Top Banner
80 Computer SUBJECT INDEX A Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., Nov., pp. 27-31 Mailbox-Based Scheme for Mobile Agent Communications, J. Cao et al., Sept., pp. 54-60 Q: A Scenario Description Language for Interactive Agents, T. Ishida, Nov., pp. 42-47 Social Intelligence Design for the Web, T. Nishida, Nov., pp. 37-41 Toward Behavioral Intelligence in the Semantic Web, J.J. Bryson et al., Nov., pp. 48-54 Agile Software Development The Agile Methods Fray [Column], T. DeMarco and B. Boehm, June, pp. 90-92 Get Ready for Agile Methods, with Care, B. Boehm, Jan., pp. 64-69 Algorithms, see also Scheduling Algorithms Computers Are from Mars, Organisms Are from Venus, J. Kim, July, pp. 25-32 Efficient Replacement of Nonuniform Objects in Web Caches, H. Bahn et al., June, pp. 65-73 Large-Vocabulary Speech Recognition Algorithms, M. Padmanabhan and M. Picheny, Apr., pp. 42-50 Next Steps for Mobile Entertainment Portals, T.S. Raghu et al., May, pp. 63-70 The Web and Social Networks, R. Kumar et al., Nov., pp. 32-36 Artificial Intelligence From Computational Intelligence to Web Intelligence, N. Cercone, Nov., pp. 72-76 Social Intelligence Design for the Web, T. Nishida, Nov., pp. 37-41 Toward Behavioral Intelligence in the Semantic Web, J.J. Bryson et al., Nov., pp. 48-54 Would a Digital Brain Have a Mind? [Column], N. Holmes, May, pp. 112, 110-111 Assistive Technologies for Persons with Disabilities Blind, Deaf Engineer Develops Computerized Braille Machine [News], L.D. Paulson, Dec., p. 27 Now You See It, Now You Don’t [Column], C. Rigden, July, pp. 104-105 Project Promises Accessible Technology for the Disabled [News], L.D. Paulson, Oct., p. 26 Augmented Reality Applying Mixed Reality to Entertainment [Column], C. Stapleton et al., Dec., pp. 122-124 Developing a Generic Augmented-Reality Interface, I. Poupyrev et al., Mar., pp. 44-50 Merging Fossil Specimens with Computer-Generated Information, O. Bimber et al., Sept., pp. 25-30 Authentication PKI: It’s Not Dead, Just Resting, P. Gutmann, Aug., pp. 41-49 Taking a Graphical Approach to the Password [News], L.D. Paulson, July, p. 19 Automotive Electronics Expanding Automotive Electronic Systems, G. Leen and D. Heffernan, Jan., pp. 88-93 Autonomic Computing Computer System, Heal Thyself [News], L.D. Paulson, Aug., pp. 20-22 IBM Begins Autonomic-Computing Project [News], L.D. Paulson, Feb., p. 25 In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., Nov., pp. 27-31 Awards Academic Excellence Prize and Best Paper Scholarship Awarded [CS Connection], M-L.G. Piner, Apr., p. 76 High School Student from China Receives IEEE Computer Society Prize [CS Connection], M-L.G. Piner, Aug., pp. 64-65 IEEE CS Recognizes Achievements of Leading Computer Engineers [CS Connection], M-L.G. Piner, June, pp. 74-76 IEEE Fellows Lead the Engineering Profession [CS Connection], M-L.G. Piner, Feb., pp. 84-85 Recent Awards Reinforce Society’s Commitment to Service, Teaching [CS Connection], M-L.G. Piner, Nov., pp. 82-83 Romanian Disaster-Response Project Wins Design Compe- tition [News], L. Garber, Aug., pp. 13-15 B Bioinformatics Bioinformatics Experiences Important Breakthroughs [News], L.D. Paulson, June, pp. 26-27 BioSig: An Imaging Bioinformatic System for Studying Phenomics, B. Parvin et al., July, pp. 65-71 The Blueprint for Life?, D.G. Feitelson and M. Treinin, July, pp. 34-40 Computers Are from Mars, Organisms Are from Venus, J. Kim, July, pp. 25-32 The Emerging Landscape of Bioinformatics Software Systems [Guest Editors’ Intro: Bioinformatics], L.S. Heath and N. Ramakrishnan, July, pp. 41-45 Genome Sequence Assembly: Algorithms and Issues, M. Pop et al., July, pp. 47-54 Interactively Exploring Hierarchical Clustering Results, J. Seo and B. Shneiderman, July, pp. 80-86 A Random Walk Down the Genomes: DNA Evolution in Valis, S. Paxia et al., July, pp. 73-79 Toward New Software for Computational Phylogenetics, B.M.E. Moret et al., July, pp. 55-64 Bluetooth Enhanced Service Discovery in Bluetooth [Column], S. Avancha et al., June, pp. 96-99 Book Reviews Assessing a C# Text [Column], B. Meyer, Apr., pp. 86-88 Science-Philosophy Celebrity Death Match [Opinion], B. Colwell, Dec., pp. 13-15 Weird Books [Opinion], B. Colwell, Aug., pp. 10-12 C Cache Memory Efficient Replacement of Nonuniform Objects in Web Caches, H. Bahn et al., June, pp. 65-73 Certification, Software Software Certification Debate: Benefits of Certification, L. Tripp, June, pp. 31-33 Software Certification Debate: Certification Will Do More Harm Than Good, A. Kolawa, June, pp. 34-35 China, Computer Industry in Enter the Dragon: China’s Computer Industry, K. Kraemer and J. Dedrick, Feb., pp. 28-36 Client-Server Computing Rover: Scalable Location-Aware Computing, S. Banerjee et ANNUAL INDEX Volume 35, 2002
12

Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

Apr 12, 2018

Download

Documents

dinhnhi
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

80 Computer

SUBJECT INDEX

AAgent TechnologyIn Search of the Wisdom Web [Guest Editors’ Intro: Web

Intelligence], N. Zhong et al., Nov., pp. 27-31Mailbox-Based Scheme for Mobile Agent Communications,

J. Cao et al., Sept., pp. 54-60Q: A Scenario Description Language for Interactive Agents,

T. Ishida, Nov., pp. 42-47Social Intelligence Design for the Web, T. Nishida,

Nov., pp. 37-41Toward Behavioral Intelligence in the Semantic Web,

J.J. Bryson et al., Nov., pp. 48-54Agile Software DevelopmentThe Agile Methods Fray [Column], T. DeMarco andB. Boehm, June, pp. 90-92Get Ready for Agile Methods, with Care, B. Boehm,

Jan., pp. 64-69Algorithms, see also Scheduling AlgorithmsComputers Are from Mars, Organisms Are from

Venus, J. Kim, July, pp. 25-32Efficient Replacement of Nonuniform Objects in

Web Caches, H. Bahn et al., June, pp. 65-73Large-Vocabulary Speech Recognition Algorithms,

M. Padmanabhan and M. Picheny, Apr., pp. 42-50Next Steps for Mobile Entertainment Portals, T.S.

Raghu et al., May, pp. 63-70The Web and Social Networks, R. Kumar et al., Nov., pp.

32-36Artificial IntelligenceFrom Computational Intelligence to Web Intelligence, N.

Cercone, Nov., pp. 72-76Social Intelligence Design for the Web, T. Nishida, Nov.,

pp. 37-41Toward Behavioral Intelligence in the Semantic Web, J.J.

Bryson et al., Nov., pp. 48-54Would a Digital Brain Have a Mind? [Column], N. Holmes,

May, pp. 112, 110-111Assistive Technologies for Persons with DisabilitiesBlind, Deaf Engineer Develops Computerized Braille

Machine [News], L.D. Paulson, Dec., p. 27Now You See It, Now You Don’t [Column], C. Rigden, July,

pp. 104-105Project Promises Accessible Technology for the Disabled

[News], L.D. Paulson, Oct., p. 26Augmented RealityApplying Mixed Reality to Entertainment [Column], C.

Stapleton et al., Dec., pp. 122-124Developing a Generic Augmented-Reality Interface, I.

Poupyrev et al., Mar., pp. 44-50Merging Fossil Specimens with Computer-Generated

Information, O. Bimber et al., Sept., pp. 25-30AuthenticationPKI: It’s Not Dead, Just Resting, P. Gutmann, Aug., pp. 41-49Taking a Graphical Approach to the Password [News], L.D.

Paulson, July, p. 19Automotive ElectronicsExpanding Automotive Electronic Systems, G. Leen and D.

Heffernan, Jan., pp. 88-93 Autonomic ComputingComputer System, Heal Thyself [News], L.D. Paulson,

Aug., pp. 20-22

IBM Begins Autonomic-Computing Project [News], L.D.Paulson, Feb., p. 25

In Search of the Wisdom Web [Guest Editors’ Intro: WebIntelligence], N. Zhong et al., Nov., pp. 27-31

AwardsAcademic Excellence Prize and Best Paper Scholarship

Awarded [CS Connection], M-L.G. Piner, Apr., p. 76High School Student from China Receives IEEE Computer

Society Prize [CS Connection], M-L.G. Piner, Aug., pp.64-65

IEEE CS Recognizes Achievements of Leading ComputerEngineers [CS Connection], M-L.G. Piner, June, pp. 74-76

IEEE Fellows Lead the Engineering Profession [CSConnection], M-L.G. Piner, Feb., pp. 84-85

Recent Awards Reinforce Society’s Commitment to Service,Teaching [CS Connection], M-L.G. Piner, Nov., pp. 82-83

Romanian Disaster-Response Project Wins Design Compe-tition [News], L. Garber, Aug., pp. 13-15

BBioinformaticsBioinformatics Experiences Important Breakthroughs

[News], L.D. Paulson, June, pp. 26-27BioSig: An Imaging Bioinformatic System for Studying

Phenomics, B. Parvin et al., July, pp. 65-71The Blueprint for Life?, D.G. Feitelson and M. Treinin, July,

pp. 34-40Computers Are from Mars, Organisms Are from Venus, J.

Kim, July, pp. 25-32The Emerging Landscape of Bioinformatics Software

Systems [Guest Editors’ Intro: Bioinformatics], L.S.Heath and N. Ramakrishnan, July, pp. 41-45

Genome Sequence Assembly: Algorithms and Issues, M.Pop et al., July, pp. 47-54

Interactively Exploring Hierarchical Clustering Results, J.Seo and B. Shneiderman, July, pp. 80-86

A Random Walk Down the Genomes: DNA Evolution inValis, S. Paxia et al., July, pp. 73-79

Toward New Software for Computational Phylogenetics,B.M.E. Moret et al., July, pp. 55-64

BluetoothEnhanced Service Discovery in Bluetooth [Column], S.

Avancha et al., June, pp. 96-99Book ReviewsAssessing a C# Text [Column], B. Meyer, Apr., pp. 86-88Science-Philosophy Celebrity Death Match [Opinion], B.

Colwell, Dec., pp. 13-15Weird Books [Opinion], B. Colwell, Aug., pp. 10-12

CCache MemoryEfficient Replacement of Nonuniform Objects in Web

Caches, H. Bahn et al., June, pp. 65-73Certification, SoftwareSoftware Certification Debate: Benefits of Certification, L.

Tripp, June, pp. 31-33Software Certification Debate: Certification Will Do More

Harm Than Good, A. Kolawa, June, pp. 34-35China, Computer Industry inEnter the Dragon: China’s Computer Industry, K. Kraemer

and J. Dedrick, Feb., pp. 28-36Client-Server ComputingRover: Scalable Location-Aware Computing, S. Banerjee et

A N N U A L I N D E X

Volume 35, 2002

Page 2: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

al., Oct., pp. 46-53Thick Clients for Personal Wireless Devices [Column], T.

Starner, Jan., pp. 133-135Using Virtual Linux Servers [Column], R.L. Norton, Nov.,

pp. 106-107Yima: A Second-Generation Continuous Media Server, C.

Shahabi et al., June, pp. 56-64CodesSeven Great Blunders of the Computing World [Column],

N. Holmes, July, pp. 112, 110-111Codesign, Hardware-SoftwareNetworks on Chips: A New SoC Paradigm, L. Benini and

G. DeMicheli, Jan., pp. 70-78A Sophomore Course in Codesign [Column], J. Madsen et

al., Nov., pp. 108-110Computational Biology, see BioinformaticsComputer ArchitecturePICO: Automatically Designing Custom Computers, V.

Kathail et al., Sept., pp. 39-47A Practical Architecture for Reliable Quantum Computers,

M. Oskin et al., Jan., pp. 79-87SimpleScalar: An Infrastructure for Computer System

Modeling, T. Austin et al., Feb., pp. 59-67Whither Warhol’s Law? [Column], W. Wolf, Sept., pp. 96-97Computer CrimeCognitive Hacking: A Battle for the Mind, G. Cybenko et

al., Aug., pp. 50-56Computer GamesThe Computer Graphics Wars Heat Up [Column], M.

Macedonia, Oct., pp. 97-99Haptics: Gaming’s New Sensation [Column], D. Chang,

Aug., pp. 84-86Next Steps for Mobile Entertainment Portals, T.S. Raghu

et al., May, pp. 63-70Computer GraphicsThe Computer Graphics Wars Heat Up [Column], M.

Macedonia, Oct., pp. 97-99Linux in Hollywood: A Star Is Born [Column], M.

Macedonia, Feb., pp. 112-114Merging Fossil Specimens with Computer-Generated

Information, O. Bimber et al., Sept., pp. 25-30Smart Graphics: A New Approach to Meeting User Needs

[News], J. Edwards and L.D. Paulson, May, pp. 18-21Tracking Pitches for Broadcast Television, A. Guéziec,

Mar., pp. 38-43Computer IndustryEnter the Dragon: China’s Computer Industry, K. Kraemer

and J. Dedrick, Feb., pp. 28-36Computer Networks, see also Internet, World Wide WebSCinet: Testbed for High-Performance Networked

Applications, W.T.C. Kramer, June, pp. 47-55Wireless Beyond 3G: Managing Services and Network

Resources [Column], P. Demestichas et al., Aug., pp.80-82

Computer VisionSmart Cameras as Embedded Systems, W. Wolf et al., Sept.,

pp. 48-53Configurable Processors, see MicroprocessorsCopy ProtectionBroadcast Encryption’s Bright Future, J. Lotspiech et al.,

Aug., pp. 57-63Optical Fingerprinting to Protect Data: A Proposal, N.

Potlapally, Apr., pp. 23-28CryptographyBroadcast Encryption’s Bright Future, J. Lotspiech et al.,

Aug., pp. 57-63Optical Fingerprinting to Protect Data: A Proposal, N.

Potlapally, Apr., pp. 23-28PKI: It’s Not Dead, Just Resting, P. Gutmann, Aug., pp.

41-49Prime Breakthrough May Improve Encryption [News],

L.D. Paulson, Oct., p. 28

DData CommunicationsThe Economics of DSL Regulation, R. Kalakota et al.,

Oct., pp. 29-36Data MiningThe Chamois Component-Based Knowledge Engineering

Framework, W. Kim et al., May, pp. 46-54Data Mining for the Corporate Masses? [News], N.

Leavitt, May, pp. 22-24

Data Mining for Web Intelligence, J. Han and K.C-C.Chang, Nov., pp. 64-70

The Emerging Landscape of Bioinformatics SoftwareSystems [Guest Editors’ Intro: Bioinformatics], L.S.Heath et al., July, pp. 41-45

Interactively Exploring Hierarchical Clustering Results, J.Seo and B. Shneiderman, July, pp. 80-86

Is Business Intelligence a Smart Move? [News], S. OrtizJr., July, pp. 11-14

Let’s Hear It for Audio Mining [News], N. Leavitt, Oct.,pp. 23-25

Data ModelingBioSig: An Imaging Bioinformatic System for Studying

Phenomics, B. Parvin et al., July, pp. 65-71A Pattern for Softcoded Values, M. Blaha and C. Smith,

May, pp. 28-34A Random Walk Down the Genomes: DNA Evolution in

Valis, S. Paxia et al., July, pp. 73-79Data SecurityOpen Source Security: Opportunity or Oxymoron?

[News], G. Lawton, Mar., pp. 18-21Optical Fingerprinting to Protect Data: A Proposal, N.

Potlapally, Apr., pp. 23-28Security: Technical, Social, and Legal Challenges

[Column], B. Arbaugh, Feb., pp. 109-111Training for Information Assurance, D. Welch et al., Apr.,

pp. 30-37Who’s Liable for Insecure Networks? [Column], E.

Kenneally, June, pp. 93-95Database Management Systems, see InformationRetrievalDesign Engineering, see also EngineeringNear Misses: Murphy’s Law Is Wrong [Opinion], B.

Colwell, Apr., pp. 9-12PICO: Automatically Designing Custom Com-

puters, V. Kathail et al., Sept., pp. 39-47The Power of the Most Likely [Opinion], B.

Colwell, Oct., pp. 12-14Design-for-Test Technology, see TestingDistance LearningRethinking the Digital Divide [Column], L. Briggs

and K.B. McBride, Oct., pp. 108, 106-107Distributed SystemsDeveloping the Distributed-Computing OS [News],

S.J. Vaughan-Nichols, Sept., pp. 19-21Grid Services for Distributed System Integration, I.

Foster et al., June, pp. 37-46Mailbox-Based Scheme for Mobile Agent Communi-

cations, J. Cao et al., Sept., pp. 54-60DNA Computing, see Molecular Computing

EE-CommerceE-Business Process Modeling: The Next Big Step, S. Aissi

et al., May, pp. 55-62Mobile Payments [Column], U. Varshney, Dec., pp. 120-121Multicast Support in Mobile Commerce Applications

[Column], U. Varshney, Feb., pp. 115-117EconomicsAn Economically Scalable Internet [Column], A.S.

Heddaya, Sept., pp. 93-95The Economics of DSL Regulation, R. Kalakota et al.,

Oct., pp. 29-36Education, Computer and Information ScienceEfforts Launched to Improve Network Security Education

[News], L.D. Paulson, Dec., p. 26The End of Computing Disciplines as We Know Them?

[EIC’s Message], J.A. Aylor, Jan., pp. 4-5, 8A Sophomore Course in Codesign [Column], J. Madsen et

al., Nov., pp. 108-110Software Certification Debate: Benefits of Certification,

L. Tripp, June, pp. 31-33Software Certification Debate: Certification Will Do More

Harm Than Good, A. Kolawa, June, pp. 34-35Software Development: An Outsider’s View, K. Eischen,

May, pp. 36-44Wanted: More Network-Security Graduates and Research

[News], L.D. Paulson, Feb., pp. 22-24Education, Computer Uses inProfessors Use Technology to Fight Plagiarism [News],

L.D. Paulson, Aug., pp. 24 -25Rethinking the Digital Divide [Column], L. Briggs and

December 2002 81

Page 3: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

82 Computer

Social Intelligence Design for the Web, T. Nishida, Nov.,pp. 37-41

HHandheld DevicesWeb Interaction Using Very Small Internet Devices, B.N.

Schilit et al., Oct., pp. 37-45Haptic InterfacesHaptics: Gaming’s New Sensation [Column], D. Chang,

Aug., pp. 84-86High-Performance ComputingAsim: A Performance Model Framework, J. Emer et al.,

Feb., pp. 68-76Performance Simulation Tools [Guest Editors’ Intro: High-

Performance Simulators], S.S. Mukherjee et al., Feb.,pp. 38-39

Rsim: Simulating Shared-Memory Multiprocessors withILP Processors, C.J. Hughes et al., Feb., pp. 40-49

SCinet: Testbed for High-Performance NetworkedApplications, W.T.C. Kramer, June, pp. 47-55

Simics: A Full System Simulation Platform, P.S.Magnusson et al., Feb., pp. 50-58

SimpleScalar: An Infrastructure for Computer SystemModeling, T. Austin et al., Feb., pp. 59-67

Home NetworkingJini Home Networking: A Step toward Pervasive Com-

puting, R. Gupta et al., Aug., pp. 34-40Human Genome ProjectGenome Sequence Assembly: Algorithms and Issues, M.

Pop et al., July, pp. 47-54Human-Computer InteractionDeveloping a Generic Augmented-Reality Interface, I.

Poupyrev et al., Mar., pp. 44-50A Lightweight Framework for Cross-Application User

Monitoring, K. Fenstermacher and M. Ginsburg, Mar.,pp. 51-59

HypertextSelf-Organization and Identification of Web Communities,

G.W. Flake et al., Mar., pp. 66-71Using Knowledge Anchors to Reduce Cognitive Overhead

[Column], S. Ransom et al., Nov., pp. 111-112The Web and Social Networks, R. Kumar et al., Nov., pp.

32-36

IIBM ComputersIBM’s Linux Watch: The Challenge of Miniaturization, C.

Narayanaswami et al., Jan., pp. 33-41IEEE Computer SocietyBuilding on Success: CS Programs for 2002 [CS

Connection], M-L.G. Piner, Jan., pp. 94-98Board Approves Reading of Bylaws Amendments [CS

Connection], M-L.G. Piner, Jan., pp. 98-99CD-ROM Supplement Provides Demos, Interactive

Tutorials for Computer Graphics Community [CSConnection], M-L.G. Piner, Apr., p. 75

Certification Program Provides Mark of Professionalism[CS Connection], M-L.G. Piner, Apr., pp. 74-75

Chang Chosen IEEE Computer Society President-Elect[Report to Members], M-L.G. Piner, Dec., pp. 73-74

Distance Learning Campus Offers New Courses [CSConnection], M-L.G. Piner, Aug., p. 66

Draft Computer Engineering Curriculum VolumeAvailable for Review [CS Connection], M-L.G. Piner,Sept., p. 76

IEEE Computer Society Election [Nominee Statements],Sept., pp. 62-68

IEEE President-Elect Candidates Address ComputerSociety Concerns [CS Connection], Sept., pp. 70-75

Implementing Our Future Vision in 2002 [CS President’sMessage], W.K. King, Jan., pp. 6-8

Online Collection Offers Information Technology forResource Libraries [CS Connection], M-L.G. Piner,Nov., p. 80

Online Courses Offer Members Expert Instruction [CSConnection], M-L.G. Piner, Mar., p. 80

Partnership with Wiley Will Showcase Expert Texts [CSConnection], M-L.G. Piner, Nov., p. 80

Revised Student Competition Offers Opportunity forIncreased Participation [CS Connection], M-L.G. Piner,Mar., p. 81

Ten Student Teams Advance to CSIDC World Finals [CS

K.B. McBride, Oct., pp. 108, 106-107Education, EngineeringThe End of Computing Disciplines as We Know Them?

[EIC’s Message], J.A. Aylor, Jan., pp. 4-5, 8Engineering Follies [Opinion], B. Colwell, June, pp. 10-12Electronic Design AutomationPICO: Automatically Designing Custom Computers, V.

Kathail et al., Sept., pp. 39-47Embedded SystemsChoosing the Brain(s) of an Embedded System [Column],

T.M. Conte, July, pp. 106-107A Design Chain for Embedded Systems [Column], G.

Martin and F. Schirrmeister, Mar., pp. 100-103Expanding Automotive Electronic Systems, G. Leen and

D. Heffernan, Jan., pp. 88-93Household Hints for Embedded Systems Designers

[Column], W. Wolf, May, pp. 106-108PICO: Automatically Designing Custom Computers, V.

Kathail et al., Sept., pp. 39-47Reducing SoC Simulation and Development Time, C.

Rowen, Dec., pp. 29-34Smart Cameras as Embedded Systems, W. Wolf et al.,

Sept., pp. 48-53What Is Embedded Computing? [Column], W. Wolf, Jan.,

pp. 136-137Whither Warhol’s Law? [Column], W. Wolf, Sept., pp. 96-97Encryption, see CryptographyEngineeringThe Coolest Thing on Earth [Opinion], B.

Colwell, Nov., pp. 10-12Engineering, Science, and Quantum Mechanics

[Opinion], B. Colwell, Mar., pp. 8-10Entertainment ComputingApplying Mixed Reality to Entertainment

[Column], C. Stapleton et al., Dec., pp. 122-124The Computer Graphics Wars Heat Up

[Column], M. Macedonia, Oct., pp. 97-99The End of Celluloid: Digital Cinema Emerges

[Column], J. Korris and M. Macedonia, Apr., pp. 96-98

Haptics: Gaming’s New Sensation [Column], D. Chang, Aug., pp. 84-86

Home Theater: Not Ready for Prime Time [Column], D.A. Norman, June, pp. 100-102

Linux in Hollywood: A Star Is Born [Column], M. Macedonia, Feb., pp. 112-114

Next Steps for Mobile Entertainment Portals, T.S.Raghu et al., May, pp. 63-70

Tracking Pitches for Broadcast Television, A. Guéziec,Mar., pp. 38-43

FFault ToleranceDenial of Service in Sensor Networks, A.D. Wood et al.,

Oct., pp. 54-62Fiber OpticsDevelopments Could Boost Optical Networks [News],

L.D. Paulson, Mar., p. 28

GGlobal Positioning SystemGPS: Location-Tracking Technology [Column], R. Bajaj

et al., Apr., pp. 92-94Government PolicyDefending Cyberspace [Column], O.S. Saydjari, Dec., p. 125Graph TheoryGenome Sequence Assembly: Algorithms and Issues, M.

Pop et al., July, pp. 47-54The Web and Social Networks, R. Kumar et al., Nov., pp.

32-36Graphical User Interfaces, see User InterfacesGrid ComputingGrid Services for Distributed System Integration, I. Foster

et al., June, pp. 37-46GroupwareA Lightweight Framework for Cross-Application User

Monitoring, K. Fenstermacher and M. Ginsburg, Mar.,pp. 51-59

Next Steps for Mobile Entertainment Portals, T.S. Raghuet al., May, pp. 63-70

Realizing the Benefits of Virtual Teams [Column], C.Steinfield, Mar., pp. 104-106

Page 4: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

Connection], M-L.G. Piner, July, pp. 87-88Year in Review [President’s Message], W.K. King, Dec., pp.

10-11IEEE Registration AuthorityIEEE Registration Authority [Column], A.C. Ricketts,

Nov., pp. 113-115Image ProcessingBioSig: An Imaging Bioinformatic System for Studying

Phenomics, B. Parvin et al., July, pp. 65-71Tracking Pitches for Broadcast Television, A. Guéziec,

Mar., pp. 38-43Industry TrendsBull Market for IEEE 802.11 WLAN Chipsets [News], S.J.

Vaughan-Nichols, Nov., pp. 17-19Computer System, Heal Thyself [News], L.D. Paulson,

Aug., pp. 20-22Data Mining for the Corporate Masses? [News], N.

Leavitt, May, pp. 22-24Developing the Distributed Computing OS [News], S.J.

Vaughan-Nichols, Sept., pp. 19-21Do Web Standards and Patents Mix? [News], D. Clark,

Oct., pp. 19-22Is Business Intelligence a Smart Move? [News], S. Ortiz Jr.,

July, pp. 11-14Moving Java into Mobile Phones [News], G. Lawton, June,

pp. 17-20OFDM: Back to the Wireless Future [News], S.J. Vaughan-

Nichols, Dec., pp. 19-21Web Services: Beyond the Hype [News], S.J. Vaughan-

Nichols, Feb., pp. 18-21Information Assurance, see also Security, Data SecurityThe Evolution of Information Assurance, R. Cummings,

Dec., pp. 65-72Toward the Age of Smarter Storage, G.S. Robinson, Dec.,

pp. 35-41Training for Information Assurance, D. Welch et al., Apr.,

pp. 30-37Information RetrievalBioSig: An Imaging Bioinformatic System for Studying

Phenomics, B. Parvin et al., July, pp. 65-71The Emerging Landscape of Bioinformatics Software

Systems [Guest Editors’ Intro: Bioinformatics], L.S.Heath et al., July, pp. 41-45

From Multimedia Retrieval to Knowledge Management,P.J. Moreno et al., Apr., pp. 58-66

The Interspace: Concept Navigation Across DistributedCommunities, B. Schatz, Jan., pp. 54-62

In Search of the Wisdom Web [Guest Editors’ Intro: WebIntelligence], N. Zhong et al., Nov., pp. 27-31

Is Speech Recognition Becoming Mainstream? [GuestEditors’ Intro: Speech Recognition], S. Srinivasan et al.,Apr., pp. 38-41

Lessons in Global Information Technology Sourcing, M.Lacity, Aug., pp. 26-33

Self-Organization and Identification of Web Communities,G.W. Flake et al., Mar., pp. 66-71

Using Coplink to Analyze Criminal-Justice Data, R.V.Hauck et al., Mar., pp. 30-37

Interactive SystemsAutomated Natural Spoken Dialog, A.L. Gorin et al., Apr.,

pp. 51-56Electrophysiologically Interactive Computer Systems, J.

Allanson, Mar., pp. 60-65Interactive TV: VoD Meets the Internet [Column], S.S.Y.

Shim and Y-J. Lee, July, pp. 108-109Interactively Exploring Hierarchical Clustering Results, J.

Seo and B. Shneiderman, July, pp. 80-86A Lightweight Framework for Cross-Application User

Monitoring, K. Fenstermacher and M. Ginsburg, Mar.,pp. 51-59

Interconnect TechnologyAnatomy of a Forward-Looking Open Standard [Column],

S. Fuller and T. Cox, Jan., pp. 140-141Faster Processors with Optical Connections [News], L.D.

Paulson, Feb., p. 27InternetAn Economically Scalable Internet [Column], A.S.

Heddaya, Sept., pp. 93-95The Economics of DSL Regulation, R. Kalakota et al.,

Oct., pp. 29-36End-to-End Testing of IP QoS Mechanisms, F.A. Shaikh et

al., May, pp. 80-87

Free Speech Online and Offline, R. Anderson, June, pp.28-30

Protocol-Related Problem Threatens Internet Security[News], L.D. Paulson, Apr., p. 20

Toward the Mobile Internet [Column], J.F. Huber, Oct.,pp. 100-102

Web Interaction Using Very Small Internet Devices, B.N.Schilit et al., Oct., pp. 37-45

InterspaceThe Interspace: Concept Navigation Across Distributed

Communities, B. Schatz, Jan., pp. 54-62

JJavaMoving Java into Mobile Phones [News], G. Lawton,

June, pp. 17-20JiniJini Home Networking: A Step Toward Pervasive

Computing, R. Gupta et al., Aug., pp. 34-40

KKnowledge ManagementThe Chamois Component-Based Knowledge Engineering

Framework, W. Kim et al., May, pp. 46-54From Multimedia Retrieval to Knowledge Management,

P.J. Moreno et al., Apr., pp. 58-66Knowledge Management and Speech Recognition, J. Allan

[Sidebar], Apr., pp. 60-61Using Coplink to Analyze Criminal-Justice Data, R.V.

Hauck et al., Mar., pp. 30-37Using Knowledge Anchors to Reduce Cognitive

Overhead, S. Ransom and X. Wu, Nov., pp. 111-112

LLegal ApplicationsUsing Coplink to Analyze Criminal-Justice Data,

R.V. Hauck et al., Mar., pp. 30-37Legal IssuesDo Web Standards and Patents Mix? [News], D.

Clark, Oct., pp. 29-36The Economics of DSL Regulation, R. Kalakota et

al., Oct., pp. 19-22Free Speech Online and Offline, R. Anderson, June,

pp. 28-30Security: Technical, Social, and Legal Challenges

[Column], B. Arbaugh, Feb., pp. 109-111Who’s Liable for Insecure Networks? [Column], E.

Kenneally, June, pp. 93-95LinuxIBM’s Linux Watch: The Challenge of Miniaturization, C.

Narayanaswami et al., Jan., pp. 33-41Linux in Hollywood: A Star Is Born [Column], M.

Macedonia, Feb., pp. 112-114Using Virtual Linux Servers [Column], R.L. Norton, Nov.,

pp. 106-107Location-Aware ComputingGPS: Location-Tracking Technology [Column], R. Bajaj

et al., Apr., pp. 92-94Rover: Scalable Location-Aware Computing, S. Banerjee

et al., Oct., pp. 46-53

MMachine LearningIntegrated Approach to Web Ontology Learning and

Engineering, M. Missikoff, Nov., pp. 60-63Machine TranslationFrom Computational Intelligence to Web Intelligence, N.

Cercone et al., Nov., pp. 72-76Management, BusinessLessons in Global Information Technology Sourcing, M.

Lacity, Aug., pp. 26-33MicroprocessorsAdding a Third Dimension to Chips [News], L.D. Paulson,

Mar., p. 29Little Chips Promise Big Power [News], L.D. Paulson,

June, p. 25Mobile Processors Begin to Grow Up [News], D. Clark,

Mar., pp. 22-25Networks on Chips: A New SoC Paradigm, L. Benini and

G. DeMicheli, Jan., pp. 70-78New Chips Will Help Computers Visualize in Three

December 2002 83

Page 5: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

84 Computer

Network Security, see also SecurityBattling Intrusions with a “Network Telescope” [News],

L.D. Paulson, Nov., p. 24Denial of Service in Sensor Networks, A.D. Wood et al.,

Oct., pp. 54-62Efforts Launched to Improve Network Security Education

[News], L.D. Paulson, Dec., p. 26Stopping Intruders Outside the Gates [News], L.D.

Paulson, Nov., pp. 20-22

OObituariesJohn Cocke, 1925-2002, M-L.G. Piner, Aug., p. 66Ole-Johan Dahl, 1931-2002, M-L.G. Piner, Oct., p. 76Edsger Wybe Dijkstra, 1930-2002, M-L.G. Piner, Sept.,

p. 76Kristen Nygaard, 1926-2002, M-L.G. Piner, Oct., p. 76Object-Oriented ProgrammingThe Chamois Component-Based Knowledge Engineering

Framework, W. Kim et al., May, pp. 46-54A Pattern for Softcoded Values, M. Blaha and C. Smith,

May, pp. 28-34On-to-Knowledge ProjectOntology-Based Knowledge Management, D. Fensel,

Nov., pp. 56-59OntologiesIntegrated Approach to Web Ontology Learning and

Engineering, M. Missikoff, Nov., pp. 60-63Ontology-Based Knowledge Management, D. Fensel,

Nov., pp. 56-59Open Source SoftwareOpen Source Security: Opportunity or Oxymoron?

[News], G. Lawton, Mar., pp. 18-21Optical TechnologyData at the Speed of Light [News], L.D. Paulson, July, p. 21New Optical Clock Could Synchronize Chips [News],

L.D. Paulson, Dec., p. 26A Survey of Storage Options, J.P. Scheible, Dec., pp. 42-46

PParallel ComputingToward New Software for Computational Phylogenetics,

B.M.E. Moret et al., July, pp. 55-64Performance Measurement and EvaluationArchitecture-Level Power Modeling with Wattch

[Sidebar], M. Martonosi et al., Feb., p. 64Asim: A Performance Model Framework, J. Emer et al.,

Feb., pp. 68-75End-to-End Testing of IP QoS Mechanisms, F.A. Shaikh

et al., May, pp. 80-87Performance Simulation Tools [Guest Editors’ Intro: High-

Performance Simulators], S.S. Mukherjee et al., Feb.,pp. 38-39

Rsim: Simulating Shared-Memory Multiprocessors withILP Processors, C.J. Hughes et al., Feb., pp. 40-49

SCinet: Testbed for High-Performance NetworkedApplications, W.T.C. Kramer, June, pp. 47-55

Simics: A Full System Simulation Platform, P.S.Magnusson et al., Feb., pp. 50-58

SimpleScalar: An Infrastructure for Computer SystemModeling, T. Austin et al., Feb., pp. 59-67

PhysicsEngineering, Science, and Quantum Mechanics [Opinion],

B. Colwell, Mar., pp. 8-10Preservation, Digital DocumentIBM Works on a Universal Virtual Computer [News], L.D.

Paulson, Nov., p. 23PrivacyInvasive Software: Who’s Inside Your Computer? [News],

G. Lawton, July, pp. 15-18Security: Technical, Social, and Legal Challenges

[Column], B. Arbaugh, Feb., pp. 109-111Side Effects of Digital Technology [Column], N. Holmes,

Apr. pp. 104, 102-103Toward Adequate Online Privacy and Safeguards

[Column], D.M. Orick, Aug., pp. 92, 90-91Process AutomationE-Business Process Modeling: The Next Big Step, S. Aissi

et al., May, pp. 55-62Professional IssuesComputers, Programming, and People [Column], N.

Holmes, Mar., pp. 112, 110-111

Dimensions [News], L.D. Paulson, Sept., p. 24New Optical Clock Could Synchronize Chips [News],

L.D. Paulson, Dec., p. 26Reducing SoC Simulation and Development Time, C.

Rowen, Dec., pp. 29-34Researchers Bring Wireless Communications to the Chip

[News], L.D. Paulson, Sept., p. 23Startup Wants to Automate Chip Design [News], L.D.

Paulson, Aug., p. 25Whither Warhol’s Law? [Column], W. Wolf, Sept., pp. 96-97Will New Chip Revolutionize Digital Photography?

[News], L.D. Paulson, May, pp. 25-26MiddlewareJini Home Networking: A Step Toward Pervasive

Computing, R. Gupta et al., Aug., pp. 34-40Web Interaction Using Very Small Internet Devices, B.N.

Schilit et al., Oct., pp. 37-45Mobile ComputingEnhanced Service Discovery in Bluetooth [Column], S.

Avancha et al., June, pp. 96-99Mobile Payments [Column], U. Varshney, Dec., pp. 120-121Multicast Support in Mobile Commerce Applications

[Column], U. Varshney, Feb., pp. 115-117Next Steps for Mobile Entertainment Portals, T.S. Raghu

et al., May, pp. 63-70Rover: Scalable Location-Aware Computing, S. Banerjee

et al., Oct., pp. 46-53Thick Clients for Personal Wireless Devices [Column], T.

Starner, Jan., pp. 133-135Will 3G Really Be the Next Big Wireless

Technology? [News], L. Garber, Jan., pp. 26-32Wireless Beyond 3G: Managing Services and

Network Resources [Column], P. Demestichas et al., Aug., pp. 80-82

Modeling, see Process Automation, SimulationMolecular ComputingThe Blueprint for Life?, D.G. Feitelson and M.

Treinin, July, pp. 34-40Computers Are from Mars, Organisms Are from

Venus, J. Kim, July, pp. 25-32MPEG-4MPEG Licensing Dispute Hurts Apple [News],

L.D. Paulson, May, p. 25Multicast CommunicationMulticast Support in Mobile Commerce Applica-

tions [Column], U. Varshney, Feb., pp. 115-117Multimedia Data

From Multimedia Retrieval to Knowledge Management,P.J. Moreno et al., Apr., pp. 58-66

Let’s Hear It for Audio Mining [News], N. Leavitt, Oct.,pp. 23-25

Yima: A Second-Generation Continuous Media Server, C.Shahabi et al., June, pp. 56-64

MultiprocessingSimics: A Full System Simulation Platform, P.S.

Magnusson et al., Feb., pp. 50-58MusicOn Computers and Rock ’n’ Roll [Opinion], B. Colwell,

Feb., pp. 9-11What Technology Is Doing to Music [Opinion], B.

Colwell, July, pp. 6-8

NNanotechnologyNew Nanotech Institute Will Sweat the Small Stuff

[News], L.D. Paulson, Jan., p. 23Natural Language ProcessingFrom Computational Intelligence to Web Intelligence, N.

Cercone et al., Nov., pp. 72-76Integrated Approach to Web Ontology Learning and

Engineering, M. Missikoff, Nov., pp. 60-63Ontology-Based Knowledge Management, D. Fensel,

Nov., pp. 56-59Network Architecture and DesignAn Economically Scalable Internet [Column], A.S.

Heddaya, Sept., pp. 93-95Training for Information Assurance, D. Welch et al., Apr.,

pp. 30-37Network-Attached Storage, see Storage TechnologyNetwork ProtocolsToward the Mobile Internet [Column], J.F. Huber, Oct.,

pp. 100-102

Page 6: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

Employee Performance Reviews [Opinion], B. Colwell,Sept., pp. 12-15

Engineering Follies [Opinion], B. Colwell, June, pp. 10-12Free Speech Online and Offline, R. Anderson, June, pp.

28-30If You Didn’t Test It, It Doesn’t Work [Opinion], B.

Colwell, May, pp. 11-13Jobs, Trades, Skills, and the Profession [Column], N.

Holmes, Sept., pp. 104, 102-103The Profession and the World [Column], N. Holmes, Nov.,

pp. 116, 114-115Science-Philosophy Celebrity Death Match [Opinion], B.

Colwell, Dec., pp. 13-15Seven Great Blunders of the Computing World [Column],

N. Holmes, July, pp. 112, 110-111Software Certification Debate: Benefits of Certification, L.

Tripp, June, pp. 31-33Software Certification Debate: Certification Will Do More

Harm Than Good, A. Kolawa, June, pp. 34-35To See Ourselves as Others See Us, N. Holmes, Jan., pp.

144, 142-143Using Language More Responsibly [Column], S. Santana,

Dec., pp. 128, 126-127Would a Digital Brain Have a Mind? [Column], N.

Holmes, May, pp. 112, 110-111ProgrammingComputers, Programming, and People [Column], N.

Holmes, Mar., pp. 112, 110-111Programming LanguagesQ: A Scenario Description Language for Interactive Agents,

T. Ishida, Nov., pp. 42-47Programming Support EnvironmentsA Random Walk Down the Genomes: DNA Evolution in

Valis, S. Paxia et al., July, pp. 73-79Project ManagementPlanning and Executing Time-Bound Projects, E. Miranda,

Mar., pp. 73-79Software System Engineering: A Tutorial, R.H. Thayer, Apr.,

pp. 68-73Protocols, see also Network ProtocolsGrid Services for Distributed System Integration, I. Foster

et al., June, pp. 37-46Mailbox-Based Scheme for Mobile Agent Communi-

cations, J. Cao et al., Sept., pp. 54-60Public Key Infrastructure, see also CryptographyPKI: It’s Not Dead, Just Resting, P. Gutmann, Aug., pp.

41-49

QQuality MetricsBody of Knowledge for Software Quality Measurement,

N.F. Schneidewind, Feb., pp. 77-83Phrenology, Astrology, Risk, and Product Quality

[Opinion], B. Colwell, Jan., pp. 12-14Quality of ServiceDeterministic Preemptive Scheduling of Real-Time Tasks,

L.E. Jackson and G.N. Rouskas, May, pp. 72-79End-to-End Testing of IP QoS Mechanisms, F.A. Shaikh et

al., May, pp. 80-87Wireless Beyond 3G: Managing Services and Network

Resources [Column], P. Demestichas et al., Aug., pp.80-82

Quantum ComputingA Practical Architecture for Reliable Quantum Computers,

M. Oskin et al., Jan., pp. 79-87

RReal-Time SystemsDeterministic Preemptive Scheduling of Real-Time Tasks,

L.E. Jackson and G.N. Rouskas, May, pp. 72-79Yima: A Second-Generation Continuous Media Server, C.

Shahabi et al., June, pp. 56-64Research Initiatives2001 Roadmap for Semiconductors, A. Allan et al., Jan.,

pp. 42-53Risk ManagementManaging Software Security Risks [Column], G. McGraw,

Apr., pp. 99-101Phrenology, Astrology, Risk, and Product Quality

[Opinion], B. Colwell, Jan., pp. 12-14Security: Technical, Social, and Legal Challenges [Column],

B. Arbaugh, Feb., pp. 109-111

SScheduling AlgorithmsDeterministic Preemptive Scheduling of Real-Time Tasks,

L.E. Jackson and G.N. Rouskas, May, pp. 72-79Scientific VisualizationInteractively Exploring Hierarchical Clustering Results, J.

Seo and B. Shneiderman, July, pp. 80-86Security, see also Cryptography, Data Security, Privacy,Public-Key InfrastructureBroadcast Encryption’s Bright Future, J. Lotspiech et al.,

Aug., pp. 57-63Cognitive Hacking: A Battle for the Mind, G. Cybenko et

al., Aug., pp. 50-56Defending Cyberspace [Column], O.S. Saydjari, Dec., p. 125The Evolution of Information Assurance, R. Cummings,

Dec., pp. 65-72Key Snooping Technology Causes Controversy [News],

L.D. Paulson, Mar., p. 27Managing Software Security Risks [Column], G. McGraw,

Apr., pp. 99-101PKI: It’s Not Dead, Just Resting, P. Gutmann, Aug., pp.

41-49Security: Technical, Social, and Legal Challenges

[Column], B. Arbaugh, Feb., pp. 109-111Self-Securing Devices [Sidebar], G. Ganger, Dec., p. 71Technology Standards Pros Aid Homeland Security

[Column], K. McMillan, May, pp. 104-105The Trusted PC: Skin-Deep Security [Column], A.B.

Huang, Oct., pp. 103-105Self-Healing SystemsComputer System, Heal Thyself [News], L.D.

Paulson, Aug., pp. 20-22Semantic Web, see also Agent TechnologyIntegrated Approach to Web Ontology Learning

and Engineering, M. Missikoff et al., Nov., pp.60-63

Ontology-Based Knowledge Management, D.Fensel, Nov., pp. 56-59

Toward Behavioral Intelligence in the SemanticWeb, J.J. Bryson et al., Nov., pp. 48-54

Semiconductor TechnologyDynamic Scan: Driving Down the Cost of Test, S.

Samaranayake et al., Oct., pp. 63-682001 Roadmap for Semiconductors, A. Allan et al.,

Jan., pp. 42-53Sensor NetworksDenial of Service in Sensor Networks, A.D. Wood

and J.A. Stankovic, Oct., pp. 54-62SimulationAsim: A Performance Model Framework, J. Emer et al.,

Feb., pp. 68-76Performance Simulation Tools [Guest Editors’ Intro: High-

Performance Simulators], S.S. Mukherjee et al., Feb.,pp. 38-39

Rsim: Simulating Shared-Memory Multiprocessors withILP Processors, C.J. Hughes et al., Feb., pp. 40-49

Simics: A Full System Simulation Platform, P.S.Magnusson et al., Feb., pp. 50-58

SimpleScalar: An Infrastructure for Computer SystemModeling, T. Austin et al., Feb., pp. 59-67

Smart CardsResearchers Upgrade Smart Card Technology [News],

L.D. Paulson, Dec., p. 25Social IssuesEnter the Dragon: China’s Computer Industry, K. Kraemer

and J. Dedrick, Feb., pp. 28-36The Profession and the World [Column], N. Holmes,

Nov., pp. 116, 114-115Representative Democracy and the Profession [Column],

N. Holmes, Feb., pp. 120, 118-119Rethinking the Digital Divide [Column], L. Briggs and

K.B. McBride, Oct., pp. 108, 106-107Side Effects of Digital Technology [Column], N. Holmes,

Apr. pp. 104, 102-103To See Ourselves as Others See Us [Column], N. Holmes,

Jan., pp. 144, 142-143Using Computers in Our Daily Life [Column], A. Asuaga,

June, pp. 104, 103Using Language More Responsibly [Column], S. Santini,

Dec., pp. 128, 126-127

December 2002 85

Page 7: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

86 Computer

[Sidebar], D. Granath, Dec., p. 68-69Storage Topologies, R. Griswold, Dec., pp. 56-63A Survey of Storage Options, J.P. Scheible, Dec., pp. 42-46Surveying Today’s Most Popular Storage Interfaces, M.T.

LoBue, Dec., pp. 48-55Tiny “Punch Cards” Boost Storage Capacity [News], L.D.

Paulson, Sept., p. 22Toward the Age of Smarter Storage, G.S. Robinson, Dec.,

pp. 35-41Two Efforts Aim to Upgrade Mobile Memory [News],

L.D. Paulson, Oct., p. 27Streaming MediaAlliance Seeks Streaming-Media Standard [News], L.D.

Paulson, Jan., pp. 22-23Improvements Stream into Multimedia Technology

[News], L.D. Paulson, July, pp. 20-21Yima: A Second-Generation Continuous Media Server, C.

Shahabi et al., June, pp. 56-64System-on-Chip TechnologyA Design Chain for Embedded Systems [Column], G.

Martin and F. Schirrmeister, Mar., pp. 100-103Networks on Chips: A New SoC Paradigm, L. Benini and

G. DeMicheli, Jan., pp. 70-78Reducing SoC Simulation and Development Time, C.

Rowen, Dec., pp. 29-34Systems EngineeringChoosing the Brain(s) of an Embedded System [Column],

T.M. Conte, July, pp. 106-107Software System Engineering:: A Tutorial, R.H. Thayer, Apr.,

pp. 68-73Top-Down Approach to Computing, R. Mathieu, Jan.,

pp. 138-139

TTechnological ForecastingThe Interspace: Concept Navigation Across Distributed

Communities, B.R. Schatz, Jan., pp. 54-62Large-Vocabulary Speech Recognition Algorithms, M.

Padmanabhan and M. Picheny, Apr., pp. 42-50Telecommunications IndustryThe Economics of DSL Regulation, R. Kalakota et al.,

Oct., pp. 29-36Testing, see also Software TestingDynamic Scan: Driving Down the Cost of Test, S.

Samaranayake et al., Oct., pp. 63-68TrainingTraining for Information Assurance, D. Welch et al., Apr.,

pp. 30-37Tree of Life ProjectToward New Software for Computational Phylogenetics,

B.M.E. Moret et al., July, pp. 55-64TrustCognitive Hacking: A Battle for the Mind, G. Cybenko et

al., Aug., pp. 50-56Improving the TCPA Specification [Column], B. Arbaugh,

Aug., pp. 77-79The Trusted PC: Skin-Deep Security [Column], A.B.

Huang, Oct., pp. 103-105

UUser Interfaces, see also Haptic InterfacesAutomated Natural Spoken Dialog, A. Gorin et al., Apr.,

pp. 51-56Designing for Web Site Usability [Column], J. Palmer, July,

pp. 102-103Developing a Generic Augmented-Reality Interface, I.

Poupyrev et al., Mar., pp. 44-50Electrophysiologically Interactive Computer Systems, J.

Allanson, Mar., pp. 60-65GUI Testing: Pitfalls and Process [Column], A.M. Memon,

Aug., pp. 87-88Is Speech Recognition Becoming Mainstream? [Guest

Editors’ Intro: Speech Recognition], S. Srinivasan andE. Brown, Apr., pp. 38-41

A Lightweight Framework for Cross-Application UserMonitoring, K. Fenstermacher and M. Ginsburg, Mar.,pp. 51-59

VVideo on Demand, see Interactive SystemsVirtual Machines

Social NetworksThe Web and Social Networks, R. Kumar et al., Nov., pp.

32-36Software ArchitectureRover: Scalable Location-Aware Computing, S. Banerjee

et al., Oct., pp. 46-53Software Configuration ManagementThe Importance of Branching Models in SCM, C. Walrad

et al., Sept., pp. 31-38Software EngineeringThe Agile Methods Fray [Column], T. DeMarco and B.

Boehm, June, pp. 90-92Body of Knowledge for Software Quality Measurement,

N.F. Schneidewind, Feb., pp. 77-83Get Ready for Agile Methods, with Care, B. Boehm, Jan.,

pp. 64-69Household Hints for Embedded Systems Designers

[Column], W. Wolf, May, pp. 106-108Managing Software Security Risks [Column], G.W.

McGraw, Apr., pp. 99-101Software Development: An Outsider’s View, K. Eischen,

May, pp. 36-44Software System Engineering: A Tutorial, R.H. Thayer, Apr.,

pp. 68-73There’s More Than One Way to Build a Bridge [Column],

D.A. Lyon and C.L. Huntley, May, pp. 102-103Software TestingIf You Didn’t Test It, It Doesn’t Work [Opinion], B.

Colwell, May, pp. 11-13Speech Recognition and SynthesisAutomated Natural Spoken Dialog, A. Gorin et

al., Apr., pp. 51-56From Multimedia Retrieval to Knowledge

Management, P. Moreno et al., Apr., pp. 58-66Is Speech Recognition Becoming Mainstream?

[Guest Editors’ Intro: Speech Recognition], S. Srinivasan and E. Brown, Apr., pp. 38-41

Knowledge Management and Speech Recognition[Sidebar], J. Allan, Apr., pp. 60-61

Large-Vocabulary Speech Recognition Algorithms, M. Padmanabhan and M. Picheny, Apr., pp. 42-50

StandardsAnatomy of a Forward-Looking Open Standard

[Column], S. Fuller and T. Cox, Jan., pp. 140-141Do Web Standards and Patents Mix? [News], D.

Clark, Oct., pp. 19-22Home Theater: Not Ready for Prime Time [Column], D.A.

Norman, June, pp. 100-102IEEE Registration Authority [Column], A.C. Ricketts,

Nov., pp. 113-115Software System Engineering: A Tutorial, R.H. Thayer, Apr.,

pp. 68-73Standards News: PAR 1599 and IEEE 1484.12.1 [CS

Connection], M-L.G. Piner, Oct., p. 77Technology Standards Pros Aid Homeland Security

[Column], K. McMillan, May, pp. 104-105Toward the Age of Smarter Storage, G.S. Robinson, Dec.,

pp. 35-41Will 10-Gigabit Ethernet Have a Bright Future? [News],

S.J. Vaughan-Nichols, June, pp. 22-24Storage TechnologyCompany Unveils Holographic DVD for 3D Storage

[News], L.D. Paulson, June, p. 27Distributed Storage Challenges Data Glut [News], L.D.

Paulson, Aug., p. 23The Evolution of Information Assurance, R. Cummings,

Dec., pp. 65-72Faster RAM Tackles Data and Marketplace Bottlenecks

[News], L.D. Paulson, Apr., pp. 17-19Faster Storage Connectivity Technologies Emerge [News],

L.D. Paulson, Apr., p. 21Fibre Channel Delivers, T. Hammond-Doel, Dec., pp. 50-

51FireWire as a Mass-Storage Interface, E. Anderson, Dec.,

pp. 51-52 iSCSI Protocol, T. Clark, Dec., pp. 54-55SCSI: An Enterprise Foundation, H. Mason, Dec., pp. 48-50Self-Securing Devices [Sidebar], G. Ganger, Dec., p. 71Serial ATA, M. Alexenko, Dec., pp. 53-54Storage Area Networks for Business Continuance

Page 8: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

Using Virtual Linux Servers [Column], R.L. Norton, Nov.,pp. 106-107

Virus, ComputerMalicious Code Hits Instant Messaging [News], L.D.

Paulson, Feb., p. 26Virus Wars: Fewer Attacks, New Threats [News}, G.

Lawton, Dec., pp. 22-24Voice Input, see Speech Recognition and Synthesis

WWearable ComputingIBM’s Linux Watch: The Challenge of Miniaturization, C.

Narayanaswami et al., Jan., pp. 33-41Web SearchData Mining for Web Intelligence, J. Han and K.C-C.

Chang, Nov., pp. 64-70From E-Sex to E-Commerce: Web Search Changes

[Column], A. Spink et al., Mar., pp. 107-109Using Knowledge Anchors to Reduce Cognitive Overhead

[Column], S. Ransom and X. Wu, Nov., pp. 111-112The Web and Social Networks, R. Kumar et al., Nov., pp.

32-36Web Interaction Using Very Small Internet Devices, B.N.

Schilit et al., Oct., pp. 37-45Web ServicesChoreographing Web Services [News], L.D. Paulson, Nov.,

p. 25E-Business Process Modeling: The Next Big Step, S. Aissi

et al., May, pp. 55-62Grid Services for Distributed System Integration, I. Foster

et al., June, pp. 37-46Toward Behavioral Intelligence in the Semantic Web, J.J.

Bryson et al., Nov., pp. 48-54Web Services and Context Horizons [Column], C. Shirky,

Sept., pp. 98-100Web Services: Beyond the Hype [News], S.J. Vaughan-

Nichols, Feb., pp. 18-21Web SitesDesigning for Web Site Usability [Column], J. Palmer, July,

pp. 102-103Wireless TechnologyBull Market for IEEE 802.11 WLAN Chipsets [News], S.J.

Vaughan-Nichols, Nov., pp. 17-19Enhanced Service Discovery in Bluetooth [Column], S.

Avancha et al., June, pp. 96-99IBM’s Linux Watch: The Challenge of Miniaturization, C.

Narayanaswami et al., Jan., pp. 33-41Jini Home Networking: A Step Toward Pervasive

Computing, R. Gupta et al., Aug., pp. 34-40Mobile Payments [Column], U. Varshney, Dec., pp. 120-121New Wireless Technology Is in Sight [News], L.D. Paulson,

Apr., p. 22OFDM: Back to the Wireless Future [News], S.I. Vaughan-

Nichols, Dec., pp. 19-21Thick Clients for Personal Wireless Devices [Column], T.

Starner, Jan., pp. 133-135Toward the Mobile Internet [Column], J.F. Huber, Oct.,

pp. 100-102US Approves New Uses for Wireless Technology [News],

L.D. Paulson, May, p. 27Will 3G Really Be the Next Big Wireless Technology?

[News], L. Garber, Jan., pp. 26-32Wireless Beyond 3G: Managing Services and Network

Resources [Column], P. Demestichas et al., Aug., pp.80-82

World Wide WebEfficient Replacement of Nonuniform Objects in Web

Caches, H. Bahn et al., June, pp. 65-73From E-Sex to E-Commerce: Web Search Changes

[Column], A. Spink et al., Mar., pp. 107-109In Search of the Wisdom Web [Guest Editors’ Intro: Web

Intelligence], N. Zhong et al., Nov., pp. 27-31Self-Organization and Identification of Web Communities,

G.W. Flake et al., Mar., pp. 66-71Social Intelligence Design for the Web, T. Nishida, Nov.,

pp. 37-41

AUTHOR INDEX

AAbella, Alicia, see Gorin, A.L., Apr., pp. 51-56Aditya, Shail, see Kathail, V., Sept., pp. 39-47

Adve, Sarita V.see Hughes, C.J., Feb., pp. 40-49see Mukherjee, S.S., Feb., pp. 38-39

Agarwal, Sulabh, see Banerjee, S., Oct., pp. 46-53Agrawal, Dharma P.

see Bajaj, R., Apr., pp. 92-94see Gupta, R., Aug., pp. 34-40

Agrawala, Ashok, see Banerjee, S., Oct., pp. 46-53 Ahuja, Pritpal, see Emer, J., Feb., pp. 68-75Aissi, Selim, Pallavi Malu, and Krishnamurthy Srinivasan,

E-Business Process Modeling: The Next Big Step, May,pp. 55-62

Alexenko, Mike, Serial ATA, Dec., pp. 53-54Allan, Alan et al., 2001 Roadmap for Semiconductor

Technology, Jan., pp. 42-53Allan, James, Knowledge Management and Speech

Recognition [Sidebar], Apr., pp. 60-61Allanson, Jennifer, Electrophysiologically Interactive

Computer Systems, Mar., pp. 60-65Alonso, Tirso, see Gorin, A.L., Apr., pp. 51-56Altman, Marty, see Stapleton, C., Dec., pp. 122-124 Amin, Minesh B., see Samaranayake, S., Oct., pp. 63-68An, Aijun, see Cercone, N., Nov., pp. 72-76Anderson, Eric, FireWire As a Mass-Storage Interface,

Dec., pp. 51-53Anderson, Ross, Free Speech Online and Offline, June, pp.

28-30Arbaugh, Bill

Security: Technical, Social, and Legal Challenges, Feb.,pp. 109-111

Improving the TCPA Specification, Aug., pp. 77-79

Asuaga, Ana, Using Computers in Our Daily Life,June, pp. 104, 103

Atabakhsh, Homa, see Hauck, R.V., Mar., pp. 30-37Austin, Todd, Eric Larson, and Dan Ernst,

SimpleScalar: An Infrastructure for ComputerSystem Modeling, Feb., pp. 59-67see Mukherjee, S.S., Feb., pp. 38-49

Avancha, Sasikanth, Anupam Joshi, and TimothyFinin, Enhanced Service Discovery in Bluetooth,June, pp. 96-99

Aylor, James H.The End of Computing Disciplines as We Know

Them?, Jan., pp. 4-5, 8It Has Been a Great Ride!, Dec., p. 12

BBahn, Hyokyung et al., Efficient Replacement of Non-

uniform Objects in Web Caches, June, pp. 65-73Bajaj, Rashmi, Samantha Lalinda Ranaweera, and

Dharma P. Agrawal, GPS: Location-Tracking Tech-nology, Apr., pp. 92-94

Banerjee, Suman et al., Rover: Scalable Location-AwareComputing, Oct., pp. 46-53

Barcellos-Hoff, Mary Helen, see Parvin, B., July, pp. 65-71Benini, Luca, and Giovanni De Micheli, Networks on

Chips: A New SoC Paradigm, Jan., pp. 70-78Billinghurst, Mark, see Poupyrev, I., Mar., pp. 44-50Bimber, Oliver et al., Merging Fossil Specimens with

Computer-Generated Information, Sept., pp. 25-30Binkert, Nathan, see Emer, J., Feb., pp. 68-75Blaha, Michael, and Cheryl Smith, A Pattern for Softcoded

Values, May, pp. 28-34Boehm, Barry

Get Ready for Agile Methods, with Care, Jan., pp. 64-69see DeMarco, T., June, pp. 90-92

Borch, Eric, see Emer, J., Feb., pp. 68-75Briggs, Laura, and Kari Boyd McBride, Rethinking the

Digital Divide, Oct., pp. 108, 106-107Brooks, David, see M. Martonosi, Feb., p. 64Brown, Eric, see Srinivasan, S., Is Speech Recognition

Becoming Mainstream?, Apr., pp. 38-41Bryson, Joanna J. et al., Toward Behavioral Intelligence

in the Semantic Web, Nov., pp. 48-54

CCao, Jiannong et al., Mailbox-Based Scheme for Mobile

Agent Communications, Sept., pp. 54-60Cercone, Nick et al., From Computational Intelligence to

Web Intelligence, Nov., pp. 72-76

December 2002 87

Page 9: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

88 Computer

Flake, Gary William et al., Self-Organization andIdentification of Web Communities, Mar., pp. 66-71

Fontenay, Gerald, see Parvin, B., July, pp. 65-71Forsgren, Daniel, see Magnusson, P.S., Feb., pp. 50-58Foster, Ian et al., Grid Services for Distributed System

Integration, June, pp. 37-46Fu, Kun, see Shahabi, C., June, pp. 56-64, June, pp. 56-64Fuller, Sam, and Tom Cox, Anatomy of a Forward-

Looking Open Standard, Jan., pp. 140-141

GGalliano, Fabio, see Demestichas, P., Aug., pp. 80-82Ganger, Greg, Self-Securing Devices [Sidebar], Dec., p. 71Garber, Lee

Will 3G Really Be the Next Big Wireless Technology?,Jan., pp. 26-32

Romanian Disaster-Response Project Wins DesignCompetition, Aug., pp. 13-15

Gatesy, Stephen M., see Bimber, O., Sept., pp. 25-30Giani, Annarita, see Cybenko, G., Aug., pp. 50-56Giles, C. Lee, see Flake, G.W., Mar., pp. 66-71Ginsburg, Mark, see Fenstermacher, K.D., Mar., pp. 51-59Gorin, Allen L. et al., Automated Natural Spoken Dialog,

Apr., pp. 51-56Granath, Derek, Storage Area Networks for Business

Continuance [Sidebar], Dec., pp. 68-69Griswold, Robert, Storage Topologies, Dec., pp. 56-63Guéziec, André, Tracking Pitches for Broadcast Television,

Mar., pp. 38-43Gundepudi, Pavan, see Kalakota, R., Oct., pp. 29-36Guniguntala, Dinakar, see Narayanaswami, C., Jan., pp.

33-41Gupta, Harsh, see Hauck, R.V., Mar., pp. 30-37Gupta, Rahul, Sumeet Talwar, and Dharma P. Agrawal,

Jini Home Networking: A Step Toward PervasiveComputing, Aug., pp. 34-40

Gutmann, Peter, PKI: It’s Not Dead, Just Resting, Aug.,pp. 41-49

HHallberg, Gustav, see Magnusson, P.S., Feb., pp. 50-58Hammond-Doel, Thomas, Fibre Channel Delivers, Dec.,

pp. 50-51Han, Jiawei, and Kevin Chen-Chuan Chang, Data Mining

for Web Intelligence, Nov., pp. 64-70Hauck, Roslin V. et al., Using Coplink to Analyze

Criminal-Justice Data, Mar., pp. 30-37Heath, Lenwood S., and Naren Ramakrishnan, The

Emerging Landscape of Bioinformatics SoftwareSystems, July, pp. 41-45

Heddaya, Abdelsalam “Solom,” An EconomicallyScalable Internet, Sept., pp. 93-95

Heffernan, Donal, see Leen, G., Jan., pp. 88-93Hilbert, David M., see Schilit, B.N., Oct., pp. 37-45Hogberg, Johan, see Magnusson, P.S., Feb., pp. 50-58Holmes, Neville

To See Ourselves as Others See Us, Jan., pp. 144, 142-143

Representative Democracy and the Profession, Feb., pp.120, 118-119

Computers, Programming, and People, Mar., pp. 112,110-111

Side Effects of Digital Technology, Apr., pp. 104, 102-103

Would a Digital Brain Have a Mind?, May, pp. 112,110-111

Seven Great Blunders of the Computing World, July,pp. 112, 110-111

Jobs, Trades, Skills, and the Profession, Sept., pp. 104,102-103

The Profession and the World, Nov., pp. 116, 114-115Hou, Lijun, see Cercone, N., Nov., pp. 72-76Hu, Xiaohua, see Cercone, N., Nov., pp. 72-76Huang, Andrew “bunnie,” The Trusted PC: Skin-Deep

Security, Oct., pp. 103-105Huber, Josef F., Toward the Mobile Internet, Oct., pp. 100-

102Hughes, Charles, see Stapleton, C., Dec., pp. 122-124Hughes, Christopher J. et al., Rsim: Simulating Shared-

Memory Multiprocessors with ILP Processors, Feb., pp.40-49

Chae, Ki-Joon, see Kim, W., The Chamois Component-Based Knowledge Engineering Framework, May, pp.46-54

Chakravarthy, Sannedhi K., see Shaikh, F.A., May, pp. 80-87Chang, Dean, Haptics: Gaming’s New Sensation, Aug.,

pp. 84-86Chang, Kevin Chen-Chuan, see Han, J., Nov., pp. 64-70Chen, Hsinshun, see Hauck, R.V., Mar., pp. 30-37Cho, Dong-Sub, see Kim, W., May, pp. 46-54Choi, Byoungju, see Kim, W., May, pp. 46-54Chong, Frederic T., see Oskin, M., Jan., pp. 79-87

Christensen, Lars M., see Madsen, J., Nov., pp. 108-110Christensson, Magnus, see Magnusson, P.S., Feb., pp. 50-58Chuang, Isaac L., see Oskin, M., Jan., pp. 79-87Cipolla, Thomas, see Narayanaswami, C., Jan., pp. 33-41Clark, David

Mobile Processors Begin to Grow Up, Mar., pp. 22-25Do Web Standards and Patents Mix?, Oct., pp. 19-22

Clark, Tom, iSCSI Protocol, Dec., pp. 54-55Coetzee, Frans M., see Flake, G.W., Mar., pp. 66-71Colwell, Bob

Phrenology, Astrology, Risk, and Product Quality, Jan.,pp. 12-14

On Computers and Rock ’n’ Roll, Feb., pp. 9-11Engineering, Science, and Quantum Mechanics, Mar.,

pp. 8-10Near Misses: Murphy’s Law Is Wrong, Apr., pp. 9-12

If You Didn’t Test It, It Doesn’t Work, May, pp. 11-13

Engineering Follies, June, pp. 10-12What Technology Is Doing to Music, July, pp. 6-8Weird Books, Aug., pp. 10-12Employee Performance Reviews, Sept., pp. 12-15The Power of the Most Likely, Oct., pp. 12-14The Coolest Thing on Earth, Nov., pp. 10-12Science-Philosophy Celebrity Death Match, Dec.,

pp. 13-15Cox , Tom, see Fuller, S., Jan., pp. 140-141Cronquist, Darren C., see Kathail, V., Sept., pp.

39-47Cummings, Roger, The Evolution of Information

Assurance, Dec., pp. 65-72Cybenko, George, Annarita Giani, and Paul

Thompson, Cognitive Hacking: A Battle for the Mind, Aug., pp. 50-56

DDas, Sajal K., see Cao, J., Sept., pp. 54-60De Micheli, Giovanni, see Benini, L, Jan., pp. 70-78Dedrick, Jason, see Kraemer, K., Feb., pp. 28-36DeMarco, Tom, and Barry Boehm, The Agile Methods

Fray, June, pp. 90-92Demestichas, Panagiotis et al., Wireless Beyond 3G:

Managing Services and Network Resources, Aug., pp.80-82

EEdenfield, Don, see Allan, A., Jan., pp. 42-53Edwards, John, and Linda Dailey Paulson, Smart

Graphics: A New Approach to Meeting User Needs,May, pp. 18-21

Eischen, Kyle, Software Development: An Outsider’s View,May, pp. 36-44

Emer, Joel et al., Asim: A Performance Model Framework,Feb., pp. 68-76

Emer, Joel, see Mukherjee, S.S., Feb., pp. 38-49Encarnacao, L. Miguel, see Bimber, O., Sept., pp. 25-30Ernst, Daniel, see Austin, T., Feb., pp. 59-67Eskilson, Jesper, see Magnusson, P.S., Feb., pp. 50-58Espasa, Roger, see Emer, J., Feb., pp. 68-76

FFeitelson, Dror G., and Millet Treinin, The Blueprint for

Life?, July, pp. 34-40Feng, Xinyu, see Cao, J., Sept., pp. 54-60Fensel, Dieter, Ontology-Based Knowledge Management,

Nov., pp. 56-59Fenstermacher, Kurt D., and Mark Ginsburg, A

Lightweight Framework for Cross-Application UserMonitoring, Mar., pp. 51-59

Finin, Timothy, see Avancha, S., June, pp. 96-99

Page 10: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

Huntley, Christopher L., see Lyon, D.A., May, pp. 102-103

IInoue, Tadanobu, see Narayanaswami, C., Jan., pp. 33-41Ishida, Toru, Q: A Scenario Description Language for

Interactive Agents, Nov., pp. 42-47

JJackson, Laura E., and George N. Rouskas, Deterministic

Preemptive Scheduling of Real-Time Tasks, May, pp.72-79

Jansen , Bernard J., see Spink, A., Mar., pp. 107-109Jeong, Anmo, see Kim, W., May, pp. 46-54Jones, Gareth J.F., see Moreno, P.J., Apr., pp. 58-66Joshi, Anupam, see Avancha, S., June, pp. 96-99Joyner Jr., William H., see Allan, A., Jan., pp. 42-53Juan, Toni, see Emer, J., Feb., pp. 68-76

KKahng, Andrew B., see Allan, A., Jan., pp. 42-53Kalakota, Ravi et al., The Economics of DSL Regulation,

Oct., pp. 29-36Kamel, Kevin, see Banerjee, S., Oct., pp. 46-53Kamijoh , Noboru, see Narayanaswami, C., Jan., pp. 33-41Kapur, Rohit, see Samaranayake, S., Oct., pp. 63-68Kathail, Vinod et al., PICO: Automatically Designing

Custom Computers, Sept., pp. 39-47Kato, Kirokazu, see Poupyrev, I., Mar., pp. 44-50Kenneally, Erin, Who’s Liable for Insecure Networks?,

June, pp. 93-95Keselj, Vlado, see Cercone, N., Nov., pp. 72-76 Kesselman, Carl, see Foster, I., June, pp. 37-46Kim, Junhyong, Computers Are from Mars, Organisms

Are from Venus, July, pp. 25-32Kim, Myung, see Kim, W., May, pp. 46-54Kim, Won et al., The Chamois Component-Based

Knowledge Engineering Framework, May, pp. 46-54King, Willis K.

Implementing Our Future Vision in 2002, Jan., pp. 6-8

Year in Review [President’s Message], Dec., pp. 10-11Klauser, Artur, see Emer, J., Feb., pp. 68-75Kochut, Andrzej, see Banerjee, S., Oct., pp. 46-53Koh, Kern, see Bahn, H., June, pp. 65-73Koh, Tzu Khiau, see Schilit, B.N., Oct., pp. 37-45Kolawa, Adam, Software Certification Debate: Certification

Will Do More Harm Than Good, June, pp. 34-35Kommareddy, Christopher, see Banerjee, S., Oct., pp. 46-53Korris, James, and Michael Macedonia, The End of

Celluloid: Digital Cinema Emerges, Apr., pp. 96-98Kraemer, Kenneth, and Jason Dedrick, Enter the Dragon:

China’s Computer Industry, Feb., pp. 28-36Kramer, William T.C., SCinet: Testbed for High-

Performance Networked Applications, June, pp. 47-55Kulkarni, Vishal, see Narayanaswami, C., Jan., pp. 33-41Kumar, Ravi et al., The Web and Social Networks, Nov.,

pp. 32-36

LLacity, Mary, Lessons in Global Information Technology

Sourcing, Aug., pp. 26-33Larsen, Ronald L., see Banerjee, S., Oct., pp. 46-53Larson, Eric, see Austin, T., Feb., pp. 59-67Larsson, Fredrik, see Magnusson, P.S., Feb., pp. 50-58Lawrence, Steve, see Flake, G.W., Mar., pp. 66-71Lawton, George

Open Source Security: Opportunity or Oxymoron?,Mar., pp. 18-21

Moving Java into Mobile Phones, June, pp. 17-20Invasive Software: Who’s Inside Your Computer, July,

pp. 15-18Virus Wars: Fewer Attacks, New Threats, Dec., pp. 22-24

Leavitt, NealData Mining for the Corporate Masses?, May, pp. 22-24Let’s Hear It for Audio Mining, Oct., pp. 23-25

Lee, KiHo, see Kim, W., May, pp. 46-54Lee, Meejeong, see Kim, W., May, pp. 46-54Lee, Sang-Ho, see Kim, W., May, pp. 46-54Lee, Yen-Jen, see Shim, S.S.Y., July, pp. 108-109Leen, Gabriel, and Donal Heffernan, Expanding Auto-

motive Electronic Systems, Jan., pp. 88-93Liu, Jiming, see Zhong, N., Nov., pp. 27-31

LoBue, Michael T., Surveying Today’s Most PopularStorage Interfaces, Dec., pp. 48-55

Logan, Beth, see Moreno, P.J., Apr., pp. 58-66Lotspiech, Jeffrey, Stefan Nusser, and Florian Pestoni,

Broadcast Encryption’s Bright Future, Aug., pp. 57-63Lu, Jian, see Cao, J., Sept., pp. 54-60Luk, Chi-Keung, see Emer, J., Feb., pp. 68-76Lv, Tiehan, see Wolf, W., Sept., pp. 48-53Lyon, Douglas A., and Christopher L. Huntley, There’s More

Than One Way to Build a Bridge, May, pp. 102-103

MMacedonia, Michael

Linux in Hollywood: A Star Is Born, Feb., pp. 112-114see Korris, J., Apr., pp. 96-98The Computer Graphics Wars Heat Up, Oct., pp. 97-99

Madsen, Jan, Jorgen Steensgaard-Madsen, and Lars M.Christensen, A Sophomore Course in Codesign, Nov.,pp. 108-110

Magnusson, Peter S. et al., Simics: A Full SystemSimulation Platform, Feb., pp. 50-58

Magnusson, Peter S., see Mukherjee, S.S., Feb., pp. 38-49Malu, Pallavi, see Aissi, S., May, pp. 55-62Manne, Srilatha, see Emer, J., Feb., pp. 68-76Martin, Grant, and Frank Schirrmeister, A Design Chain

for Embedded Systems, Mar., pp. 100-103Martinez, David L., see Bryson, J.J., Nov., pp. 48-54Martinez, Georges, see Demestichas, P., Aug., pp. 80-82Martonosi, Margaret, David Brooks, and Vivek Tiwari,

Architecture-Level Power Modeling withWattch, Feb., p. 64

Mason, Harry, SCSI: An Enterprise Foundation[Sidebar], Dec., pp. 48-50

Mathieu, Richard G., Top-Down Approach toComputing, Jan., pp. 138-139

McBride, Kari Boyd, see Briggs, L., Oct., pp. 108,106-107

McClellan, Stan, see Shaikh, F.A., May, pp. 80-87McGraw, Gary, Managing Software Security Risks,

Apr., pp. 99-101McIlraith, Sheila A., see Bryson, J.J., Nov., pp. 48-54McMillan, Kate, Technology Standards Pros Aid

Homeland Security, May, pp. 104-105Memon, Atif M., GUI Testing: Pitfalls and Process,

Aug., pp. 87-88Meyer, Bertrand, Assessing a C# Text, Apr., pp. 86-

88Micikevicius, Paulius, see Stapleton, C., Dec., pp. 122-124Min, Sang Lyul, see Bahn, H., June, pp. 65-73Miranda, Eduardo, Planning and Executing Time-Bound

Projects, Mar., pp. 73-79Mishra, Bud, see Paxia, S., July, pp. 73-79Missikoff, Michele, Roberto Navigli, and Paola Velardi,

Integrated Approach to Web Ontology Learning andEngineering, Nov., pp. 60-63

Moestedt, Andreas, see Magnusson, P.S., Feb., pp. 50-58Moreno, Pedro J. et al., From Multimedia Retrieval to

Knowledge Management, Apr., pp. 58-66Moret, Bernard M.E., Li-San Wang, and Tandy Warnow,

Toward New Software for Computational Phyloge-netics, July, pp. 55-64

Moshell, Michael, see Stapleton, C., Dec., pp. 122-124Mukherjee, Shubhendu S., see Emer, J., Feb., pp. 68-76Mukherjee, Shubhendu S. et al., Performance Simulation

Tools, Feb., pp. 38-49

NNadeem, Tamer, see Banerjee, S., Oct., pp. 46-53Narayanaswami, Chandra et al., IBM’s Linux Watch: The

Challenge of Miniaturization, Jan., pp. 33-41Naruedomkul, Kanlaya, see Cercone, N., Nov., pp. 72-76Navigli, Roberto, see Missikoff, M., Nov., pp. 60-63Nick, Jeffrey M., see Foster, I., June, pp. 37-46Nishida, Toyoaki, Social Intelligence Design for the Web,

Nov., pp. 37-41Noh, Sam H., see Bahn, H., June, pp. 65-73Norman, Donald A., Home Theater: Not Ready for Prime

Time, June, pp. 100-102Norton, Roger L., Using Virtual Linux Servers, Nov., pp.

106-107Nusser, Stefan, see Lotspiech, J., Aug., pp. 57-63

December 2002 89

Page 11: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

90 Computer

Battling Intrusions with a “Network Telescope,” Nov.,p. 24

Choreographing Web Services, Nov., p. 25Researchers Upgrade Smart Card Technology, Dec., p. 25Blind, Deaf Engineer Develops Computerized Braille

Machine, Dec., p. 27New Optical Clock Could Synchronize Chips, Dec., p. 26Efforts Launched to Improve Network Security Edu-

cation, Dec., p. 26see Edwards, J., Smart Graphics: A New Approach to

Meeting User Needs, May, pp. 18-21Paxia, Salvatore et al., A Random Walk Down the

Genomes: DNA Evolution in Valis, July, pp. 73-79Pestoni, Florian, see Lotspiech, J., Aug., pp. 57-63Picheny, Michael, see Padmanabhan, M., Apr., pp. 42-

50Piner, Mary-Louise G.

Building on Success: CS Programs for 2002, Jan., pp.94-98

Board Approves Reading of Bylaws Amendments, Jan.,pp. 98-99

IEEE Fellows Lead the Engineering Profession, Feb.,pp. 84-85

Fellow Nominations Due 15 March, Feb., pp. 86-87Society Seeks Editor-in-Chief Applicants, Feb., pp. 86-

87Online Courses Offer Members Expert Instruction,

Mar., p. 80Revised Student Competition Offers Opportunity for

Increased Participation, Mar., p. 81Certification Program Provides Mark of Profes-

sionalism, Apr., pp. 74-75CD-ROM Supplement Provides Demos, Interactive

Tutorials for Computer Graphics Community, Apr.,p. 75

Academic Excellence Prize and Best Paper ScholarshipAwarded, Apr., p. 76

Conferences Offer Findings in Both New andTraditional Computing Research Fields, May, pp.92-94

Ten Student Teams Advance to CSIDC World Finals,July, pp. 87-88

Ole-Johan Dahl, 1931-2002, Oct., p. 76Kristen Nygaard, 1926-2002, Oct., p. 76Standards News: PAR 1599 and IEEE 1484.12.1, Oct.,

p. 77Partnership with Wiley Will Showcase Expert Texts,

Nov., p. 80Online Collection Offers Information Technology for

Resource Libraries, Nov., p. 80Recent Awards Reinforce Society’s Commitment to

Service, Teaching, Nov., pp. 82-83Chang Chosen IEEE Computer Society President-Elect

[Report to Members], Dec., pp. 73-74Pop, Mihai, Steven L. Salzberg, and Martin Shumway,

Genome Sequence Assembly: Algorithms and Issues,July, pp. 47-54

Potlapally, Nachiketh, Optical Fingerprinting to ProtectData: A Proposal, Apr., pp. 23-28

Poupyrev, Ivan et al. , Developing a Generic Augmented-Reality Interface, Mar., pp. 44-50

RRaghavan, Prabhakar, see Kumar, R., Nov., pp. 32-36Raghu, T.S., R. Ramesh, and Andrew B. Winston, Next

Steps for Mobile Entertainment Portals, May, pp. 63-70

Raghunath, Mandayan, see Narayanaswami, C., Jan., pp.33-41

Ragsdale, Daniel, see Welch, D., Apr., pp. 30-37Rai, Arun, see Kalakota, R., Oct., pp. 29-36Rajagopalan, Sridhar, see Kumar, R., Nov., pp. 32-36Ramakrishnan, Naren, see Heath, L.S., July, pp. 41-45Ramesh, R., see Raghu, T.S., May, pp. 63-70Ranaweera, Samantha Lalinda, see Bajaj, R., Apr., pp. 92-

94Ranganathan, Parthasarathy, see Hughes, C.J., Feb., pp.

40-49Ransom, Stephen, and Xindong Wu, Using Knowledge

Anchors to Reduce Cognitive Overhead, Nov., pp. 111-112

Raskar, Ramesh, see Bimber, O., Sept., pp. 25-30

OOngvasith, Pichai, see Hauck, R.V., Mar., pp. 30-37Orick, Diana Mayer, Toward Adequate Online Privacy,

Aug.pp. 92, 90-91Ortiz Jr., Sixto, Is Business Intelligence a Smart Move?,

July, pp. 11-14Oskin, Mark, Frederic T. Chong, and Isaac L. Chuang, A

Practical Architecture for Reliable QuantumComputers, Jan., pp. 79-87

Ozer, Burak, see Wolf, W., Sept., pp. 48-53

PPadmanabhan, Mukund, and Michael Picheny, Large-

Vocabulary Speech Recognition Algorithms, Apr., pp.42-50

Pai, Vijay S., see Hughes, C.J., Feb., pp. 40-49Palmer, Jonathan, Designing for Web Site Usability, July,

pp. 102-103Papadopoulou, Louisa, see Demestichas, P., Aug., pp. 80-

82 Park, Seung-Soo, see Kim, W., May, pp. 46-54Parvin, Bahram et al., BioSig: An Imaging Bioinformatic

System for Studying Phenomics, July, pp. 65-71Patil, Harish, see Emer, J., Feb., pp. 68-76Paulson, Linda Dailey

Alliance Seeks Streaming-Media Standard, Jan., pp. 22-23

New Nanotech Institute Will Sweat the Small Stuff,Jan., p. 23

Wanted: More Network-Security Graduates and Research, Feb., pp. 22-24

IBM Begins Autonomic-Computing Project, Feb.,p. 25

Malicious Code Hits Instant Messaging, Feb., p. 26

Faster Processors with Optical Connections, Feb.,p. 27

Key Snooping Technology Causes Controversy, Mar., p. 27

Developments Could Boost Optical Networks, Mar., p. 28

Adding a Third Dimension to Chips, Mar., p. 29Faster RAM Tackles Data and Marketplace

Bottlenecks, Apr., pp. 17-19Protocol-Related Problem Threatens Internet

Security, Apr., p. 20Faster Storage Connectivity Technologies

Emerge, Apr., p. 21New Wireless Technology Is in Sight, Apr., p. 22MPEG Licensing Dispute Hurts Apple, May, p. 25Will New Chip Revolutionize Digital Photography?,

May, pp. 25-26US Approves New Uses for Wireless Technology, May,

p. 27Little Chips Promise Big Power, June, p. 25Bioinformatics Experiences Important Breakthroughs,

June, pp. 26-27Company Unveils Holographic DVD for 3D Storage,

June, p. 27Taking a Graphical Approach to the Password, July, p. 19Improvements Stream into Multimedia Technology,

July, pp. 20-21Data at the Speed of Light, July, p. 21Computer System, Heal Thyself, Aug., pp. 20-22Distributed Storage Challenges Data Glut, Aug., p. 23Professors Use Technology to Fight Plagiarism, Aug.,

pp. 24 -25Startup Wants to Automate Chip Design, Aug., p. 25Tiny “Punch Cards” Boost Storage Capacity, Sept., p.

22Researchers Bring Wireless Communications to the

Chip, Sept., p. 23New Chips Will Help Computers Visualize in Three

Dimensions, Sept., p. 24Project Promises Accessible Technology for the Dis-

abled, Oct., p. 26Two Efforts Aim to Upgrade Mobile Memory, Oct., p. 27Prime Breakthrough May Improve Encryption, Oct., p.

28Stopping Intruders Outside the Gates, Nov., pp. 20-22IBM Works on a Universal Virtual Computer, Nov., p.

23

Page 12: Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable

Rau, B. Ramakrishna, see Kathail, V., Sept., pp. 39-47Regenbrecht, Holger, see Poupyrev, I., Mar., pp. 44-50Riccardi, Giuseppe, see Gorin, A.L., Apr., pp. 51-56Ricketts, Anita C., IEEE Registration Authority, Nov., pp.

113-115Rigden, Christine, Now You See It, Now You Don’t, July,

pp. 104-105Robinson, Gary S., Toward the Age of Smarter Storage,

Dec., pp. 35-41Rodgers, Mike, see Allan, A., Jan., pp. 42-53Rouskas, George N., see Jackson, L.E., May, pp. 72-79Rowen, Chris, Reducing SoC Simulation and Development

Time, Dec., pp. 29-34Rudra, Archisman, see Paxia, S., July, pp. 73-79

SSalzberg, Steve L., see Pop, M., July, pp. 47-54Samaranayake, Samitha et al., Dynamic Scan: Driving

Down the Cost of Test, Oct., pp. 63-68Sanford , Jim, see Narayanaswami, C., Jan., pp. 33-41Santini, Simone, Using Language More Responsibly, Dec.,

pp. 128, 126-127Saracevic, Tefko, see Spink, A., Mar., pp. 107-109Schatz, Bruce R., The Interspace: Concept Navigation

Across Distributed Communities, Jan., pp. 54-62Scheible, John P., A Survey of Storage Options, Dec., pp.

42-46Schepens, Wayne, see Welch, D., Apr., pp. 30-37Schilit, Bill N. et al., Web Interaction Using Very Small

Internet Devices, Oct., pp. 37-45Schirrmeister, Frank, see Martin, G., Mar., pp. 100-103Schlig, Eugene, see Narayanaswami, C., Jan., pp. 33-41Schneiderman, Ben, see Seo, J., July, pp. 80-86Schneidewind, Norman F., Body of Knowledge for

Software Quality Measurement, Feb., pp. 77-83Schreiber, Robert, see Kathail, V., Sept., pp. 39-47Seo, Jinwook, and Ben Schneiderman, Interactively Ex-

ploring Hierarchical Clustering Results, July, pp. 80-86Shahabi, Cyrus et al., Yima: A Second-Generation

Continuous Media Server, June, pp. 56-64Shaikh, Fayaz A. et al, End-to-End Testing of IP QoS

Mechanisms, May, pp. 80-87Shankar, A. Uddaya, see Banerjee, S., Oct., pp. 46-53Shim, Simon S.Y., and Yen-Jen Lee, Interactive TV: VoD

Meets the Internet, July, pp. 108-109Shirky, Clay, Web Services and Context Horizons, Sept.,

pp. 98-100Shumway, Martin, see Pop, M., July, pp. 47-54Singh, Manpreet, see Shaikh, F.A., End-to-End Testing of

IP QoS Mechanisms, May, pp. 80-87Sitchinava, Nodari, see Samaranayake, S., Oct., pp. 63-

68Sivaraman, Mukund, see Kathail, V., Sept., pp. 39-47Smith, Cheryl, see Blaha, M., May, pp. 28-34Spink, Amanda et al., From E-Sex to E-Commerce: Web

Search Changes, Mar., pp. 107-109Srinivasan, Krishnamurthy, see Aissi, S., May, pp. 55-62Srinivasan, Savitha, and Eric Brown, Is Speech Recognition

Becoming Mainstream, Apr., pp. 38-41Stankovic, John A., see Wood, A.D., Oct., pp. 54-62Stapleton, Christopher et al., Applying Mixed Reality to

Entertainment, Dec., pp. 122-124Starner, Thad, Thick Clients for Personal Wireless Devices,

Jan., pp. 133-135Stavroulaki, Vera, see Demestichas, P., Aug., pp. 80-82Steensgaard-Madsen, Jørgen, see Madsen, J., Nov., pp.

108-110Stein, Lynn Andrea, see Bryson, J.J., Nov., pp. 48-54Steinfield, Charles, Realizing the Benefits of Virtual Teams,

Mar., pp. 104-106Strom, Darrel, see Walrad, C., Sept., pp. 31-38

TTalwar, Sumeet, see Gupta, R., Aug., pp. 34-40Tan, Desney S., see Poupyrev, I., Mar., pp. 44-50Tetsutani, Nobuji, see Poupyrev, I., Mar., pp. 44-50Thakkar, Pankaj, see Banerjee, S., Oct., pp. 46-53Thayer, Richard H., Software System Engineering: A

Tutorial, Apr., pp. 68-73Theologou, Michael, see Demestichas, P., Aug., pp. 80-

82Thompson, Paul, see Cybenko, G., Aug., pp. 50-56

Tiwari, Vivek, see M. Martonosi, Feb., p. 64Tomkins, Andrew, see Kumar, R., Nov., pp. 32-36Treinin, Millet, see Feitelson, D.G., July, pp. 34-40Trevor, Jonathan, see Schilit, B.N., Oct., pp. 37-45Trinh, Bao, see Banerjee, S., Oct., pp. 46-53Tripp, Leonard L., Software Certification Debate: Benefits

of Certification, June, pp. 31-33Tuecke, Steven, see Foster, I., June, pp. 37-46

VVan Thong, J-M., see Moreno, P.J., Apr., pp. 58-66Varshney, Upkar, Multicast Support in Mobile Commerce

Applications, Feb., pp. 115-117Vaughan-Nichols, Steven J.

Web Services: Beyond the Hype, Feb., pp. 18-21Will 10-Gigabit Ethernet Have a Bright Future, June,

pp. 22-24Developing the Distributed Computing OS, Sept., pp.

19-21Bull Market for IEEE 802.11 WLAN Chipsets, Nov.,

pp. 17-19OFDM: Back to the Wireless Future, Dec., pp. 19-21

Velardi, Paola, see Missikoff, M., Nov., pp. 60-63Vivier, Guillaume, see Demestichas, P., Aug., pp. 80-82

WWallace, Steven, see Emer, J., Feb., pp. 68-76Walrad, Chuck, and Darrel Strom, The Importance of

Branching Models in SCM, Sept., pp. 31-38Wang, Li-San, see Moret, B.M.E., July, pp. 55-64Wareham, Jonathan, see Kalakota, R., Oct., pp. 29-

36Warnow, Tandy, see Moret, B.M.E., July, pp. 55-64Welch, Donald, Daniel Ragsdale, and Wayne

Schepens, Training for Information Assurance,Apr., pp. 30-37

Welke, Richard, see Kalakota, R., Oct., pp. 29-36Werner, Bengt, see Magnusson, P.S., Feb., pp. 50-

58Whinston, Andrew B., see Raghu, T.S., May, pp.

63-70Williams, Thomas W., see Samaranayake, S., Oct.,

pp. 63-68Witmer, Lawrence M., see Bimber, O., Sept., pp.

25-30Wolf, Wayne

What Is Embedded Computing?, Jan., pp. 136-137

Household Hints for Embedded Systems Designers,May, pp. 106-108

Whither Warhol’s Law?, Sept., pp. 96-97Wolf, Wayne, Burak Ozer, and Tiehan Lv, Smart Cameras

as Embedded Systems, Sept., pp. 48-53Wolfram, Dietmar, see Spink, A., From E-Sex to E-

Commerce: Web Search Changes, Mar., pp. 107-109Wood, Anthony D., and John A. Stankovic, Denial of

Service in Sensor Networks, Oct., pp. 54-62Wright, Jeremy H., see Gorin, A.L., Automated Natural

Spoken Dialog, Apr., pp. 51-56Wu, Xindong, see Ransom, S., Nov., pp. 111-112

YYamazaki, Kazuhiko, see Narayanaswami, C., Jan., pp.

33-41Yang, Qing, see Parvin, B., July, pp. 65-71Yao, Shu-Yuen Didi, see Shahabi, C., June, pp. 56-64Yong, Hwan-Seung, see Kim, W., May, pp. 46-54Youssef, Adel, see Banerjee, S., Oct., pp. 46-53Youssef, Moustafa, see Banerjee, S., Oct., pp. 46-53

ZZhong, Ning, Jiming Liu, and Yiyu Yao, In Search of the

Wisdom Web, Nov., pp. 27-31Zhou, Yi, see Paxia, S., July, pp. 73-79Zimmermann, Roger, see Shahabi, C., June, pp. 56-64Zorian, Yervant, see Allan, A., Jan., pp. 42-53

December 2002 91