The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.12 - December (2002 vol.35)
pp: 80-91
Published by the IEEE Computer Society

SUBJECT INDEX

A
Agent Technology

In Search of the Wisdom Web [Guest Editors' Intro: Web Intelligence], N. Zhong et al., Nov., pp. 27-31;

Mailbox-Based Scheme for Mobile Agent Communications, J. Cao et al., Sept., pp. 54-60;

Q: A Scenario Description Language for Interactive Agents, T. Ishida, Nov., pp. 42-47;

Social Intelligence Design for the Web, T. Nishida, Nov., pp. 37-41;

Toward Behavioral Intelligence in the Semantic Web, J.J. Bryson et al., Nov., pp. 48-54

Agile Software Development

The Agile Methods Fray [Column], T. DeMarco and B. Boehm, June, pp. 90-92;

Get Ready for Agile Methods, with Care, B. Boehm, Jan., pp. 64-69

Algorithms

Computers Are from Mars, Organisms Are from Venus, J. Kim, July, pp. 25-32;

Efficient Replacement of Nonuniform Objects in Web Caches, H. Bahn et al., June, pp. 65-73;

Large-Vocabulary Speech Recognition Algorithms, M. Padmanabhan and M. Picheny, Apr., pp. 42-50;

Next Steps for Mobile Entertainment Portals, T.S. Raghu et al., May, pp. 63-70;

The Web and Social Networks, R. Kumar et al., Nov., pp. 32-36

see also Scheduling Algorithms
Artificial Intelligence

From Computational Intelligence to Web Intelligence, N. Cercone, Nov., pp. 72-76;

Social Intelligence Design for the Web, T. Nishida, Nov., pp. 37-41;

Toward Behavioral Intelligence in the Semantic Web, J.J. Bryson et al., Nov., pp. 48-54;

Would a Digital Brain Have a Mind? [Column], N. Holmes, May, pp. 112, 110-111

Assistive Technologies for Persons with Disabilities

Blind, Deaf Engineer Develops Computerized Braille Machine [News], L.D. Paulson, Dec., p. 27;

Now You See It, Now You Don't [Column], C. Rigden, July, pp. 104-105;

Project Promises Accessible Technology for the Disabled [News], L.D. Paulson, Oct., p. 26

Augmented Reality

Applying Mixed Reality to Entertainment [Column], C. Stapleton et al., Dec., pp. 122-124;

Developing a Generic Augmented-Reality Interface, I. Poupyrev et al., Mar., pp. 44-50;

Merging Fossil Specimens with Computer-Generated Information, O. Bimber et al., Sept., pp. 25-30

Authentication

PKI: It's Not Dead, Just Resting, P. Gutmann, Aug., pp. 41-49;

Taking a Graphical Approach to the Password [News], L.D. Paulson, July, p. 19

Automotive Electronics

Expanding Automotive Electronic Systems, G. Leen and D. Heffernan, Jan., pp. 88-93

Autonomic Computing

Computer System, Heal Thyself [News], L.D. Paulson, Aug., pp. 20-22;

IBM Begins Autonomic-Computing Project [News], L.D. Paulson, Feb., p. 25;

In Search of the Wisdom Web [Guest Editors' Intro: Web Intelligence], N. Zhong et al., Nov., pp. 27-31

Awards

Academic Excellence Prize and Best Paper Scholarship Awarded [CS Connection], M-L.G. Piner, Apr., p. 76;

High School Student from China Receives IEEE Computer Society Prize [CS Connection], M-L.G. Piner, Aug., pp. 64-65;

IEEE CS Recognizes Achievements of Leading Computer Engineers [CS Connection], M-L.G. Piner, June, pp. 74-76;

IEEE Fellows Lead the Engineering Profession [CS Connection], M-L.G. Piner, Feb., pp. 84-85;

Recent Awards Reinforce Society's Commitment to Service, Teaching [CS Connection], M-L.G. Piner, Nov., pp. 82-83;

Romanian Disaster-Response Project Wins Design Competition [News], L. Garber, Aug., pp. 13-15

B
Bioinformatics

Bioinformatics Experiences Important Breakthroughs [News], L.D. Paulson, June, pp. 26-27;

BioSig: An Imaging Bioinformatic System for Studying Phenomics, B. Parvin et al., July, pp. 65-71;

The Blueprint for Life?, D.G. Feitelson and M. Treinin, July, pp. 34-40;

Computers Are from Mars, Organisms Are from Venus, J. Kim, July, pp. 25-32;

The Emerging Landscape of Bioinformatics Software Systems [Guest Editors' Intro: Bioinformatics], L.S. Heath and N. Ramakrishnan, July, pp. 41-45;

Genome Sequence Assembly: Algorithms and Issues, M. Pop et al., July, pp. 47-54;

Interactively Exploring Hierarchical Clustering Results, J. Seo and B. Shneiderman, July, pp. 80-86;

A Random Walk Down the Genomes: DNA Evolution in Valis, S. Paxia et al., July, pp. 73-79;

Toward New Software for Computational Phylogenetics, B.M.E. Moret et al., July, pp. 55-64

Bluetooth

Enhanced Service Discovery in Bluetooth [Column], S. Avancha et al., June, pp. 96-99

Book Reviews

Assessing a C# Text [Column], B. Meyer, Apr., pp. 86-88;

Science-Philosophy Celebrity Death Match [Opinion], B. Colwell, Dec., pp. 13-15;

Weird Books [Opinion], B. Colwell, Aug., pp. 10-12

C
Cache Memory

Efficient Replacement of Nonuniform Objects in Web Caches, H. Bahn et al., June, pp. 65-73

Certification, Software

Software Certification Debate: Benefits of Certification, L. Tripp, June, pp. 31-33;

Software Certification Debate: Certification Will Do More Harm Than Good, A. Kolawa, June, pp. 34-35

China, Computer Industry in

Enter the Dragon: China's Computer Industry, K. Kraemer and J. Dedrick, Feb., pp. 28-36

Client-Server Computing

Rover: Scalable Location-Aware Computing, S. Banerjee et al., Oct., pp. 46-53;

Thick Clients for Personal Wireless Devices [Column], T. Starner, Jan., pp. 133-135;

Using Virtual Linux Servers [Column], R.L. Norton, Nov., pp. 106-107;

Yima: A Second-Generation Continuous Media Server, C. Shahabi et al., June, pp. 56-64

Codes

Seven Great Blunders of the Computing World [Column], N. Holmes, July, pp. 112, 110-111

Codesign, Hardware-Software

Networks on Chips: A New SoC Paradigm, L. Benini and G. DeMicheli, Jan., pp. 70-78;

A Sophomore Course in Codesign [Column], J. Madsen et al., Nov., pp. 108-110

Computational Biology
see Bioinformatics
Computer Architecture

PICO: Automatically Designing Custom Computers, V. Kathail et al., Sept., pp. 39-47;

A Practical Architecture for Reliable Quantum Computers, M. Oskin et al., Jan., pp. 79-87;

SimpleScalar: An Infrastructure for Computer System Modeling, T. Austin et al., Feb., pp. 59-67;

Whither Warhol's Law? [Column], W. Wolf, Sept., pp. 96-97

Computer Crime

Cognitive Hacking: A Battle for the Mind, G. Cybenko et al., Aug., pp. 50-56

Computer Games

The Computer Graphics Wars Heat Up [Column], M. Macedonia, Oct., pp. 97-99;

Haptics: Gaming's New Sensation [Column], D. Chang, Aug., pp. 84-86;

Next Steps for Mobile Entertainment Portals, T.S. Raghu et al., May, pp. 63-70

Computer Graphics

The Computer Graphics Wars Heat Up [Column], M. Macedonia, Oct., pp. 97-99;

Linux in Hollywood: A Star Is Born [Column], M. Macedonia, Feb., pp. 112-114;

Merging Fossil Specimens with Computer-Generated Information, O. Bimber et al., Sept., pp. 25-30;

Smart Graphics: A New Approach to Meeting User Needs [News], J. Edwards and L.D. Paulson, May, pp. 18-21;

Tracking Pitches for Broadcast Television, A. Guéziec, Mar., pp. 38-43

Computer Industry

Enter the Dragon: China's Computer Industry, K. Kraemer and J. Dedrick, Feb., pp. 28-36

Computer Networks

SCinet: Testbed for High-Performance Networked Applications, W.T.C. Kramer, June, pp. 47-55;

Wireless Beyond 3G: Managing Services and Network Resources [Column], P. Demestichas et al., Aug., pp. 80-82

see also Internet, World Wide Web
Computer Vision

Smart Cameras as Embedded Systems, W. Wolf et al., Sept., pp. 48-53

Configurable Processors
see Microprocessors
Copy Protection

Broadcast Encryption's Bright Future, J. Lotspiech et al., Aug., pp. 57-63;

Optical Fingerprinting to Protect Data: A Proposal, N. Potlapally, Apr., pp. 23-28

Cryptography

Broadcast Encryption's Bright Future, J. Lotspiech et al., Aug., pp. 57-63;

Optical Fingerprinting to Protect Data: A Proposal, N. Potlapally, Apr., pp. 23-28;

PKI: It's Not Dead, Just Resting, P. Gutmann, Aug., pp. 41-49;

Prime Breakthrough May Improve Encryption [News], L.D. Paulson, Oct., p. 28

D
Data Communications

The Economics of DSL Regulation, R. Kalakota et al., Oct., pp. 29-36

Data Mining

The Chamois Component-Based Knowledge Engineering Framework, W. Kim et al., May, pp. 46-54;

Data Mining for the Corporate Masses? [News], N. Leavitt, May, pp. 22-24;

Data Mining for Web Intelligence, J. Han and K.C-C. Chang, Nov., pp. 64-70;

The Emerging Landscape of Bioinformatics Software Systems [Guest Editors' Intro: Bioinformatics], L.S. Heath et al., July, pp. 41-45;

Interactively Exploring Hierarchical Clustering Results, J. Seo and B. Shneiderman, July, pp. 80-86;

Is Business Intelligence a Smart Move? [News], S. Ortiz Jr., July, pp. 11-14;

Let's Hear It for Audio Mining [News], N. Leavitt, Oct., pp. 23-25

Data Modeling

BioSig: An Imaging Bioinformatic System for Studying Phenomics, B. Parvin et al., July, pp. 65-71;

A Pattern for Softcoded Values, M. Blaha and C. Smith, May, pp. 28-34;

A Random Walk Down the Genomes: DNA Evolution in Valis, S. Paxia et al., July, pp. 73-79

Data Security

Open Source Security: Opportunity or Oxymoron? [News], G. Lawton, Mar., pp. 18-21;

Optical Fingerprinting to Protect Data: A Proposal, N. Potlapally, Apr., pp. 23-28;

Security: Technical, Social, and Legal Challenges [Column], B. Arbaugh, Feb., pp. 109-111;

Training for Information Assurance, D. Welch et al., Apr., pp. 30-37;

Who's Liable for Insecure Networks? [Column], E. Kenneally, June, pp. 93-95

Database Management Systems
see Information Retrieval
Design Engineering

Near Misses: Murphy's Law Is Wrong [Opinion], B. Colwell, Apr., pp. 9-12;

PICO: Automatically Designing Custom Computers, V. Kathail et al., Sept., pp. 39-47;

The Power of the Most Likely [Opinion], B. Colwell, Oct., pp. 12-14

see also Engineering
Design-for-Test Technology
see Testing
Distance Learning

Rethinking the Digital Divide [Column], L. Briggs and K.B. McBride, Oct., pp. 108, 106-107

Distributed Systems

Developing the Distributed-Computing OS [News], S.J. Vaughan-Nichols, Sept., pp. 19-21;

Grid Services for Distributed System Integration, I. Foster et al., June, pp. 37-46;

Mailbox-Based Scheme for Mobile Agent Communications, J. Cao et al., Sept., pp. 54-60

DNA Computing
see Molecular Computing
E
E-Commerce

E-Business Process Modeling: The Next Big Step, S. Aissi et al., May, pp. 55-62;

Mobile Payments [Column], U. Varshney, Dec., pp. 120-121;

Multicast Support in Mobile Commerce Applications [Column], U. Varshney, Feb., pp. 115-117

Economics

An Economically Scalable Internet [Column], A.S. Heddaya, Sept., pp. 93-95;

The Economics of DSL Regulation, R. Kalakota et al., Oct., pp. 29-36

Education, Computer and Information Science

Efforts Launched to Improve Network Security Education [News], L.D. Paulson, Dec., p. 26;

The End of Computing Disciplines as We Know Them? [EIC's Message], J.A. Aylor, Jan., pp. 4-5, 8;

A Sophomore Course in Codesign [Column], J. Madsen et al., Nov., pp. 108-110;

Software Certification Debate: Benefits of Certification, L. Tripp, June, pp. 31-33;

Software Certification Debate: Certification Will Do More Harm Than Good, A. Kolawa, June, pp. 34-35;

Software Development: An Outsider's View, K. Eischen, May, pp. 36-44;

Wanted: More Network-Security Graduates and Research [News], L.D. Paulson, Feb., pp. 22-24

Education, Computer Uses in

Professors Use Technology to Fight Plagiarism [News], L.D. Paulson, Aug., pp. 24 -25;

Rethinking the Digital Divide [Column], L. Briggs and K.B. McBride, Oct., pp. 108, 106-107

Education, Engineering

The End of Computing Disciplines as We Know Them? [EIC's Message], J.A. Aylor, Jan., pp. 4-5, 8;

Engineering Follies [Opinion], B. Colwell, June, pp. 10-12

Electronic Design Automation

PICO: Automatically Designing Custom Computers, V. Kathail et al., Sept., pp. 39-47

Embedded Systems

Choosing the Brain(s) of an Embedded System [Column], T.M. Conte, July, pp. 106-107;

A Design Chain for Embedded Systems [Column], G. Martin and F. Schirrmeister, Mar., pp. 100-103;

Expanding Automotive Electronic Systems, G. Leen and D. Heffernan, Jan., pp. 88-93;

Household Hints for Embedded Systems Designers [Column], W. Wolf, May, pp. 106-108;

PICO: Automatically Designing Custom Computers, V. Kathail et al., Sept., pp. 39-47;

Reducing SoC Simulation and Development Time, C. Rowen, Dec., pp. 29-34;

Smart Cameras as Embedded Systems, W. Wolf et al., Sept., pp. 48-53;

What Is Embedded Computing? [Column], W. Wolf, Jan., pp. 136-137;

Whither Warhol's Law? [Column], W. Wolf, Sept., pp. 96-97

Encryption
see Cryptography
Engineering

The Coolest Thing on Earth [Opinion], B. Colwell, Nov., pp. 10-12;

Engineering, Science, and Quantum Mechanics [Opinion], B. Colwell, Mar., pp. 8-10

Entertainment Computing

Applying Mixed Reality to Entertainment [Column], C. Stapleton et al., Dec., pp. 122-124;

The Computer Graphics Wars Heat Up [Column], M. Macedonia, Oct., pp. 97-99;

The End of Celluloid: Digital Cinema Emerges [Column], J. Korris and M. Macedonia, Apr., pp. 96-98;

Haptics: Gaming's New Sensation [Column], D. Chang, Aug., pp. 84-86;

Home Theater: Not Ready for Prime Time [Column], D.A. Norman, June, pp. 100-102;

Linux in Hollywood: A Star Is Born [Column], M. Macedonia, Feb., pp. 112-114;

Next Steps for Mobile Entertainment Portals, T.S. Raghu et al., May, pp. 63-70;

Tracking Pitches for Broadcast Television, A. Guéziec, Mar., pp. 38-43

F
Fault Tolerance

Denial of Service in Sensor Networks, A.D. Wood et al., Oct., pp. 54-62

Fiber Optics

Developments Could Boost Optical Networks [News], L.D. Paulson, Mar., p. 28

G
Global Positioning System

GPS: Location-Tracking Technology [Column], R. Bajaj et al., Apr., pp. 92-94

Government Policy

Defending Cyberspace [Column], O.S. Saydjari, Dec., p. 125

Graph Theory

Genome Sequence Assembly: Algorithms and Issues, M. Pop et al., July, pp. 47-54;

The Web and Social Networks, R. Kumar et al., Nov., pp. 32-36

Graphical User Interfaces
see User Interfaces
Grid Computing

Grid Services for Distributed System Integration, I. Foster et al., June, pp. 37-46

Groupware

A Lightweight Framework for Cross-Application User Monitoring, K. Fenstermacher and M. Ginsburg, Mar., pp. 51-59;

Next Steps for Mobile Entertainment Portals, T.S. Raghu et al., May, pp. 63-70;

Realizing the Benefits of Virtual Teams [Column], C. Steinfield, Mar., pp. 104-106;

Social Intelligence Design for the Web, T. Nishida, Nov., pp. 37-41

H
Handheld Devices

Web Interaction Using Very Small Internet Devices, B.N. Schilit et al., Oct., pp. 37-45

Haptic Interfaces

Haptics: Gaming's New Sensation [Column], D. Chang, Aug., pp. 84-86

High-Performance Computing

Asim: A Performance Model Framework, J. Emer et al., Feb., pp. 68-76;

Performance Simulation Tools [Guest Editors' Intro: High-Performance Simulators], S.S. Mukherjee et al., Feb., pp. 38-39;

Rsim: Simulating Shared-Memory Multiprocessors with ILP Processors, C.J. Hughes et al., Feb., pp. 40-49;

SCinet: Testbed for High-Performance Networked Applications, W.T.C. Kramer, June, pp. 47-55;

Simics: A Full System Simulation Platform, P.S. Magnusson et al., Feb., pp. 50-58;

SimpleScalar: An Infrastructure for Computer System Modeling, T. Austin et al., Feb., pp. 59-67

Home Networking

Jini Home Networking: A Step toward Pervasive Computing, R. Gupta et al., Aug., pp. 34-40

Human Genome Project

Genome Sequence Assembly: Algorithms and Issues, M. Pop et al., July, pp. 47-54

Human-Computer Interaction

Developing a Generic Augmented-Reality Interface, I. Poupyrev et al., Mar., pp. 44-50;

A Lightweight Framework for Cross-Application User Monitoring, K. Fenstermacher and M. Ginsburg, Mar., pp. 51-59

Hypertext

Self-Organization and Identification of Web Communities, G.W. Flake et al., Mar., pp. 66-71;

Using Knowledge Anchors to Reduce Cognitive Overhead [Column], S. Ransom et al., Nov., pp. 111-112;

The Web and Social Networks, R. Kumar et al., Nov., pp. 32-36

I
IBM Computers

IBM's Linux Watch: The Challenge of Miniaturization, C. Narayanaswami et al., Jan., pp. 33-41

IEEE Computer Society

Building on Success: CS Programs for 2002 [CS Connection], M-L.G. Piner, Jan., pp. 94-98;

Board Approves Reading of Bylaws Amendments [CS Connection], M-L.G. Piner, Jan., pp. 98-99;

CD-ROM Supplement Provides Demos, Interactive Tutorials for Computer Graphics Community [CS Connection], M-L.G. Piner, Apr., p. 75;

Certification Program Provides Mark of Professionalism [CS Connection], M-L.G. Piner, Apr., pp. 74-75;

Chang Chosen IEEE Computer Society President-Elect [Report to Members], M-L.G. Piner, Dec., pp. 73-74;

Distance Learning Campus Offers New Courses [CS Connection], M-L.G. Piner, Aug., p. 66;

Draft Computer Engineering Curriculum Volume Available for Review [CS Connection], M-L.G. Piner, Sept., p. 76;

IEEE Computer Society Election [Nominee Statements], Sept., pp. 62-68;

IEEE President-Elect Candidates Address Computer Society Concerns [CS Connection], Sept., pp. 70-75;

Implementing Our Future Vision in 2002 [CS President's Message], W.K. King, Jan., pp. 6-8;

Online Collection Offers Information Technology for Resource Libraries [CS Connection], M-L.G. Piner, Nov., p. 80;

Online Courses Offer Members Expert Instruction [CS Connection], M-L.G. Piner, Mar., p. 80;

Partnership with Wiley Will Showcase Expert Texts [CS Connection], M-L.G. Piner, Nov., p. 80;

Revised Student Competition Offers Opportunity for Increased Participation [CS Connection], M-L.G. Piner, Mar., p. 81;

Ten Student Teams Advance to CSIDC World Finals [CS Connection], M-L.G. Piner, July, pp. 87-88;

Year in Review [President's Message], W.K. King, Dec., pp. 10-11

IEEE Registration Authority

IEEE Registration Authority [Column], A.C. Ricketts, Nov., pp. 113-115

Image Processing

BioSig: An Imaging Bioinformatic System for Studying Phenomics, B. Parvin et al., July, pp. 65-71;

Tracking Pitches for Broadcast Television, A. Guéziec, Mar., pp. 38-43

Industry Trends

Bull Market for IEEE 802.11 WLAN Chipsets [News], S.J. Vaughan-Nichols, Nov., pp. 17-19;

Computer System, Heal Thyself [News], L.D. Paulson, Aug., pp. 20-22;

Data Mining for the Corporate Masses? [News], N. Leavitt, May, pp. 22-24;

Developing the Distributed Computing OS [News], S.J. Vaughan-Nichols, Sept., pp. 19-21;

Do Web Standards and Patents Mix? [News], D. Clark, Oct., pp. 19-22;

Is Business Intelligence a Smart Move? [News], S. Ortiz Jr., July, pp. 11-14;

Moving Java into Mobile Phones [News], G. Lawton, June, pp. 17-20;

OFDM: Back to the Wireless Future [News], S.J. Vaughan-Nichols, Dec., pp. 19-21;

Web Services: Beyond the Hype [News], S.J. Vaughan-Nichols, Feb., pp. 18-21

Information Assurance

The Evolution of Information Assurance, R. Cummings, Dec., pp. 65-72;

Toward the Age of Smarter Storage, G.S. Robinson, Dec., pp. 35-41;

Training for Information Assurance, D. Welch et al., Apr., pp. 30-37

see also Security, Data Security
Information Retrieval

BioSig: An Imaging Bioinformatic System for Studying Phenomics, B. Parvin et al., July, pp. 65-71;

The Emerging Landscape of Bioinformatics Software Systems [Guest Editors' Intro: Bioinformatics], L.S. Heath et al., July, pp. 41-45;

From Multimedia Retrieval to Knowledge Management, P.J. Moreno et al., Apr., pp. 58-66;

The Interspace: Concept Navigation Across Distributed Communities, B. Schatz, Jan., pp. 54-62;

In Search of the Wisdom Web [Guest Editors' Intro: Web Intelligence], N. Zhong et al., Nov., pp. 27-31;

Is Speech Recognition Becoming Mainstream? [Guest Editors' Intro: Speech Recognition], S. Srinivasan et al., Apr., pp. 38-41;

Lessons in Global Information Technology Sourcing, M. Lacity, Aug., pp. 26-33;

Self-Organization and Identification of Web Communities, G.W. Flake et al., Mar., pp. 66-71;

Using Coplink to Analyze Criminal-Justice Data, R.V. Hauck et al., Mar., pp. 30-37

Interactive Systems

Automated Natural Spoken Dialog, A.L. Gorin et al., Apr., pp. 51-56;

Electrophysiologically Interactive Computer Systems, J. Allanson, Mar., pp. 60-65;

Interactive TV: VoD Meets the Internet [Column], S.S.Y. Shim and Y-J. Lee, July, pp. 108-109;

Interactively Exploring Hierarchical Clustering Results, J. Seo and B. Shneiderman, July, pp. 80-86;

A Lightweight Framework for Cross-Application User Monitoring, K. Fenstermacher and M. Ginsburg, Mar., pp. 51-59

Interconnect Technology

Anatomy of a Forward-Looking Open Standard [Column], S. Fuller and T. Cox, Jan., pp. 140-141;

Faster Processors with Optical Connections [News], L.D. Paulson, Feb., p. 27

Internet

An Economically Scalable Internet [Column], A.S. Heddaya, Sept., pp. 93-95;

The Economics of DSL Regulation, R. Kalakota et al., Oct., pp. 29-36;

End-to-End Testing of IP QoS Mechanisms, F.A. Shaikh et al., May, pp. 80-87;

Free Speech Online and Offline, R. Anderson, June, pp. 28-30;

Protocol-Related Problem Threatens Internet Security [News], L.D. Paulson, Apr., p. 20;

Toward the Mobile Internet [Column], J.F. Huber, Oct., pp. 100-102;

Web Interaction Using Very Small Internet Devices, B.N. Schilit et al., Oct., pp. 37-45

Interspace

The Interspace: Concept Navigation Across Distributed Communities, B. Schatz, Jan., pp. 54-62

J
Java

Moving Java into Mobile Phones [News], G. Lawton, June, pp. 17-20

Jini

Jini Home Networking: A Step Toward Pervasive Computing, R. Gupta et al., Aug., pp. 34-40

K
Knowledge Management

The Chamois Component-Based Knowledge Engineering Framework, W. Kim et al., May, pp. 46-54;

From Multimedia Retrieval to Knowledge Management, P.J. Moreno et al., Apr., pp. 58-66;

Knowledge Management and Speech Recognition, J. Allan [Sidebar], Apr., pp. 60-61;

Using Coplink to Analyze Criminal-Justice Data, R.V. Hauck et al., Mar., pp. 30-37;

Using Knowledge Anchors to Reduce Cognitive Overhead, S. Ransom and X. Wu, Nov., pp. 111-112

L
Legal Applications

Using Coplink to Analyze Criminal-Justice Data, R.V. Hauck et al., Mar., pp. 30-37

Legal Issues

Do Web Standards and Patents Mix? [News], D. Clark, Oct., pp. 29-36;

The Economics of DSL Regulation, R. Kalakota et al., Oct., pp. 19-22;

Free Speech Online and Offline, R. Anderson, June, pp. 28-30;

Security: Technical, Social, and Legal Challenges [Column], B. Arbaugh, Feb., pp. 109-111;

Who's Liable for Insecure Networks? [Column], E. Kenneally, June, pp. 93-95

Linux

IBM's Linux Watch: The Challenge of Miniaturization, C. Narayanaswami et al., Jan., pp. 33-41;

Linux in Hollywood: A Star Is Born [Column], M. Macedonia, Feb., pp. 112-114;

Using Virtual Linux Servers [Column], R.L. Norton, Nov., pp. 106-107

Location-Aware Computing

GPS: Location-Tracking Technology [Column], R. Bajaj et al., Apr., pp. 92-94;

Rover: Scalable Location-Aware Computing, S. Banerjee et al., Oct., pp. 46-53

M
Machine Learning

Integrated Approach to Web Ontology Learning and Engineering, M. Missikoff, Nov., pp. 60-63

Machine Translation

From Computational Intelligence to Web Intelligence, N. Cercone et al., Nov., pp. 72-76

Management, Business

Lessons in Global Information Technology Sourcing, M. Lacity, Aug., pp. 26-33

Microprocessors

Adding a Third Dimension to Chips [News], L.D. Paulson, Mar., p. 29;

Little Chips Promise Big Power [News], L.D. Paulson, June, p. 25;

Mobile Processors Begin to Grow Up [News], D. Clark, Mar., pp. 22-25;

Networks on Chips: A New SoC Paradigm, L. Benini and G. DeMicheli, Jan., pp. 70-78;

New Chips Will Help Computers Visualize in Three Dimensions [News], L.D. Paulson, Sept., p. 24;

New Optical Clock Could Synchronize Chips [News], L.D. Paulson, Dec., p. 26;

Reducing SoC Simulation and Development Time, C. Rowen, Dec., pp. 29-34;

Researchers Bring Wireless Communications to the Chip [News], L.D. Paulson, Sept., p. 23;

Startup Wants to Automate Chip Design [News], L.D. Paulson, Aug., p. 25;

Whither Warhol's Law? [Column], W. Wolf, Sept., pp. 96-97;

Will New Chip Revolutionize Digital Photography? [News], L.D. Paulson, May, pp. 25-26

Middleware

Jini Home Networking: A Step Toward Pervasive Computing, R. Gupta et al., Aug., pp. 34-40;

Web Interaction Using Very Small Internet Devices, B.N. Schilit et al., Oct., pp. 37-45

Mobile Computing

Enhanced Service Discovery in Bluetooth [Column], S. Avancha et al., June, pp. 96-99;

Mobile Payments [Column], U. Varshney, Dec., pp. 120-121;

Multicast Support in Mobile Commerce Applications [Column], U. Varshney, Feb., pp. 115-117;

Next Steps for Mobile Entertainment Portals, T.S. Raghu et al., May, pp. 63-70;

Rover: Scalable Location-Aware Computing, S. Banerjee et al., Oct., pp. 46-53;

Thick Clients for Personal Wireless Devices [Column], T. Starner, Jan., pp. 133-135;

Will 3G Really Be the Next Big Wireless Technology? [News], L. Garber, Jan., pp. 26-32;

Wireless Beyond 3G: Managing Services and Network Resources [Column], P. Demestichas et al., Aug., pp. 80-82

Modeling
see Process Automation, Simulation
Molecular Computing

The Blueprint for Life?, D.G. Feitelson and M. Treinin, July, pp. 34-40;

Computers Are from Mars, Organisms Are from Venus, J. Kim, July, pp. 25-32

MPEG-4

MPEG Licensing Dispute Hurts Apple [News], L.D. Paulson, May, p. 25

Multicast Communication

Multicast Support in Mobile Commerce Applications [Column], U. Varshney, Feb., pp. 115-117

Multimedia Data

From Multimedia Retrieval to Knowledge Management, P.J. Moreno et al., Apr., pp. 58-66;

Let's Hear It for Audio Mining [News], N. Leavitt, Oct., pp. 23-25;

Yima: A Second-Generation Continuous Media Server, C. Shahabi et al., June, pp. 56-64

Multiprocessing

Simics: A Full System Simulation Platform, P.S. Magnusson et al., Feb., pp. 50-58

Music

On Computers and Rock 'n' Roll [Opinion], B. Colwell, Feb., pp. 9-11;

What Technology Is Doing to Music [Opinion], B. Colwell, July, pp. 6-8

N
Nanotechnology

New Nanotech Institute Will Sweat the Small Stuff [News], L.D. Paulson, Jan., p. 23

Natural Language Processing

From Computational Intelligence to Web Intelligence, N. Cercone et al., Nov., pp. 72-76;

Integrated Approach to Web Ontology Learning and Engineering, M. Missikoff, Nov., pp. 60-63;

Ontology-Based Knowledge Management, D. Fensel, Nov., pp. 56-59

Network Architecture and Design

An Economically Scalable Internet [Column], A.S. Heddaya, Sept., pp. 93-95;

Training for Information Assurance, D. Welch et al., Apr., pp. 30-37

Network-Attached Storage
see Storage Technology
Network Protocols

Toward the Mobile Internet [Column], J.F. Huber, Oct., pp. 100-102

Network Security

Battling Intrusions with a "Network Telescope" [News], L.D. Paulson, Nov., p. 24;

Denial of Service in Sensor Networks, A.D. Wood et al., Oct., pp. 54-62;

Efforts Launched to Improve Network Security Education [News], L.D. Paulson, Dec., p. 26;

Stopping Intruders Outside the Gates [News], L.D. Paulson, Nov., pp. 20-22

see also Security
O
Obituaries

John Cocke, 1925-2002, M-L.G. Piner, Aug., p. 66;

Ole-Johan Dahl, 1931-2002, M-L.G. Piner, Oct., p. 76;

Edsger Wybe Dijkstra, 1930-2002, M-L.G. Piner, Sept., p. 76;

Kristen Nygaard, 1926-2002, M-L.G. Piner, Oct., p. 76

Object-Oriented Programming

The Chamois Component-Based Knowledge Engineering Framework, W. Kim et al., May, pp. 46-54;

A Pattern for Softcoded Values, M. Blaha and C. Smith, May, pp. 28-34

On-to-Knowledge Project

Ontology-Based Knowledge Management, D. Fensel, Nov., pp. 56-59

Ontologies

Integrated Approach to Web Ontology Learning and Engineering, M. Missikoff, Nov., pp. 60-63;

Ontology-Based Knowledge Management, D. Fensel, Nov., pp. 56-59

Open Source Software

Open Source Security: Opportunity or Oxymoron? [News], G. Lawton, Mar., pp. 18-21

Optical Technology

Data at the Speed of Light [News], L.D. Paulson, July, p. 21;

New Optical Clock Could Synchronize Chips [News], L.D. Paulson, Dec., p. 26;

A Survey of Storage Options, J.P. Scheible, Dec., pp. 42-46

P
Parallel Computing

Toward New Software for Computational Phylogenetics, B.M.E. Moret et al., July, pp. 55-64

Performance Measurement and Evaluation

Architecture-Level Power Modeling with Wattch [Sidebar], M. Martonosi et al., Feb., p. 64;

Asim: A Performance Model Framework, J. Emer et al., Feb., pp. 68-75;

End-to-End Testing of IP QoS Mechanisms, F.A. Shaikh et al., May, pp. 80-87;

Performance Simulation Tools [Guest Editors' Intro: High-Performance Simulators], S.S. Mukherjee et al., Feb., pp. 38-39;

Rsim: Simulating Shared-Memory Multiprocessors with ILP Processors, C.J. Hughes et al., Feb., pp. 40-49;

SCinet: Testbed for High-Performance Networked Applications, W.T.C. Kramer, June, pp. 47-55;

Simics: A Full System Simulation Platform, P.S. Magnusson et al., Feb., pp. 50-58;

SimpleScalar: An Infrastructure for Computer System Modeling, T. Austin et al., Feb., pp. 59-67

Physics

Engineering, Science, and Quantum Mechanics [Opinion], B. Colwell, Mar., pp. 8-10

Preservation, Digital Document

IBM Works on a Universal Virtual Computer [News], L.D. Paulson, Nov., p. 23

Privacy

Invasive Software: Who's Inside Your Computer? [News], G. Lawton, July, pp. 15-18;

Security: Technical, Social, and Legal Challenges [Column], B. Arbaugh, Feb., pp. 109-111;

Side Effects of Digital Technology [Column], N. Holmes, Apr. pp. 104, 102-103;

Toward Adequate Online Privacy and Safeguards [Column], D.M. Orick, Aug., pp. 92, 90-91

Process Automation

E-Business Process Modeling: The Next Big Step, S. Aissi et al., May, pp. 55-62

Professional Issues

Computers, Programming, and People [Column], N. Holmes, Mar., pp. 112, 110-111;

Employee Performance Reviews [Opinion], B. Colwell, Sept., pp. 12-15;

Engineering Follies [Opinion], B. Colwell, June, pp. 10-12;

Free Speech Online and Offline, R. Anderson, June, pp. 28-30;

If You Didn't Test It, It Doesn't Work [Opinion], B. Colwell, May, pp. 11-13;

Jobs, Trades, Skills, and the Profession [Column], N. Holmes, Sept., pp. 104, 102-103;

The Profession and the World [Column], N. Holmes, Nov., pp. 116, 114-115;

Science-Philosophy Celebrity Death Match [Opinion], B. Colwell, Dec., pp. 13-15;

Seven Great Blunders of the Computing World [Column], N. Holmes, July, pp. 112, 110-111;

Software Certification Debate: Benefits of Certification, L. Tripp, June, pp. 31-33;

Software Certification Debate: Certification Will Do More Harm Than Good, A. Kolawa, June, pp. 34-35;

To See Ourselves as Others See Us, N. Holmes, Jan., pp. 144, 142-143;

Using Language More Responsibly [Column], S. Santana, Dec., pp. 128, 126-127;

Would a Digital Brain Have a Mind? [Column], N. Holmes, May, pp. 112, 110-111

Programming

Computers, Programming, and People [Column], N. Holmes, Mar., pp. 112, 110-111

Programming Languages

Q: A Scenario Description Language for Interactive Agents, T. Ishida, Nov., pp. 42-47

Programming Support Environments

A Random Walk Down the Genomes: DNA Evolution in Valis, S. Paxia et al., July, pp. 73-79

Project Management

Planning and Executing Time-Bound Projects, E. Miranda, Mar., pp. 73-79;

Software System Engineering: A Tutorial, R.H. Thayer, Apr., pp. 68-73

Protocols

Grid Services for Distributed System Integration, I. Foster et al., June, pp. 37-46;

Mailbox-Based Scheme for Mobile Agent Communications, J. Cao et al., Sept., pp. 54-60

see also Network Protocols
Public Key Infrastructure

PKI: It's Not Dead, Just Resting, P. Gutmann, Aug., pp. 41-49

see also Cryptography
Q
Quality Metrics

Body of Knowledge for Software Quality Measurement, N.F. Schneidewind, Feb., pp. 77-83;

Phrenology, Astrology, Risk, and Product Quality [Opinion], B. Colwell, Jan., pp. 12-14

Quality of Service

Deterministic Preemptive Scheduling of Real-Time Tasks, L.E. Jackson and G.N. Rouskas, May, pp. 72-79;

End-to-End Testing of IP QoS Mechanisms, F.A. Shaikh et al., May, pp. 80-87;

Wireless Beyond 3G: Managing Services and Network Resources [Column], P. Demestichas et al., Aug., pp. 80-82

Quantum Computing

A Practical Architecture for Reliable Quantum Computers, M. Oskin et al., Jan., pp. 79-87

R
Real-Time Systems

Deterministic Preemptive Scheduling of Real-Time Tasks, L.E. Jackson and G.N. Rouskas, May, pp. 72-79;

Yima: A Second-Generation Continuous Media Server, C. Shahabi et al., June, pp. 56-64

Research Initiatives

2001 Roadmap for Semiconductors, A. Allan et al., Jan., pp. 42-53

Risk Management

Managing Software Security Risks [Column], G. McGraw, Apr., pp. 99-101;

Phrenology, Astrology, Risk, and Product Quality [Opinion], B. Colwell, Jan., pp. 12-14;

Security: Technical, Social, and Legal Challenges [Column], B. Arbaugh, Feb., pp. 109-111

S
Scheduling Algorithms

Deterministic Preemptive Scheduling of Real-Time Tasks, L.E. Jackson and G.N. Rouskas, May, pp. 72-79

Scientific Visualization

Interactively Exploring Hierarchical Clustering Results, J. Seo and B. Shneiderman, July, pp. 80-86

Security

Broadcast Encryption's Bright Future, J. Lotspiech et al., Aug., pp. 57-63;

Cognitive Hacking: A Battle for the Mind, G. Cybenko et al., Aug., pp. 50-56;

Defending Cyberspace [Column], O.S. Saydjari, Dec., p. 125;

The Evolution of Information Assurance, R. Cummings, Dec., pp. 65-72;

Key Snooping Technology Causes Controversy [News], L.D. Paulson, Mar., p. 27;

Managing Software Security Risks [Column], G. McGraw, Apr., pp. 99-101;

PKI: It's Not Dead, Just Resting, P. Gutmann, Aug., pp. 41-49;

Security: Technical, Social, and Legal Challenges [Column], B. Arbaugh, Feb., pp. 109-111;

Self-Securing Devices [Sidebar], G. Ganger, Dec., p. 71;

Technology Standards Pros Aid Homeland Security [Column], K. McMillan, May, pp. 104-105;

The Trusted PC: Skin-Deep Security [Column], A.B. Huang, Oct., pp. 103-105

see also Cryptography, Data Security, Privacy, Public-Key Infrastructure
Self-Healing Systems

Computer System, Heal Thyself [News], L.D. Paulson, Aug., pp. 20-22

Semantic Web

Integrated Approach to Web Ontology Learning and Engineering, M. Missikoff et al., Nov., pp. 60-63;

Ontology-Based Knowledge Management, D. Fensel, Nov., pp. 56-59;

Toward Behavioral Intelligence in the Semantic Web, J.J. Bryson et al., Nov., pp. 48-54

see also Agent Technology
Semiconductor Technology

Dynamic Scan: Driving Down the Cost of Test, S. Samaranayake et al., Oct., pp. 63-68;

2001 Roadmap for Semiconductors, A. Allan et al., Jan., pp. 42-53

Sensor Networks

Denial of Service in Sensor Networks, A.D. Wood and J.A. Stankovic, Oct., pp. 54-62

Simulation

Asim: A Performance Model Framework, J. Emer et al., Feb., pp. 68-76;

Performance Simulation Tools [Guest Editors' Intro: High-Performance Simulators], S.S. Mukherjee et al., Feb., pp. 38-39;

Rsim: Simulating Shared-Memory Multiprocessors with ILP Processors, C.J. Hughes et al., Feb., pp. 40-49;

Simics: A Full System Simulation Platform, P.S. Magnusson et al., Feb., pp. 50-58;

SimpleScalar: An Infrastructure for Computer System Modeling, T. Austin et al., Feb., pp. 59-67

Smart Cards

Researchers Upgrade Smart Card Technology [News], L.D. Paulson, Dec., p. 25

Social Issues

Enter the Dragon: China's Computer Industry, K. Kraemer and J. Dedrick, Feb., pp. 28-36;

The Profession and the World [Column], N. Holmes, Nov., pp. 116, 114-115;

Representative Democracy and the Profession [Column], N. Holmes, Feb., pp. 120, 118-119;

Rethinking the Digital Divide [Column], L. Briggs and K.B. McBride, Oct., pp. 108, 106-107;

Side Effects of Digital Technology [Column], N. Holmes, Apr. pp. 104, 102-103;

To See Ourselves as Others See Us [Column], N. Holmes, Jan., pp. 144, 142-143;

Using Computers in Our Daily Life [Column], A. Asuaga, June, pp. 104, 103;

Using Language More Responsibly [Column], S. Santini, Dec., pp. 128, 126-127

Social Networks

The Web and Social Networks, R. Kumar et al., Nov., pp. 32-36

Software Architecture

Rover: Scalable Location-Aware Computing, S. Banerjee et al., Oct., pp. 46-53

Software Configuration Management

The Importance of Branching Models in SCM, C. Walrad et al., Sept., pp. 31-38

Software Engineering

The Agile Methods Fray [Column], T. DeMarco and B. Boehm, June, pp. 90-92;

Body of Knowledge for Software Quality Measurement, N.F. Schneidewind, Feb., pp. 77-83;

Get Ready for Agile Methods, with Care, B. Boehm, Jan., pp. 64-69;

Household Hints for Embedded Systems Designers [Column], W. Wolf, May, pp. 106-108;

Managing Software Security Risks [Column], G.W. McGraw, Apr., pp. 99-101;

Software Development: An Outsider's View, K. Eischen, May, pp. 36-44;

Software System Engineering: A Tutorial, R.H. Thayer, Apr., pp. 68-73;

There's More Than One Way to Build a Bridge [Column], D.A. Lyon and C.L. Huntley, May, pp. 102-103

Software Testing

If You Didn't Test It, It Doesn't Work [Opinion], B. Colwell, May, pp. 11-13

Speech Recognition and Synthesis

Automated Natural Spoken Dialog, A. Gorin et al., Apr., pp. 51-56;

From Multimedia Retrieval to Knowledge Management, P. Moreno et al., Apr., pp. 58-66;

Is Speech Recognition Becoming Mainstream? [Guest Editors' Intro: Speech Recognition], S. Srinivasan and E. Brown, Apr., pp. 38-41;

Knowledge Management and Speech Recognition [Sidebar], J. Allan, Apr., pp. 60-61;

Large-Vocabulary Speech Recognition Algorithms, M. Padmanabhan and M. Picheny, Apr., pp. 42-50

Standards

Anatomy of a Forward-Looking Open Standard [Column], S. Fuller and T. Cox, Jan., pp. 140-141;

Do Web Standards and Patents Mix? [News], D. Clark, Oct., pp. 19-22;

Home Theater: Not Ready for Prime Time [Column], D.A. Norman, June, pp. 100-102;

IEEE Registration Authority [Column], A.C. Ricketts, Nov., pp. 113-115;

Software System Engineering: A Tutorial, R.H. Thayer, Apr., pp. 68-73;

Standards News: PAR 1599 and IEEE 1484.12.1 [CS Connection], M-L.G. Piner, Oct., p. 77;

Technology Standards Pros Aid Homeland Security [Column], K. McMillan, May, pp. 104-105;

Toward the Age of Smarter Storage, G.S. Robinson, Dec., pp. 35-41;

Will 10-Gigabit Ethernet Have a Bright Future? [News], S.J. Vaughan-Nichols, June, pp. 22-24

Storage Technology

Company Unveils Holographic DVD for 3D Storage [News], L.D. Paulson, June, p. 27;

Distributed Storage Challenges Data Glut [News], L.D. Paulson, Aug., p. 23;

The Evolution of Information Assurance, R. Cummings, Dec., pp. 65-72;

Faster RAM Tackles Data and Marketplace Bottlenecks [News], L.D. Paulson, Apr., pp. 17-19;

Faster Storage Connectivity Technologies Emerge [News], L.D. Paulson, Apr., p. 21;

Fibre Channel Delivers, T. Hammond-Doel, Dec., pp. 50-51;

FireWire as a Mass-Storage Interface, E. Anderson, Dec., pp. 51-52 ;

iSCSI Protocol, T. Clark, Dec., pp. 54-55;

SCSI: An Enterprise Foundation, H. Mason, Dec., pp. 48-50;

Self-Securing Devices [Sidebar], G. Ganger, Dec., p. 71;

Serial ATA, M. Alexenko, Dec., pp. 53-54;

Storage Area Networks for Business Continuance [Sidebar], D. Granath, Dec., p. 68-69;

Storage Topologies, R. Griswold, Dec., pp. 56-63;

A Survey of Storage Options, J.P. Scheible, Dec., pp. 42-46;

Surveying Today's Most Popular Storage Interfaces, M.T. LoBue, Dec., pp. 48-55;

Tiny "Punch Cards" Boost Storage Capacity [News], L.D. Paulson, Sept., p. 22;

Toward the Age of Smarter Storage, G.S. Robinson, Dec., pp. 35-41;

Two Efforts Aim to Upgrade Mobile Memory [News], L.D. Paulson, Oct., p. 27

Streaming Media

Alliance Seeks Streaming-Media Standard [News], L.D. Paulson, Jan., pp. 22-23;

Improvements Stream into Multimedia Technology [News], L.D. Paulson, July, pp. 20-21;

Yima: A Second-Generation Continuous Media Server, C. Shahabi et al., June, pp. 56-64

System-on-Chip Technology

A Design Chain for Embedded Systems [Column], G. Martin and F. Schirrmeister, Mar., pp. 100-103;

Networks on Chips: A New SoC Paradigm, L. Benini and G. DeMicheli, Jan., pp. 70-78;

Reducing SoC Simulation and Development Time, C. Rowen, Dec., pp. 29-34

Systems Engineering

Choosing the Brain(s) of an Embedded System [Column], T.M. Conte, July, pp. 106-107;

Software System Engineering: A Tutorial, R.H. Thayer, Apr., pp. 68-73;

Top-Down Approach to Computing, R. Mathieu, Jan., pp. 138-139

T
Technological Forecasting

The Interspace: Concept Navigation Across Distributed Communities, B.R. Schatz, Jan., pp. 54-62;

Large-Vocabulary Speech Recognition Algorithms, M. Padmanabhan and M. Picheny, Apr., pp. 42-50

Telecommunications Industry

The Economics of DSL Regulation, R. Kalakota et al., Oct., pp. 29-36

Testing

Dynamic Scan: Driving Down the Cost of Test, S. Samaranayake et al., Oct., pp. 63-68

see also Software Testing
Training

Training for Information Assurance, D. Welch et al., Apr., pp. 30-37

Tree of Life Project

Toward New Software for Computational Phylogenetics, B.M.E. Moret et al., July, pp. 55-64

Trust

Cognitive Hacking: A Battle for the Mind, G. Cybenko et al., Aug., pp. 50-56;

Improving the TCPA Specification [Column], B. Arbaugh, Aug., pp. 77-79;

The Trusted PC: Skin-Deep Security [Column], A.B. Huang, Oct., pp. 103-105

U
User Interfaces

Automated Natural Spoken Dialog, A. Gorin et al., Apr., pp. 51-56;

Designing for Web Site Usability [Column], J. Palmer, July, pp. 102-103;

Developing a Generic Augmented-Reality Interface, I. Poupyrev et al., Mar., pp. 44-50;

Electrophysiologically Interactive Computer Systems, J. Allanson, Mar., pp. 60-65;

GUI Testing: Pitfalls and Process [Column], A.M. Memon, Aug., pp. 87-88;

Is Speech Recognition Becoming Mainstream? [Guest Editors' Intro: Speech Recognition], S. Srinivasan and E. Brown, Apr., pp. 38-41;

A Lightweight Framework for Cross-Application User Monitoring, K. Fenstermacher and M. Ginsburg, Mar., pp. 51-59

see also Haptic Interfaces
V
Video on Demand
see Interactive Systems
Virtual Machines

Using Virtual Linux Servers [Column], R.L. Norton, Nov., pp. 106-107

Virus, Computer

Malicious Code Hits Instant Messaging [News], L.D. Paulson, Feb., p. 26;

Virus Wars: Fewer Attacks, New Threats [News}, G. Lawton, Dec., pp. 22-24

Voice Input
see Speech Recognition and Synthesis
W
Wearable Computing

IBM's Linux Watch: The Challenge of Miniaturization, C. Narayanaswami et al., Jan., pp. 33-41

Web Search

Data Mining for Web Intelligence, J. Han and K.C-C. Chang, Nov., pp. 64-70;

From E-Sex to E-Commerce: Web Search Changes [Column], A. Spink et al., Mar., pp. 107-109;

Using Knowledge Anchors to Reduce Cognitive Overhead [Column], S. Ransom and X. Wu, Nov., pp. 111-112;

The Web and Social Networks, R. Kumar et al., Nov., pp. 32-36;

Web Interaction Using Very Small Internet Devices, B.N. Schilit et al., Oct., pp. 37-45

Web Services

Choreographing Web Services [News], L.D. Paulson, Nov., p. 25;

E-Business Process Modeling: The Next Big Step, S. Aissi et al., May, pp. 55-62;

Grid Services for Distributed System Integration, I. Foster et al., June, pp. 37-46;

Toward Behavioral Intelligence in the Semantic Web, J.J. Bryson et al., Nov., pp. 48-54;

Web Services and Context Horizons [Column], C. Shirky, Sept., pp. 98-100;

Web Services: Beyond the Hype [News], S.J. Vaughan-Nichols, Feb., pp. 18-21;

Web Sites

Designing for Web Site Usability [Column], J. Palmer, July, pp. 102-103

Wireless Technology

Bull Market for IEEE 802.11 WLAN Chipsets [News], S.J. Vaughan-Nichols, Nov., pp. 17-19;

Enhanced Service Discovery in Bluetooth [Column], S. Avancha et al., June, pp. 96-99;

IBM's Linux Watch: The Challenge of Miniaturization, C. Narayanaswami et al., Jan., pp. 33-41;

Jini Home Networking: A Step Toward Pervasive Computing, R. Gupta et al., Aug., pp. 34-40;

Mobile Payments [Column], U. Varshney, Dec., pp. 120-121;

New Wireless Technology Is in Sight [News], L.D. Paulson, Apr., p. 22;

OFDM: Back to the Wireless Future [News], S.I. Vaughan-Nichols, Dec., pp. 19-21;

Thick Clients for Personal Wireless Devices [Column], T. Starner, Jan., pp. 133-135;

Toward the Mobile Internet [Column], J.F. Huber, Oct., pp. 100-102;

US Approves New Uses for Wireless Technology [News], L.D. Paulson, May, p. 27;

Will 3G Really Be the Next Big Wireless Technology? [News], L. Garber, Jan., pp. 26-32;

Wireless Beyond 3G: Managing Services and Network Resources [Column], P. Demestichas et al., Aug., pp. 80-82

World Wide Web

Efficient Replacement of Nonuniform Objects in Web Caches, H. Bahn et al., June, pp. 65-73;

From E-Sex to E-Commerce: Web Search Changes [Column], A. Spink et al., Mar., pp. 107-109;

In Search of the Wisdom Web [Guest Editors' Intro: Web Intelligence], N. Zhong et al., Nov., pp. 27-31;

Self-Organization and Identification of Web Communities, G.W. Flake et al., Mar., pp. 66-71;

Social Intelligence Design for the Web, T. Nishida, Nov., pp. 37-41

AUTHOR INDEX

A

Abella, Alicia,see Gorin, A.L., Apr., pp. 51-56

Aditya, Shail,see Kathail, V., Sept., pp. 39-47

Adve, Sarita V.see Hughes, C.J., Feb., pp. 40-49; see Mukherjee, S.S., Feb., pp. 38-39

Agarwal, Sulabh,see Banerjee, S., Oct., pp. 46-53

Agrawal, Dharma P.see Bajaj, R., Apr., pp. 92-94; see Gupta, R., Aug., pp. 34-40

Agrawala, Ashok,see Banerjee, S., Oct., pp. 46-53

Ahuja, Pritpal,see Emer, J., Feb., pp. 68-75

Aissi, Selim,Pallavi Malu, and Krishnamurthy Srinivasan, E-Business Process Modeling: The Next Big Step, May, pp. 55-62

Alexenko, Mike,Serial ATA, Dec., pp. 53-54

Allan, Alanet al.,2001 Roadmap for Semiconductor Technology, Jan., pp. 42-53

Allan, James,Knowledge Management and Speech Recognition [Sidebar], Apr., pp. 60-61

Allanson, Jennifer,Electrophysiologically Interactive Computer Systems, Mar., pp. 60-65

Alonso, Tirso,see Gorin, A.L., Apr., pp. 51-56

Altman, Marty,see Stapleton, C., Dec., pp. 122-124

Amin, Minesh B.,see Samaranayake, S., Oct., pp. 63-68

An, Aijun,see Cercone, N., Nov., pp. 72-76

Anderson, Eric,FireWire As a Mass-Storage Interface, Dec., pp. 51-53

Anderson, Ross,Free Speech Online and Offline, June, pp. 28-30

Arbaugh, Bill,Security: Technical, Social, and Legal Challenges, Feb., pp. 109-111; Improving the TCPA Specification, Aug., pp. 77-79

Asuaga, Ana,Using Computers in Our Daily Life, June, pp. 104, 103

Atabakhsh, Homa,see Hauck, R.V., Mar., pp. 30-37

Austin, Todd,Eric Larson, and Dan Ernst, SimpleScalar: An Infrastructure for Computer System Modeling, Feb., pp. 59-67see also Mukherjee, S.S., Feb., pp. 38-49

Avancha, Sasikanth,Anupam Joshi, and Timothy Finin, Enhanced Service Discovery in Bluetooth, June, pp. 96-99

Aylor, James H.,The End of Computing Disciplines as We Know Them?, Jan., pp. 4-5, 8; It Has Been a Great Ride!, Dec., p. 12

B

Bahn, Hyokyunget al.,Efficient Replacement of Nonuniform Objects in Web Caches, June, pp. 65-73

Bajaj, Rashmi,Samantha Lalinda Ranaweera, and Dharma P. Agrawal, GPS: Location-Tracking Technology, Apr., pp. 92-94

Banerjee, Sumanet al.,Rover: Scalable Location-Aware Computing, Oct., pp. 46-53

Barcellos-Hoff, Mary Helen,see Parvin, B., July, pp. 65-71

Benini, Luca,and Giovanni De Micheli, Networks on Chips: A New SoC Paradigm, Jan., pp. 70-78

Billinghurst, Mark,see Poupyrev, I., Mar., pp. 44-50

Bimber, Oliveret al.,Merging Fossil Specimens with Computer-Generated Information, Sept., pp. 25-30

Binkert, Nathan,see Emer, J., Feb., pp. 68-75

Blaha, Michael,and Cheryl Smith, A Pattern for Softcoded Values, May, pp. 28-34

Boehm, Barry,Get Ready for Agile Methods, with Care, Jan., pp. 64-69see also DeMarco, T., June, pp. 90-92

Borch, Eric,see Emer, J., Feb., pp. 68-75

Briggs, Laura,and Kari Boyd McBride, Rethinking the Digital Divide, Oct., pp. 108, 106-107

Brooks, David,see M. Martonosi, Feb., p. 64

Brown, Eric,see Srinivasan, S., Is Speech Recognition Becoming Mainstream?, Apr., pp. 38-41

Bryson, Joanna J.et al.,Toward Behavioral Intelligence in the Semantic Web, Nov., pp. 48-54

C

Cao, Jiannonget al.,Mailbox-Based Scheme for Mobile Agent Communications, Sept., pp. 54-60

Cercone, Nicket al.,From Computational Intelligence to Web Intelligence, Nov., pp. 72-76

Chae, Ki-Joon,see Kim, W., The Chamois Component-Based Knowledge Engineering Framework, May, pp. 46-54

Chakravarthy, Sannedhi K.,see Shaikh, F.A., May, pp. 80-87

Chang, Dean,Haptics: Gaming's New Sensation, Aug., pp. 84-86

Chang, Kevin Chen-Chuan,see Han, J., Nov., pp. 64-70

Chen, Hsinshun,see Hauck, R.V., Mar., pp. 30-37

Cho, Dong-Sub,see Kim, W., May, pp. 46-54

Choi, Byoungju,see Kim, W., May, pp. 46-54

Chong, Frederic T.,see Oskin, M., Jan., pp. 79-87

Christensen, Lars M.,see Madsen, J., Nov., pp. 108-110

Christensson, Magnus,see Magnusson, P.S., Feb., pp. 50-58

Chuang, Isaac L.,see Oskin, M., Jan., pp. 79-87

Cipolla, Thomas,see Narayanaswami, C., Jan., pp. 33-41

Clark, David,Mobile Processors Begin to Grow Up, Mar., pp. 22-25; Do Web Standards and Patents Mix?, Oct., pp. 19-22

Clark, Tom,iSCSI Protocol, Dec., pp. 54-55

Coetzee, Frans M.,see Flake, G.W., Mar., pp. 66-71

Colwell, Bob,Phrenology, Astrology, Risk, and Product Quality, Jan., pp. 12-14; On Computers and Rock 'n' Roll, Feb., pp. 9-11; Engineering, Science, and Quantum Mechanics, Mar., pp. 8-10; Near Misses: Murphy's Law Is Wrong, Apr., pp. 9-12; If You Didn't Test It, It Doesn't Work, May, pp. 11-13; Engineering Follies, June, pp. 10-12; What Technology Is Doing to Music, July, pp. 6-8; Weird Books, Aug., pp. 10-12; Employee Performance Reviews, Sept., pp. 12-15; The Power of the Most Likely, Oct., pp. 12-14; The Coolest Thing on Earth, Nov., pp. 10-12; Science-Philosophy Celebrity Death Match, Dec., pp. 13-15

Cox, Tom,see Fuller, S., Jan., pp. 140-141

Cronquist, Darren C.,see Kathail, V., Sept., pp. 39-47

Cummings, Roger,The Evolution of Information Assurance, Dec., pp. 65-72

Cybenko, George,Annarita Giani, and Paul Thompson, Cognitive Hacking: A Battle for the Mind, Aug., pp. 50-56

D

Das, Sajal K.,see Cao, J., Sept., pp. 54-60

De Micheli, Giovanni,see Benini, L, Jan., pp. 70-78

Dedrick, Jason,see Kraemer, K., Feb., pp. 28-36

DeMarco, Tom,and Barry Boehm, The Agile Methods Fray, June, pp. 90-92

Demestichas, Panagiotiset al.,Wireless Beyond 3G: Managing Services and Network Resources, Aug., pp. 80-82

E

Edenfield, Don,see Allan, A., Jan., pp. 42-53

Edwards, John,and Linda Dailey Paulson, Smart Graphics: A New Approach to Meeting User Needs, May, pp. 18-21

Eischen, Kyle,Software Development: An Outsider's View, May, pp. 36-44

Emer, Joel et al., Asim: A Performance Model Framework, Feb., pp. 68-76

Emer, Joel,see Mukherjee, S.S., Feb., pp. 38-49

Encarnacao, L. Miguel,see Bimber, O., Sept., pp. 25-30

Ernst, Daniel,see Austin, T., Feb., pp. 59-67

Eskilson, Jesper,see Magnusson, P.S., Feb., pp. 50-58

Espasa, Roger,see Emer, J., Feb., pp. 68-76

F

Feitelson, Dror G.,and Millet Treinin, The Blueprint for Life?, July, pp. 34-40

Feng, Xinyu,see Cao, J., Sept., pp. 54-60

Fensel, Dieter,Ontology-Based Knowledge Management, Nov., pp. 56-59

Fenstermacher, Kurt D.,and Mark Ginsburg, A Lightweight Framework for Cross-Application User Monitoring, Mar., pp. 51-59

Finin, Timothy,see Avancha, S., June, pp. 96-99

Flake, Gary Williamet al.,Self-Organization and Identification of Web Communities, Mar., pp. 66-71

Fontenay, Gerald,see Parvin, B., July, pp. 65-71

Forsgren, Daniel,see Magnusson, P.S., Feb., pp. 50-58

Foster, Ianet al.,Grid Services for Distributed System Integration, June, pp. 37-46

Fu, Kun,see Shahabi, C., June, pp. 56-64

Fuller, Sam,and Tom Cox, Anatomy of a Forward-Looking Open Standard, Jan., pp. 140-141

G

Galliano, Fabio,see Demestichas, P., Aug., pp. 80-82

Ganger, Greg,Self-Securing Devices [Sidebar], Dec., p. 71

Garber, Lee,Will 3G Really Be the Next Big Wireless Technology?, Jan., pp. 26-32; Romanian Disaster-Response Project Wins Design Competition, Aug., pp. 13-15

Gatesy, Stephen M.,see Bimber, O., Sept., pp. 25-30

Giani, Annarita,see Cybenko, G., Aug., pp. 50-56

Giles, C. Lee,see Flake, G.W., Mar., pp. 66-71

Ginsburg, Mark,see Fenstermacher, K.D., Mar., pp. 51-59

Gorin, Allen L.et al.,Automated Natural Spoken Dialog, Apr., pp. 51-56

Granath, Derek,Storage Area Networks for Business Continuance [Sidebar], Dec., pp. 68-69

Griswold, Robert,Storage Topologies, Dec., pp. 56-63

Guéziec, André,Tracking Pitches for Broadcast Television, Mar., pp. 38-43

Gundepudi, Pavan,see Kalakota, R., Oct., pp. 29-36

Guniguntala, Dinakar,see Narayanaswami, C., Jan., pp. 33-41

Gupta, Harsh,see Hauck, R.V., Mar., pp. 30-37

Gupta, Rahul,Sumeet Talwar, and Dharma P. Agrawal, Jini Home Networking: A Step Toward Pervasive Computing, Aug., pp. 34-40

Gutmann, Peter,PKI: It's Not Dead, Just Resting, Aug., pp. 41-49

H

Hallberg, Gustav,see Magnusson, P.S., Feb., pp. 50-58

Hammond-Doel, Thomas,Fibre Channel Delivers, Dec., pp. 50-51

Han, Jiawei,and Kevin Chen-Chuan Chang, Data Mining for Web Intelligence, Nov., pp. 64-70

Hauck, Roslin V.et al.,Using Coplink to Analyze Criminal-Justice Data, Mar., pp. 30-37

Heath, Lenwood S.,and Naren Ramakrishnan, The Emerging Landscape of Bioinformatics Software Systems, July, pp. 41-45

Heddaya, Abdelsalam "Solom,"An Economically Scalable Internet, Sept., pp. 93-95

Heffernan, Donal,see Leen, G., Jan., pp. 88-93

Hilbert, David M.,see Schilit, B.N., Oct., pp. 37-45

Hogberg, Johan,see Magnusson, P.S., Feb., pp. 50-58

Holmes, Neville,To See Ourselves as Others See Us, Jan., pp. 144, 142-143; Representative Democracy and the Profession, Feb., pp. 120, 118-119; Computers, Programming, and People, Mar., pp. 112, 110-111; Side Effects of Digital Technology, Apr., pp. 104, 102-103; Would a Digital Brain Have a Mind?, May, pp. 112, 110-111; Seven Great Blunders of the Computing World, July, pp. 112, 110-111; Jobs, Trades, Skills, and the Profession, Sept., pp. 104, 102-103; The Profession and the World, Nov., pp. 116, 114-115

Hou, Lijun,see Cercone, N., Nov., pp. 72-76

Hu, Xiaohua,see Cercone, N., Nov., pp. 72-76

Huang, Andrew "bunnie,"The Trusted PC: Skin-Deep Security, Oct., pp. 103-105

Huber, Josef F.,Toward the Mobile Internet, Oct., pp. 100-102

Hughes, Charles,see Stapleton, C., Dec., pp. 122-124

Hughes, Christopher J.et al.,Rsim: Simulating Shared-Memory Multiprocessors with ILP Processors, Feb., pp. 40-49

Huntley, Christopher L.,see Lyon, D.A., May, pp. 102-103

I

Inoue, Tadanobu,see Narayanaswami, C., Jan., pp. 33-41

Ishida, Toru,Q: A Scenario Description Language for Interactive Agents, Nov., pp. 42-47

J

Jackson, Laura E.,and George N. Rouskas, Deterministic Preemptive Scheduling of Real-Time Tasks, May, pp. 72-79

Jansen, Bernard J.,see Spink, A., Mar., pp. 107-109

Jeong, Anmo,see Kim, W., May, pp. 46-54

Jones, Gareth J.F.,see Moreno, P.J., Apr., pp. 58-66

Joshi, Anupam,see Avancha, S., June, pp. 96-99

Joyner Jr., William H.,see Allan, A., Jan., pp. 42-53

Juan, Toni,see Emer, J., Feb., pp. 68-76

K

Kahng, Andrew B.,see Allan, A., Jan., pp. 42-53

Kalakota, Raviet al.,The Economics of DSL Regulation, Oct., pp. 29-36

Kamel, Kevin,see Banerjee, S., Oct., pp. 46-53

Kamijoh, Noboru,see Narayanaswami, C., Jan., pp. 33-41

Kapur, Rohit,see Samaranayake, S., Oct., pp. 63-68

Kathail, Vinodet al.,PICO: Automatically Designing Custom Computers, Sept., pp. 39-47

Kato, Kirokazu,see Poupyrev, I., Mar., pp. 44-50

Kenneally, Erin,Who's Liable for Insecure Networks?, June, pp. 93-95

Keselj, Vlado,see Cercone, N., Nov., pp. 72-76

Kesselman, Carl,see Foster, I., June, pp. 37-46

Kim, Junhyong,Computers Are from Mars, Organisms Are from Venus, July, pp. 25-32

Kim, Myung,see Kim, W., May, pp. 46-54

Kim, Wonet al.,The Chamois Component-Based Knowledge Engineering Framework, May, pp. 46-54

King, Willis K.,Implementing Our Future Vision in 2002, Jan., pp. 6-8; Year in Review [President's Message], Dec., pp. 10-11

Klauser, Artur,see Emer, J., Feb., pp. 68-75

Kochut, Andrzej,see Banerjee, S., Oct., pp. 46-53

Koh, Kern,see Bahn, H., June, pp. 65-73

Koh, Tzu Khiau,see Schilit, B.N., Oct., pp. 37-45

Kolawa, Adam,Software Certification Debate: Certification Will Do More Harm Than Good, June, pp. 34-35

Kommareddy, Christopher,see Banerjee, S., Oct., pp. 46-53

Korris, James,and Michael Macedonia, The End of Celluloid: Digital Cinema Emerges, Apr., pp. 96-98

Kraemer, Kenneth,and Jason Dedrick, Enter the Dragon: China's Computer Industry, Feb., pp. 28-36

Kramer, William T.C.,SCinet: Testbed for High-Performance Networked Applications, June, pp. 47-55

Kulkarni, Vishal,see Narayanaswami, C., Jan., pp. 33-41

Kumar, Raviet al.,The Web and Social Networks, Nov., pp. 32-36

L

Lacity, Mary,Lessons in Global Information Technology Sourcing, Aug., pp. 26-33

Larsen, Ronald L.,see Banerjee, S., Oct., pp. 46-53

Larson, Eric,see Austin, T., Feb., pp. 59-67

Larsson, Fredrik,see Magnusson, P.S., Feb., pp. 50-58

Lawrence, Steve,see Flake, G.W., Mar., pp. 66-71

Lawton, George,Open Source Security: Opportunity or Oxymoron?, Mar., pp. 18-21; Moving Java into Mobile Phones, June, pp. 17-20; Invasive Software: Who's Inside Your Computer, July, pp. 15-18; Virus Wars: Fewer Attacks, New Threats, Dec., pp. 22-24

Leavitt, Neal,Data Mining for the Corporate Masses?, May, pp. 22-24; Let's Hear It for Audio Mining, Oct., pp. 23-25

Lee, KiHo,see Kim, W., May, pp. 46-54

Lee, Meejeong,see Kim, W., May, pp. 46-54

Lee, Sang-Ho,see Kim, W., May, pp. 46-54

Lee, Yen-Jen,see Shim, S.S.Y., July, pp. 108-109

Leen, Gabriel,and Donal Heffernan, Expanding Automotive Electronic Systems, Jan., pp. 88-93

Liu, Jiming,see Zhong, N., Nov., pp. 27-31

LoBue, Michael T.,Surveying Today's Most Popular Storage Interfaces, Dec., pp. 48-55

Logan, Beth,see Moreno, P.J., Apr., pp. 58-66

Lotspiech, Jeffrey,Stefan Nusser, and Florian Pestoni, Broadcast Encryption's Bright Future, Aug., pp. 57-63

Lu, Jian,see Cao, J., Sept., pp. 54-60

Luk, Chi-Keung,see Emer, J., Feb., pp. 68-76

Lv, Tiehan,see Wolf, W., Sept., pp. 48-53

Lyon, Douglas A.,and Christopher L. Huntley, There's More Than One Way to Build a Bridge, May, pp. 102-103

M

Macedonia, Michael,Linux in Hollywood: A Star Is Born, Feb., pp. 112-114; The Computer Graphics Wars Heat Up, Oct., pp. 97-99 see also Korris, J., Apr., pp. 96-98

Madsen, Jan,Jorgen Steensgaard-Madsen, and Lars M. Christensen, A Sophomore Course in Codesign, Nov., pp. 108-110

Magnusson, Peter S.et al.,Simics: A Full System Simulation Platform, Feb., pp. 50-58

Magnusson, Peter S.,see Mukherjee, S.S., Feb., pp. 38-49

Malu, Pallavi,see Aissi, S., May, pp. 55-62

Manne, Srilatha,see Emer, J., Feb., pp. 68-76

Martin, Grant,and Frank Schirrmeister, A Design Chain for Embedded Systems, Mar., pp. 100-103

Martinez, David L.,see Bryson, J.J., Nov., pp. 48-54

Martinez, Georges,see Demestichas, P., Aug., pp. 80-82

Martonosi, Margaret,David Brooks, and Vivek Tiwari, Architecture-Level Power Modeling with Wattch, Feb., p. 64

Mason, Harry,SCSI: An Enterprise Foundation [Sidebar], Dec., pp. 48-50

Mathieu, Richard G.,Top-Down Approach to Computing, Jan., pp. 138-139

McBride, Kari Boyd,see Briggs, L., Oct., pp. 108, 106-107

McClellan, Stan,see Shaikh, F.A., May, pp. 80-87

McGraw, Gary,Managing Software Security Risks, Apr., pp. 99-101

McIlraith, Sheila A.,see Bryson, J.J., Nov., pp. 48-54

McMillan, Kate,Technology Standards Pros Aid Homeland Security, May, pp. 104-105

Memon, Atif M.,GUI Testing: Pitfalls and Process, Aug., pp. 87-88

Meyer, Bertrand,Assessing a C# Text, Apr., pp. 86-88

Micikevicius, Paulius,see Stapleton, C., Dec., pp. 122-124

Min, Sang Lyul,see Bahn, H., June, pp. 65-73

Miranda, Eduardo,Planning and Executing Time-Bound Projects, Mar., pp. 73-79

Mishra, Bud,see Paxia, S., July, pp. 73-79

Missikoff, Michele,Roberto Navigli, and Paola Velardi, Integrated Approach to Web Ontology Learning and Engineering, Nov., pp. 60-63

Moestedt, Andreas,see Magnusson, P.S., Feb., pp. 50-58

Moreno, Pedro J.et al.,From Multimedia Retrieval to Knowledge Management, Apr., pp. 58-66

Moret, Bernard M.E.,Li-San Wang, and Tandy Warnow, Toward New Software for Computational Phylogenetics, July, pp. 55-64

Moshell, Michael,see Stapleton, C., Dec., pp. 122-124

Mukherjee, Shubhendu S.,see Emer, J., Feb., pp. 68-76

Mukherjee, Shubhendu S.et al.,Performance Simulation Tools, Feb., pp. 38-49

N

Nadeem, Tamer,see Banerjee, S., Oct., pp. 46-53

Narayanaswami, Chandraet al.,IBM's Linux Watch: The Challenge of Miniaturization, Jan., pp. 33-41

Naruedomkul, Kanlaya,see Cercone, N., Nov., pp. 72-76

Navigli, Roberto,see Missikoff, M., Nov., pp. 60-63

Nick, Jeffrey M.,see Foster, I., June, pp. 37-46

Nishida, Toyoaki,Social Intelligence Design for the Web, Nov., pp. 37-41

Noh, Sam H.,see Bahn, H., June, pp. 65-73

Norman, Donald A.,Home Theater: Not Ready for Prime Time, June, pp. 100-102

Norton, Roger L.,Using Virtual Linux Servers, Nov., pp. 106-107

Nusser, Stefan,see Lotspiech, J., Aug., pp. 57-63

O

Ongvasith, Pichai,see Hauck, R.V., Mar., pp. 30-37

Orick, Diana Mayer,Toward Adequate Online Privacy, Aug., pp. 92, 90-91

Ortiz Jr., Sixto,Is Business Intelligence a Smart Move?, July, pp. 11-14

Oskin, Mark,Frederic T. Chong, and Isaac L. Chuang, A Practical Architecture for Reliable Quantum Computers, Jan., pp. 79-87

Ozer, Burak,see Wolf, W., Sept., pp. 48-53

P

Padmanabhan, Mukund,and Michael Picheny, Large-Vocabulary Speech Recognition Algorithms, Apr., pp. 42-50

Pai, Vijay S.,see Hughes, C.J., Feb., pp. 40-49

Palmer, Jonathan,Designing for Web Site Usability, July, pp. 102-103

Papadopoulou, Louisa,see Demestichas, P., Aug., pp. 80-82

Park, Seung-Soo,see Kim, W., May, pp. 46-54

Parvin, Bahramet al.,BioSig: An Imaging Bioinformatic System for Studying Phenomics, July, pp. 65-71

Patil, Harish,see Emer, J., Feb., pp. 68-76

Paulson, Linda Dailey,Alliance Seeks Streaming-Media Standard, Jan., pp. 22-23; New Nanotech Institute Will Sweat the Small Stuff, Jan., p. 23; Wanted: More Network-Security Graduates and Research, Feb., pp. 22-24; IBM Begins Autonomic-Computing Project, Feb., p. 25; Malicious Code Hits Instant Messaging, Feb., p. 26; Faster Processors with Optical Connections, Feb., p. 27; Key Snooping Technology Causes Controversy, Mar., p. 27; Developments Could Boost Optical Networks, Mar., p. 28; Adding a Third Dimension to Chips, Mar., p. 29; Faster RAM Tackles Data and Marketplace Bottlenecks, Apr., pp. 17-19; Protocol-Related Problem Threatens Internet Security, Apr., p. 20; Faster Storage Connectivity Technologies Emerge, Apr., p. 21; New Wireless Technology Is in Sight, Apr., p. 22; MPEG Licensing Dispute Hurts Apple, May, p. 25; Will New Chip Revolutionize Digital Photography?, May, pp. 25-26; US Approves New Uses for Wireless Technology, May, p. 27; Little Chips Promise Big Power, June, p. 25; Bioinformatics Experiences Important Breakthroughs, June, pp. 26-27; Company Unveils Holographic DVD for 3D Storage, June, p. 27; Taking a Graphical Approach to the Password, July, p. 19; Improvements Stream into Multimedia Technology, July, pp. 20-21; Data at the Speed of Light, July, p. 21; Computer System, Heal Thyself, Aug., pp. 20-22; Distributed Storage Challenges Data Glut, Aug., p. 23; Professors Use Technology to Fight Plagiarism, Aug., pp. 24 -25; Startup Wants to Automate Chip Design, Aug., p. 25; Tiny "Punch Cards" Boost Storage Capacity, Sept., p. 22; Researchers Bring Wireless Communications to the Chip, Sept., p. 23; New Chips Will Help Computers Visualize in Three Dimensions, Sept., p. 24; Project Promises Accessible Technology for the Disabled, Oct., p. 26; Two Efforts Aim to Upgrade Mobile Memory, Oct., p. 27; Prime Breakthrough May Improve Encryption, Oct., p. 28; Stopping Intruders Outside the Gates, Nov., pp. 20-22; IBM Works on a Universal Virtual Computer, Nov., p. 23; Battling Intrusions with a "Network Telescope," Nov., p. 24; Choreographing Web Services, Nov., p. 25; Researchers Upgrade Smart Card Technology, Dec., p. 25; Blind, Deaf Engineer Develops Computerized Braille Machine, Dec., p. 27; New Optical Clock Could Synchronize Chips, Dec., p. 26; Efforts Launched to Improve Network Security Education, Dec., p. 26 see also Edwards, J., Smart Graphics: A New Approach to Meeting User Needs, May, pp. 18-21

Paxia, Salvatoreet al.,A Random Walk Down the Genomes: DNA Evolution in Valis, July, pp. 73-79

Pestoni, Florian,see Lotspiech, J., Aug., pp. 57-63

Picheny, Michael,see Padmanabhan, M., Apr., pp. 42-50

Piner, Mary-Louise G.,Building on Success: CS Programs for 2002, Jan., pp. 94-98; Board Approves Reading of Bylaws Amendments, Jan., pp. 98-99; IEEE Fellows Lead the Engineering Profession, Feb., pp. 84-85; Fellow Nominations Due 15 March, Feb., pp. 86-87; Society Seeks Editor-in-Chief Applicants, Feb., pp. 86-87; Online Courses Offer Members Expert Instruction, Mar., p. 80; Revised Student Competition Offers Opportunity for Increased Participation, Mar., p. 81; Certification Program Provides Mark of Professionalism, Apr., pp. 74-75; CD-ROM Supplement Provides Demos, Interactive Tutorials for Computer Graphics Community, Apr., p. 75; Academic Excellence Prize and Best Paper Scholarship Awarded, Apr., p. 76; Conferences Offer Findings in Both New and Traditional Computing Research Fields, May, pp. 92-94; Ten Student Teams Advance to CSIDC World Finals, July, pp. 87-88; Ole-Johan Dahl, 1931-2002, Oct., p. 76; Kristen Nygaard, 1926-2002, Oct., p. 76; Standards News: PAR 1599 and IEEE 1484.12.1, Oct., p. 77; Partnership with Wiley Will Showcase Expert Texts, Nov., p. 80; Online Collection Offers Information Technology for Resource Libraries, Nov., p. 80; Recent Awards Reinforce Society's Commitment to Service, Teaching, Nov., pp. 82-83; Chang Chosen IEEE Computer Society President-Elect [Report to Members], Dec., pp. 73-74

Pop, Mihai,Steven L. Salzberg, and Martin Shumway, Genome Sequence Assembly: Algorithms and Issues, July, pp. 47-54

Potlapally, Nachiketh,Optical Fingerprinting to Protect Data: A Proposal, Apr., pp. 23-28

Poupyrev, Ivanet al., Developing a Generic Augmented-Reality Interface, Mar., pp. 44-50

R

Raghavan, Prabhakar,see Kumar, R., Nov., pp. 32-36

Raghu, T.S.,R. Ramesh, and Andrew B. Winston, Next Steps for Mobile Entertainment Portals, May, pp. 63-70

Raghunath, Mandayan,see Narayanaswami, C., Jan., pp. 33-41

Ragsdale, Daniel,see Welch, D., Apr., pp. 30-37

Rai, Arun,see Kalakota, R., Oct., pp. 29-36

Rajagopalan, Sridhar,see Kumar, R., Nov., pp. 32-36

Ramakrishnan, Naren,see Heath, L.S., July, pp. 41-45

Ramesh, R.,see Raghu, T.S., May, pp. 63-70

Ranaweera, Samantha Lalinda,see Bajaj, R., Apr., pp. 92-94

Ranganathan, Parthasarathy,see Hughes, C.J., Feb., pp. 40-49

Ransom, Stephen,and Xindong Wu, Using Knowledge Anchors to Reduce Cognitive Overhead, Nov., pp. 111-112

Raskar, Ramesh,see Bimber, O., Sept., pp. 25-30

Rau, B. Ramakrishna,see Kathail, V., Sept., pp. 39-47

Regenbrecht, Holger,see Poupyrev, I., Mar., pp. 44-50

Riccardi, Giuseppe,see Gorin, A.L., Apr., pp. 51-56

Ricketts, Anita C.,IEEE Registration Authority, Nov., pp. 113-115

Rigden, Christine,Now You See It, Now You Don't, July, pp. 104-105

Robinson, Gary S.,Toward the Age of Smarter Storage, Dec., pp. 35-41

Rodgers, Mike,see Allan, A., Jan., pp. 42-53

Rouskas, George N.,see Jackson, L.E., May, pp. 72-79

Rowen, Chris,Reducing SoC Simulation and Development Time, Dec., pp. 29-34

Rudra, Archisman,see Paxia, S., July, pp. 73-79

S

Salzberg, Steve L.,see Pop, M., July, pp. 47-54

Samaranayake, Samithaet al.,Dynamic Scan: Driving Down the Cost of Test, Oct., pp. 63-68

Sanford, Jim,see Narayanaswami, C., Jan., pp. 33-41

Santini, Simone,Using Language More Responsibly, Dec., pp. 128, 126-127

Saracevic, Tefko,see Spink, A., Mar., pp. 107-109

Schatz, Bruce R.,The Interspace: Concept Navigation Across Distributed Communities, Jan., pp. 54-62

Scheible, John P.,A Survey of Storage Options, Dec., pp. 42-46

Schepens, Wayne,see Welch, D., Apr., pp. 30-37

Schilit, Bill N.et al.,Web Interaction Using Very Small Internet Devices, Oct., pp. 37-45

Schirrmeister, Frank,see Martin, G., Mar., pp. 100-103

Schlig, Eugene,see Narayanaswami, C., Jan., pp. 33-41

Schneiderman, Ben,see Seo, J., July, pp. 80-86

Schneidewind, Norman F.,Body of Knowledge for Software Quality Measurement, Feb., pp. 77-83

Schreiber, Robert,see Kathail, V., Sept., pp. 39-47

Seo, Jinwook,and Ben Schneiderman, Interactively Exploring Hierarchical Clustering Results, July, pp. 80-86

Shahabi, Cyruset al.,Yima: A Second-Generation Continuous Media Server, June, pp. 56-64

Shaikh, Fayaz A.et al, End-to-End Testing of IP QoS Mechanisms, May, pp. 80-87

Shankar, A. Uddaya,see Banerjee, S., Oct., pp. 46-53

Shim, Simon S.Y.,and Yen-Jen Lee, Interactive TV: VoD Meets the Internet, July, pp. 108-109

Shirky, Clay,Web Services and Context Horizons, Sept., pp. 98-100

Shumway, Martin,see Pop, M., July, pp. 47-54

Singh, Manpreet,see Shaikh, F.A., End-to-End Testing of IP QoS Mechanisms, May, pp. 80-87

Sitchinava, Nodari,see Samaranayake, S., Oct., pp. 63-68

Sivaraman, Mukund,see Kathail, V., Sept., pp. 39-47

Smith, Cheryl,see Blaha, M., May, pp. 28-34

Spink, Amandaet al.,From E-Sex to E-Commerce: Web Search Changes, Mar., pp. 107-109

Srinivasan, Krishnamurthy,see Aissi, S., May, pp. 55-62

Srinivasan, Savitha,and Eric Brown, Is Speech Recognition Becoming Mainstream, Apr., pp. 38-41

Stankovic, John A.,see Wood, A.D., Oct., pp. 54-62

Stapleton, Christopheret al.,Applying Mixed Reality to Entertainment, Dec., pp. 122-124

Starner, Thad,Thick Clients for Personal Wireless Devices, Jan., pp. 133-135

Stavroulaki, Vera,see Demestichas, P., Aug., pp. 80-82

Steensgaard-Madsen, Jørgen,see Madsen, J., Nov., pp. 108-110

Stein, Lynn Andrea,see Bryson, J.J., Nov., pp. 48-54

Steinfield, Charles,Realizing the Benefits of Virtual Teams, Mar., pp. 104-106

Strom, Darrel,see Walrad, C., Sept., pp. 31-38

T

Talwar, Sumeet,see Gupta, R., Aug., pp. 34-40

Tan, Desney S.,see Poupyrev, I., Mar., pp. 44-50

Tetsutani, Nobuji,see Poupyrev, I., Mar., pp. 44-50

Thakkar, Pankaj,see Banerjee, S., Oct., pp. 46-53

Thayer, Richard H.,Software System Engineering: A Tutorial, Apr., pp. 68-73

Theologou, Michael,see Demestichas, P., Aug., pp. 80-82

Thompson, Paul,see Cybenko, G., Aug., pp. 50-56

Tiwari, Vivek,see M. Martonosi, Feb., p. 64

Tomkins, Andrew,see Kumar, R., Nov., pp. 32-36

Treinin, Millet,see Feitelson, D.G., July, pp. 34-40

Trevor, Jonathan,see Schilit, B.N., Oct., pp. 37-45

Trinh, Bao,see Banerjee, S., Oct., pp. 46-53

Tripp, Leonard L.,Software Certification Debate: Benefits of Certification, June, pp. 31-33

Tuecke, Steven,see Foster, I., June, pp. 37-46

V

Van Thong, J-M.,see Moreno, P.J., Apr., pp. 58-66

Varshney, Upkar,Multicast Support in Mobile Commerce Applications, Feb., pp. 115-117

Vaughan-Nichols, Steven J.,Web Services: Beyond the Hype, Feb., pp. 18-21; Will 10-Gigabit Ethernet Have a Bright Future, June, pp. 22-24; Developing the Distributed Computing OS, Sept., pp. 19-21; Bull Market for IEEE 802.11 WLAN Chipsets, Nov., pp. 17-19; OFDM: Back to the Wireless Future, Dec., pp. 19-21

Velardi, Paola,see Missikoff, M., Nov., pp. 60-63

Vivier, Guillaume,see Demestichas, P., Aug., pp. 80-82

W

Wallace, Steven,see Emer, J., Feb., pp. 68-76

Walrad, Chuck,and Darrel Strom, The Importance of Branching Models in SCM, Sept., pp. 31-38

Wang, Li-San,see Moret, B.M.E., July, pp. 55-64

Wareham, Jonathan,see Kalakota, R., Oct., pp. 29-36

Warnow, Tandy,see Moret, B.M.E., July, pp. 55-64

Welch, Donald,Daniel Ragsdale, and Wayne Schepens, Training for Information Assurance, Apr., pp. 30-37

Welke, Richard,see Kalakota, R., Oct., pp. 29-36

Werner, Bengt,see Magnusson, P.S., Feb., pp. 50-58

Whinston, Andrew B.,see Raghu, T.S., May, pp. 63-70

Williams, Thomas W.,see Samaranayake, S., Oct., pp. 63-68

Witmer, Lawrence M.,see Bimber, O., Sept., pp. 25-30

Wolf, Wayne,What Is Embedded Computing?, Jan., pp. 136-137; Household Hints for Embedded Systems Designers, May, pp. 106-108; Whither Warhol's Law?, Sept., pp. 96-97

Wolf, Wayne,Burak Ozer, and Tiehan Lv, Smart Cameras as Embedded Systems, Sept., pp. 48-53

Wolfram, Dietmar,see Spink, A., From E-Sex to E-Commerce: Web Search Changes, Mar., pp. 107-109

Wood, Anthony D.,and John A. Stankovic, Denial of Service in Sensor Networks, Oct., pp. 54-62

Wright, Jeremy H.,see Gorin, A.L., Automated Natural Spoken Dialog, Apr., pp. 51-56

Wu, Xindong,see Ransom, S., Nov., pp. 111-112

Y

Yamazaki, Kazuhiko,see Narayanaswami, C., Jan., pp. 33-41

Yang, Qing,see Parvin, B., July, pp. 65-71

Yao, Shu-Yuen Didi,see Shahabi, C., June, pp. 56-64

Yong, Hwan-Seung,see Kim, W., May, pp. 46-54

Youssef, Adel,see Banerjee, S., Oct., pp. 46-53

Youssef, Moustafa,see Banerjee, S., Oct., pp. 46-53

Z

Zhong, Ning,Jiming Liu, and Yiyu Yao, In Search of the Wisdom Web, Nov., pp. 27-31

Zhou, Yi,see Paxia, S., July, pp. 73-79

Zimmermann, Roger,see Shahabi, C., June, pp. 56-64

Zorian, Yervant,see Allan, A., Jan., pp. 42-53

6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool