80 Computer SUBJECT INDEX A Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., Nov., pp. 27-31 Mailbox-Based Scheme for Mobile Agent Communications, J. Cao et al., Sept., pp. 54-60 Q: A Scenario Description Language for Interactive Agents, T. Ishida, Nov., pp. 42-47 Social Intelligence Design for the Web, T. Nishida, Nov., pp. 37-41 Toward Behavioral Intelligence in the Semantic Web, J.J. Bryson et al., Nov., pp. 48-54 Agile Software Development The Agile Methods Fray [Column], T. DeMarco and B. Boehm, June, pp. 90-92 Get Ready for Agile Methods, with Care, B. Boehm, Jan., pp. 64-69 Algorithms, see also Scheduling Algorithms Computers Are from Mars, Organisms Are from Venus, J. Kim, July, pp. 25-32 Efficient Replacement of Nonuniform Objects in Web Caches, H. Bahn et al., June, pp. 65-73 Large-Vocabulary Speech Recognition Algorithms, M. Padmanabhan and M. Picheny, Apr., pp. 42-50 Next Steps for Mobile Entertainment Portals, T.S. Raghu et al., May, pp. 63-70 The Web and Social Networks, R. Kumar et al., Nov., pp. 32-36 Artificial Intelligence From Computational Intelligence to Web Intelligence, N. Cercone, Nov., pp. 72-76 Social Intelligence Design for the Web, T. Nishida, Nov., pp. 37-41 Toward Behavioral Intelligence in the Semantic Web, J.J. Bryson et al., Nov., pp. 48-54 Would a Digital Brain Have a Mind? [Column], N. Holmes, May, pp. 112, 110-111 Assistive Technologies for Persons with Disabilities Blind, Deaf Engineer Develops Computerized Braille Machine [News], L.D. Paulson, Dec., p. 27 Now You See It, Now You Don’t [Column], C. Rigden, July, pp. 104-105 Project Promises Accessible Technology for the Disabled [News], L.D. Paulson, Oct., p. 26 Augmented Reality Applying Mixed Reality to Entertainment [Column], C. Stapleton et al., Dec., pp. 122-124 Developing a Generic Augmented-Reality Interface, I. Poupyrev et al., Mar., pp. 44-50 Merging Fossil Specimens with Computer-Generated Information, O. Bimber et al., Sept., pp. 25-30 Authentication PKI: It’s Not Dead, Just Resting, P. Gutmann, Aug., pp. 41-49 Taking a Graphical Approach to the Password [News], L.D. Paulson, July, p. 19 Automotive Electronics Expanding Automotive Electronic Systems, G. Leen and D. Heffernan, Jan., pp. 88-93 Autonomic Computing Computer System, Heal Thyself [News], L.D. Paulson, Aug., pp. 20-22 IBM Begins Autonomic-Computing Project [News], L.D. Paulson, Feb., p. 25 In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., Nov., pp. 27-31 Awards Academic Excellence Prize and Best Paper Scholarship Awarded [CS Connection], M-L.G. Piner, Apr., p. 76 High School Student from China Receives IEEE Computer Society Prize [CS Connection], M-L.G. Piner, Aug., pp. 64-65 IEEE CS Recognizes Achievements of Leading Computer Engineers [CS Connection], M-L.G. Piner, June, pp. 74-76 IEEE Fellows Lead the Engineering Profession [CS Connection], M-L.G. Piner, Feb., pp. 84-85 Recent Awards Reinforce Society’s Commitment to Service, Teaching [CS Connection], M-L.G. Piner, Nov., pp. 82-83 Romanian Disaster-Response Project Wins Design Compe- tition [News], L. Garber, Aug., pp. 13-15 B Bioinformatics Bioinformatics Experiences Important Breakthroughs [News], L.D. Paulson, June, pp. 26-27 BioSig: An Imaging Bioinformatic System for Studying Phenomics, B. Parvin et al., July, pp. 65-71 The Blueprint for Life?, D.G. Feitelson and M. Treinin, July, pp. 34-40 Computers Are from Mars, Organisms Are from Venus, J. Kim, July, pp. 25-32 The Emerging Landscape of Bioinformatics Software Systems [Guest Editors’ Intro: Bioinformatics], L.S. Heath and N. Ramakrishnan, July, pp. 41-45 Genome Sequence Assembly: Algorithms and Issues, M. Pop et al., July, pp. 47-54 Interactively Exploring Hierarchical Clustering Results, J. Seo and B. Shneiderman, July, pp. 80-86 A Random Walk Down the Genomes: DNA Evolution in Valis, S. Paxia et al., July, pp. 73-79 Toward New Software for Computational Phylogenetics, B.M.E. Moret et al., July, pp. 55-64 Bluetooth Enhanced Service Discovery in Bluetooth [Column], S. Avancha et al., June, pp. 96-99 Book Reviews Assessing a C# Text [Column], B. Meyer, Apr., pp. 86-88 Science-Philosophy Celebrity Death Match [Opinion], B. Colwell, Dec., pp. 13-15 Weird Books [Opinion], B. Colwell, Aug., pp. 10-12 C Cache Memory Efficient Replacement of Nonuniform Objects in Web Caches, H. Bahn et al., June, pp. 65-73 Certification, Software Software Certification Debate: Benefits of Certification, L. Tripp, June, pp. 31-33 Software Certification Debate: Certification Will Do More Harm Than Good, A. Kolawa, June, pp. 34-35 China, Computer Industry in Enter the Dragon: China’s Computer Industry, K. Kraemer and J. Dedrick, Feb., pp. 28-36 Client-Server Computing Rover: Scalable Location-Aware Computing, S. Banerjee et ANNUAL INDEX Volume 35, 2002
12
Embed
Volume 35, 2002 - The Community for Technology Leaders · Agent Technology In Search of the Wisdom Web [Guest Editors’ Intro: Web Intelligence], N. Zhong et al., ... Rover: Scalable
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
80 Computer
SUBJECT INDEX
AAgent TechnologyIn Search of the Wisdom Web [Guest Editors’ Intro: Web
Intelligence], N. Zhong et al., Nov., pp. 27-31Mailbox-Based Scheme for Mobile Agent Communications,
J. Cao et al., Sept., pp. 54-60Q: A Scenario Description Language for Interactive Agents,
T. Ishida, Nov., pp. 42-47Social Intelligence Design for the Web, T. Nishida,
Nov., pp. 37-41Toward Behavioral Intelligence in the Semantic Web,
J.J. Bryson et al., Nov., pp. 48-54Agile Software DevelopmentThe Agile Methods Fray [Column], T. DeMarco andB. Boehm, June, pp. 90-92Get Ready for Agile Methods, with Care, B. Boehm,
Jan., pp. 64-69Algorithms, see also Scheduling AlgorithmsComputers Are from Mars, Organisms Are from
Venus, J. Kim, July, pp. 25-32Efficient Replacement of Nonuniform Objects in
Web Caches, H. Bahn et al., June, pp. 65-73Large-Vocabulary Speech Recognition Algorithms,
M. Padmanabhan and M. Picheny, Apr., pp. 42-50Next Steps for Mobile Entertainment Portals, T.S.
Raghu et al., May, pp. 63-70The Web and Social Networks, R. Kumar et al., Nov., pp.
32-36Artificial IntelligenceFrom Computational Intelligence to Web Intelligence, N.
Cercone, Nov., pp. 72-76Social Intelligence Design for the Web, T. Nishida, Nov.,
pp. 37-41Toward Behavioral Intelligence in the Semantic Web, J.J.
Bryson et al., Nov., pp. 48-54Would a Digital Brain Have a Mind? [Column], N. Holmes,
May, pp. 112, 110-111Assistive Technologies for Persons with DisabilitiesBlind, Deaf Engineer Develops Computerized Braille
Machine [News], L.D. Paulson, Dec., p. 27Now You See It, Now You Don’t [Column], C. Rigden, July,
pp. 104-105Project Promises Accessible Technology for the Disabled
[News], L.D. Paulson, Oct., p. 26Augmented RealityApplying Mixed Reality to Entertainment [Column], C.
Stapleton et al., Dec., pp. 122-124Developing a Generic Augmented-Reality Interface, I.
Poupyrev et al., Mar., pp. 44-50Merging Fossil Specimens with Computer-Generated
Information, O. Bimber et al., Sept., pp. 25-30AuthenticationPKI: It’s Not Dead, Just Resting, P. Gutmann, Aug., pp. 41-49Taking a Graphical Approach to the Password [News], L.D.
Paulson, July, p. 19Automotive ElectronicsExpanding Automotive Electronic Systems, G. Leen and D.
IBM Begins Autonomic-Computing Project [News], L.D.Paulson, Feb., p. 25
In Search of the Wisdom Web [Guest Editors’ Intro: WebIntelligence], N. Zhong et al., Nov., pp. 27-31
AwardsAcademic Excellence Prize and Best Paper Scholarship
Awarded [CS Connection], M-L.G. Piner, Apr., p. 76High School Student from China Receives IEEE Computer
Society Prize [CS Connection], M-L.G. Piner, Aug., pp.64-65
IEEE CS Recognizes Achievements of Leading ComputerEngineers [CS Connection], M-L.G. Piner, June, pp. 74-76
IEEE Fellows Lead the Engineering Profession [CSConnection], M-L.G. Piner, Feb., pp. 84-85
Recent Awards Reinforce Society’s Commitment to Service,Teaching [CS Connection], M-L.G. Piner, Nov., pp. 82-83
Romanian Disaster-Response Project Wins Design Compe-tition [News], L. Garber, Aug., pp. 13-15
BBioinformaticsBioinformatics Experiences Important Breakthroughs
[News], L.D. Paulson, June, pp. 26-27BioSig: An Imaging Bioinformatic System for Studying
Phenomics, B. Parvin et al., July, pp. 65-71The Blueprint for Life?, D.G. Feitelson and M. Treinin, July,
pp. 34-40Computers Are from Mars, Organisms Are from Venus, J.
Kim, July, pp. 25-32The Emerging Landscape of Bioinformatics Software
Systems [Guest Editors’ Intro: Bioinformatics], L.S.Heath and N. Ramakrishnan, July, pp. 41-45
Genome Sequence Assembly: Algorithms and Issues, M.Pop et al., July, pp. 47-54
Interactively Exploring Hierarchical Clustering Results, J.Seo and B. Shneiderman, July, pp. 80-86
A Random Walk Down the Genomes: DNA Evolution inValis, S. Paxia et al., July, pp. 73-79
Toward New Software for Computational Phylogenetics,B.M.E. Moret et al., July, pp. 55-64
BluetoothEnhanced Service Discovery in Bluetooth [Column], S.
Avancha et al., June, pp. 96-99Book ReviewsAssessing a C# Text [Column], B. Meyer, Apr., pp. 86-88Science-Philosophy Celebrity Death Match [Opinion], B.
Colwell, Dec., pp. 13-15Weird Books [Opinion], B. Colwell, Aug., pp. 10-12
CCache MemoryEfficient Replacement of Nonuniform Objects in Web
Caches, H. Bahn et al., June, pp. 65-73Certification, SoftwareSoftware Certification Debate: Benefits of Certification, L.
Tripp, June, pp. 31-33Software Certification Debate: Certification Will Do More
Harm Than Good, A. Kolawa, June, pp. 34-35China, Computer Industry inEnter the Dragon: China’s Computer Industry, K. Kraemer
and J. Dedrick, Feb., pp. 28-36Client-Server ComputingRover: Scalable Location-Aware Computing, S. Banerjee et
A N N U A L I N D E X
Volume 35, 2002
al., Oct., pp. 46-53Thick Clients for Personal Wireless Devices [Column], T.
Starner, Jan., pp. 133-135Using Virtual Linux Servers [Column], R.L. Norton, Nov.,
pp. 106-107Yima: A Second-Generation Continuous Media Server, C.
Shahabi et al., June, pp. 56-64CodesSeven Great Blunders of the Computing World [Column],
N. Holmes, July, pp. 112, 110-111Codesign, Hardware-SoftwareNetworks on Chips: A New SoC Paradigm, L. Benini and
G. DeMicheli, Jan., pp. 70-78A Sophomore Course in Codesign [Column], J. Madsen et
al., Nov., pp. 108-110Computational Biology, see BioinformaticsComputer ArchitecturePICO: Automatically Designing Custom Computers, V.
Kathail et al., Sept., pp. 39-47A Practical Architecture for Reliable Quantum Computers,
M. Oskin et al., Jan., pp. 79-87SimpleScalar: An Infrastructure for Computer System
Modeling, T. Austin et al., Feb., pp. 59-67Whither Warhol’s Law? [Column], W. Wolf, Sept., pp. 96-97Computer CrimeCognitive Hacking: A Battle for the Mind, G. Cybenko et
al., Aug., pp. 50-56Computer GamesThe Computer Graphics Wars Heat Up [Column], M.
Macedonia, Oct., pp. 97-99Haptics: Gaming’s New Sensation [Column], D. Chang,
Aug., pp. 84-86Next Steps for Mobile Entertainment Portals, T.S. Raghu
et al., May, pp. 63-70Computer GraphicsThe Computer Graphics Wars Heat Up [Column], M.
Macedonia, Oct., pp. 97-99Linux in Hollywood: A Star Is Born [Column], M.
Macedonia, Feb., pp. 112-114Merging Fossil Specimens with Computer-Generated
Information, O. Bimber et al., Sept., pp. 25-30Smart Graphics: A New Approach to Meeting User Needs
[News], J. Edwards and L.D. Paulson, May, pp. 18-21Tracking Pitches for Broadcast Television, A. Guéziec,
Mar., pp. 38-43Computer IndustryEnter the Dragon: China’s Computer Industry, K. Kraemer
and J. Dedrick, Feb., pp. 28-36Computer Networks, see also Internet, World Wide WebSCinet: Testbed for High-Performance Networked
Applications, W.T.C. Kramer, June, pp. 47-55Wireless Beyond 3G: Managing Services and Network
Resources [Column], P. Demestichas et al., Aug., pp.80-82
Computer VisionSmart Cameras as Embedded Systems, W. Wolf et al., Sept.,
pp. 48-53Configurable Processors, see MicroprocessorsCopy ProtectionBroadcast Encryption’s Bright Future, J. Lotspiech et al.,
Aug., pp. 57-63Optical Fingerprinting to Protect Data: A Proposal, N.
Potlapally, Apr., pp. 23-28CryptographyBroadcast Encryption’s Bright Future, J. Lotspiech et al.,
Aug., pp. 57-63Optical Fingerprinting to Protect Data: A Proposal, N.
Potlapally, Apr., pp. 23-28PKI: It’s Not Dead, Just Resting, P. Gutmann, Aug., pp.
41-49Prime Breakthrough May Improve Encryption [News],
L.D. Paulson, Oct., p. 28
DData CommunicationsThe Economics of DSL Regulation, R. Kalakota et al.,
Oct., pp. 29-36Data MiningThe Chamois Component-Based Knowledge Engineering
Framework, W. Kim et al., May, pp. 46-54Data Mining for the Corporate Masses? [News], N.
Leavitt, May, pp. 22-24
Data Mining for Web Intelligence, J. Han and K.C-C.Chang, Nov., pp. 64-70
The Emerging Landscape of Bioinformatics SoftwareSystems [Guest Editors’ Intro: Bioinformatics], L.S.Heath et al., July, pp. 41-45
Interactively Exploring Hierarchical Clustering Results, J.Seo and B. Shneiderman, July, pp. 80-86
Is Business Intelligence a Smart Move? [News], S. OrtizJr., July, pp. 11-14
Let’s Hear It for Audio Mining [News], N. Leavitt, Oct.,pp. 23-25
Data ModelingBioSig: An Imaging Bioinformatic System for Studying
Phenomics, B. Parvin et al., July, pp. 65-71A Pattern for Softcoded Values, M. Blaha and C. Smith,
May, pp. 28-34A Random Walk Down the Genomes: DNA Evolution in
Valis, S. Paxia et al., July, pp. 73-79Data SecurityOpen Source Security: Opportunity or Oxymoron?
[News], G. Lawton, Mar., pp. 18-21Optical Fingerprinting to Protect Data: A Proposal, N.
Potlapally, Apr., pp. 23-28Security: Technical, Social, and Legal Challenges
[Column], B. Arbaugh, Feb., pp. 109-111Training for Information Assurance, D. Welch et al., Apr.,
pp. 30-37Who’s Liable for Insecure Networks? [Column], E.
Kenneally, June, pp. 93-95Database Management Systems, see InformationRetrievalDesign Engineering, see also EngineeringNear Misses: Murphy’s Law Is Wrong [Opinion], B.
Colwell, Apr., pp. 9-12PICO: Automatically Designing Custom Com-
puters, V. Kathail et al., Sept., pp. 39-47The Power of the Most Likely [Opinion], B.
Colwell, Oct., pp. 12-14Design-for-Test Technology, see TestingDistance LearningRethinking the Digital Divide [Column], L. Briggs
and K.B. McBride, Oct., pp. 108, 106-107Distributed SystemsDeveloping the Distributed-Computing OS [News],
S.J. Vaughan-Nichols, Sept., pp. 19-21Grid Services for Distributed System Integration, I.
Foster et al., June, pp. 37-46Mailbox-Based Scheme for Mobile Agent Communi-
cations, J. Cao et al., Sept., pp. 54-60DNA Computing, see Molecular Computing
EE-CommerceE-Business Process Modeling: The Next Big Step, S. Aissi
et al., May, pp. 55-62Mobile Payments [Column], U. Varshney, Dec., pp. 120-121Multicast Support in Mobile Commerce Applications
[Column], U. Varshney, Feb., pp. 115-117EconomicsAn Economically Scalable Internet [Column], A.S.
Heddaya, Sept., pp. 93-95The Economics of DSL Regulation, R. Kalakota et al.,
Oct., pp. 29-36Education, Computer and Information ScienceEfforts Launched to Improve Network Security Education
[News], L.D. Paulson, Dec., p. 26The End of Computing Disciplines as We Know Them?
[EIC’s Message], J.A. Aylor, Jan., pp. 4-5, 8A Sophomore Course in Codesign [Column], J. Madsen et
al., Nov., pp. 108-110Software Certification Debate: Benefits of Certification,
L. Tripp, June, pp. 31-33Software Certification Debate: Certification Will Do More
Harm Than Good, A. Kolawa, June, pp. 34-35Software Development: An Outsider’s View, K. Eischen,
May, pp. 36-44Wanted: More Network-Security Graduates and Research
[News], L.D. Paulson, Feb., pp. 22-24Education, Computer Uses inProfessors Use Technology to Fight Plagiarism [News],
L.D. Paulson, Aug., pp. 24 -25Rethinking the Digital Divide [Column], L. Briggs and
December 2002 81
82 Computer
Social Intelligence Design for the Web, T. Nishida, Nov.,pp. 37-41
HHandheld DevicesWeb Interaction Using Very Small Internet Devices, B.N.
Schilit et al., Oct., pp. 37-45Haptic InterfacesHaptics: Gaming’s New Sensation [Column], D. Chang,
Aug., pp. 84-86High-Performance ComputingAsim: A Performance Model Framework, J. Emer et al.,
Feb., pp. 68-76Performance Simulation Tools [Guest Editors’ Intro: High-
Performance Simulators], S.S. Mukherjee et al., Feb.,pp. 38-39
Rsim: Simulating Shared-Memory Multiprocessors withILP Processors, C.J. Hughes et al., Feb., pp. 40-49
SCinet: Testbed for High-Performance NetworkedApplications, W.T.C. Kramer, June, pp. 47-55
Simics: A Full System Simulation Platform, P.S.Magnusson et al., Feb., pp. 50-58
SimpleScalar: An Infrastructure for Computer SystemModeling, T. Austin et al., Feb., pp. 59-67
Home NetworkingJini Home Networking: A Step toward Pervasive Com-
puting, R. Gupta et al., Aug., pp. 34-40Human Genome ProjectGenome Sequence Assembly: Algorithms and Issues, M.
Pop et al., July, pp. 47-54Human-Computer InteractionDeveloping a Generic Augmented-Reality Interface, I.
Poupyrev et al., Mar., pp. 44-50A Lightweight Framework for Cross-Application User
Monitoring, K. Fenstermacher and M. Ginsburg, Mar.,pp. 51-59
HypertextSelf-Organization and Identification of Web Communities,
G.W. Flake et al., Mar., pp. 66-71Using Knowledge Anchors to Reduce Cognitive Overhead
[Column], S. Ransom et al., Nov., pp. 111-112The Web and Social Networks, R. Kumar et al., Nov., pp.
32-36
IIBM ComputersIBM’s Linux Watch: The Challenge of Miniaturization, C.
Narayanaswami et al., Jan., pp. 33-41IEEE Computer SocietyBuilding on Success: CS Programs for 2002 [CS
Connection], M-L.G. Piner, Jan., pp. 94-98Board Approves Reading of Bylaws Amendments [CS
Connection], M-L.G. Piner, Jan., pp. 98-99CD-ROM Supplement Provides Demos, Interactive
Tutorials for Computer Graphics Community [CSConnection], M-L.G. Piner, Apr., p. 75
Certification Program Provides Mark of Professionalism[CS Connection], M-L.G. Piner, Apr., pp. 74-75
Chang Chosen IEEE Computer Society President-Elect[Report to Members], M-L.G. Piner, Dec., pp. 73-74
Distance Learning Campus Offers New Courses [CSConnection], M-L.G. Piner, Aug., p. 66
Draft Computer Engineering Curriculum VolumeAvailable for Review [CS Connection], M-L.G. Piner,Sept., p. 76
IEEE Computer Society Election [Nominee Statements],Sept., pp. 62-68
Ten Student Teams Advance to CSIDC World Finals [CS
K.B. McBride, Oct., pp. 108, 106-107Education, EngineeringThe End of Computing Disciplines as We Know Them?
[EIC’s Message], J.A. Aylor, Jan., pp. 4-5, 8Engineering Follies [Opinion], B. Colwell, June, pp. 10-12Electronic Design AutomationPICO: Automatically Designing Custom Computers, V.
Kathail et al., Sept., pp. 39-47Embedded SystemsChoosing the Brain(s) of an Embedded System [Column],
T.M. Conte, July, pp. 106-107A Design Chain for Embedded Systems [Column], G.
Martin and F. Schirrmeister, Mar., pp. 100-103Expanding Automotive Electronic Systems, G. Leen and
D. Heffernan, Jan., pp. 88-93Household Hints for Embedded Systems Designers
[Column], W. Wolf, May, pp. 106-108PICO: Automatically Designing Custom Computers, V.
Kathail et al., Sept., pp. 39-47Reducing SoC Simulation and Development Time, C.
Rowen, Dec., pp. 29-34Smart Cameras as Embedded Systems, W. Wolf et al.,
Sept., pp. 48-53What Is Embedded Computing? [Column], W. Wolf, Jan.,
pp. 136-137Whither Warhol’s Law? [Column], W. Wolf, Sept., pp. 96-97Encryption, see CryptographyEngineeringThe Coolest Thing on Earth [Opinion], B.
Colwell, Nov., pp. 10-12Engineering, Science, and Quantum Mechanics
[Opinion], B. Colwell, Mar., pp. 8-10Entertainment ComputingApplying Mixed Reality to Entertainment
[Column], C. Stapleton et al., Dec., pp. 122-124The Computer Graphics Wars Heat Up
[Column], M. Macedonia, Oct., pp. 97-99The End of Celluloid: Digital Cinema Emerges
[Column], J. Korris and M. Macedonia, Apr., pp. 96-98
Haptics: Gaming’s New Sensation [Column], D. Chang, Aug., pp. 84-86
Home Theater: Not Ready for Prime Time [Column], D.A. Norman, June, pp. 100-102
Linux in Hollywood: A Star Is Born [Column], M. Macedonia, Feb., pp. 112-114
Next Steps for Mobile Entertainment Portals, T.S.Raghu et al., May, pp. 63-70
Tracking Pitches for Broadcast Television, A. Guéziec,Mar., pp. 38-43
FFault ToleranceDenial of Service in Sensor Networks, A.D. Wood et al.,
Oct., pp. 54-62Fiber OpticsDevelopments Could Boost Optical Networks [News],
L.D. Paulson, Mar., p. 28
GGlobal Positioning SystemGPS: Location-Tracking Technology [Column], R. Bajaj
et al., Apr., pp. 92-94Government PolicyDefending Cyberspace [Column], O.S. Saydjari, Dec., p. 125Graph TheoryGenome Sequence Assembly: Algorithms and Issues, M.
Pop et al., July, pp. 47-54The Web and Social Networks, R. Kumar et al., Nov., pp.
32-36Graphical User Interfaces, see User InterfacesGrid ComputingGrid Services for Distributed System Integration, I. Foster
et al., June, pp. 37-46GroupwareA Lightweight Framework for Cross-Application User
Monitoring, K. Fenstermacher and M. Ginsburg, Mar.,pp. 51-59
Next Steps for Mobile Entertainment Portals, T.S. Raghuet al., May, pp. 63-70
Realizing the Benefits of Virtual Teams [Column], C.Steinfield, Mar., pp. 104-106
Connection], M-L.G. Piner, July, pp. 87-88Year in Review [President’s Message], W.K. King, Dec., pp.
10-11IEEE Registration AuthorityIEEE Registration Authority [Column], A.C. Ricketts,
Nov., pp. 113-115Image ProcessingBioSig: An Imaging Bioinformatic System for Studying
Phenomics, B. Parvin et al., July, pp. 65-71Tracking Pitches for Broadcast Television, A. Guéziec,
Mar., pp. 38-43Industry TrendsBull Market for IEEE 802.11 WLAN Chipsets [News], S.J.
Vaughan-Nichols, Nov., pp. 17-19Computer System, Heal Thyself [News], L.D. Paulson,
Aug., pp. 20-22Data Mining for the Corporate Masses? [News], N.
Leavitt, May, pp. 22-24Developing the Distributed Computing OS [News], S.J.
Vaughan-Nichols, Sept., pp. 19-21Do Web Standards and Patents Mix? [News], D. Clark,
Oct., pp. 19-22Is Business Intelligence a Smart Move? [News], S. Ortiz Jr.,
July, pp. 11-14Moving Java into Mobile Phones [News], G. Lawton, June,
pp. 17-20OFDM: Back to the Wireless Future [News], S.J. Vaughan-
Nichols, Dec., pp. 19-21Web Services: Beyond the Hype [News], S.J. Vaughan-
Nichols, Feb., pp. 18-21Information Assurance, see also Security, Data SecurityThe Evolution of Information Assurance, R. Cummings,
Dec., pp. 65-72Toward the Age of Smarter Storage, G.S. Robinson, Dec.,
pp. 35-41Training for Information Assurance, D. Welch et al., Apr.,
pp. 30-37Information RetrievalBioSig: An Imaging Bioinformatic System for Studying
Phenomics, B. Parvin et al., July, pp. 65-71The Emerging Landscape of Bioinformatics Software
Systems [Guest Editors’ Intro: Bioinformatics], L.S.Heath et al., July, pp. 41-45
From Multimedia Retrieval to Knowledge Management,P.J. Moreno et al., Apr., pp. 58-66
The Interspace: Concept Navigation Across DistributedCommunities, B. Schatz, Jan., pp. 54-62
In Search of the Wisdom Web [Guest Editors’ Intro: WebIntelligence], N. Zhong et al., Nov., pp. 27-31
Is Speech Recognition Becoming Mainstream? [GuestEditors’ Intro: Speech Recognition], S. Srinivasan et al.,Apr., pp. 38-41
Lessons in Global Information Technology Sourcing, M.Lacity, Aug., pp. 26-33
Self-Organization and Identification of Web Communities,G.W. Flake et al., Mar., pp. 66-71
Using Coplink to Analyze Criminal-Justice Data, R.V.Hauck et al., Mar., pp. 30-37
Interactive SystemsAutomated Natural Spoken Dialog, A.L. Gorin et al., Apr.,
pp. 51-56Electrophysiologically Interactive Computer Systems, J.
Allanson, Mar., pp. 60-65Interactive TV: VoD Meets the Internet [Column], S.S.Y.
Shim and Y-J. Lee, July, pp. 108-109Interactively Exploring Hierarchical Clustering Results, J.
Seo and B. Shneiderman, July, pp. 80-86A Lightweight Framework for Cross-Application User
Monitoring, K. Fenstermacher and M. Ginsburg, Mar.,pp. 51-59
Interconnect TechnologyAnatomy of a Forward-Looking Open Standard [Column],
S. Fuller and T. Cox, Jan., pp. 140-141Faster Processors with Optical Connections [News], L.D.
Paulson, Feb., p. 27InternetAn Economically Scalable Internet [Column], A.S.
Heddaya, Sept., pp. 93-95The Economics of DSL Regulation, R. Kalakota et al.,
Oct., pp. 29-36End-to-End Testing of IP QoS Mechanisms, F.A. Shaikh et
al., May, pp. 80-87
Free Speech Online and Offline, R. Anderson, June, pp.28-30
Protocol-Related Problem Threatens Internet Security[News], L.D. Paulson, Apr., p. 20
Toward the Mobile Internet [Column], J.F. Huber, Oct.,pp. 100-102
Web Interaction Using Very Small Internet Devices, B.N.Schilit et al., Oct., pp. 37-45
InterspaceThe Interspace: Concept Navigation Across Distributed
Communities, B. Schatz, Jan., pp. 54-62
JJavaMoving Java into Mobile Phones [News], G. Lawton,
June, pp. 17-20JiniJini Home Networking: A Step Toward Pervasive
p. 76Kristen Nygaard, 1926-2002, M-L.G. Piner, Oct., p. 76Object-Oriented ProgrammingThe Chamois Component-Based Knowledge Engineering
Framework, W. Kim et al., May, pp. 46-54A Pattern for Softcoded Values, M. Blaha and C. Smith,
May, pp. 28-34On-to-Knowledge ProjectOntology-Based Knowledge Management, D. Fensel,
Nov., pp. 56-59OntologiesIntegrated Approach to Web Ontology Learning and
Engineering, M. Missikoff, Nov., pp. 60-63Ontology-Based Knowledge Management, D. Fensel,
Nov., pp. 56-59Open Source SoftwareOpen Source Security: Opportunity or Oxymoron?
[News], G. Lawton, Mar., pp. 18-21Optical TechnologyData at the Speed of Light [News], L.D. Paulson, July, p. 21New Optical Clock Could Synchronize Chips [News],
L.D. Paulson, Dec., p. 26A Survey of Storage Options, J.P. Scheible, Dec., pp. 42-46
PParallel ComputingToward New Software for Computational Phylogenetics,
B.M.E. Moret et al., July, pp. 55-64Performance Measurement and EvaluationArchitecture-Level Power Modeling with Wattch
[Sidebar], M. Martonosi et al., Feb., p. 64Asim: A Performance Model Framework, J. Emer et al.,
Feb., pp. 68-75End-to-End Testing of IP QoS Mechanisms, F.A. Shaikh
et al., May, pp. 80-87Performance Simulation Tools [Guest Editors’ Intro: High-
Performance Simulators], S.S. Mukherjee et al., Feb.,pp. 38-39
Rsim: Simulating Shared-Memory Multiprocessors withILP Processors, C.J. Hughes et al., Feb., pp. 40-49
SCinet: Testbed for High-Performance NetworkedApplications, W.T.C. Kramer, June, pp. 47-55
Simics: A Full System Simulation Platform, P.S.Magnusson et al., Feb., pp. 50-58
SimpleScalar: An Infrastructure for Computer SystemModeling, T. Austin et al., Feb., pp. 59-67
PhysicsEngineering, Science, and Quantum Mechanics [Opinion],
B. Colwell, Mar., pp. 8-10Preservation, Digital DocumentIBM Works on a Universal Virtual Computer [News], L.D.
Paulson, Nov., p. 23PrivacyInvasive Software: Who’s Inside Your Computer? [News],
G. Lawton, July, pp. 15-18Security: Technical, Social, and Legal Challenges
[Column], B. Arbaugh, Feb., pp. 109-111Side Effects of Digital Technology [Column], N. Holmes,
Apr. pp. 104, 102-103Toward Adequate Online Privacy and Safeguards
[Column], D.M. Orick, Aug., pp. 92, 90-91Process AutomationE-Business Process Modeling: The Next Big Step, S. Aissi
et al., May, pp. 55-62Professional IssuesComputers, Programming, and People [Column], N.
Holmes, Mar., pp. 112, 110-111
Dimensions [News], L.D. Paulson, Sept., p. 24New Optical Clock Could Synchronize Chips [News],
L.D. Paulson, Dec., p. 26Reducing SoC Simulation and Development Time, C.
Rowen, Dec., pp. 29-34Researchers Bring Wireless Communications to the Chip
[News], L.D. Paulson, Sept., p. 23Startup Wants to Automate Chip Design [News], L.D.
Paulson, Aug., p. 25Whither Warhol’s Law? [Column], W. Wolf, Sept., pp. 96-97Will New Chip Revolutionize Digital Photography?
[News], L.D. Paulson, May, pp. 25-26MiddlewareJini Home Networking: A Step Toward Pervasive
Computing, R. Gupta et al., Aug., pp. 34-40Web Interaction Using Very Small Internet Devices, B.N.
Schilit et al., Oct., pp. 37-45Mobile ComputingEnhanced Service Discovery in Bluetooth [Column], S.
Avancha et al., June, pp. 96-99Mobile Payments [Column], U. Varshney, Dec., pp. 120-121Multicast Support in Mobile Commerce Applications
[Column], U. Varshney, Feb., pp. 115-117Next Steps for Mobile Entertainment Portals, T.S. Raghu
et al., May, pp. 63-70Rover: Scalable Location-Aware Computing, S. Banerjee
et al., Oct., pp. 46-53Thick Clients for Personal Wireless Devices [Column], T.
Starner, Jan., pp. 133-135Will 3G Really Be the Next Big Wireless
Technology? [News], L. Garber, Jan., pp. 26-32Wireless Beyond 3G: Managing Services and
Network Resources [Column], P. Demestichas et al., Aug., pp. 80-82
Modeling, see Process Automation, SimulationMolecular ComputingThe Blueprint for Life?, D.G. Feitelson and M.
Treinin, July, pp. 34-40Computers Are from Mars, Organisms Are from
Venus, J. Kim, July, pp. 25-32MPEG-4MPEG Licensing Dispute Hurts Apple [News],
L.D. Paulson, May, p. 25Multicast CommunicationMulticast Support in Mobile Commerce Applica-
tions [Column], U. Varshney, Feb., pp. 115-117Multimedia Data
From Multimedia Retrieval to Knowledge Management,P.J. Moreno et al., Apr., pp. 58-66
Let’s Hear It for Audio Mining [News], N. Leavitt, Oct.,pp. 23-25
Yima: A Second-Generation Continuous Media Server, C.Shahabi et al., June, pp. 56-64
MultiprocessingSimics: A Full System Simulation Platform, P.S.
Magnusson et al., Feb., pp. 50-58MusicOn Computers and Rock ’n’ Roll [Opinion], B. Colwell,
Feb., pp. 9-11What Technology Is Doing to Music [Opinion], B.
Colwell, July, pp. 6-8
NNanotechnologyNew Nanotech Institute Will Sweat the Small Stuff
[News], L.D. Paulson, Jan., p. 23Natural Language ProcessingFrom Computational Intelligence to Web Intelligence, N.
Cercone et al., Nov., pp. 72-76Integrated Approach to Web Ontology Learning and
Engineering, M. Missikoff, Nov., pp. 60-63Ontology-Based Knowledge Management, D. Fensel,
Nov., pp. 56-59Network Architecture and DesignAn Economically Scalable Internet [Column], A.S.
Heddaya, Sept., pp. 93-95Training for Information Assurance, D. Welch et al., Apr.,
pp. 30-37Network-Attached Storage, see Storage TechnologyNetwork ProtocolsToward the Mobile Internet [Column], J.F. Huber, Oct.,
pp. 100-102
Employee Performance Reviews [Opinion], B. Colwell,Sept., pp. 12-15
Engineering Follies [Opinion], B. Colwell, June, pp. 10-12Free Speech Online and Offline, R. Anderson, June, pp.
28-30If You Didn’t Test It, It Doesn’t Work [Opinion], B.
Colwell, May, pp. 11-13Jobs, Trades, Skills, and the Profession [Column], N.
Holmes, Sept., pp. 104, 102-103The Profession and the World [Column], N. Holmes, Nov.,
pp. 116, 114-115Science-Philosophy Celebrity Death Match [Opinion], B.
Colwell, Dec., pp. 13-15Seven Great Blunders of the Computing World [Column],
N. Holmes, July, pp. 112, 110-111Software Certification Debate: Benefits of Certification, L.
Tripp, June, pp. 31-33Software Certification Debate: Certification Will Do More
Harm Than Good, A. Kolawa, June, pp. 34-35To See Ourselves as Others See Us, N. Holmes, Jan., pp.
144, 142-143Using Language More Responsibly [Column], S. Santana,
Dec., pp. 128, 126-127Would a Digital Brain Have a Mind? [Column], N.
Holmes, May, pp. 112, 110-111ProgrammingComputers, Programming, and People [Column], N.
Holmes, Mar., pp. 112, 110-111Programming LanguagesQ: A Scenario Description Language for Interactive Agents,
T. Ishida, Nov., pp. 42-47Programming Support EnvironmentsA Random Walk Down the Genomes: DNA Evolution in
Valis, S. Paxia et al., July, pp. 73-79Project ManagementPlanning and Executing Time-Bound Projects, E. Miranda,
Mar., pp. 73-79Software System Engineering: A Tutorial, R.H. Thayer, Apr.,
pp. 68-73Protocols, see also Network ProtocolsGrid Services for Distributed System Integration, I. Foster
et al., June, pp. 37-46Mailbox-Based Scheme for Mobile Agent Communi-
cations, J. Cao et al., Sept., pp. 54-60Public Key Infrastructure, see also CryptographyPKI: It’s Not Dead, Just Resting, P. Gutmann, Aug., pp.
41-49
QQuality MetricsBody of Knowledge for Software Quality Measurement,
N.F. Schneidewind, Feb., pp. 77-83Phrenology, Astrology, Risk, and Product Quality
[Opinion], B. Colwell, Jan., pp. 12-14Quality of ServiceDeterministic Preemptive Scheduling of Real-Time Tasks,
L.E. Jackson and G.N. Rouskas, May, pp. 72-79End-to-End Testing of IP QoS Mechanisms, F.A. Shaikh et
al., May, pp. 80-87Wireless Beyond 3G: Managing Services and Network
Resources [Column], P. Demestichas et al., Aug., pp.80-82
Quantum ComputingA Practical Architecture for Reliable Quantum Computers,
M. Oskin et al., Jan., pp. 79-87
RReal-Time SystemsDeterministic Preemptive Scheduling of Real-Time Tasks,
L.E. Jackson and G.N. Rouskas, May, pp. 72-79Yima: A Second-Generation Continuous Media Server, C.
Shahabi et al., June, pp. 56-64Research Initiatives2001 Roadmap for Semiconductors, A. Allan et al., Jan.,
pp. 42-53Risk ManagementManaging Software Security Risks [Column], G. McGraw,
Apr., pp. 99-101Phrenology, Astrology, Risk, and Product Quality
[Opinion], B. Colwell, Jan., pp. 12-14Security: Technical, Social, and Legal Challenges [Column],
B. Arbaugh, Feb., pp. 109-111
SScheduling AlgorithmsDeterministic Preemptive Scheduling of Real-Time Tasks,
L.E. Jackson and G.N. Rouskas, May, pp. 72-79Scientific VisualizationInteractively Exploring Hierarchical Clustering Results, J.
Seo and B. Shneiderman, July, pp. 80-86Security, see also Cryptography, Data Security, Privacy,Public-Key InfrastructureBroadcast Encryption’s Bright Future, J. Lotspiech et al.,
Aug., pp. 57-63Cognitive Hacking: A Battle for the Mind, G. Cybenko et
al., Aug., pp. 50-56Defending Cyberspace [Column], O.S. Saydjari, Dec., p. 125The Evolution of Information Assurance, R. Cummings,
Dec., pp. 65-72Key Snooping Technology Causes Controversy [News],
L.D. Paulson, Mar., p. 27Managing Software Security Risks [Column], G. McGraw,
Apr., pp. 99-101PKI: It’s Not Dead, Just Resting, P. Gutmann, Aug., pp.
41-49Security: Technical, Social, and Legal Challenges
[Column], B. Arbaugh, Feb., pp. 109-111Self-Securing Devices [Sidebar], G. Ganger, Dec., p. 71Technology Standards Pros Aid Homeland Security
[Column], K. McMillan, May, pp. 104-105The Trusted PC: Skin-Deep Security [Column], A.B.
Huang, Oct., pp. 103-105Self-Healing SystemsComputer System, Heal Thyself [News], L.D.
Paulson, Aug., pp. 20-22Semantic Web, see also Agent TechnologyIntegrated Approach to Web Ontology Learning
and Engineering, M. Missikoff et al., Nov., pp.60-63
Ontology-Based Knowledge Management, D.Fensel, Nov., pp. 56-59
Toward Behavioral Intelligence in the SemanticWeb, J.J. Bryson et al., Nov., pp. 48-54
Semiconductor TechnologyDynamic Scan: Driving Down the Cost of Test, S.
Samaranayake et al., Oct., pp. 63-682001 Roadmap for Semiconductors, A. Allan et al.,
Jan., pp. 42-53Sensor NetworksDenial of Service in Sensor Networks, A.D. Wood
and J.A. Stankovic, Oct., pp. 54-62SimulationAsim: A Performance Model Framework, J. Emer et al.,
Feb., pp. 68-76Performance Simulation Tools [Guest Editors’ Intro: High-
Performance Simulators], S.S. Mukherjee et al., Feb.,pp. 38-39
Rsim: Simulating Shared-Memory Multiprocessors withILP Processors, C.J. Hughes et al., Feb., pp. 40-49
Simics: A Full System Simulation Platform, P.S.Magnusson et al., Feb., pp. 50-58
SimpleScalar: An Infrastructure for Computer SystemModeling, T. Austin et al., Feb., pp. 59-67
L.D. Paulson, Dec., p. 25Social IssuesEnter the Dragon: China’s Computer Industry, K. Kraemer
and J. Dedrick, Feb., pp. 28-36The Profession and the World [Column], N. Holmes,
Nov., pp. 116, 114-115Representative Democracy and the Profession [Column],
N. Holmes, Feb., pp. 120, 118-119Rethinking the Digital Divide [Column], L. Briggs and
K.B. McBride, Oct., pp. 108, 106-107Side Effects of Digital Technology [Column], N. Holmes,
Apr. pp. 104, 102-103To See Ourselves as Others See Us [Column], N. Holmes,
Jan., pp. 144, 142-143Using Computers in Our Daily Life [Column], A. Asuaga,
June, pp. 104, 103Using Language More Responsibly [Column], S. Santini,
Dec., pp. 128, 126-127
December 2002 85
86 Computer
[Sidebar], D. Granath, Dec., p. 68-69Storage Topologies, R. Griswold, Dec., pp. 56-63A Survey of Storage Options, J.P. Scheible, Dec., pp. 42-46Surveying Today’s Most Popular Storage Interfaces, M.T.
L.D. Paulson, Apr., p. 21Fibre Channel Delivers, T. Hammond-Doel, Dec., pp. 50-
51FireWire as a Mass-Storage Interface, E. Anderson, Dec.,
pp. 51-52 iSCSI Protocol, T. Clark, Dec., pp. 54-55SCSI: An Enterprise Foundation, H. Mason, Dec., pp. 48-50Self-Securing Devices [Sidebar], G. Ganger, Dec., p. 71Serial ATA, M. Alexenko, Dec., pp. 53-54Storage Area Networks for Business Continuance
Using Virtual Linux Servers [Column], R.L. Norton, Nov.,pp. 106-107
Paulson, Feb., p. 26Virus Wars: Fewer Attacks, New Threats [News}, G.
Lawton, Dec., pp. 22-24Voice Input, see Speech Recognition and Synthesis
WWearable ComputingIBM’s Linux Watch: The Challenge of Miniaturization, C.
Narayanaswami et al., Jan., pp. 33-41Web SearchData Mining for Web Intelligence, J. Han and K.C-C.
Chang, Nov., pp. 64-70From E-Sex to E-Commerce: Web Search Changes
[Column], A. Spink et al., Mar., pp. 107-109Using Knowledge Anchors to Reduce Cognitive Overhead
[Column], S. Ransom and X. Wu, Nov., pp. 111-112The Web and Social Networks, R. Kumar et al., Nov., pp.
32-36Web Interaction Using Very Small Internet Devices, B.N.
Schilit et al., Oct., pp. 37-45Web ServicesChoreographing Web Services [News], L.D. Paulson, Nov.,
p. 25E-Business Process Modeling: The Next Big Step, S. Aissi
et al., May, pp. 55-62Grid Services for Distributed System Integration, I. Foster
et al., June, pp. 37-46Toward Behavioral Intelligence in the Semantic Web, J.J.
Bryson et al., Nov., pp. 48-54Web Services and Context Horizons [Column], C. Shirky,
Sept., pp. 98-100Web Services: Beyond the Hype [News], S.J. Vaughan-
Nichols, Feb., pp. 18-21Web SitesDesigning for Web Site Usability [Column], J. Palmer, July,
pp. 102-103Wireless TechnologyBull Market for IEEE 802.11 WLAN Chipsets [News], S.J.
Vaughan-Nichols, Nov., pp. 17-19Enhanced Service Discovery in Bluetooth [Column], S.
Avancha et al., June, pp. 96-99IBM’s Linux Watch: The Challenge of Miniaturization, C.
Narayanaswami et al., Jan., pp. 33-41Jini Home Networking: A Step Toward Pervasive
Computing, R. Gupta et al., Aug., pp. 34-40Mobile Payments [Column], U. Varshney, Dec., pp. 120-121New Wireless Technology Is in Sight [News], L.D. Paulson,
Apr., p. 22OFDM: Back to the Wireless Future [News], S.I. Vaughan-
Nichols, Dec., pp. 19-21Thick Clients for Personal Wireless Devices [Column], T.
Starner, Jan., pp. 133-135Toward the Mobile Internet [Column], J.F. Huber, Oct.,
pp. 100-102US Approves New Uses for Wireless Technology [News],
L.D. Paulson, May, p. 27Will 3G Really Be the Next Big Wireless Technology?
[News], L. Garber, Jan., pp. 26-32Wireless Beyond 3G: Managing Services and Network
Resources [Column], P. Demestichas et al., Aug., pp.80-82
World Wide WebEfficient Replacement of Nonuniform Objects in Web
Caches, H. Bahn et al., June, pp. 65-73From E-Sex to E-Commerce: Web Search Changes
[Column], A. Spink et al., Mar., pp. 107-109In Search of the Wisdom Web [Guest Editors’ Intro: Web
Intelligence], N. Zhong et al., Nov., pp. 27-31Self-Organization and Identification of Web Communities,
G.W. Flake et al., Mar., pp. 66-71Social Intelligence Design for the Web, T. Nishida, Nov.,
pp. 37-41
AUTHOR INDEX
AAbella, Alicia, see Gorin, A.L., Apr., pp. 51-56Aditya, Shail, see Kathail, V., Sept., pp. 39-47
Adve, Sarita V.see Hughes, C.J., Feb., pp. 40-49see Mukherjee, S.S., Feb., pp. 38-39
Agarwal, Sulabh, see Banerjee, S., Oct., pp. 46-53Agrawal, Dharma P.
see Bajaj, R., Apr., pp. 92-94see Gupta, R., Aug., pp. 34-40
Agrawala, Ashok, see Banerjee, S., Oct., pp. 46-53 Ahuja, Pritpal, see Emer, J., Feb., pp. 68-75Aissi, Selim, Pallavi Malu, and Krishnamurthy Srinivasan,
E-Business Process Modeling: The Next Big Step, May,pp. 55-62
Alexenko, Mike, Serial ATA, Dec., pp. 53-54Allan, Alan et al., 2001 Roadmap for Semiconductor
Technology, Jan., pp. 42-53Allan, James, Knowledge Management and Speech
Recognition [Sidebar], Apr., pp. 60-61Allanson, Jennifer, Electrophysiologically Interactive
Computer Systems, Mar., pp. 60-65Alonso, Tirso, see Gorin, A.L., Apr., pp. 51-56Altman, Marty, see Stapleton, C., Dec., pp. 122-124 Amin, Minesh B., see Samaranayake, S., Oct., pp. 63-68An, Aijun, see Cercone, N., Nov., pp. 72-76Anderson, Eric, FireWire As a Mass-Storage Interface,
Dec., pp. 51-53Anderson, Ross, Free Speech Online and Offline, June, pp.
28-30Arbaugh, Bill
Security: Technical, Social, and Legal Challenges, Feb.,pp. 109-111
Improving the TCPA Specification, Aug., pp. 77-79
Asuaga, Ana, Using Computers in Our Daily Life,June, pp. 104, 103
Atabakhsh, Homa, see Hauck, R.V., Mar., pp. 30-37Austin, Todd, Eric Larson, and Dan Ernst,
SimpleScalar: An Infrastructure for ComputerSystem Modeling, Feb., pp. 59-67see Mukherjee, S.S., Feb., pp. 38-49
Avancha, Sasikanth, Anupam Joshi, and TimothyFinin, Enhanced Service Discovery in Bluetooth,June, pp. 96-99
Aylor, James H.The End of Computing Disciplines as We Know
Them?, Jan., pp. 4-5, 8It Has Been a Great Ride!, Dec., p. 12
BBahn, Hyokyung et al., Efficient Replacement of Non-
uniform Objects in Web Caches, June, pp. 65-73Bajaj, Rashmi, Samantha Lalinda Ranaweera, and
Dharma P. Agrawal, GPS: Location-Tracking Tech-nology, Apr., pp. 92-94
Banerjee, Suman et al., Rover: Scalable Location-AwareComputing, Oct., pp. 46-53
Barcellos-Hoff, Mary Helen, see Parvin, B., July, pp. 65-71Benini, Luca, and Giovanni De Micheli, Networks on
Chips: A New SoC Paradigm, Jan., pp. 70-78Billinghurst, Mark, see Poupyrev, I., Mar., pp. 44-50Bimber, Oliver et al., Merging Fossil Specimens with
Computer-Generated Information, Sept., pp. 25-30Binkert, Nathan, see Emer, J., Feb., pp. 68-75Blaha, Michael, and Cheryl Smith, A Pattern for Softcoded
Values, May, pp. 28-34Boehm, Barry
Get Ready for Agile Methods, with Care, Jan., pp. 64-69see DeMarco, T., June, pp. 90-92
Borch, Eric, see Emer, J., Feb., pp. 68-75Briggs, Laura, and Kari Boyd McBride, Rethinking the
Digital Divide, Oct., pp. 108, 106-107Brooks, David, see M. Martonosi, Feb., p. 64Brown, Eric, see Srinivasan, S., Is Speech Recognition
Becoming Mainstream?, Apr., pp. 38-41Bryson, Joanna J. et al., Toward Behavioral Intelligence
in the Semantic Web, Nov., pp. 48-54
CCao, Jiannong et al., Mailbox-Based Scheme for Mobile
Agent Communications, Sept., pp. 54-60Cercone, Nick et al., From Computational Intelligence to
Web Intelligence, Nov., pp. 72-76
December 2002 87
88 Computer
Flake, Gary William et al., Self-Organization andIdentification of Web Communities, Mar., pp. 66-71
Fontenay, Gerald, see Parvin, B., July, pp. 65-71Forsgren, Daniel, see Magnusson, P.S., Feb., pp. 50-58Foster, Ian et al., Grid Services for Distributed System
Integration, June, pp. 37-46Fu, Kun, see Shahabi, C., June, pp. 56-64, June, pp. 56-64Fuller, Sam, and Tom Cox, Anatomy of a Forward-
Looking Open Standard, Jan., pp. 140-141
GGalliano, Fabio, see Demestichas, P., Aug., pp. 80-82Ganger, Greg, Self-Securing Devices [Sidebar], Dec., p. 71Garber, Lee
Will 3G Really Be the Next Big Wireless Technology?,Jan., pp. 26-32
Romanian Disaster-Response Project Wins DesignCompetition, Aug., pp. 13-15
Gatesy, Stephen M., see Bimber, O., Sept., pp. 25-30Giani, Annarita, see Cybenko, G., Aug., pp. 50-56Giles, C. Lee, see Flake, G.W., Mar., pp. 66-71Ginsburg, Mark, see Fenstermacher, K.D., Mar., pp. 51-59Gorin, Allen L. et al., Automated Natural Spoken Dialog,
Apr., pp. 51-56Granath, Derek, Storage Area Networks for Business
Continuance [Sidebar], Dec., pp. 68-69Griswold, Robert, Storage Topologies, Dec., pp. 56-63Guéziec, André, Tracking Pitches for Broadcast Television,
Mar., pp. 38-43Gundepudi, Pavan, see Kalakota, R., Oct., pp. 29-36Guniguntala, Dinakar, see Narayanaswami, C., Jan., pp.
33-41Gupta, Harsh, see Hauck, R.V., Mar., pp. 30-37Gupta, Rahul, Sumeet Talwar, and Dharma P. Agrawal,
Jini Home Networking: A Step Toward PervasiveComputing, Aug., pp. 34-40
Gutmann, Peter, PKI: It’s Not Dead, Just Resting, Aug.,pp. 41-49
HHallberg, Gustav, see Magnusson, P.S., Feb., pp. 50-58Hammond-Doel, Thomas, Fibre Channel Delivers, Dec.,
pp. 50-51Han, Jiawei, and Kevin Chen-Chuan Chang, Data Mining
for Web Intelligence, Nov., pp. 64-70Hauck, Roslin V. et al., Using Coplink to Analyze
Criminal-Justice Data, Mar., pp. 30-37Heath, Lenwood S., and Naren Ramakrishnan, The
Emerging Landscape of Bioinformatics SoftwareSystems, July, pp. 41-45
Heddaya, Abdelsalam “Solom,” An EconomicallyScalable Internet, Sept., pp. 93-95
Heffernan, Donal, see Leen, G., Jan., pp. 88-93Hilbert, David M., see Schilit, B.N., Oct., pp. 37-45Hogberg, Johan, see Magnusson, P.S., Feb., pp. 50-58Holmes, Neville
To See Ourselves as Others See Us, Jan., pp. 144, 142-143
Representative Democracy and the Profession, Feb., pp.120, 118-119
Computers, Programming, and People, Mar., pp. 112,110-111
Side Effects of Digital Technology, Apr., pp. 104, 102-103
Would a Digital Brain Have a Mind?, May, pp. 112,110-111
Seven Great Blunders of the Computing World, July,pp. 112, 110-111
Jobs, Trades, Skills, and the Profession, Sept., pp. 104,102-103
The Profession and the World, Nov., pp. 116, 114-115Hou, Lijun, see Cercone, N., Nov., pp. 72-76Hu, Xiaohua, see Cercone, N., Nov., pp. 72-76Huang, Andrew “bunnie,” The Trusted PC: Skin-Deep
Security, Oct., pp. 103-105Huber, Josef F., Toward the Mobile Internet, Oct., pp. 100-
102Hughes, Charles, see Stapleton, C., Dec., pp. 122-124Hughes, Christopher J. et al., Rsim: Simulating Shared-
Memory Multiprocessors with ILP Processors, Feb., pp.40-49
Chae, Ki-Joon, see Kim, W., The Chamois Component-Based Knowledge Engineering Framework, May, pp.46-54
Chakravarthy, Sannedhi K., see Shaikh, F.A., May, pp. 80-87Chang, Dean, Haptics: Gaming’s New Sensation, Aug.,
pp. 84-86Chang, Kevin Chen-Chuan, see Han, J., Nov., pp. 64-70Chen, Hsinshun, see Hauck, R.V., Mar., pp. 30-37Cho, Dong-Sub, see Kim, W., May, pp. 46-54Choi, Byoungju, see Kim, W., May, pp. 46-54Chong, Frederic T., see Oskin, M., Jan., pp. 79-87
Christensen, Lars M., see Madsen, J., Nov., pp. 108-110Christensson, Magnus, see Magnusson, P.S., Feb., pp. 50-58Chuang, Isaac L., see Oskin, M., Jan., pp. 79-87Cipolla, Thomas, see Narayanaswami, C., Jan., pp. 33-41Clark, David
Mobile Processors Begin to Grow Up, Mar., pp. 22-25Do Web Standards and Patents Mix?, Oct., pp. 19-22
Clark, Tom, iSCSI Protocol, Dec., pp. 54-55Coetzee, Frans M., see Flake, G.W., Mar., pp. 66-71Colwell, Bob
Phrenology, Astrology, Risk, and Product Quality, Jan.,pp. 12-14
On Computers and Rock ’n’ Roll, Feb., pp. 9-11Engineering, Science, and Quantum Mechanics, Mar.,
pp. 8-10Near Misses: Murphy’s Law Is Wrong, Apr., pp. 9-12
If You Didn’t Test It, It Doesn’t Work, May, pp. 11-13
Engineering Follies, June, pp. 10-12What Technology Is Doing to Music, July, pp. 6-8Weird Books, Aug., pp. 10-12Employee Performance Reviews, Sept., pp. 12-15The Power of the Most Likely, Oct., pp. 12-14The Coolest Thing on Earth, Nov., pp. 10-12Science-Philosophy Celebrity Death Match, Dec.,
pp. 13-15Cox , Tom, see Fuller, S., Jan., pp. 140-141Cronquist, Darren C., see Kathail, V., Sept., pp.
39-47Cummings, Roger, The Evolution of Information
Assurance, Dec., pp. 65-72Cybenko, George, Annarita Giani, and Paul
Thompson, Cognitive Hacking: A Battle for the Mind, Aug., pp. 50-56
DDas, Sajal K., see Cao, J., Sept., pp. 54-60De Micheli, Giovanni, see Benini, L, Jan., pp. 70-78Dedrick, Jason, see Kraemer, K., Feb., pp. 28-36DeMarco, Tom, and Barry Boehm, The Agile Methods
Fray, June, pp. 90-92Demestichas, Panagiotis et al., Wireless Beyond 3G:
Managing Services and Network Resources, Aug., pp.80-82
EEdenfield, Don, see Allan, A., Jan., pp. 42-53Edwards, John, and Linda Dailey Paulson, Smart
Graphics: A New Approach to Meeting User Needs,May, pp. 18-21
Eischen, Kyle, Software Development: An Outsider’s View,May, pp. 36-44
Emer, Joel et al., Asim: A Performance Model Framework,Feb., pp. 68-76
Emer, Joel, see Mukherjee, S.S., Feb., pp. 38-49Encarnacao, L. Miguel, see Bimber, O., Sept., pp. 25-30Ernst, Daniel, see Austin, T., Feb., pp. 59-67Eskilson, Jesper, see Magnusson, P.S., Feb., pp. 50-58Espasa, Roger, see Emer, J., Feb., pp. 68-76
FFeitelson, Dror G., and Millet Treinin, The Blueprint for
Life?, July, pp. 34-40Feng, Xinyu, see Cao, J., Sept., pp. 54-60Fensel, Dieter, Ontology-Based Knowledge Management,
Nov., pp. 56-59Fenstermacher, Kurt D., and Mark Ginsburg, A
Lightweight Framework for Cross-Application UserMonitoring, Mar., pp. 51-59
Finin, Timothy, see Avancha, S., June, pp. 96-99
Huntley, Christopher L., see Lyon, D.A., May, pp. 102-103
IInoue, Tadanobu, see Narayanaswami, C., Jan., pp. 33-41Ishida, Toru, Q: A Scenario Description Language for
Interactive Agents, Nov., pp. 42-47
JJackson, Laura E., and George N. Rouskas, Deterministic
Preemptive Scheduling of Real-Time Tasks, May, pp.72-79
Jansen , Bernard J., see Spink, A., Mar., pp. 107-109Jeong, Anmo, see Kim, W., May, pp. 46-54Jones, Gareth J.F., see Moreno, P.J., Apr., pp. 58-66Joshi, Anupam, see Avancha, S., June, pp. 96-99Joyner Jr., William H., see Allan, A., Jan., pp. 42-53Juan, Toni, see Emer, J., Feb., pp. 68-76
KKahng, Andrew B., see Allan, A., Jan., pp. 42-53Kalakota, Ravi et al., The Economics of DSL Regulation,
Oct., pp. 29-36Kamel, Kevin, see Banerjee, S., Oct., pp. 46-53Kamijoh , Noboru, see Narayanaswami, C., Jan., pp. 33-41Kapur, Rohit, see Samaranayake, S., Oct., pp. 63-68Kathail, Vinod et al., PICO: Automatically Designing
Custom Computers, Sept., pp. 39-47Kato, Kirokazu, see Poupyrev, I., Mar., pp. 44-50Kenneally, Erin, Who’s Liable for Insecure Networks?,
June, pp. 93-95Keselj, Vlado, see Cercone, N., Nov., pp. 72-76 Kesselman, Carl, see Foster, I., June, pp. 37-46Kim, Junhyong, Computers Are from Mars, Organisms
Are from Venus, July, pp. 25-32Kim, Myung, see Kim, W., May, pp. 46-54Kim, Won et al., The Chamois Component-Based
Knowledge Engineering Framework, May, pp. 46-54King, Willis K.
Implementing Our Future Vision in 2002, Jan., pp. 6-8
Year in Review [President’s Message], Dec., pp. 10-11Klauser, Artur, see Emer, J., Feb., pp. 68-75Kochut, Andrzej, see Banerjee, S., Oct., pp. 46-53Koh, Kern, see Bahn, H., June, pp. 65-73Koh, Tzu Khiau, see Schilit, B.N., Oct., pp. 37-45Kolawa, Adam, Software Certification Debate: Certification
Will Do More Harm Than Good, June, pp. 34-35Kommareddy, Christopher, see Banerjee, S., Oct., pp. 46-53Korris, James, and Michael Macedonia, The End of
Celluloid: Digital Cinema Emerges, Apr., pp. 96-98Kraemer, Kenneth, and Jason Dedrick, Enter the Dragon:
China’s Computer Industry, Feb., pp. 28-36Kramer, William T.C., SCinet: Testbed for High-
Performance Networked Applications, June, pp. 47-55Kulkarni, Vishal, see Narayanaswami, C., Jan., pp. 33-41Kumar, Ravi et al., The Web and Social Networks, Nov.,
pp. 32-36
LLacity, Mary, Lessons in Global Information Technology
Sourcing, Aug., pp. 26-33Larsen, Ronald L., see Banerjee, S., Oct., pp. 46-53Larson, Eric, see Austin, T., Feb., pp. 59-67Larsson, Fredrik, see Magnusson, P.S., Feb., pp. 50-58Lawrence, Steve, see Flake, G.W., Mar., pp. 66-71Lawton, George
Open Source Security: Opportunity or Oxymoron?,Mar., pp. 18-21
Moving Java into Mobile Phones, June, pp. 17-20Invasive Software: Who’s Inside Your Computer, July,
pp. 15-18Virus Wars: Fewer Attacks, New Threats, Dec., pp. 22-24
Leavitt, NealData Mining for the Corporate Masses?, May, pp. 22-24Let’s Hear It for Audio Mining, Oct., pp. 23-25
Lee, KiHo, see Kim, W., May, pp. 46-54Lee, Meejeong, see Kim, W., May, pp. 46-54Lee, Sang-Ho, see Kim, W., May, pp. 46-54Lee, Yen-Jen, see Shim, S.S.Y., July, pp. 108-109Leen, Gabriel, and Donal Heffernan, Expanding Auto-
motive Electronic Systems, Jan., pp. 88-93Liu, Jiming, see Zhong, N., Nov., pp. 27-31
LoBue, Michael T., Surveying Today’s Most PopularStorage Interfaces, Dec., pp. 48-55
Logan, Beth, see Moreno, P.J., Apr., pp. 58-66Lotspiech, Jeffrey, Stefan Nusser, and Florian Pestoni,
Broadcast Encryption’s Bright Future, Aug., pp. 57-63Lu, Jian, see Cao, J., Sept., pp. 54-60Luk, Chi-Keung, see Emer, J., Feb., pp. 68-76Lv, Tiehan, see Wolf, W., Sept., pp. 48-53Lyon, Douglas A., and Christopher L. Huntley, There’s More
Than One Way to Build a Bridge, May, pp. 102-103
MMacedonia, Michael
Linux in Hollywood: A Star Is Born, Feb., pp. 112-114see Korris, J., Apr., pp. 96-98The Computer Graphics Wars Heat Up, Oct., pp. 97-99
Madsen, Jan, Jorgen Steensgaard-Madsen, and Lars M.Christensen, A Sophomore Course in Codesign, Nov.,pp. 108-110
Magnusson, Peter S. et al., Simics: A Full SystemSimulation Platform, Feb., pp. 50-58
Magnusson, Peter S., see Mukherjee, S.S., Feb., pp. 38-49Malu, Pallavi, see Aissi, S., May, pp. 55-62Manne, Srilatha, see Emer, J., Feb., pp. 68-76Martin, Grant, and Frank Schirrmeister, A Design Chain
for Embedded Systems, Mar., pp. 100-103Martinez, David L., see Bryson, J.J., Nov., pp. 48-54Martinez, Georges, see Demestichas, P., Aug., pp. 80-82Martonosi, Margaret, David Brooks, and Vivek Tiwari,
Architecture-Level Power Modeling withWattch, Feb., p. 64
Mason, Harry, SCSI: An Enterprise Foundation[Sidebar], Dec., pp. 48-50
Mathieu, Richard G., Top-Down Approach toComputing, Jan., pp. 138-139
McBride, Kari Boyd, see Briggs, L., Oct., pp. 108,106-107
McClellan, Stan, see Shaikh, F.A., May, pp. 80-87McGraw, Gary, Managing Software Security Risks,
Apr., pp. 99-101McIlraith, Sheila A., see Bryson, J.J., Nov., pp. 48-54McMillan, Kate, Technology Standards Pros Aid
Homeland Security, May, pp. 104-105Memon, Atif M., GUI Testing: Pitfalls and Process,
Aug., pp. 87-88Meyer, Bertrand, Assessing a C# Text, Apr., pp. 86-
88Micikevicius, Paulius, see Stapleton, C., Dec., pp. 122-124Min, Sang Lyul, see Bahn, H., June, pp. 65-73Miranda, Eduardo, Planning and Executing Time-Bound
Projects, Mar., pp. 73-79Mishra, Bud, see Paxia, S., July, pp. 73-79Missikoff, Michele, Roberto Navigli, and Paola Velardi,
Integrated Approach to Web Ontology Learning andEngineering, Nov., pp. 60-63
Moestedt, Andreas, see Magnusson, P.S., Feb., pp. 50-58Moreno, Pedro J. et al., From Multimedia Retrieval to
Knowledge Management, Apr., pp. 58-66Moret, Bernard M.E., Li-San Wang, and Tandy Warnow,
Toward New Software for Computational Phyloge-netics, July, pp. 55-64
Moshell, Michael, see Stapleton, C., Dec., pp. 122-124Mukherjee, Shubhendu S., see Emer, J., Feb., pp. 68-76Mukherjee, Shubhendu S. et al., Performance Simulation
Tools, Feb., pp. 38-49
NNadeem, Tamer, see Banerjee, S., Oct., pp. 46-53Narayanaswami, Chandra et al., IBM’s Linux Watch: The
Challenge of Miniaturization, Jan., pp. 33-41Naruedomkul, Kanlaya, see Cercone, N., Nov., pp. 72-76Navigli, Roberto, see Missikoff, M., Nov., pp. 60-63Nick, Jeffrey M., see Foster, I., June, pp. 37-46Nishida, Toyoaki, Social Intelligence Design for the Web,
Nov., pp. 37-41Noh, Sam H., see Bahn, H., June, pp. 65-73Norman, Donald A., Home Theater: Not Ready for Prime
Time, June, pp. 100-102Norton, Roger L., Using Virtual Linux Servers, Nov., pp.
106-107Nusser, Stefan, see Lotspiech, J., Aug., pp. 57-63
December 2002 89
90 Computer
Battling Intrusions with a “Network Telescope,” Nov.,p. 24
Choreographing Web Services, Nov., p. 25Researchers Upgrade Smart Card Technology, Dec., p. 25Blind, Deaf Engineer Develops Computerized Braille
Machine, Dec., p. 27New Optical Clock Could Synchronize Chips, Dec., p. 26Efforts Launched to Improve Network Security Edu-
cation, Dec., p. 26see Edwards, J., Smart Graphics: A New Approach to
Meeting User Needs, May, pp. 18-21Paxia, Salvatore et al., A Random Walk Down the
Genomes: DNA Evolution in Valis, July, pp. 73-79Pestoni, Florian, see Lotspiech, J., Aug., pp. 57-63Picheny, Michael, see Padmanabhan, M., Apr., pp. 42-
50Piner, Mary-Louise G.
Building on Success: CS Programs for 2002, Jan., pp.94-98
Board Approves Reading of Bylaws Amendments, Jan.,pp. 98-99
IEEE Fellows Lead the Engineering Profession, Feb.,pp. 84-85
Fellow Nominations Due 15 March, Feb., pp. 86-87Society Seeks Editor-in-Chief Applicants, Feb., pp. 86-
87Online Courses Offer Members Expert Instruction,
Mar., p. 80Revised Student Competition Offers Opportunity for
Increased Participation, Mar., p. 81Certification Program Provides Mark of Profes-
sionalism, Apr., pp. 74-75CD-ROM Supplement Provides Demos, Interactive
Tutorials for Computer Graphics Community, Apr.,p. 75
Academic Excellence Prize and Best Paper ScholarshipAwarded, Apr., p. 76
Conferences Offer Findings in Both New andTraditional Computing Research Fields, May, pp.92-94
Ten Student Teams Advance to CSIDC World Finals,July, pp. 87-88
Ole-Johan Dahl, 1931-2002, Oct., p. 76Kristen Nygaard, 1926-2002, Oct., p. 76Standards News: PAR 1599 and IEEE 1484.12.1, Oct.,
p. 77Partnership with Wiley Will Showcase Expert Texts,
Nov., p. 80Online Collection Offers Information Technology for
Resource Libraries, Nov., p. 80Recent Awards Reinforce Society’s Commitment to
Service, Teaching, Nov., pp. 82-83Chang Chosen IEEE Computer Society President-Elect
[Report to Members], Dec., pp. 73-74Pop, Mihai, Steven L. Salzberg, and Martin Shumway,
Genome Sequence Assembly: Algorithms and Issues,July, pp. 47-54
Potlapally, Nachiketh, Optical Fingerprinting to ProtectData: A Proposal, Apr., pp. 23-28
Poupyrev, Ivan et al. , Developing a Generic Augmented-Reality Interface, Mar., pp. 44-50
RRaghavan, Prabhakar, see Kumar, R., Nov., pp. 32-36Raghu, T.S., R. Ramesh, and Andrew B. Winston, Next
Steps for Mobile Entertainment Portals, May, pp. 63-70
Raghunath, Mandayan, see Narayanaswami, C., Jan., pp.33-41
Ragsdale, Daniel, see Welch, D., Apr., pp. 30-37Rai, Arun, see Kalakota, R., Oct., pp. 29-36Rajagopalan, Sridhar, see Kumar, R., Nov., pp. 32-36Ramakrishnan, Naren, see Heath, L.S., July, pp. 41-45Ramesh, R., see Raghu, T.S., May, pp. 63-70Ranaweera, Samantha Lalinda, see Bajaj, R., Apr., pp. 92-
94Ranganathan, Parthasarathy, see Hughes, C.J., Feb., pp.
40-49Ransom, Stephen, and Xindong Wu, Using Knowledge
Anchors to Reduce Cognitive Overhead, Nov., pp. 111-112
Raskar, Ramesh, see Bimber, O., Sept., pp. 25-30
OOngvasith, Pichai, see Hauck, R.V., Mar., pp. 30-37Orick, Diana Mayer, Toward Adequate Online Privacy,
Aug.pp. 92, 90-91Ortiz Jr., Sixto, Is Business Intelligence a Smart Move?,
July, pp. 11-14Oskin, Mark, Frederic T. Chong, and Isaac L. Chuang, A
Practical Architecture for Reliable QuantumComputers, Jan., pp. 79-87
Pai, Vijay S., see Hughes, C.J., Feb., pp. 40-49Palmer, Jonathan, Designing for Web Site Usability, July,
pp. 102-103Papadopoulou, Louisa, see Demestichas, P., Aug., pp. 80-
82 Park, Seung-Soo, see Kim, W., May, pp. 46-54Parvin, Bahram et al., BioSig: An Imaging Bioinformatic
System for Studying Phenomics, July, pp. 65-71Patil, Harish, see Emer, J., Feb., pp. 68-76Paulson, Linda Dailey
Alliance Seeks Streaming-Media Standard, Jan., pp. 22-23
New Nanotech Institute Will Sweat the Small Stuff,Jan., p. 23
Wanted: More Network-Security Graduates and Research, Feb., pp. 22-24
IBM Begins Autonomic-Computing Project, Feb.,p. 25
Malicious Code Hits Instant Messaging, Feb., p. 26
Faster Processors with Optical Connections, Feb.,p. 27
Key Snooping Technology Causes Controversy, Mar., p. 27
Developments Could Boost Optical Networks, Mar., p. 28
Adding a Third Dimension to Chips, Mar., p. 29Faster RAM Tackles Data and Marketplace
Bottlenecks, Apr., pp. 17-19Protocol-Related Problem Threatens Internet
Security, Apr., p. 20Faster Storage Connectivity Technologies
Emerge, Apr., p. 21New Wireless Technology Is in Sight, Apr., p. 22MPEG Licensing Dispute Hurts Apple, May, p. 25Will New Chip Revolutionize Digital Photography?,
May, pp. 25-26US Approves New Uses for Wireless Technology, May,
p. 27Little Chips Promise Big Power, June, p. 25Bioinformatics Experiences Important Breakthroughs,
June, pp. 26-27Company Unveils Holographic DVD for 3D Storage,
June, p. 27Taking a Graphical Approach to the Password, July, p. 19Improvements Stream into Multimedia Technology,
July, pp. 20-21Data at the Speed of Light, July, p. 21Computer System, Heal Thyself, Aug., pp. 20-22Distributed Storage Challenges Data Glut, Aug., p. 23Professors Use Technology to Fight Plagiarism, Aug.,
pp. 24 -25Startup Wants to Automate Chip Design, Aug., p. 25Tiny “Punch Cards” Boost Storage Capacity, Sept., p.
22Researchers Bring Wireless Communications to the
Chip, Sept., p. 23New Chips Will Help Computers Visualize in Three
Dimensions, Sept., p. 24Project Promises Accessible Technology for the Dis-
abled, Oct., p. 26Two Efforts Aim to Upgrade Mobile Memory, Oct., p. 27Prime Breakthrough May Improve Encryption, Oct., p.
28Stopping Intruders Outside the Gates, Nov., pp. 20-22IBM Works on a Universal Virtual Computer, Nov., p.
23
Rau, B. Ramakrishna, see Kathail, V., Sept., pp. 39-47Regenbrecht, Holger, see Poupyrev, I., Mar., pp. 44-50Riccardi, Giuseppe, see Gorin, A.L., Apr., pp. 51-56Ricketts, Anita C., IEEE Registration Authority, Nov., pp.
113-115Rigden, Christine, Now You See It, Now You Don’t, July,
pp. 104-105Robinson, Gary S., Toward the Age of Smarter Storage,
Dec., pp. 35-41Rodgers, Mike, see Allan, A., Jan., pp. 42-53Rouskas, George N., see Jackson, L.E., May, pp. 72-79Rowen, Chris, Reducing SoC Simulation and Development
Time, Dec., pp. 29-34Rudra, Archisman, see Paxia, S., July, pp. 73-79
SSalzberg, Steve L., see Pop, M., July, pp. 47-54Samaranayake, Samitha et al., Dynamic Scan: Driving
Down the Cost of Test, Oct., pp. 63-68Sanford , Jim, see Narayanaswami, C., Jan., pp. 33-41Santini, Simone, Using Language More Responsibly, Dec.,
pp. 128, 126-127Saracevic, Tefko, see Spink, A., Mar., pp. 107-109Schatz, Bruce R., The Interspace: Concept Navigation
Across Distributed Communities, Jan., pp. 54-62Scheible, John P., A Survey of Storage Options, Dec., pp.
42-46Schepens, Wayne, see Welch, D., Apr., pp. 30-37Schilit, Bill N. et al., Web Interaction Using Very Small
Internet Devices, Oct., pp. 37-45Schirrmeister, Frank, see Martin, G., Mar., pp. 100-103Schlig, Eugene, see Narayanaswami, C., Jan., pp. 33-41Schneiderman, Ben, see Seo, J., July, pp. 80-86Schneidewind, Norman F., Body of Knowledge for
Software Quality Measurement, Feb., pp. 77-83Schreiber, Robert, see Kathail, V., Sept., pp. 39-47Seo, Jinwook, and Ben Schneiderman, Interactively Ex-
ploring Hierarchical Clustering Results, July, pp. 80-86Shahabi, Cyrus et al., Yima: A Second-Generation
Continuous Media Server, June, pp. 56-64Shaikh, Fayaz A. et al, End-to-End Testing of IP QoS
Mechanisms, May, pp. 80-87Shankar, A. Uddaya, see Banerjee, S., Oct., pp. 46-53Shim, Simon S.Y., and Yen-Jen Lee, Interactive TV: VoD
Meets the Internet, July, pp. 108-109Shirky, Clay, Web Services and Context Horizons, Sept.,
pp. 98-100Shumway, Martin, see Pop, M., July, pp. 47-54Singh, Manpreet, see Shaikh, F.A., End-to-End Testing of
IP QoS Mechanisms, May, pp. 80-87Sitchinava, Nodari, see Samaranayake, S., Oct., pp. 63-
68Sivaraman, Mukund, see Kathail, V., Sept., pp. 39-47Smith, Cheryl, see Blaha, M., May, pp. 28-34Spink, Amanda et al., From E-Sex to E-Commerce: Web
Search Changes, Mar., pp. 107-109Srinivasan, Krishnamurthy, see Aissi, S., May, pp. 55-62Srinivasan, Savitha, and Eric Brown, Is Speech Recognition
Becoming Mainstream, Apr., pp. 38-41Stankovic, John A., see Wood, A.D., Oct., pp. 54-62Stapleton, Christopher et al., Applying Mixed Reality to
Entertainment, Dec., pp. 122-124Starner, Thad, Thick Clients for Personal Wireless Devices,
Jan., pp. 133-135Stavroulaki, Vera, see Demestichas, P., Aug., pp. 80-82Steensgaard-Madsen, Jørgen, see Madsen, J., Nov., pp.
108-110Stein, Lynn Andrea, see Bryson, J.J., Nov., pp. 48-54Steinfield, Charles, Realizing the Benefits of Virtual Teams,
Mar., pp. 104-106Strom, Darrel, see Walrad, C., Sept., pp. 31-38
TTalwar, Sumeet, see Gupta, R., Aug., pp. 34-40Tan, Desney S., see Poupyrev, I., Mar., pp. 44-50Tetsutani, Nobuji, see Poupyrev, I., Mar., pp. 44-50Thakkar, Pankaj, see Banerjee, S., Oct., pp. 46-53Thayer, Richard H., Software System Engineering: A
Tutorial, Apr., pp. 68-73Theologou, Michael, see Demestichas, P., Aug., pp. 80-
82Thompson, Paul, see Cybenko, G., Aug., pp. 50-56
Tiwari, Vivek, see M. Martonosi, Feb., p. 64Tomkins, Andrew, see Kumar, R., Nov., pp. 32-36Treinin, Millet, see Feitelson, D.G., July, pp. 34-40Trevor, Jonathan, see Schilit, B.N., Oct., pp. 37-45Trinh, Bao, see Banerjee, S., Oct., pp. 46-53Tripp, Leonard L., Software Certification Debate: Benefits
of Certification, June, pp. 31-33Tuecke, Steven, see Foster, I., June, pp. 37-46
VVan Thong, J-M., see Moreno, P.J., Apr., pp. 58-66Varshney, Upkar, Multicast Support in Mobile Commerce
Applications, Feb., pp. 115-117Vaughan-Nichols, Steven J.
Web Services: Beyond the Hype, Feb., pp. 18-21Will 10-Gigabit Ethernet Have a Bright Future, June,
pp. 22-24Developing the Distributed Computing OS, Sept., pp.
19-21Bull Market for IEEE 802.11 WLAN Chipsets, Nov.,
pp. 17-19OFDM: Back to the Wireless Future, Dec., pp. 19-21
Velardi, Paola, see Missikoff, M., Nov., pp. 60-63Vivier, Guillaume, see Demestichas, P., Aug., pp. 80-82
WWallace, Steven, see Emer, J., Feb., pp. 68-76Walrad, Chuck, and Darrel Strom, The Importance of
Branching Models in SCM, Sept., pp. 31-38Wang, Li-San, see Moret, B.M.E., July, pp. 55-64Wareham, Jonathan, see Kalakota, R., Oct., pp. 29-
36Warnow, Tandy, see Moret, B.M.E., July, pp. 55-64Welch, Donald, Daniel Ragsdale, and Wayne
Schepens, Training for Information Assurance,Apr., pp. 30-37
Welke, Richard, see Kalakota, R., Oct., pp. 29-36Werner, Bengt, see Magnusson, P.S., Feb., pp. 50-
58Whinston, Andrew B., see Raghu, T.S., May, pp.
63-70Williams, Thomas W., see Samaranayake, S., Oct.,
pp. 63-68Witmer, Lawrence M., see Bimber, O., Sept., pp.
25-30Wolf, Wayne
What Is Embedded Computing?, Jan., pp. 136-137
Household Hints for Embedded Systems Designers,May, pp. 106-108
Whither Warhol’s Law?, Sept., pp. 96-97Wolf, Wayne, Burak Ozer, and Tiehan Lv, Smart Cameras
as Embedded Systems, Sept., pp. 48-53Wolfram, Dietmar, see Spink, A., From E-Sex to E-
Commerce: Web Search Changes, Mar., pp. 107-109Wood, Anthony D., and John A. Stankovic, Denial of
Service in Sensor Networks, Oct., pp. 54-62Wright, Jeremy H., see Gorin, A.L., Automated Natural
Spoken Dialog, Apr., pp. 51-56Wu, Xindong, see Ransom, S., Nov., pp. 111-112
YYamazaki, Kazuhiko, see Narayanaswami, C., Jan., pp.
33-41Yang, Qing, see Parvin, B., July, pp. 65-71Yao, Shu-Yuen Didi, see Shahabi, C., June, pp. 56-64Yong, Hwan-Seung, see Kim, W., May, pp. 46-54Youssef, Adel, see Banerjee, S., Oct., pp. 46-53Youssef, Moustafa, see Banerjee, S., Oct., pp. 46-53
ZZhong, Ning, Jiming Liu, and Yiyu Yao, In Search of the
Wisdom Web, Nov., pp. 27-31Zhou, Yi, see Paxia, S., July, pp. 73-79Zimmermann, Roger, see Shahabi, C., June, pp. 56-64Zorian, Yervant, see Allan, A., Jan., pp. 42-53