking E-Learning Courses IEEE Computer Society . . . . . . . . . . . . 14 Ali Jadbabaie Defining Data Clusters . . . . . . . . . 15 Roy Want and Trevor Pering and Yuvraj Agarwal Multidevice Interaction [Guest Editors' introduction] . . . . . . . . . . . . . 16--20 Anonymous Call for Special Issue Proposals . . . . 21 Jarno Leppanen and Mikko Pelkonen and Haipeng Guo and Samuli Hemminki and Petteri Nurmi and Sasu Tarkoma Collaborative and Energy-Efficient Speech Monitoring on Smart Devices . . . 22--30 Anonymous Can You Invent a Better World through Technology? . . . . . . . . . . . . . . 31 Carlo Pinciroli and Giovanni Beltrame Swarm-Oriented Programming of Distributed Robot Networks . . . . . . . 32--41 Timothy Neate and Matt Jones and Michael Evans Interdevice Media: Choreographing Content to Maximize Viewer Engagement 42--49 Tomas Bures and Frantisek Plasil and Michal Kit and Petr Tuma and Nicklas Hoch Software Abstractions for Component Interaction in the Internet of Things 50--59 Charith Perera and Chang Liu and Rajiv Ranjan and Lizhe Wang and Albert Y. Zomaya Privacy-Knowledge Modeling for the Internet of Things: A Look Back . . . . 60--68 Anonymous Watch the World's Leading Experts Take Multi-Core Strategies to New Heights . . 69 Alexander Kott and Ananthram Swami and Bruce J. West The Internet of Battle Things . . . . . 70--75 Erik P. DeBenedictis Computational Complexity and New Computing Approaches . . . . . . . . . . 76--79 Vincent C. Hu and Rick Kuhn Access Control Policy Verification . . . 80--83 Brian David Johnson So Long, and Thanks for All the Robots 84--85 Kenneth M. Zemrowski NIST Bases Flagship Security Engineering Publication on ISO/IEC/IEEE 15288:2015 86--88 Anonymous Nominations are solicited for the Seymour Cray, Sidney Fernbach & Ken Kennedy awards . . . . . . . . . . . . . 89 Anonymous Kasahara Voted 2017 Computer Society President-Elect . . . . . . . . . . . . 90--92 Anonymous Call and Calendar . . . . . . . . . . . 93--95 David Alan Grier Fifteen Years to Open Source . . . . . . 96 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward IEEE Computer Society Membership . . . . . . . . . . . c3--c3 Anonymous New Membership Options for a Better Fit c2--c2 Anonymous TechIgnite . . . . . . . . . . . . . . . c4--c4
Anonymous IEEE Computer Society Is Where You Choose the Resources that Fit Your Career House Advertisement . . . . . . . 1 Anonymous Masthead . . . . . . . . . . . . . . . . 2 Anonymous Table of Contents . . . . . . . . . . . 3--4 Jean-Luc Gaudiot 2017: The New Computer Society . . . . . 5--7 Shaoshan Liu and James Peng and Jean-Luc Gaudiot Computer, Drive My Car! . . . . . . . . 8 Anonymous ACM--IEEE CS Eckert--Mauchly Award House Advertisement . . . . . . . . . . . . . 9 Erich Neuhold \booktitleComputer, January 1967 and 1992 . . . . . . . . . . . . . . . . . . 10--11 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 12--13 Sumi Helal \booktitleComputer's 50th Anniversary 14--18 Anonymous Focus on Your Job Search House Advertisement . . . . . . . . . . . . . 19 Thomas M. Conte and Erik P. DeBenedictis and Paolo A. Gargini and Elie Track Rebooting Computing: The Road Ahead . . 20--29 Mahadev Satyanarayanan The Emergence of Edge Computing . . . . 30--39 Antti Oulasvirta User Interface Design with Combinatorial Optimization . . . . . . . . . . . . . . 40--47 Daqing Zhang and Hao Wang and Dan Wu Toward Centimeter-Scale Human Activity Sensing with Wi-Fi Signals . . . . . . . 48--57 John Atkinson and Alvaro Maurelia Redundancy-Based Trust in Question-Answering Systems . . . . . . . 58--65 G. R. Gangadharan Open Source Solutions for Cloud Computing . . . . . . . . . . . . . . . 66--70 Brian David Johnson The Impossible Thing . . . . . . . . . . 71 Jeffrey Voas and Philip Laplante Curriculum Considerations for the Internet of Things . . . . . . . . . . . 72--75 Nir Kshetri and Jeffrey Voas Banking on Availability . . . . . . . . 76--80 Anonymous My CS House Advertisement . . . . . . . 81 Hal Berghel Software Sophistry and Political Sleight of Hand . . . . . . . . . . . . . . . . 82--87 Anonymous CS Connection . . . . . . . . . . . . . 88--90 Anonymous Seymour Cray, Sidney Fernbach, & Ken Kennedy Awards House Advertisement . . . 91 Anonymous Call and Calendar . . . . . . . . . . . 92--94 Anonymous Can You Invent a Better World through Technologies? House Advertisement . . . 95 David Alan Grier Local Culture, Global Habits . . . . . . 96 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward IEEE Computer Society Membership House Advertisement c3--c3 Anonymous New Membership Options for a Better Fit House Advertisement . . . . . . . . . . c2--c2 Anonymous TechIgnite: A Rock Star Technology Event House Advertisement . . . . . . . . . . c4--c4
Anonymous IEEE Computer Society Is Where You Choose the Resources that Fit Your Career . . . . . . . . . . . . . . . . . 1 Anonymous Masthead . . . . . . . . . . . . . . . . 2 Anonymous Table of Contents . . . . . . . . . . . 3--4 Bruce McMillin and Tao Zhang Fog Computing for Smart Living . . . . . 5 David Alan Grier Computer's First Issues and the First Volunteer . . . . . . . . . . . . . . . 6--7 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 8--9 Peter A. Zientara and Sooyeon Lee and Gus H. Smith and Rorry Brenner and Laurent Itti and Mary B. Rosson and John M. Carroll and Kevin M. Irick and Vijaykrishnan Narayanan Third Eye: A Shopping Assistant for the Visually Impaired . . . . . . . . . . . 16--24 Anonymous myCS House . . . . . . . . . . . . . . . 25 Florian Wahl and Rui Zhang and Martin Freund and Oliver Amft Personalizing $3$D-Printed Smart Eyeglasses to Augment Daily Life . . . . 26--35 Cheng Zhang and Sinan Hersek and Yiming Pu and Danrui Sun and Qiuyue Xue and Thad E. Starner and Gregory D. Abowd and Omer T. Inan Bioacoustics-Based Human-Body-Mediated Communication . . . . . . . . . . . . . 36--46 Anonymous ACM--IEEE CS Eckert--Mauchly Award . . . 47 Rajan Bhattacharyya and Brian A. Coffman and Jaehoon Choe and Matthew E. Phillips Does Neurotechnology Produce a Better Brain? . . . . . . . . . . . . . . . . . 48--58 Scott Jenson The Future IoT: Building Better Legos 68--71 Erik P. DeBenedictis It's Time to Redefine Moore's Law Again 72--75 Elisa Bertino and Nayeem Islam Botnets and Internet of Things Security 76--79 Barry Brown The Social Life of Autonomous Cars . . . 92--96 Anonymous IEEE Computer Society 2017 Call for Major Award Nominations . . . . . . . . 98 Anonymous Call for Nominees Education Awards Nominations House Advertisement . . . . 103 Anonymous Move Your Career Forward IEEE Computer Society Membership . . . . . . . . . . . c3--c3 Anonymous New Membership Options for a Better Fit c2--c2 Anonymous TechIgnite . . . . . . . . . . . . . . . c4--c4
Anonymous IEEE Computer Society is Where You Choose the Resources that Fit Your Career . . . . . . . . . . . . . . . . . 1 Anonymous Masthead . . . . . . . . . . . . . . . . 2 Anonymous Table of Contents . . . . . . . . . . . 3--4 Anonymous IEEE Computer Society Richard E. Merwin Student Leadership Scholarship . . . . . 5 David Alan Grier When the Field was Young . . . . . . . . 6--7 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 8--9 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 10--11 Daniel J. Sorin Persistent Memory . . . . . . . . . . . 12 Anonymous Focus on Your Job Search . . . . . . . . 13 Katarzyna Wac and Homero Rivas and Maddalena Fiordelli Quality-of-Life Technologies . . . . . . 14--19 Mirana Randriambelonoro and Yu Chen and Pearl Pu Can Fitness Trackers Help Diabetic and Obese Users Make and Sustain Lifestyle Changes? . . . . . . . . . . . . . . . . 20--29 Aarti Sathyanarayana and Jaideep Srivastava and Luis Fernandez-Luque The Science of Sweet Dreams: Predicting Sleep Efficiency from Wearable Device Data . . . . . . . . . . . . . . . . . . 30--38 Anonymous Call for Nominees Education Awards Nominations . . . . . . . . . . . . . . 39 Tongda Zhang and Renate Fruchter and Maria Frank Are They Paying Attention? A Model-Based Method to Identify Individuals' Mental States . . . . . . . . . . . . . . . . . 40--49 Adela C. Timmons and Theodora Chaspari and Sohyun C. Han and Laura Perrone and Shrikanth S. Narayanan and Gayla Margolin Using Multimodal Wearable Technology to Detect Conflict among Couples . . . . . 50--59 Eisa Zarepour and Mohammadreza Hosseini and Salil S. Kanhere and Arcot Sowmya and Hamid R. Rabiee Applications and Challenges of Wearable Visual Lifeloggers . . . . . . . . . . . 60--69 Chuck Walrad Standards for the Enterprise IT Profession . . . . . . . . . . . . . . . 70--73 Scooter Willis You Never Forget Your First Project . . 74--76 Anonymous Nominations are Solicited for the Seymour Cray Sidney Fernbach & Ken Kennedy Awards House Advertisement . . . 77 Angelos Stavrou and Jeffrey Voas Verified Time . . . . . . . . . . . . . 78--82 Anonymous Conferences in the Palm of Your Hand . . 83 Hal Berghel On the Problem of (Cyber) Attribution 84--89 Steve Brown The New Diversity: Working with Nonhumans . . . . . . . . . . . . . . . 90--91 Anonymous Call and Calendar . . . . . . . . . . . 92--94 Anonymous IEEE Computer Society 2017 Call for Major Award Nominations . . . . . . . . 95 David Alan Grier Digital Trade . . . . . . . . . . . . . 96 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward IEEE Computer Society Membership . . . . . . . . . . . c3--c3 Anonymous New Membership Options for a Better Fit c2--c2 Anonymous TechIgnite . . . . . . . . . . . . . . . c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous Elsewhere in the CS . . . . . . . . . . 4--5 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 6 Sven Dietrich Cybersecurity and the Future . . . . . . 7 Stephen P. Morse The Intel 8086 Chip and the Future of Microprocessor Design . . . . . . . . . 8--9 Charles Severance Resurrecting the CDC 6500 Supercomputer 10--12 Leila De Floriani A High-level Language for Interactive Data Visualization . . . . . . . . . . . 13 Stefano Zanero Cyber-Physical Systems . . . . . . . . . 14--16 Gerry Howser and Bruce McMillin Using Information-Flow Methods to Analyze the Security of Cyber-Physical Systems . . . . . . . . . . . . . . . . 17--26 Teodora Sanislav and Sherali Zeadally and George Dan Mois A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture . . . . . . . . . . . . . . 27--37 Cesare Alippi and Manuel Roveri The (Not) Far-Away Path to Smart Cyber-Physical Systems: An Information-Centric Framework . . . . . 38--47 Rolf Oppliger and Gunther Pernul and Sokratis Katsikas New Frontiers: Assessing and Managing Security Risks . . . . . . . . . . . . . 48--51 Gaute Wangen Information Security Risk Assessment: A Method Comparison . . . . . . . . . . . 52--61 Judith E. Y. Rossebo and Reinder Wolthuis and Frank Fransen and Gunnar Bjorkman and Nuno Medeiros An Enhanced Risk-Assessment Methodology for Smart Grids . . . . . . . . . . . . 62--71 Pete Burnap and Yulia Cherdantseva and Andrew Blyth and Peter Eden and Kevin Jones and Hugh Soulsby and Kristan Stoddart Determining and Sharing Risk Data in Distributed Interdependent Systems . . . 72--79 Zahid Akhtar and Ajita Rattani A Face in any Form: New Challenges and Opportunities for Face Recognition Technology . . . . . . . . . . . . . . . 80--90 Ruben S. Montero and Elisa Rojas and Alfonso A. Carrillo and Ignacio M. Llorente Extending the Cloud to the Network Edge 91--95 Erik P. DeBenedictis Computer Architecture's Changing Role in Rebooting Computing . . . . . . . . . . 96--99 George Hurlburt Shining Light on the Dark Web . . . . . 100--105 Marta E. Cecchinato and Anna L. Cox Smartwatches: Digital Handcuffs or Magic Bracelets? . . . . . . . . . . . . . . . 106--109 Hal Berghel Alt-News and Post-Truths in the `Fake News' Era . . . . . . . . . . . . . . . 110--114 Anonymous Call and Calendar . . . . . . . . . . . 115--119 David Alan Grier The Radical Technology of Industrie 4.0 120 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous myCS . . . . . . . . . . . . . . . . . . c4--c4 Anonymous Move Your Career Forward IEEE Computer Society Membership . . . . . . . . . . . c3--c3 Anonymous New Membership Options for a Better Fit c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 6--7 Grace A. Lewis Cloud Computing . . . . . . . . . . . . 8--9 Giovanni De Micheli and Luca Benini Networks on Chips: 15 Years Later . . . 10--11 Bjorn Schuller Can Affective Computing Save Lives? Meet Mobile Health . . . . . . . . . . . . . 13 Carl K. Chang and Sorel Reisman and Edmundo Tovar Advances in Learning Technologies . . . 14--17 Austin Cory Bart and Javier Tibau and Eli Tilevich and Clifford A. Shaffer and Dennis Kafura BlockPy: An Open Access Data-Science Environment for Introductory Programmers 18--26 Soroush Ghorashi and Carlos Jensen Integrating Collaborative and Live Coding for Distance Education . . . . . 27--35 Sujata Rani and Parteek Kumar A Sentiment Analysis System to Improve Teaching and Learning . . . . . . . . . 36--43 Toru Ishida and Tetsuo Sawaragi and Kumiyo Nakakoji and Takushi Sogo Interdisciplinary Education for Design Innovation . . . . . . . . . . . . . . . 44--52 Henry C. B. Chan Internet of Education Resources Using a Chemistry-Inspired Framework . . . . . . 54--60 Yang Xie and Chongxi Bao and Ankur Srivastava Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy 62--71 Zoltan Adam Mann The Top Eight Misconceptions about NP-Hardness . . . . . . . . . . . . . . 72--79 Richard E. Fairley and Mary Jane Willshire Better Now Than Later: Managing Technical Debt in Systems Development 80--87 Jeffrey Voas and Rick Kuhn What Happened to Software Metrics? . . . 88--98 Brian David Johnson Sentient Tools and the Future of Work 99 Gary McGraw Six Tech Trends Impacting Software Security . . . . . . . . . . . . . . . . 100--102 W. Richards Adrion How Computer Science Departments and Faculty Can Contribute to the CS for All Initiative . . . . . . . . . . . . . . . 103--105 Andrew C. Gray and Eric M. Schwartz A Successful Approach to the 2016 RobotX Challenge . . . . . . . . . . . . . . . 106--109 Nicholas A. Valentino and John Leslie King and Walter W. Hill Polling and Prediction in the 2016 Presidential Election . . . . . . . . . 110--115 Joanna Bryson and Alan Winfield Standardizing Ethical Design for Artificial Intelligence and Autonomous Systems . . . . . . . . . . . . . . . . 116--119 Hal Berghel A Quick Take on Windows Security Evolution . . . . . . . . . . . . . . . 120--124 Anonymous Call and Calendar . . . . . . . . . . . 125--129 Anonymous CS Connection . . . . . . . . . . . . . 130--131 David Alan Grier A Russian Tragedy . . . . . . . . . . . 132 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Lee Garber \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Lynette A. Jones A Haptic Compass for Navigation . . . . 6 Erich Neuhold Computer, June 1967 and 1992 . . . . . . 7 Tom Snyder and Greg Byrd The Internet of Everything . . . . . . . 8--9 David Alan Grier The Yau Years: 1981--1984 . . . . . . . 10--11 Mark D. Hill and Michael R. Marty Retrospective on Amdahl's Law in the Multicore Era . . . . . . . . . . . . . 12--14 Anonymous myCS . . . . . . . . . . . . . . . . . . 15 Marilyn Wolf and Saibal Mukhopadhyay VLSI for the Internet of Things . . . . 16--18 Chenguang Shen and Mani Srivastava Exploring Hardware Heterogeneity to Improve Pervasive Context Inferences . . 19--26 Mingze Gao and Qian Wang and Md Tanvir Arafin and Yongqiang Lyu and Gang Qu Approximate Computing for Low Power and Security in the Internet of Things . . . 27--34 Mathias Soeken and Pierre-Emmanuel Gaillardon and Saeideh Shirinzadeh and Rolf Drechsler and Giovanni De Micheli A PLiM Computer for the Internet of Things . . . . . . . . . . . . . . . . . 35--40 Aldo Romani and Marco Tartagni and Enrico Sangiorgi Doing a Lot with a Little: Micropower Conversion and Management for Ambient-Powered Electronics . . . . . . 41--49 Gagan Gupta and Tony Nowatzki and Vinay Gangadhar and Karthikeyan Sankaralingam Kickstarting Semiconductor Innovation with Open Source Hardware . . . . . . . 50--59 Patrick Eugster and Chamikara Jayalath and Kirill Kogan and Julian Stephen Big Data Analytics beyond the Single Datacenter . . . . . . . . . . . . . . . 60--68 Jeffrey Voas and Phillip A. Laplante The IoT Blame Game . . . . . . . . . . . 69--73 Jennifer Davis Marketing and Engineering --- Working across the Aisle . . . . . . . . . . . . 74--75 Erik P. DeBenedictis and Jesse K. Mee and Michael P. Frank The Opportunities and Controversies of Reversible Computing . . . . . . . . . . 76--80 Hsiu-Chuan Huang and Zhi-Kai Zhang and Hao-Wen Cheng and Shiuhpyng Winston Shieh Web Application Security: Threats, Countermeasures, and Pitfalls . . . . . 81--85 Harold Thimbleby Improve IT, Improve Healthcare . . . . . 86--91 Justin Riley and John Noss and Wes Dillingham and James Cuff and Ignacio M. Llorente A High-Availability Cloud for Research Computing . . . . . . . . . . . . . . . 92--95 Anonymous CS Connection . . . . . . . . . . . . . 96--98 Anonymous Call and Calendar . . . . . . . . . . . 99--103 David Alan Grier Global Connections . . . . . . . . . . . 104 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward IEEE Computer Society Membership . . . . . . . . . . . c3--c3 Anonymous New Membership Options for a Better Fit c2--c2 Anonymous Prepare to Connect . . . . . . . . . . . c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--5 Anonymous New Membership Options For a Better Fit 6 Anonymous Achieve your career goals with the fit that's right for you . . . . . . . . . . 7 Anonymous Computer, July 1967 and 1992 . . . . . . 8--9 Rick Kazman Software Engineering . . . . . . . . . . 10--11 Jorg Henkel and Paolo Montuschi Computer Engineers' Challenges for the Next Decade: The Triangle of Power Density, Circuit Degradation, and Reliability . . . . . . . . . . . . . . 12 Scooter Willis and Greg Byrd and Brian David Johnson Challenge-Based Learning . . . . . . . . 13--16 Nancy Boyer Inspiring the Next Generation of Scientists and Engineers: K--12 and Beyond . . . . . . . . . . . . . . . . . 17--19 Lindsey Hitchcock Greenpower: Racing to a STEM Finish . . 20--22 Randy Swearer Industry-Backed Competitions: Helping Today's Students Prepare for Tomorrow's Careers . . . . . . . . . . . . . . . . 23--25 Anonymous Low-Cost High-Altitude Ballooning . . . 26--28 Randy Scheid Code4GoodPBC: Bridging the Gap between Innovation and Philanthropy . . . . . . 29--31 Richard S. Thomas Using Design Slam to Foster Lifelong Learning Solutions . . . . . . . . . . . 32--33 Anonymous Call For Nominees . . . . . . . . . . . 34 Juan C. SanMiguel and Andrea Cavallaro Networked Computer Vision: The Importance of a Holistic Simulator . . . 35--43 Jorg Liebig and Sven Apel and Andreas Janker and Florian Garbe and Sebastian Oster Handling Static Configurability in Refactoring Engines . . . . . . . . . . 44--53 Liliana Pasquale and Carlo Ghezzi and Edoardo Pasi and Christos Tsigkanos and Menouer Boubekeur and Blanca Florentino-Liano and Tarik Hadzic and Bashar Nuseibeh Topology-Aware Access Control of Smart Spaces . . . . . . . . . . . . . . . . . 54--63 Yamini Allu and Fred Douglis and Mahesh Kamat and Philip Shilane and Hugo Patterson and Ben Zhu Backup to the Future: How Workload and Hardware Changes Continually Redefine Data Domain File Systems . . . . . . . . 64--72 Anonymous Move Your Career Forward . . . . . . . . 73 Mohammad A. Salahuddin and Ala Al-Fuqaha and Mohsen Guizani and Khaled Shuaib and Farag Sallabi Softwarization of Internet of Things Infrastructure for Secure and Smart Healthcare . . . . . . . . . . . . . . . 74--79 Constantinos Kolias and Georgios Kambourakis and Angelos Stavrou and Jeffrey Voas DDoS in the IoT: Mirai and Other Botnets 80--84 Natalie Vanatta Envisioning the Future to Empower Action 85 Hal Berghel Which Is More Dangerous --- the Dark Web or the Deep State? . . . . . . . . . . . 86--91 Al Crouch and Michael Laisne and Martin Keim Generalizing Access to Instrumentation Embedded in a Semiconductor Device . . . 92--95 Sorel Reisman Teaching vs. Research--Optimizing Your Contribution for Society's Well-Being 96--98 Scooter Willis Stand on the Shoulders of Giants . . . . 99--102 Anonymous CS Connection . . . . . . . . . . . . . 103--105 Anonymous Call and Calendar . . . . . . . . . . . 106--111 David Alan Grier Connecting to Nigeria . . . . . . . . . 112 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society 2017 Call for Major Award Nominations . . . . . . . . c3--c3 Anonymous One membership. Unlimited knowledge . . c4--c4 Anonymous Prepare to Connect . . . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 David Alan Grier The Better Mix: 1985--1990 . . . . . . . 4--5 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 6--7 Pascal Guitton and Philippe Nain and François Sillion Inria: From Cold-War Computing to Digital Sciences . . . . . . . . . . . . 8--12 Anonymous IEEE Computer Society Information . . . 13 Erik P. DeBenedictis Computer Design Starts Over . . . . . . 14--17 Shaoshan Liu and Jie Tang and Zhe Zhang and Jean-Luc Gaudiot Computer Architectures for Autonomous Driving . . . . . . . . . . . . . . . . 18--25 Rathijit Sen and David A. Wood Energy-Proportional Computing: A New Definition . . . . . . . . . . . . . . . 26--33 Fei Xia and Ashur Rafiev and Ali Aalsaud and Mohammed Al-Hayanni and James Davis and Joshua Levine and Andrey Mokhov and Alexander Romanovsky and Rishad Shafik and Alex Yakovlev and Sheng Yang Voltage, Throughput, Power, Reliability, and Multicore Scaling . . . . . . . . . 34--45 Ike Nassi Scaling the Computer to the Problem: Application Programming with Unlimited Memory . . . . . . . . . . . . . . . . . 46--51 Christof Teuscher The Weird, the Small, and the Uncontrollable: Redefining the Frontiers of Computing . . . . . . . . . . . . . . 52--58 Anonymous IEEE Computer Society Richard E. Merwin Student Leadership Scholarship . . . . . 59 Andreas Stefik and Stefan Hanenberg Methodological Irregularities in Programming-Language Research . . . . . 60--63 John Hagel and John Seely Brown Shaping Strategies for the IoT . . . . . 64--68 Anonymous Sustaining Moore's law with $3$D chips 69--73 Kate Netkachova and Robin Bloomfield Is Chocolate Good for You --- or, Is the Cloud Secure? . . . . . . . . . . . . . 74--78 Anonymous Upsilon Pi Epsilon Student Excellence Award: Up to Four \$1,000 Awards . . . . 79 Anonymous IEEE Computer Society Election . . . . . 80--93 Anonymous IEEE Division VIII Delegate/Director Candidates . . . . . . . . . . . . . . . 94--95 Anonymous IEEE President-Elect Candidates Address Computer Society Concerns . . . . . . . 96--100 Anonymous CS Connection . . . . . . . . . . . . . 101--103 David Alan Grier The Lingua Franca of Technology . . . . 104 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Looking for the BEST Tech Job for You? c2--c2 Anonymous Move Your Career Forward IEEE Computer Society Membership . . . . . . . . . . . c3--c3 Anonymous One membership. Unlimited knowledge . . c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--7 Ann DeMarle Let Us Entertain You . . . . . . . . . . 8--9 Kenneth Magel Revisiting the Impact of the Ada Programming Language . . . . . . . . . . 10--11 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 12--13 Philip Treleaven and Richard Gendal Brown and Danny Yang Blockchain Technology in Finance . . . . 14--17 Tomaso Aste and Paolo Tasca and Tiziana Di Matteo Blockchain Technologies: The Foreseeable Impact on Society and Industry . . . . . 18--28 Chris Khan and Antony Lewis and Emily Rutland and Clemens Wan and Kevin Rutter and Clark Thompson A Distributed-Ledger Consortium Model for Collaborative Innovation . . . . . . 29--37 Ittay Eyal Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities . . . . . 38--49 Daniele Magazzeni and Peter McBurney and William Nash Validation and Verification of Smart Contracts: A Research Agenda . . . . . . 50--57 Michael Bedford Taylor The Evolution of Bitcoin Hardware . . . 58--66 Fariborz Farahmand The Importance of Human Information Processing: A Behavioral Economics Model for Predicting Domain Name Choice . . . 67--74 Anonymous Stay Connected . . . . . . . . . . . . . 75 Mohiuddin Ahmed Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering . . . . . . . . . . . . . 76--82 Mark Embury and Jan Clayton Standardization and Certification Challenges for Biopharmaceutical Plants 83--86 Hal Berghel Oh, What a Tangled Web: Russian Hacking, Fake News, and the 2016 US Presidential Election . . . . . . . . . . . . . . . . 87--91 Chii Chang and Satish Narayana Srirama and Rajkumar Buyya Indie Fog: An Efficient Fog-Computing Infrastructure for the Internet of Things . . . . . . . . . . . . . . . . . 92--98 Anonymous IEEE Computer Society Information . . . 99 Hyunji Chung and Michaela Iorga and Jeffrey Voas and Sangjin Lee ``Alexa, Can I Trust You?'' . . . . . . 100--104 David Alan Grier Bringing the Benefits Home . . . . . . . 105 Kyle Rakos and Alex Ruffino and Charles Li and Katherine Mao and Luke McBee and Ryan McBee and Matt Molo and Sanay Shah and Ian Sibley and Tyler Stagge Purdue University Team Tackles Global Underwater-Vehicle Competition . . . . . 106--110 Anonymous Looking for the BEST Tech Job for You? 111 Julie Jenson Bennett The Meanings in the Machine . . . . . . 112 Anonymous Achieve your career goals with the fit that's right for you . . . . . . . . . . c2--c2 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous Move Your Career Forward IEEE Computer Society Membership . . . . . . . . . . . c4--c4 Anonymous One membership. Unlimited knowledge . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--7 Ben Shneiderman Revisiting the Astonishing Growth of Human--Computer Interaction Research . . 8--11 David B. Lomet The Future of Data Management . . . . . 12--13 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 14--15 Antti Oulasvirta On-Skin Interfaces . . . . . . . . . . . 16--18 Jurgen Steimle and Joanna Bergstrom-Lehtovirta and Martin Weigel and Aditya Shekhar Nittala and Sebastian Boring and Alex Olwal and Kasper Hornbak On-Skin Interaction Using Body Landmarks 19--27 Pedro Lopes and Patrick Baudisch Interactive Systems Based on Electrical Muscle Stimulation . . . . . . . . . . . 28--35 Mahadev Satyanarayanan Edge Computing . . . . . . . . . . . . . 36--38 Anonymous One membership. Unlimited knowledge . . 39 Guenter Klas Edge Computing and the Role of Cellular Networks . . . . . . . . . . . . . . . . 40--49 Peng Liu and Lance Hartung and Suman Banerjee Lightweight Multitenancy at the Network's Extreme Edge . . . . . . . . . 50--57 Ganesh Ananthanarayanan and Paramvir Bahl and Peter Bodik and Krishna Chintalapudi and Matthai Philipose and Lenin Ravindranath and Sudipta Sinha Real-Time Video Analytics: The Killer App for Edge Computing . . . . . . . . . 58--67 Hal Berghel Net Neutrality Reloaded . . . . . . . . 68--72 Brian David Johnson The Weaponization of AI: A Glimpse into Future Threats . . . . . . . . . . . . . 73 Erik P. DeBenedictis $3$D Software: A New Research Imperative 74--77 Jeffrey Voas and Nir Kshetri Human Tagging . . . . . . . . . . . . . 78--85 Robert N. Charette Low Clearance Ahead: Can Predictable IT Crashes Be Avoided? . . . . . . . . . . 86--91 Jie Tang and Dawei Sun and Shaoshan Liu and Jean-Luc Gaudiot Enabling Deep Learning on IoT Devices 92--96 Anonymous IEEE Computer Society . . . . . . . . . 97 Gregory W. Hislop and Heidi J. C. Ellis Humanitarian Open Source Software in Computing Education . . . . . . . . . . 98--101 Albrecht Schmidt Technologies to Amplify the Mind . . . . 102--106 Anonymous \booktitleIEEE Transactions on Cloud Computing . . . . . . . . . . . . . . . 107 David Alan Grier Keeping the Internet Global . . . . . . 108 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society: Be at the Center of It All . . . . . . . . . . . . . . . c2--c2 Anonymous Looking for the BEST Tech Job for You? c3--c3 Anonymous Prepare to Connect . . . . . . . . . . . c4--c4
Anonymous Table of contents . . . . . . . . . . . 1--2 Anonymous [Masthead] . . . . . . . . . . . . . . . 3 Anonymous Highlights Society Magazines . . . . . . 4--7 Nancy G. Leveson The Therac-25: 30 Years Later . . . . . 8--11 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 12--13 Michael Beigl and Florian Michahelles and Hide Tokuda and Steve Hodges Programming the World . . . . . . . . . 14--17 Fulvio Corno and Luigi De Russis and Alberto Monge Roffarello A Semantic Web Approach to Simplifying Trigger-Action Programming in the IoT 18--24 Anonymous IEEE Computer Society . . . . . . . . . 25 Jack Hodges and Kimberly Garcia and Steven Ray Semantic Development and Integration of Standards for Adoption and Interoperability . . . . . . . . . . . . 26--36 Anonymous IEEE Transactions on Sustainable Computing . . . . . . . . . . . . . . . 37 Thomas Kubitza and Albrecht Schmidt meSchup: A Platform for Programming Interconnected Smart Things . . . . . . 38--49 Henry B. Wolfe The Mobile Phone as Surveillance Device: Progress, Perils, and Protective Measures . . . . . . . . . . . . . . . . 50--58 Anonymous Stay connected . . . . . . . . . . . . . 59 Roja Bandari and Zicong Zhou and Hai Qian and Timothy R. Tangherlini and Vwani P. Roychowdhury A Resistant Strain: Revealing the Online Grassroots Rise of the Antivaccination Movement . . . . . . . . . . . . . . . . 60--67 Daniel Lam and Ethan Stillman and Anthony Cariello and Andrew McCorkle and Ahmed Fouad A High School Team's Hard Road to Success in an International Engineering Competition . . . . . . . . . . . . . . 68--71 Hal Berghel The New Science Wars . . . . . . . . . . 72--76 David Alan Grier A More National Technology . . . . . . . 77 Paul Grassi and Mike Garcia and Katie Boeckl Government Adopts an Industry Approach to Open Source Collaboration . . . . . . 78--81 Adam L. Young and Moti Yung On Ransomware and Envisioning the Enemy of Tomorrow . . . . . . . . . . . . . . 82--85 Patricia Takako Endo and Guto Leoni Santos and Daniel Rosendo and Demis Moacir Gomes and Andre Moreira and Judith Kelner and Djamel Sadok and Glauco Estacio Goncalves and Mozhgan Mahloo Minimizing and Managing Cloud Failures 86--90 Brian David Johnson The Future of Shopping: An Eerie Silence? . . . . . . . . . . . . . . . . 91 Anonymous CS Connection . . . . . . . . . . . . . 92--93 Anonymous IEEE Transactions on Big Data . . . . . 94 Anonymous IEEE Transactions on Multi-Scale Computing Systems . . . . . . . . . . . 95 Peter Brusilovsky Toward Flexible MOOCs: Student-Sourcing of Learning Content at Scale . . . . . . 96 Anonymous IEEE Computer Society: Be at the Center of It All . . . . . . . . . . . . . . . c2--c2 Anonymous Looking for the BEST Tech Job for You? c4--c4 Anonymous myCS . . . . . . . . . . . . . . . . . . c3--c3
Anonymous Table of contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Jean-Luc Gaudiot Embracing Changes . . . . . . . . . . . 4--6 Hausi A. Muller The Rise of Intelligent Cyber-Physical Systems . . . . . . . . . . . . . . . . 7--9 David Patterson Reduced Instruction Set Computers Then and Now . . . . . . . . . . . . . . . . 10--12 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 13--15 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 16--17 Mike Daily and Swarup Medasani and Reinhold Behringer and Mohan Trivedi Self-Driving Cars . . . . . . . . . . . 18--23 Ernst D. Dickmanns Developing the Sense of Vision for Autonomous Road Vehicles at UniBwM . . . 24--31 Mina J. Hanna and Shawn C. Kimmel Current US Federal Policy Framework for Self-Driving Vehicles: Opportunities and Challenges . . . . . . . . . . . . . . . 32--40 Anonymous IEEE Computer Society . . . . . . . . . 41 Shaoshan Liu and Jie Tang and Chao Wang and Quan Wang and Jean-Luc Gaudiot A Unified Cloud Platform for Autonomous Driving . . . . . . . . . . . . . . . . 42--49 Nirav Ajmeri and Chung-Wei Hang and Simon D. Parsons and Munindar P. Singh Aragorn: Eliciting and Maintaining Secure Service Policies . . . . . . . . 50--58 Anonymous COMPSAC 2018 . . . . . . . . . . . . . . 59 William Knowles and Jose M. Such and Antonios Gouglidis and Gaurav Misra and Awais Rashid All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications . . . . . . . . . . . . . 60--71 Hal Berghel Equifax and the Latest Round of Identity Theft Roulette . . . . . . . . . . . . . 72--76 Chris Arkenberg The Future of Intelligent Assistants . . 77 Georgios Karakonstantis and Dimitrios S. Nikolopoulos and Dimitris Gizopoulos and Pedro Trancoso and Yiannakis Sazeides and Christos D. Antonopoulos and Srikumar Venugopal and Shidhartha Das Error-Resilient Server Ecosystems for Edge and Cloud Datacenters . . . . . . . 78--81 John A. Stankovic and James W. Sturges and Jon Eisenberg A 21st Century Cyber-Physical Systems Education . . . . . . . . . . . . . . . 82--85 Erik P. DeBenedictis Plotting a Socially Responsible Course for Computers Using Cybersecurity as an Example . . . . . . . . . . . . . . . . 86--90 Nir Kshetri and Jeffrey Voas Hacking Power Grids: A Current Problem 91--95 Alexander Kott and David S. Alberts How Do You Command an Army of Intelligent Things? . . . . . . . . . . 96--100 Anonymous Metra Voted 2018 Computer Society President-Elect . . . . . . . . . . . . 101--103 David Alan Grier The Subway to China . . . . . . . . . . 104 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society: Be at the Center of It All . . . . . . . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . c3--c3 Anonymous Looking for the BEST Tech Job for You? c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Hironori Kasahara Satisfaction and Sustainability . . . . 4--6 Anonymous \booktitleIEEE Transactions on Big Data 7 Anonymous Highlights Society Magazines . . . . . . 8--10 Anonymous \booktitleIEEE Cloud Computing Call for Papers . . . . . . . . . . . . . . . . . 11 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 12--13 Sumi Helal 2018 Outlook: The Emerging Web and Information Sciences . . . . . . . . . . 14--16 Anonymous myCS . . . . . . . . . . . . . . . . . . 17 Wendy Hall and Ramine Tinati and Will Jennings From Brexit to Trump: Social Media's Role in Democracy . . . . . . . . . . . 18--27 Wojciech Szpankowski and Ananth Grama Frontiers of Science of Information: Shannon Meets Turing . . . . . . . . . . 28--38 Anonymous IEEE Computer Society . . . . . . . . . 39 C. Gordon Bell and Ike Nassi Revisiting Scalable Coherent Shared Memory . . . . . . . . . . . . . . . . . 40--49 Hong Mei and Yao Guo Toward Ubiquitous Operating Systems: A Software-Defined Perspective . . . . . . 50--56 Dario Bruneo and Salvatore Distefano and Francesco Longo and Giovanni Merlino and Antonio Puliafito I/Ocloud: Adding an IoT Dimension to Cloud Infrastructures . . . . . . . . . 57--65 Tanusree Chatterjee and Sushmita Ruj and Sipra Das Bit Security Issues in Named Data Networks 66--75 Connor Tingley and George Serwin and Rohan Tuli and Jenya Kirsch Posner and Celvi Lisy and Lily Bresee and Keaton Viadro and Chip Morimoto Turning an International Competition into a Valuable Learning Experience . . 76--79 Jeffrey Voas and Rick Kuhn and Celia Paulsen and Kim Schaffer Educating Next-Gen Computer Scientists 80--88 Hal Berghel Disinformatics: The Discipline behind Grand Deceptions . . . . . . . . . . . . 89--93 Apostol Vassilev and Nicky Mouha and Luis Brandao Psst, Can You Keep a Secret? . . . . . . 94--97 Anonymous CS Connection . . . . . . . . . . . . . 98--102 Anonymous Got flaws? . . . . . . . . . . . . . . . 103 Nathan Shedroff Self-Managing Real Estate . . . . . . . 104 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society: Be at the Center of It All . . . . . . . . . . . . . . . c2--c2 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . c3--c3 Anonymous Looking for the BEST Tech Job for You? c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous Highlights Society Magazines . . . . . . 4--7 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 8--9 Bruce McMillin Software Engineering . . . . . . . . . . 10--12 David Harel and Guy Katz and Rami Marelly and Assaf Marron Wise Computing: Toward Endowing System Development with Proactive Wisdom . . . 14--26 Alexander Egyed and Klaus Zeman and Peter Hehenberger and Andreas Demuth Maintaining Consistency across Engineering Artifacts . . . . . . . . . 28--35 Ivan Handler Data Sharing Defined --- Really! . . . . 36--42 Stergios Papadimitriou and Lefteris Moussiades Mac OS versus FreeBSD: A Comparative Evaluation . . . . . . . . . . . . . . . 44--53 Roman Beck Beyond Bitcoin: The Rise of Blockchain World . . . . . . . . . . . . . . . . . 54--58 Gary McGraw The New Killer App for Security: Software Inventory . . . . . . . . . . . 60--62 Hal Berghel Bruce Schneier on Future Digital Threats 64--67 Erik P. DeBenedictis A Future with Quantum Machine Learning 68--71 Rajendra K. Raj and Allen Parrish Toward Standards in Undergraduate Cybersecurity Education in 2018 . . . . 72--75 Amitangshu Pal and Krishna Kant IoT-Based Sensing and Communications Infrastructure for the Fresh Food Supply Chain . . . . . . . . . . . . . . . . . 76--80 F. D. Wright Standards: Engaging for the Future . . . 81--83 Anonymous CS Connection . . . . . . . . . . . . . 84--87 Anonymous Computer WRITE FOR US . . . . . . . . . 88 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society Information . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous Highlights Society Magazines . . . . . . 4--6 Anonymous IEEE Computer Society . . . . . . . . . 7 Daniel J. Sorin Low-Power Content Addressable Memory . . 8--9 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 10--11 Oresti Banos and Christopher Nugent E-Coaching for Health . . . . . . . . . 12--15 Sergio F. Ochoa and Francisco J. Gutierrez Architecting E-Coaching Systems: A First Step for Dealing with Their Intrinsic Design Complexity . . . . . . . . . . . 16--23 Julie M. Robillard and Jesse Hoey Emotion and Motivation in Cognitive Assistive Technologies for Dementia . . 24--34 Anonymous Impact a broader audience . . . . . . . 35 Paolo Pilloni and Luca Piras and Salvatore Carta and Gianni Fenu and Fabrizio Mulas and Ludovico Boratto Recommender System Lets Coaches Identify and Help Athletes Who Begin Losing Motivation . . . . . . . . . . . . . . . 36--42 Mario O. Parra and Jesus Favela and Luis A. Castro and Arturo Morales Monitoring Eating Behaviors for a Nutritionist E-Assistant Using Crowdsourcing . . . . . . . . . . . . . 43--51 Chit-Kwan Lin and Andreas Wild and Gautham N. Chinya and Yongqiang Cao and Mike Davies and Daniel M. Lavery and Hong Wang Programming Spiking Neural Networks on Intel's Loihi . . . . . . . . . . . . . 52--61 Scooter Willis The Maker Revolution . . . . . . . . . . 62--65 Hal Berghel Trolling Pathologies . . . . . . . . . . 66--69 Dimitrios Serpanos The Cyber-Physical Systems Revolution 70--73 Nir Kshetri and Jeffrey Voas Hacking's Brand-Equity Nexus . . . . . . 74--77 Anonymous CS Connection . . . . . . . . . . . . . 78--80 Anonymous Connect on Interface . . . . . . . . . . c4--c4 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society: Be at the Center of It All . . . . . . . . . . . . . . . c3--c3 Anonymous Share the gift of knowledge: Give Your Favorite Student a Membership to the IEEE Computer Society! . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous Letters . . . . . . . . . . . . . . . . 4--7 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 8--10 Anonymous IEEE Computer Society Information . . . 11 Ronald F. DeMara and Paolo Montuschi Non-Volatile Memory Trends: Toward Improving Density and Energy Profiles across the System Stack . . . . . . . . 12--13 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 14--15 Daniel Prince Cybersecurity: The Security and Protection Challenges of Our Digital World . . . . . . . . . . . . . . . . . 16--19 Sulabh Bhattarai and Yong Wang End-to-End Trust and Security for Internet of Things Applications . . . . 20--27 Zhen Ni and Qianmu Li and Gang Liu Game-Model-Based Network Security Risk Control . . . . . . . . . . . . . . . . 28--38 Anonymous Impact a broader audience . . . . . . . 39 Yongsuk Lee and Gyungho Lee Detecting Code Reuse Attacks with Branch Prediction . . . . . . . . . . . . . . . 40--47 Anonymous Recognizing Excellence in High Performance Computing Nominations are Solicited for the Seymour Cray, Sidney Fernbach, and Ken Kennedy Awards . . . . 48 Anonymous Take the CS Library wherever you go! . . 49 Kristofer E. Bouchard and James B. Aimone and Miyoung Chun and Thomas Dean and Michael Denker and Markus Diesmann and David D. Donofrio and Loren M. Frank and Narayanan Kasthuri and Christof Koch and Oliver Rubel and Horst D. Simon and F. T. Sommer and Prabhat International Neuroscience Initiatives through the Lens of High-Performance Computing . . . . . . . . . . . . . . . 50--59 Konstantin Rubinov and Luciano Baresi What Are We Missing When Testing Our Android Apps? . . . . . . . . . . . . . 60--68 Anonymous \booktitleIEEE Transactions on Big Data 69 Hal Berghel Weaponizing Twitter Litter: Abuse-Forming Networks and Social Media 70--73 Thomas M. Conte and Erik P. DeBenedictis and Avi Mendelson and Dejan Milojicic Rebooting Computers to Avoid Meltdown and Spectre . . . . . . . . . . . . . . 74--77 Mina J. Hanna Net Neutrality: A Brief Overview of the Policy and the FCC's Ruling to Upend It 78--81 Chung-Kuan Chen and Zhi-Kai Zhang and Shan-Hsin Lee and Shiuhpyng Shieh Penetration Testing in the IoT Age . . . 82--85 Jeffrey Voas and Phillip A. Laplante IoT's Certification Quagmire . . . . . . 86--89 Jon Rosdahl Computer Society Standards Drive Industry . . . . . . . . . . . . . . . . 90--94 Anonymous Looking for the BEST Tech Job for You? 95 Anonymous CS Connection . . . . . . . . . . . . . 96 Anonymous Connect on Interface . . . . . . . . . . c4--c4 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society: Be at the Center of It All . . . . . . . . . . . . . . . c3--c3 Anonymous Share the Gift of Knowledge: Give Your Favorite Student a Membership to the IEEE Computer Society! . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous Highlights Society Magazines . . . . . . 4--6 Anonymous 2018 CSI-IEEE CS Joint Education Award 7 Leila De Floriani Globe Browsing in OpenSpace . . . . . . 8--9 Erich Neuhold Computer, 1968 and 1993 . . . . . . . . 10--11 Nicholas D. Lane and Pete Warden The Deep (Learning) Transformation of Mobile and Embedded Computing . . . . . 12--16 Anonymous 2019 Richard E. Merwin Award for Distinguished Service . . . . . . . . . 17 Andreas Moshovos and Jorge Albericio and Patrick Judd and Alberto Delmas Lascorz and Sayeh Sharify and Zissis Poulos and Tayler Hetherington and Tor Aamodt and Natalie Enright Jerger Exploiting Typical Values to Accelerate Deep Learning . . . . . . . . . . . . . 18--30 Anonymous IEEE Computer Society Harlan D. Mills Award . . . . . . . . . . . . . . . . . 31 Shuochao Yao and Yiran Zhao and Aston Zhang and Shaohan Hu and Huajie Shao and Chao Zhang and Lu Su and Tarek Abdelzaher Deep Learning for the Internet of Things 32--41 Seyed Ali Osia and Ali Shahin Shamsabadi and Ali Taheri and Hamid R. Rabiee and Hamed Haddadi Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning . . . . . . . . . . . . . 42--49 Thomas Plotz and Yu Guan Deep Learning for Human Activity Recognition in Mobile Computing . . . . 50--59 Jagmohan Chauhan and Suranga Seneviratne and Yining Hu and Archan Misra and Aruna Seneviratne and Youngki Lee Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks . . . . . . . 60--67 Jungmo Ahn and Huynh Nguyen Loc and Rajesh Krishna Balan and Youngki Lee and JeongGil Ko Finding Small-Bowel Lesions: Challenges in Endoscopy-Image-Based Learning Systems . . . . . . . . . . . . . . . . 68--76 Anonymous Call for Nominees Education Awards Nominations . . . . . . . . . . . . . . 77 Robert N. Charette Puncturing Pernicious Project Pufferies 78--83 Hal Berghel Malice Domestic: The Cambridge Analytica Dystopia . . . . . . . . . . . . . . . . 84--89 Marilyn Wolf Computing in the Real World Is the Grandest of Challenges . . . . . . . . . 90--91 Nir Kshetri and Jeffrey Voas Cyberthreats under the Bed . . . . . . . 92--95 Anonymous IEEE Computer Society . . . . . . . . . 96 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous 2019 IEEE-CS Charles Babbage Award . . . c4--c4 Anonymous myCS . . . . . . . . . . . . . . . . . . c2--c2 Anonymous Recognizing Excellence in High Performance Computing Nominations are Solicited for the Seymour Cray Sidney Fernbach & Ken Kennedy Awards . . . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous Highlights Society Magazines . . . . . . 4--6 Bjorn Schuller What Affective Computing Reveals about Autistic Children's Facial Expressions of Joy or Fear . . . . . . . . . . . . . 7--8 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 9--10 Anonymous Looking for the BEST Tech Job for You? 11 James Hendler and Wendy Hall and Noshir Contractor Web Science: Now More Than Ever . . . . 12--17 Kyungsik Han and Hyunggu Jung and Jin Yea Jang and Dongwon Lee Understanding Users' Privacy Attitudes through Subjective and Objective Assessments: An Instagram Case Study . . 18--28 Anonymous 2019 IEEE-CS Charles Babbage Award . . . 29 John Gastil and Sascha D. Meinrath Bringing Citizens and Policymakers Together Online: Imagining the Possibilities and Taking Stock of Privacy and Transparency Hazards . . . . 30--40 Anonymous 2019 Richard E. Merwin Award for Distinguished Service . . . . . . . . . 41 Daye Nam and Mayank Kejriwal How Do Organizations Publish Semantic Markup? Three Case Studies Using Public \tt Schema.org Crawls . . . . . . . . . 42--51 Jun Sun and Steffen Staab and Jerome Kunegis Understanding Social Networks Using Transfer Learning . . . . . . . . . . . 52--60 Anonymous IEEE Letters of the Computer Society . . 61 Carleen F. Maitland Now You See It, Now You Don't: Digital Connectivity in Marginalized Communities 62--71 Toru Ishida and Yohei Murakami and Donghui Lin and Takao Nakaguchi and Masayuki Otani Language Service Infrastructure on the Web: The Language Grid . . . . . . . . . 72--81 Erik P. DeBenedictis Accelerated Architectures Create Programming Opportunities . . . . . . . 82--85 Kristen Greene and Michelle Steves and Mary Theofanos No Phishing beyond This Point . . . . . 86--89 Trevor Pering and Kathy Farrington and Thorsten Dahm Taming the IoT: Operationalized Testing to Secure Connected Devices . . . . . . 90--94 Anonymous IEEE Computer Society . . . . . . . . . 95 Richard Vedder Benefits of College---By Degrees . . . . 96--99 F. D. Wright and Thomas M. Conte Standards: Roadmapping Computer Technology Trends Enlightens Industry 100--103 Anonymous CS Connection . . . . . . . . . . . . . 104 Anonymous Call for Nominees Education Awards Nominations . . . . . . . . . . . . . . c3--c3 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous IEEE Computer Society Harlan D. Mills Award . . . . . . . . . . . . . . . . . c4--c4 Anonymous Share the Gift of Knowledge: Give Your Favorite Student a Membership to the IEEE Computer Society! . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Ayten Ozge Akmandor and Niraj K. Jha Detecting and Alleviating Stress with SoDA . . . . . . . . . . . . . . . . . . 4--5 Anonymous Highlights Society Magazines . . . . . . 6--8 Anonymous IEEE Computer Society Information . . . 9 Anonymous 50 & 25 Years Ago . . . . . . . . . . . . 10--11 Jeffrey Voas and Rick Kuhn and Constantinos Kolias and Angelos Stavrou and Georgios Kambourakis Cybertrust in the IoT Age . . . . . . . 12--15 Rodrigo Roman-Castro and Javier Lopez and Stefanos Gritzalis Evolution and Trends in IoT Security . . 16--25 Natalija Vlajic and Daiwei Zhou IoT as a Land of Opportunity for DDoS Hackers . . . . . . . . . . . . . . . . 26--34 Anonymous IEEE Computer Society Harlan D. Mills Award . . . . . . . . . . . . . . . . . 35 Weizhi Meng Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling . . . . . . . . . . . . . . . . 36--43 Jose Maria de Fuentes and Lorena Gonzalez-Manzano and Agusti Solanas and Fatbardh Veseli Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT-Based Smart Cities . . . . . . . . . 44--53 Jatinder Singh and Christopher Millard and Chris Reed and Jennifer Cobbe and Jon Crowcroft Accountability in the IoT: Systems, Law, and Ways Forward . . . . . . . . . . . . 54--65 Ryan Gary Kim and Janardhan Rao Doppa and Partha Pratim Pande and Diana Marculescu and Radu Marculescu Machine Learning and Manycore Systems Design: A Serendipitous Symbiosis . . . 66--77 Timothy Buzzelli University of Central Florida Takes the Bronze at Annual International Programming Competition . . . . . . . . 78--81 Rick Kuhn and Mohammad Raunak and Raghu Kacker Can Reducing Faults Prevent Vulnerabilities? . . . . . . . . . . . . 82--85 Hal Berghel Newton's Great Insight . . . . . . . . . 86--90 Yoshihiro Shiroishi and Kunio Uchiyama and Norihiro Suzuki Society 5.0: For Human Security and Well-Being . . . . . . . . . . . . . . . 91--95 Anonymous CS Connection . . . . . . . . . . . . . 96 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous 2019 Richard E. Merwin Award for Distinguished Service . . . . . . . . . c4--c4 Anonymous Share the Gift of Knowledge: Give Your Favorite Student a Membership to the IEEE Computer Society! . . . . . . . . . c2--c2 Anonymous TCHPC IEEE Computer Society Technical Consortium on High Performance Computing c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Patrick Schaumont and Paolo Montuschi The Rise of Hardware Security in Computer Architectures . . . . . . . . . 4--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--8 Anonymous Call for Nominees Education Awards Nominations . . . . . . . . . . . . . . 9 Anonymous \booktitleComputer, August 1968 and 1993 10--12 Anonymous 2019 Richard E. Merwin Award for Distinguished Service . . . . . . . . . 13 Oresti Banos and Chris Nugent M-Coaching: Towards the Next Generation of Mobile-Driven Healthcare Support Services . . . . . . . . . . . . . . . . 14--17 Mauro Tschanz and Tim Lucas Dorner and Jurgen Holm and Kerstin Denecke Using eMMA to Manage Medication . . . . 18--25 Haolin Wang and Qingpeng Zhang and Mary Ip and Joseph Tak Fai Lau Social Media-based Conversational Agents for Health Management and Interventions 26--33 Simo Hosio and Jaro Karppinen and Niels van Berkel and Jonas Oppenlaender and Jorge Goncalves Mobile Decision Support and Data Provisioning for Low Back Pain . . . . . 34--43 Hal Berghel and Daniel Berleant The Online Trolling Ecosystem . . . . . 44--51 Erik P. DeBenedictis A Role for IEEE in Quantum Computing . . 52--55 Jim Isaak and Mina J. Hanna User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection . . . 56--59 Robin Bloomfield and Peter Bishop and Eoin Butler and Robert Stroud Security-Informed Safety: Supporting Stakeholders with Codes of Practice . . 60--65 Roy Want and Wei Wang and Stan Chesnutt Accurate Indoor Location for the IoT . . 66--70 Anonymous IEEE Computer Society . . . . . . . . . 71 Anonymous IEEE Computer Society Election . . . . . 72--85 Anonymous IEEE Division V Delegate/Director Candidates . . . . . . . . . . . . . . . 86--87 Anonymous IEEE President-Elect Candidates Address Computer Society Concerns . . . . . . . 88--93 Anonymous CS Connection . . . . . . . . . . . . . 94--96 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous 2019 IEEE-CS Charles Babbage Award . . . c4--c4 Anonymous IEEE Computer Society: Be at the Center of It All . . . . . . . . . . . . . . . c2--c2 Anonymous IEEE Computer Society Harlan D. Mills Award . . . . . . . . . . . . . . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous Computer Highlights Society Magazines 4--6 Anonymous Stay connected . . . . . . . . . . . . . 7 Jaideep Vaidya Privacy-Preserving Statistics . . . . . 8--9 Anonymous IEEE Letters of the Computer Society . . 10 Anonymous September, 1968 and 1993 . . . . . . . . 11--12 Anonymous Call for Nominees Education Awards Nominations . . . . . . . . . . . . . . 13 Sumi Helal The Expanding Frontier of Artificial Intelligence . . . . . . . . . . . . . . 14--17 Plamen P. Angelov and Xiaowei Gu Toward Anthropomorphic Machine Learning 18--27 Hani Hagras Toward Human-Understandable, Explainable AI . . . . . . . . . . . . . . . . . . . 28--36 Anonymous 2018 CSI-IEEE CS Joint Education Award 37 Dagmar Schuller and Bjorn W. Schuller The Age of Artificial Emotional Intelligence . . . . . . . . . . . . . . 38--46 Anonymous IEEE Computer Society Harlan D. Mills Award . . . . . . . . . . . . . . . . . 47 Thang N. Dinh and My T. Thai AI and Blockchain: A Disruptive Integration . . . . . . . . . . . . . . 48--53 Wasim Ahmad Bhat Is a Data-Capacity Gap Inevitable in Big Data Storage? . . . . . . . . . . . . . 54--62 Anonymous Looking for the BEST Tech Job for You? 63 Mahbub Hassan and Wen Hu and Guhao Lan and Aruna Seneviratne and Sara Khalifa and Sajal K. Das Kinetic-Powered Health Wearables: Challenges and Opportunities . . . . . . 64--74 Anonymous IEEE Transactions on Big Data . . . . . 75 Rolf Ernst Automated Driving: The Cyber-Physical Perspective . . . . . . . . . . . . . . 76--79 George Hurlburt Toward Applied Cyberethics . . . . . . . 80--84 Anonymous IEEE Computer Society . . . . . . . . . 85 Florence Hudson and Chris Clark Wearables and Medical Interoperability: The Evolving Frontier . . . . . . . . . 86--90 Anonymous Computer WRITE FOR US . . . . . . . . . 91 Anonymous CS Connection . . . . . . . . . . . . . 92--96 Anonymous Front Cover . . . . . . . . . . . . . . c1--c1 Anonymous 2019 IEEE-CS Charles Babbage Award . . . c4--c4 Anonymous IEEE COMPUTER SOCIETY: Be at the Center of It All . . . . . . . . . . . . . . . c2--c2 Anonymous 2019 Richard E. Merwin Award for Distinguished Service . . . . . . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Staff List . . . . . . . . . . . . . . . 3 Lori Cameron [Elsewhere in the CS] . . . . . . . . . 4--6 Erich Neuhold [50 & 25 Years Ago] . . . . . . . . . . . 7--9 Oleg Sokolsky and Nicola Bezzo Resiliency in Cyber-Physical Systems [Guest Editors' Introduction] . . . . . 10--12 Darren Cofer and Andrew Gacek and John Backes and Michael W. Whalen and Lee Pike and Adam Foltzer and Michal Podhradsky and Gerwin Klein and Ihor Kuz and June Andronick and Gernot Heiser and Douglas Stuart A Formal Approach to Constructing Secure Air Vehicle Software . . . . . . . . . . 14--23 Tarek Abdelzaher and Nora Ayanian and Tamer Basar and Suhas Diggavi and Jana Diesner and Deepak Ganesan and Ramesh Govindan and Susmit Jha and Tancrede Lepoint and Benjamin Marlin and Klara Nahrstedt and David Nicol and Raj Rajkumar and Stephen Russell and Sanjit Seshia and Fei Sha and Prashant Shenoy and Mani Srivastava and Gaurav Sukhatme and Ananthram Swami and Paulo Tabuada and Don Towsley and Nitin Vaidya and Venu Veeravalli Toward an Internet of Battlefield Things: A Resilience Perspective . . . . 24--36 Varun Badrinath Krishna and Ziping Wu and Vaidehi V. Ambardekar and Richard Macwan and William H. Sanders Cyberattacks on Primary Frequency Response Mechanisms in Power Grids . . . 37--45 Yuchang Won and Buyeon Yu and Jaegeun Park and In-Hee Park and Haegeon Jeong and Jeanseong Baik and Kyungtae Kang and Insup Lee and Sang Hyuk Son and Kyung-Joon Park and Yongsoon Eun An Attack-Resilient CPS Architecture for Hierarchical Control: A Case Study on Train Control Systems . . . . . . . . . 46--55 Mohammad Shihabul Haque and Daniel Jun Xian Ng and Arvind Easwaran and Karthikeyan Thangamariappan Contract-Based Hierarchical Resilience Management for Cyber-Physical Systems 56--65 Tanesh Kumar and Pawani Porambage and Ijaz Ahmad and Madhusanka Liyanage and Erkki Harjula and Mika Ylianttila Securing Gadget-Free Digital Services 66--77 Sylvain Halle and Raphael Khoury and Mewena Awesso Streamlining the Inclusion of Computer Experiments In a Research Paper . . . . 78--89 Hal Bergel Election Integrity 2018: Are We Better Off Than We Were in 2016? [Aftershock] 90--94 Christos Koulamas and Athanasios Kalogeras Cyber-Physical Systems and Digital Twins in the Industrial Internet of Things [Cyber-Physical Systems] . . . . . . . . 95--98 Nir Kshetri Cryptocurrencies: Transparency Versus Privacy [Cybertrust] . . . . . . . . . . 99--111 Hal Berghel The Genesis of Postmodern Disinformatics [Out of Band] . . . . . . . . . . . . . 102--105 Claudio Lima Developing Open and Interoperable DLT/Blockchain Standards [Standards] . . 106--111 Anonymous IEEE Computer Society information . . . 112 Anonymous Front Cover . . . . . . . . . . . . . . C1
Anonymous Front cover . . . . . . . . . . . . . . ?? Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . ?? Lori Cameron [Elsewhere in the CS] . . . . . . . . . 4--6 Erich Neuhold Computer, December 1968 and 1993 [50 & 25 Years Ago] . . . . . . . . . . . . . . . 7--9 Yasha Wang and Katsuyuki Yamazaki Governments in the Age of Big Data and Smart Cities [Guest Editors' Introduction] . . . . . . . . . . . . . 10--12 Anonymous IEEE Computer Society information . . . ?? Takahiro Sumitomo and Noboru Koshizuka Progress and Initiatives for Open Data Policy in Japan . . . . . . . . . . . . 14--23 Hui Gao and Chi Harold Liu and Wendong Wang Hybrid Vehicular Crowdsourcing With Driverless Cars: Challenges and a Solution . . . . . . . . . . . . . . . . 24--31 Leye Wang and Bin Guo and Qiang Yang Smart City Development With Urban Transfer Learning . . . . . . . . . . . 32--41 Jiangtao Wang and Junfeng Zhao and Yong Zhang and Xin Peng and Ying Li and Yun Xie Enabling Human-Centric Smart Cities: Crowdsourcing-Based Practice in China 42--49 Noboru Koshizuka and Stephan Haller and Ken Sakamura CPaaS.io: An EU--Japan Collaboration on Open Smart-City Platforms . . . . . . . 50--58 Nir Kshetri Blockchain and Electronic Healthcare Records [Cybertrust] . . . . . . . . . . 59--63 Ju Wang and Xiaojiang Chen and Dingyi Fang and Jie Xiong and Hongbo Jiang and Rajesh Krishna Balan Material Identification and Target Imaging with RFIDs [IoT Connection] . . 64--68 Erik P. DeBenedictis and Michael P. Frank The National Quantum Initiative Will Also Benefit Classical Computers [Rebooting Computing] . . . . . . . . . 69--73 Anonymous De Floriani Voted 2019 IEEE Computer Society President-Elect [Report to Members] . . . . . . . . . . . . . . . . 74--76 Anonymous [CS Connection] . . . . . . . . . . . . 78--80
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Cecilia Metra The 2019 IEEE Computer Society: Targeting Member Satisfaction and Technical Excellence . . . . . . . . . . 4--6 Lori Cameron \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 7--9 Erich Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 10--12 David Alan Grier A revolutionary outlook [EIC's Message] 13--14 Anonymous \booktitleIEEE Software Call For Articles . . . . . . . . . . . . . . . . 14 Anonymous IEEE Computer Society . . . . . . . . . 15 Elisa Bertino and Shawn Merrill and Alina Nesen and Christine Utz Redefining Data Transparency: A Multidimensional Approach . . . . . . . 16--26 Ben Shneiderman and Catherine Plaisant Interactive Visual Event Analytics: Opportunities and Challenges . . . . . . 27--35 Dong Wang and Boleslaw K. Szymanski and Tarek Abdelzaher and Heng Ji and Lance Kaplan The Age of Social Sensing . . . . . . . 36--45 Jiangtao Wang and Yasha Wang and Qin Lv Crowd-Assisted Machine Learning: Current Issues and Future Directions . . . . . . 46--53 Marilyn Wolf Computer Security as Civil Defense . . . 54--57 Anonymous Erratum [for ``Toward Human-Understandable, Explainable AI''] 57 Nir Kshetri and Jeffrey Voas Online Advertising Fraud . . . . . . . . 58--61 Anonymous \booktitleIEEE Transactions on Big Data 61 Lu Dai and Stan Krolikoski A unique collaboration: revitalizing existing standards while preparing for the future . . . . . . . . . . . . . . . 62--65 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . 65 Hal Berghel Vehicle Telematics: The Good, Bad and Ugly . . . . . . . . . . . . . . . . . . 66--70 Anonymous B. Ramakrishna Rau Award . . . . . . . . 71 Hironori Kasahara Collaboration for the Future . . . . . . 72--76 Anonymous Front Cover . . . . . . . . . . . . . . C1 Anonymous ACM/IEEE CS Eckert--Mauchly Award . . . C2 Anonymous IEEE Computer Society Interface . . . . C3 Anonymous IEEE Computer Society Jobs Board . . . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Bjoern Schuller Microexpressions: A Chance for Computers to Beat Humans at Detecting Hidden Emotions? . . . . . . . . . . . . . . . 4--5 Anonymous \booktitleIEEE Security & Privacy Subscription . . . . . . . . . . . . . . 5 Lori Cameron \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--8 Erich Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 9--11 Anonymous \booktitleIEEE Transactions on Big Data 11 David Alan Grier Holding Us Together . . . . . . . . . . 12--13 Anonymous Call For Articles Software Magazine . . 13 Vard Antinyan and Anna B. Sandberg and Miroslaw Staron A Pragmatic View on Code Complexity Management . . . . . . . . . . . . . . . 14--22 Anonymous \booktitleIT Professional Call for Articles . . . . . . . . . . . . . . . . 22 Kjell J. Hole and Christian Otterstad Software Systems With Antifragility to Downtime . . . . . . . . . . . . . . . . 23--31 Anonymous \booktitleIEEE Pervasive Computing Call for Articles . . . . . . . . . . . . . . 31 Philip Treleaven and Jeremy Barnett and Adriano Koshiyama Algorithms: Law and Regulation . . . . . 32--40 K. Siddique and Z. Akhtar and F. Aslam Khan and Y. Kim KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research . . . . . . 41--51 Anonymous \booktitleIEEE Computer Graphics & Applications Subscription . . . . . . . 51 Kirk M. Bresniker and Paolo Faraboschi and Avi Mendelson and Dejan Milojicic and Timothy Roscoe and Robert N. M. Watson Rack-Scale Capabilities: Fine-Grained Protection for Large-Scale Memories . . 52--62 Anonymous \booktitleIEEE Annals of the History of Computing . . . . . . . . . . . . . . . 62 Amitangshu Pal and Krishna Kant NFMI: Connectivity for Short-Range IoT Applications . . . . . . . . . . . . . . 63--67 Anonymous \booktitleIEEE Intelligent Systems . . . 67 Anonymous \booktitleIEEE Multimedia . . . . . . . 67 Rick Kuhn and Dylan Yaga and Jeffrey Voas Rethinking Distributed Ledger Technology 68--72 Anonymous Front Cover . . . . . . . . . . . . . . C1--C1 Anonymous B. Ramakrishna Rau Award . . . . . . . . C2--C2 Anonymous IEEE Computer Society Information . . . C3--C3 Anonymous IEEE Computer Society Job Boards . . . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3 Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Albert Y. Zomaya A Novel Hierarchical Two-Tier Node-Deployment Strategy for Sustainable Wireless Sensor Networks . . . . . . . . 4--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--8 Anonymous IT Professional Call for Articles . . . 8--8 Anonymous \booktitleIT Professional Call for Articles . . . . . . . . . . . . . . . . 8 Erich Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 9--11 David Alan Grier Learning to Live in an Insecure World 12--13 Anonymous \booktitleSecurity & Privacy Subscribe 13--13 Ann Sobel and Allen Parrish and Rajendra K. Raj Curricular Foundations for Cybersecurity 14--17 Anonymous \booktitleIEEE Transactions on Big Data 17--17 Matthew Hudnall Educational and Workforce Cybersecurity Frameworks: Comparing, Contrasting, and Mapping . . . . . . . . . . . . . . . . 18--28 Diana L. Burley and Alfred H. Lewis Jr. Cybersecurity Curricula 2017 and Boeing: Linking Curricular Guidance to Professional Practice . . . . . . . . . 29--37 David Gibson and Vijay Anand and Josh Dehlinger and Charles Dierbach and Tracy Emmersen and Andrew Phillips Accredited Undergraduate Cybersecurity Degrees: Four Approaches . . . . . . . . 38--47 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . 47--47 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . 47 Tracy Emmersen and Joseph M. Hatfield and Jeff Kosseff and Steven R. Orr IV The USNA's Interdisciplinary Approach to Cybersecurity Education . . . . . . . . 48--57 Jean R. S. Blair and Andrew O. Hall and Edward Sobiesk Educating Future Multidisciplinary Cybersecurity Teams . . . . . . . . . . 58--66 Jessica Ivy and Sarah B. Lee and Dana Franz and Joseph Crumpton Seeding Cybersecurity Workforce Pathways With Secondary Education . . . . . . . . 67--75 Anonymous \booktitleIEEE Pervasive Computing Call for Articles . . . . . . . . . . . . . . 75--75 Anonymous \booktitleIEEE Pervasive Computing Call for Articles . . . . . . . . . . . . . . 75 Hal Berghel Codes of Ethics in a Post-Truth World 76--80 Robert N. Charette Evolving From Know-How to Know-What . . 81--86 Anonymous \booktitleIEEE Annals of the History of Computing . . . . . . . . . . . . . . . 86--86 Anonymous \booktitleIEEE Annals of the History of Computing . . . . . . . . . . . . . . . 86 Nir Kshetri and Jeffrey Voas Trusting Pirated Software . . . . . . . 87--90 Anonymous Front Cover . . . . . . . . . . . . . . C1 Anonymous Front Cover . . . . . . . . . . . . . . C1--C1 Anonymous Letters of the Computer Society . . . . C2 Anonymous Letters of the Computer Society . . . . C2--C2 Anonymous IEEE Computer Society information . . . C3--C3 Anonymous IEEE Computer Society Jobs Board . . . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--6 Anonymous \booktitleIEEE Software & Privacy . . . . 6--6 E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 7--9 Anonymous \booktitleIEEE Software Call for Articles . . . . . . . . . . . . . . . . 9--9 D. A. Grier The Path Across the Great Deep . . . . . 10--11 Anonymous \booktitleIEEE Transactions on Big Data 11--11 N. Nag and R. Jain A Navigational Approach to Health: Actionable Guidance for Improved Quality of Life . . . . . . . . . . . . . . . . 12--20 J. M. Such and P. Ciholas and A. Rashid and J. Vidler and T. Seabrook Basic Cyber Hygiene: Does It Work? . . . 21--31 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . 31--31 G. P. De Francesco The General Data Protection Regulation's Practical Impact on Software Architecture . . . . . . . . . . . . . . 32--39 K. Fawaz and K. G. Shin Security and Privacy in the Internet of Things . . . . . . . . . . . . . . . . . 40--49 Anonymous \booktitleIEEE Annals of the History of Computing . . . . . . . . . . . . . . . 49--49 F. Farahmand and F. Farahmand Privacy Decision Making: The Brain Approach . . . . . . . . . . . . . . . . 50--58 Anonymous \booktitleIEEE Computer Graphics & Applications Subscribe . . . . . . . . . 58--58 D. Riehle The Innovations of Open Source . . . . . 59--63 Anonymous IT Professional Call for Articles . . . 63--63 N. Kshetri and J. Voas Thoughts on Cyberbullying . . . . . . . 64--68 Anonymous \booktitleIEEE Persuasive Computing Call for Articles . . . . . . . . . . . . . . 68--68 J. C. Havens and A. Hessami From Principles and Standards to Certification . . . . . . . . . . . . . 69--72 Anonymous Erratum . . . . . . . . . . . . . . . . 72--72 Anonymous \booktitleIEEE MultiMedia . . . . . . . 72--72 Anonymous Front Cover . . . . . . . . . . . . . . C1--C1 Anonymous IEEE World Congress on Services 2019 . . C2--C2 Anonymous \booktitleIEEE Computer Society information . . . . . . . . . . . . . . C3--C3 Anonymous COMPSAC 2019 . . . . . . . . . . . . . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--6 Anonymous IEEE World Congress on Services 2019 . . 6--6 E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 7--10 Anonymous \booktitleComputer Graphics & Applications Subscribe . . . . . . . . . 10--10 D. A. Grier A Familiar Vision . . . . . . . . . . . 11--12 Anonymous \booktitleIEEE Annals of the History of Computing . . . . . . . . . . . . . . . 12--12 V. N. Gudivada and S. Pankanti and G. Seetharaman and Y. Zhang Cognitive Computing Systems: Their Potential and the Future . . . . . . . . 13--18 Anonymous \booktitleIEEE Pervasive Computing Call for Articles . . . . . . . . . . . . . . 18--18 Anonymous Letters of the Computer Society . . . . 19--19 M. V. DeBole and B. Taba and A. Amir and F. Akopyan and A. Andreopoulos and W. P. Risk and J. Kusnitz and C. Ortega Otero and T. K. Nayak and R. Appuswamy and P. J. Carlson and A. S. Cassidy and P. Datta and S. K. Esser and G. J. Garreau and K. L. Holland and S. Lekuch and M. Mastro and J. McKinstry and C. di Nolfo and B. Paulovicks and J. Sawada and K. Schleupen and B. G. Shaw and J. L. Klamo and M. D. Flickner and J. V. Arthur and D. S. Modha TrueNorth: Accelerating From Zero to 64 Million Neurons in 10 Years . . . . . . 20--29 S. D. Pyle and J. D. Sapp and R. F. DeMara Leveraging Stochasticity for In Situ Learning in Binarized Deep Neural Networks . . . . . . . . . . . . . . . . 30--39 Anonymous Subscribe to \booktitleSecurity & Privacy Magazine . . . . . . . . . . . . . . . . 39--39 N. Rasiwasia Perspectives on Becoming an Applied Machine Learning Scientist . . . . . . . 40--47 Z. Ma and J. Wu and S. Zhong and J. Jiang and S. J. Heinen Human Eye Movements Reveal Video Frame Importance . . . . . . . . . . . . . . . 48--57 S. O. Hwang and A. Mehmood Blockchain-Based Resource Syndicate . . 58--66 B. Rinner Can We Trust Smart Cameras? . . . . . . 67--70 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . 70--70 Anonymous \booktitleSecurity & Privacy Magazine . . 71--71 L. M. Morman How Do We Prepare the Next Generation for a Career in Our Digital Era? . . . . 72--74 Anonymous \booktitleIEEE Intelligent Systems Magazine . . . . . . . . . . . . . . . . 74--74 Anonymous \booktitleIEEE MultiMedia Magazine . . . 74--74 Anonymous \booktitleIEEE Transactions on Big Data 75--75 Anonymous CS Connection . . . . . . . . . . . . . 76--76 Anonymous Front Cover . . . . . . . . . . . . . . C1--C1 Anonymous IEEE Computer Society Website Launch . . C2--C2 Anonymous IEEE Computer Society information . . . C3--C3 Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 J. Vaidya Advances in Hardware Trojan Detection 4--5 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . 5--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--8 Anonymous \booktitleIEEE Security & Privacy Magazine Subscribe . . . . . . . . . . . 8--8 E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 9--11 Anonymous \booktitleIEEE Software Magazine Call For Articles . . . . . . . . . . . . . . 11--11 D. A. Grier Exploring the Current State of Quantum Computing . . . . . . . . . . . . . . . 12--12 T. S. Humble and E. P. DeBenedictis Quantum Realism . . . . . . . . . . . . 13--17 Anonymous \booktitleIEEE Transactions on Big Data 17--17 R. Shaydulin and H. Ushijima-Mwesigwa and C. F. A. Negre and I. Safro and S. M. Mniszewski and Y. Alexeev A Hybrid Approach for Solving Optimization Problems on Small Quantum Computers . . . . . . . . . . . . . . . 18--26 A. Paler and D. Herr and S. J. Devitt Really Small Shoe Boxes: On Realistic Quantum Resource Estimation . . . . . . 27--37 Anonymous \booktitleIEEE Pervasive Computing Call for Articles . . . . . . . . . . . . . . 37--37 C. C. McGeoch and R. Harris and S. P. Reinhardt and P. I. Bunyk Practical Annealing-Based Quantum Computing . . . . . . . . . . . . . . . 38--46 S. Hu and P. Liu and C. R. Chen and M. Pistoia and J. Gambetta Reduction-Based Problem Mapping for Quantum Computing . . . . . . . . . . . 47--57 P. Liu and S. Hu and M. Pistoia and C. R. Chen and J. M. Gambetta Stochastic Optimization of Quantum Programs . . . . . . . . . . . . . . . . 58--67 Anonymous \booktitleIEEE IT Professionals Call for Articles . . . . . . . . . . . . . . . . 67--67 G. F. Hurlburt The Tyranny of Urgency . . . . . . . . . 68--72 Anonymous \booktitleIEEE Computer Graphics & Applications Magazine . . . . . . . . . 72--72 P. Laplante and S. Applebaum NIST's 18 Internet of Things Trust Concerns . . . . . . . . . . . . . . . . 73--76 Anonymous Social Networking . . . . . . . . . . . 77--77 D. Serpanos There Is No Safety Without Security and Dependability . . . . . . . . . . . . . 78--81 Anonymous \booktitleIEEE Annals of the History of Computing . . . . . . . . . . . . . . . 81--81 M. Ballhausen Free and Open Source Software Licenses Explained . . . . . . . . . . . . . . . 82--86 Anonymous \booktitleIEEE Intelligent Systems Magazine . . . . . . . . . . . . . . . . 86--86 Anonymous IEEE Jobs Board . . . . . . . . . . . . 87--87 D. Wright Meeting Industry's Standardization Needs 88--92 Anonymous \booktitleIEEE MultiMedia Magazine . . . 92--92 Anonymous IEEE Letters of the Computer Society . . 93--93 Anonymous CS Connections . . . . . . . . . . . . . 94--96 Anonymous Front Cover . . . . . . . . . . . . . . C1--C1 Anonymous IEEE World Congress on Services 2019 . . C2--C2 Anonymous IEEE Computer Society information . . . C3--C3 Anonymous \booktitleSecurity & Privacy Magazine . . C4--C4
Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--6 E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 7--9 D. A. Grier Transforming the Field . . . . . . . . . 10--11 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . 11--11 M. Youssef and F. Kawsar Transformative Computing and Communication . . . . . . . . . . . . . 12--14 Anonymous \booktitleIEEE Annals of the History of Computing . . . . . . . . . . . . . . . 14--14 Anonymous IEEE Computer Society Technical Consortium on High Performance Computing 15--15 M. Alloulah and H. Huang Future Millimeter-Wave Indoor Systems: A Blueprint for Joint Communication and Sensing . . . . . . . . . . . . . . . . 16--24 S. Savazzi and S. Sigg and F. Vicentini and S. Kianoush and R. Findling On the Use of Stray Wireless Signals for Sensing: a Look Beyond 5G for the Next Generation of Industry . . . . . . . . . 25--36 Anonymous \booktitleIEEE Software Call for Articles . . . . . . . . . . . . . . . . 36--36 M. Satyanarayanan and N. Davies Augmenting Cognition Through Edge Computing . . . . . . . . . . . . . . . 37--46 Anonymous \booktitleIEEE Multimedia Magazine . . . 46--46 L. Moreno and P. Martinez The Harmonization of Accessibility Standards for Public Policies . . . . . 57--66 Anonymous \booktitleIEEE Transactions on Big Data 66--66 G. C. Bowker The Computerization Time Crunch . . . . 67--71 Anonymous \booktitleIEEE Security & Privacy Subscription . . . . . . . . . . . . . . 71--71 M. T. Khan and H. Shrobe Security of Cyberphysical Systems: Chaining Induction and Deduction . . . . 72--75 J. D. Roth and C. E. Lutton and J. B. Michael Security Through Simplicity: a Case Study in Logical Segmentation Inference 76--79 Anonymous CS Connections . . . . . . . . . . . . . 80--83 Anonymous IT Professional Call For Papers . . . . 83--83 Anonymous IEEE Computer Society information . . . 84--84 Anonymous Front Cover . . . . . . . . . . . . . . C1--C1 Anonymous IEEE Computer Society Job Board . . . . C2--C2 Anonymous IEEE Computer Society Social Networking C3--C3 Anonymous \booktitleIEEE Computing Edge Magazine C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1 Anonymous IEEE Job Boards . . . . . . . . . . . . C2--C2 Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 K. Mueller Advances in Visualization Recommender Systems . . . . . . . . . . . . . . . . 4--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--8 E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 9--11 E. Akleman Computing Through Time . . . . . . . . . 10--10 D. A. Grier Go/No Go . . . . . . . . . . . . . . . . 12--13 Anonymous \booktitleIEEE Annals of the History of Computing . . . . . . . . . . . . . . . 13--13 M. Villari and M. Fazio and S. Dustdar and O. Rana and D. N. Jha and R. Ranjan Osmosis: The Osmotic Computing Platform for Microelements in the Cloud, Edge, and Internet of Things . . . . . . . . . 14--26 H. Silva Borges and M. T. Valente How Do Developers Promote Open Source Projects? . . . . . . . . . . . . . . . 27--33 A. Figueroa and J. Atkinson Dual-View Learning for Detecting Web Query Intents . . . . . . . . . . . . . 34--42 H. Kim and E. A. Lee and S. Dustdar Creating a Resilient IoT With Edge Computing . . . . . . . . . . . . . . . 43--53 G. Mcgraw and R. Bonett and H. Figueroa and V. Shepardson Security Engineering for Machine Learning . . . . . . . . . . . . . . . . 54--57 Anonymous \booktitleIEEE Multimedia Magazine . . . 57--57 H. Habibi Gharakheili and A. Sivanathan and A. Hamza and V. Sivaraman Network-Level Security for the Internet of Things: Opportunities and Challenges 58--62 Anonymous \booktitleIEEE Software Magazine Call for Articles . . . . . . . . . . . . . . 62--62 H. Schoettle Open Source License Compliance --- Why and How? . . . . . . . . . . . . . . . . 63--67 Anonymous \booktitleIEEE Computer Graphics Applications Call for Articles . . . . . 67--67 R. Simpson The IEEE Standards Association Corporate Program: Engaging Industry in Standards Development . . . . . . . . . . . . . . 68--71 Anonymous \booktitleIEEE IT Professionals Call for Articles . . . . . . . . . . . . . . . . 71--71 K. J. Hole and S. Ahmad Biologically Driven Artificial Intelligence . . . . . . . . . . . . . . 72--75 Anonymous \booktitleIEEE Pervasive Computing Call for Articles . . . . . . . . . . . . . . 75--75 Anonymous \booktitleIEEE Computer Magazine Call for 2019 Major Awards Nominations . . . 76--76 Anonymous IEEE Computer Society Election . . . . . 77--90 Anonymous \booktitleIEEE Security & Privacy Subscribe . . . . . . . . . . . . . . . 90--90 Anonymous IEEE Division VIII Delegate/Director Candidates . . . . . . . . . . . . . . . 91--92 Anonymous IEEE President-Elect Candidates Address Computer Society Concerns . . . . . . . 93--96 Anonymous IEEE Computer Society Information . . . C3--C3 Anonymous \booktitleIEEE Computing Edge Subscribe C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1 Anonymous \booktitleComputer Call for Special Issue Proposals . . . . . . . . . . . . C2--C2 Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Q. Fettes and M. Clark and R. Bunescu and A. Karanth and A. Louri Dynamic Voltage and Frequency Scaling in NoCs With Supervised and Reinforcement Learning Techniques . . . . . . . . . . 4--5 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 6--8 Anonymous \booktitleIEEE Multimedia Magazine . . . 8--8 E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 9--11 D. A. Grier Translational Computing: What Needs the Translation? . . . . . . . . . . . . . . 12--14 Anonymous 2019 IEEE Computer Society Election . . 14--14 Anonymous Richard E. Merwin Award . . . . . . . . 15--15 D. Abramson and M. Parashar Translational Research in Computer Science . . . . . . . . . . . . . . . . 16--23 Anonymous \booktitleIEEE IT Professional Call For Papers . . . . . . . . . . . . . . . . . 23--23 R. Kuhn and J. Voas and P. Laplante Taking Score on the Success of Blockchain, So Far . . . . . . . . . . . 24--34 Anonymous \booktitleIEEE Pervasive Computing Call for Articles . . . . . . . . . . . . . . 34--34 A. Zamansky and D. van der Linden and I. Hadar and S. Bleuer-Elsner Log My Dog: Perceived Impact of Dog Activity Tracking . . . . . . . . . . . 35--43 Anonymous \booktitleIEEE Transactions on Big Data 43--43 M. Salisbury When Computers Advise Us: How to Represent the Types of Knowledge Users Seek for Expert Advice . . . . . . . . . 44--51 Anonymous 2019 IEEE Computer Society Election . . 51--51 P. Hukal and N. Berente and M. Germonprez and A. Schecter Bots Coordinating Work in Open Source Software Projects . . . . . . . . . . . 52--60 C. Huang and T. Wang and C. Lin Early Results on the Business Value of Internet of Things Initiatives . . . . . 61--67 B. Varghese and P. Leitner and S. Ray and K. Chard and A. Barker and Y. Elkhatib and H. Herry and C. Hong and J. Singer and F. P. Tso and E. Yoneki and M. Zhani Cloud Futurology . . . . . . . . . . . . 68--77 A. P. Fournaris and A. S. Lalos and D. Serpanos Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe? . . . . . . . . . . . . . 78--81 R. Bloomfield and H. Khlaaf and P. Ryan Conmy and G. Fletcher Disruptive Innovations and Disruptive Assurance: Assuring Machine Learning and Autonomy . . . . . . . . . . . . . . . . 82--89 Anonymous IEEE Social Networking . . . . . . . . . 90--90 Anonymous CS Connection . . . . . . . . . . . . . 91--92 Anonymous IEEE Computer Society . . . . . . . . . C3--C3 Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous [Front cover] . . . . . . . . . . . . . C1--C1 Anonymous \booktitleIEEE Computer Architecture Letters . . . . . . . . . . . . . . . . C2--C2 Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 4--6 P. Montuschi New and Emerging Topics in Computing . . 7--8 Anonymous \booktitleIEEE Intelligent Systems . . . 8--8 Anonymous 50 25 Years Ago . . . . . . . . . . . . 9--11 E. Akleman Computing Through Time . . . . . . . . . 11--11 D. A. Grier A Good Party . . . . . . . . . . . . . . 12--13 S. D. Crocker The Arpanet and Its Impact on the State of Networking . . . . . . . . . . . . . 14--23 Anonymous \booktitleIEEE Computer Graphics Applications . . . . . . . . . . . . . . 23--23 P. Stimers The U.S. National Quantum Initiative . . 24--29 Y. Lu and G. K. Thiruvathukal and A. S. Kaseb and K. Gauen and D. Rijhwani and R. Dailey and D. Malik and Y. Huang and S. Aghajanzadeh and M. M. Guo See the World Through Network Cameras 30--40 Anonymous IEEE IT Professionals Call for Articles 40--40 A. Jukan and F. Carpio and X. Masip and A. J. Ferrer and N. Kemper and B. U. Stetina Fog-to-Cloud Computing for Farming: Low-Cost Technologies, Data Exchange, and Animal Welfare . . . . . . . . . . . 41--51 F. Bertini and S. G. Rizzo and D. Montesi Can Information Hiding in Social Media Posts Represent a Threat? . . . . . . . 52--60 Anonymous \booktitleIEEE Pervasive Computing Call for Papers . . . . . . . . . . . . . . . 60--60 X. Wang and W. Sun and L. Hu and Y. Zhao and W. E. Wong and Z. Chen Software-Testing Contests: Observations and Lessons Learned . . . . . . . . . . 61--69 Anonymous \booktitleIEEE Security & Privacy Magazine Subscribe . . . . . . . . . . . 69--69 T. W. Kim and S. Mejia From Artificial Intelligence to Artificial Wisdom: What Socrates Teaches Us . . . . . . . . . . . . . . . . . . . 70--74 Anonymous IEEE DataPort . . . . . . . . . . . . . 75--75 A. Vassilev Can Deep Learning Save Us and Itself From the Avalanche of Threats in Cyberspace? . . . . . . . . . . . . . . 76--82 Anonymous \booktitleComputer Call for Special Issue Proposals . . . . . . . . . . . . 83--83 P. Zhang and S. Pan and M. Mirshekari and J. Fagert and H. Y. Noh Structures as Sensors: Indirect Sensing for Inferring Users and Environments . . 84--88 Anonymous \booktitleIEEE Transactions on Big Data 88--88 M. Campbell Synthetic Data: How AI Is Transitioning From Data Consumer to Data Producer \ldots and Why That's Important . . . . 89--91 J. McAffer Getting Started With Open Source Governance . . . . . . . . . . . . . . . 92--96 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . 96--96 A. E. K. Sobel A New (?) Educational View of Computing 97--98 Anonymous \booktitleIEEE Software Magazine Call for Articles . . . . . . . . . . . . . . 98--98 H. Berghel Huawei, BIS, and the IEEE: It's Déj\`a Vu All Over Again . . . . . . . . . . . . . 99--104 Anonymous IEEE Social Networking . . . . . . . . . 105--105 G. Thompson Ethernet: From Office to Data Center to IoT . . . . . . . . . . . . . . . . . . 106--109 Anonymous \booktitleIEEE Annals of the History of Computing . . . . . . . . . . . . . . . 109--109 E. P. DeBenedictis Powerball and Quantum Supremacy . . . . 110--112 Anonymous IEEE Computer Society Information . . . C3--C3 Anonymous IEEE Job Board . . . . . . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1 Anonymous IEEE Social Networking . . . . . . . . . C2--C2 Anonymous Table of Contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 Anonymous 50 25 Years Ago . . . . . . . . . . . . 4--6 Anonymous \booktitleIEEE Multimedia Magazine . . . 6--6 M. Parashar The Reproducibility Initiative . . . . . 7--8 Anonymous \booktitleIEEE Transactions on Big Data 8--8 Anonymous Elsewhere in the CS . . . . . . . . . . 9--11 Anonymous \booktitleIEEE Intelligent Systems Magazine . . . . . . . . . . . . . . . . 11--11 D. A. Grier Toward Healthier Lifestyles . . . . . . 12--13 Anonymous \booktitleIEEE Security and Privacy Magazine Subscribe . . . . . . . . . . . 13--13 S. Helal and R. Jain Digital Health-Active and Healthy Living 14--17 M. Gadaleta and M. Rossi and E. J. Topol and S. R. Steinhubl and G. Quer On the Effectiveness of Deep Representation Learning: The Atrial Fibrillation Case . . . . . . . . . . . 18--29 N. Homdee and R. Alam and J. A. Hayes and T. Hamid and J. Park and S. Wolfe and H. Goins and N. Fyffe and T. Newbold and T. Smith-Jackson and A. Bankole and M. S. Anderson and J. Lach Agitation Monitoring and Prevention System for Dementia Caregiver Empowerment . . . . . . . . . . . . . . 30--39 C. Tseng and C. Lin and H. Chang and C. Liu and B. M. F. Serafico and L. Wu and C. Lin and T. Hsu and C. Huang and M. Lo Cloud-Based Artificial Intelligence System for Large-Scale Arrhythmia Screening . . . . . . . . . . . . . . . 40--51 W. C. Chu and C. Shih and W. Chou and S. I. Ahamed and P. Hsiung Artificial Intelligence of Things in Sports Science: Weight Training as an Example . . . . . . . . . . . . . . . . 52--61 O. Pinarer and A. Ozgovde Application-Aware Dynamic Energy Management for Portable Devices . . . . 62--72 Y. Shiroishi and K. Uchiyama and N. Suzuki Better Actions for Society 5.0: Using AI for Evidence-Based Policy Making That Keeps Humans in the Loop . . . . . . . . 73--78 Anonymous \booktitleIEEE Computer Architecture Letters . . . . . . . . . . . . . . . . 79--79 J. B. Michael Assessing the Trustworthiness of Electronic Systems . . . . . . . . . . . 80--83 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . 83--83 Anonymous CS Connection . . . . . . . . . . . . . 84--84 Anonymous \booktitleIEEE Software Magazine Call for Articles . . . . . . . . . . . . . . 84--84 Anonymous IEEE Computer Society information . . . C3--C3 Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous [Front cover] . . . . . . . . . . . . . C1--C1 Anonymous \booktitleIEEE Transactions on Computers C2--C2 Anonymous Table of contents . . . . . . . . . . . 1--2 Anonymous Masthead . . . . . . . . . . . . . . . . 3--3 C. Metra The 2019 IEEE Computer Society: Hit Target on Member Satisfaction and Technical Excellence . . . . . . . . . . 4--11 Anonymous IEEE Computer Society . . . . . . . . . 11--11 Anonymous \booktitleComputer Highlights Society Magazines . . . . . . . . . . . . . . . 12--14 Anonymous \booktitleIEEE Internet Computing Magazine . . . . . . . . . . . . . . . . 15--15 H. Lei and C. Qiu and H. Yao and S. Guo When Blockchain-Enabled Internet of Things Meets Cloud Computing . . . . . . 16--17 Anonymous \booktitleIEEE Software Magazine Call For Articles . . . . . . . . . . . . . . 17--17 E. Neuhold 50 & 25 Years Ago . . . . . . . . . . . . 18--21 Anonymous \booktitleIEEE Multimedia Magazine . . . 19--19 E. Akleman Computing Through Time . . . . . . . . . 20--20 Anonymous \booktitleIEEE Transactions on Sustainable Computing . . . . . . . . . 21--21 Anonymous IEEE Computer Society Awards . . . . . . 22--27 D. A. Grier The IEEE Computer Society and the Tools of the Past . . . . . . . . . . . . . . 28--30 Anonymous \booktitleIEEE Intelligent Systems Magazine . . . . . . . . . . . . . . . . 30--30 D. Milojicic Technology Predictions . . . . . . . . . 31--33 P. Faraboschi and E. Frachtenberg and P. Laplante and K. Mansfield and D. Milojicic Technology Predictions: Art, Science, and Fashion . . . . . . . . . . . . . . 34--38 D. Lange Cognitive Robotics: Making Robots Sense, Understand, and Interact . . . . . . . . 39--44 K. Bresniker and A. Gavrilovska and J. Holt and D. Milojicic and T. Tran Grand Challenge: Applying Artificial Intelligence and Machine Learning to Cybersecurity . . . . . . . . . . . . . 45--52 E. Frachtenberg Practical Drone Delivery . . . . . . . . 53--57 R. Saracco Digital Twins: Bridging Physical Space and Cyberspace . . . . . . . . . . . . . 58--64 A. Mendelson Security and Privacy in the Age of Big Data and Machine Learning . . . . . . . 65--70 T. Coughlin Nonvolatile Memory Express: The Link That Binds Them . . . . . . . . . . . . 71--79 J. Voas Predictions on Predictions . . . . . . . 80--82 A. Hoffman Moral Hazards in Cyber Vulnerability Markets . . . . . . . . . . . . . . . . 83--88 P. E. Black and M. Singh Opaque Wrappers and Patching: Negative Results . . . . . . . . . . . . . . . . 89--93 A. Pal and K. Kant Using Blockchain for Provenance and Traceability in Internet of Things-Integrated Food Logistics . . . . 94--98 M. Campbell Smart Edge: The Effects of Shifting the Center of Data Gravity Out of the Cloud 99--102 D. Spinellis How to Select Open Source Components . . 103--106 A. E. K. Sobel Revisiting Whether Everyone Should Go to College . . . . . . . . . . . . . . . . 107--108 Anonymous Erratum . . . . . . . . . . . . . . . . 108--108 David G. Hough The IEEE Standard 754: One for the History Books . . . . . . . . . . . . . 109--112 Anonymous \booktitleIEEE Security Privacy Magazine Subscribe . . . . . . . . . . . . . . . 113--113 E. P. DeBenedictis Moore's Law: A Hard Act to Follow . . . 114--117 Anonymous \booktitleIEEE Transactions on Big Data 117--117 Anonymous Shull Voted 2020 IEEE Computer Society President-Elect . . . . . . . . . . . . 118--120 Anonymous IEEE Computer Society . . . . . . . . . C3--C3 Anonymous \booktitleIEEE Social Networking . . . . C4--C4