The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.12 - December (2003 vol.36)
pp: 88-99
Published by the IEEE Computer Society

SUBJECT INDEX

A
Accessibility

Improving Web Accessibility [Column], E.T. Loiacono, Jan., pp. 117-119

Adaptive processing

Dynamically Tuning Processor Resources with Adaptive Processing, D.H. Albonesi et al., Dec., pp. 49-58

GRACE: A Cross-Layer Adaptation Framework for Saving Energy [Sidebar], D.G. Sachs et al., Dec., pp. 56-57

Managing Multiple Low-Power Adaptation Techniques: The Positional Approach [Sidebar], M.C. Huang et al., Dec., pp. 52-53

Reconfiguring Wireless Phones with Adaptive Chips [News], L.D. Paulson, Sept., pp. 9-11

Aerodynamics

Leave Bernoulli Out of This [Opinion], B. Colwell, May, pp. 10-12

Aerospace computing

NASA Advances Robotic Space Exploration, D.S. Katz and R.R. Some, Jan., pp. 52-61

Aesthetic computing

Nurturing Next-Generation Computer Scientists [Column], P. Fishwick, Dec., pp. 132-134

Agent technology

Evolutionary Entertainment with Intelligent Agents [Column], D.B. Fogel, June, pp. 106-108

Ontology-Mediated Integration of Intranet Web Services, T-M. Tsai et al., Oct., pp. 63-71

Taking Back Cyberspace [Column], J.M. Bradshaw et al., July, pp. 89-92

Agile software development,
see also Software engineering

Agile Software Development: It's about Feedback and Change [Guest Editors' Intro], L. Williams and A. Cockburn, June, pp. 39-43

Agility through Discipline: A Debate, K. Beck and B. Boehm, June, pp. 44-46

Introducing an Agile Process to an Organization, M. Cohn and D. Ford, June, pp. 74-78

Migrating Agile Methods to Standardized Development Practice, M. Lycett et al., June, pp. 79-85

Algorithms

Comparison of Three Vertical Search Spiders, M. Chau and H. Chen, May, pp. 56-62

Protecting Cryptographic Keys: The Trace-and-Revoke Approach, D. Naor and M. Naor, July, pp. 47-53

Solving Awari with Parallel Retrograde Analysis, J.W. Romein and H. Bal, Oct., pp. 26-33

Artificial intelligence

Artificial Intelligence: Arrogance or Ignorance? [Column], N. Holmes, Nov., pp. 120, 118-119

Artificial Intelligence: Hype or Reality? A.A. Hopgood, May, pp. 24-28

Data Mining for Very Busy People, T. Menzies and Y. Hu, Nov. pp. 22-29

Researchers Automate the Digital Animation Process [News], L.D. Paulson, Apr., p. 24

Using AI in Games that Adapt to Users [News], L.D. Paulson, July, p. 21

Authentication

Microsoft .NET Passport: A Security Analysis, R. Oppliger, July, pp. 29-35

A Trusted Open Platform, P. England et al., July, pp. 55-62

Automation

CPXe: Web Services for Internet Imaging, T. Thompson et al., Oct., pp. 54-62

Ontology-Mediated Integration of Intranet Web Services, T-M. Tsai et al., Oct., pp. 63-71

Autonomic computing

DARPA Creating Self-Aware Computing [News], L.D. Paulson, Mar., p. 24

The Vision of Autonomic Computing, J.O. Kephart and D. Chess, Jan., pp. 41-50

B
Battery-aware design

Battery Modeling for Energy-Aware System Design, R. Rao et al., Dec., pp. 77-87

Benchmarking
see Performance measurement and evaluation
Biology and medical computing

Computer Electronics Meet Animal Brains, C. Diorio and J. Mavoori, Jan., pp. 69-75

Fighting Epidemics in the Information and Knowledge Age [Column], H. Zhuge and X. Shi, Oct., pp. 116, 114-115

Finding Optical Fiber in the Deep Blue Sea [News], L.D. Paulson, Nov., pp. 18-19

C
Cache memory

Dynamically Tuning Processor Resources with Adaptive Processing, D.H. Albonesi et al., Dec., pp. 49-58

A Popularity-Based Prediction Model for Web Prefetching, X. Chen and X. Zhang, Mar., pp. 63-70

Scaling Web Services with Capacity Provision Networks, X. Geng et al., Nov., pp. 64-72

Client-server systems

Energy Management for Commercial Servers, C. Lefurgy et al., Dec., pp. 39-48

Metadata's Role in a Scientific Archive, J. Thomson et al., Dec., pp. 27-34

A Popularity-Based Prediction Model for Web Prefetching, X. Chen and X. Zhang, Mar., pp. 63-70

Reducing Disk Power Consumption in Servers with DRPM, S. Gurumurthi et al., Dec., pp. 59-66

Cluster computing

Energy Conservation in Clustered Servers, R. Bianchini and R. Rajamony [Sidebar], Dec., pp. 44-45

Solving Awari with Parallel Retrograde Analysis, J.W. Romein and H. Bal, Oct., pp. 26-33

Codesign

A Decade of Hardware/Software Codesign, W. Wolf, Apr., pp. 38-43

Domain-Specific Codesign for Embedded Security, P. Schaumont and I. Verbauwhede, Apr., pp. 68-74

Electronic System-Level Design: Challenges on the Road Ahead [Sidebar], D. Nadamuni, Apr., pp. 36-37

High-Level Language Abstraction for Reconfigurable Computing, W.A. Najjar et al., Aug., pp. 63-69

The Softening of Hardware, F. Vahid, Apr., pp. 27-34

SystemC Cosimulation and Emulation of Multiprocessor SoC Designs, L. Benini et al., Apr., pp. 53-59

Taking on the Embedded System Design Challenge [Guest Editors' Intro], J. Henkel et al., Apr., pp. 35-37

Toward IP-Based System-Level SoC Design [Column], J. Kunkel, May, pp. 88-89

Commercial off-the-shelf (COTS) products

Rigorous Evaluation of COTS Middleware Technology, I. Gorton et al., Mar., pp. 50-55

Communication systems

Context-Aware Communication, A. Ranganathan and H. Lei, Apr., pp. 90-92

Computer architecture

Challenges in Computer Architecture Evaluation, K. Skadron et al., Aug., pp. 30-36

Designing Computer Architecture Research Workloads, L. Eeckhout et al., Feb., pp. 65-71

Energy Management for Commercial Servers, C. Lefurgy et al., Dec., pp. 39-48

How Many System Architectures? [Column], W. Wolf, Mar., pp. 93-95

Programmable Stream Processors, U.J. Kapasi et al., Aug., pp. 54-62

Computer crime

On Piracy and Privacy [Guest Editor's Intro], S. Srinivasan, July, pp. 36-38

Preventing Piracy, Reverse Engineering, and Tampering, G. Naumovich and N. Memon, July, pp. 64-71

Using Web Crawlers to Fight Piracy [News], L.D. Paulson, Sept., pp. 16-17

Computer graphics

The GPU Enters Computing's Mainstream [Column], M. Macedonia, Oct., pp. 106-108

Computer languages

The Battle over the Universal Java IDE [News], S.J. Vaughan-Nichols, Apr., pp. 21-23

High-Level Language Abstraction for Reconfigurable Computing, W.A. Najjar et al., Aug., pp. 63-69

Java in High-Performance Environments [Column], B. Ghahramani and M. Pauley, Sept., pp. 109-111

Sun Tries to Guide Mobile Java [News], Apr., L.D. Paulson, p. 25-26

Computer networks,
see also Internet

Grids, the TeraGrid, and Beyond, D.A. Reed, Jan., pp. 62-68

Computers and Communications: A Symbiotic Relationship, R.M. Janowiak, Jan., pp. 76-79

Scaling Web Services with Capacity Provision Networks, X. Geng et al., Nov., pp. 64-72

Copy protection

Picturing a New Encryption Technique [News], L.D. Paulson, Jan., p. 29

Protecting Intellectual Property in Digital Multimedia Networks, A.M. Eskicioglu, July, pp. 39-45

Technical Challenges of Protecting Digital Entertainment Content, C.B.S. Traw, July, pp. 72-78

D
Data mining

CARE: An Automobile Crash Data Analysis Tool, A.S. Parrish et al., June, pp. 22-32

Data Mining for Very Busy People, T. Menzies and Y. Hu, Nov., pp. 22-29

Data security

Databases that Heal Themselves [News], L.D. Paulson, Feb., p. 22

How Trustworthy Is Trusted Computing? [News], S.J. Vaughan-Nichols, Mar., pp. 18-20

Protecting Cryptographic Keys: The Trace-and-Revoke Approach, D. Naor and M. Naor, July, pp. 47-53

Security in Storage [Column], J. Hughes and J. Cole, Jan., pp. 124-125

Taking Back Cyberspace [Column], J.M. Bradshaw et al., July, pp. 89-92

Taking Steps to Secure Web Services [News], D. Geer, Oct., pp. 14-16

A Trusted Open Platform, P. England et al., July, pp. 55-62

XrML's Role in Information Piracy Prevention and Privacy Protection [Sidebar], X. Wang and T. DeMartini, July, p. 74

Design engineering

Design Patterns for Ubiquitous Computing [Column], J.A. Landay and G. Borriello, Aug., pp. 93-95

Design Reviews [Opinion], B. Colwell, Oct., pp. 8-10

Electronic System-Level Design: Challenges on the Road Ahead [Sidebar], D. Nadamuni, Apr., pp. 36-37

Ground Bounce [Opinion], B. Colwell, Mar., pp. 11-13

A Man, a Dog, and a Machine [Opinion], B. Colwell, Jan., pp. 14-16

Taking on the Embedded System Design Challenge [Guest Editors' Intro], J. Henkel et al., Apr., pp. 35-37

Design methodology

Uncovering Hidden Contracts: The .NET Example, K. Arnout and B. Meyer, Nov., pp. 48-55

Display technologies

Fostering a Symbiotic Handheld Environment, M. Raghunath et al., Sept., pp. 56-65

New Electronic Paper Can Display Moving Images [News], L.D. Paulson, Dec., pp. 24-26

New Monitor Technologies Are on Display [News], S. Ortiz Jr., Feb., pp. 13-16

Sharp Develops a 3D Display for Cell Phones and Computers [News], L.D. Paulson, June, p. 19

Distance learning

Will Distance Learning Create a Global University? [Column], V. Milutinovic and N. Skundric, Mar., pp. 100, 98-99

Distributed computing

ANTS Framework for Cooperative Work Environments, P.G. López and A. Skarmeta, Mar., pp. 56-62

Grids, the TeraGrid, and Beyond, D.A. Reed, Jan., pp. 62-68

Federated Approach Expands Database-Access Technology [News], D. Geer, May, pp. 18-20

Toward Internet Distributed Computing, M. Milenkovic et al., May, pp. 38-46

E
Economics

Bringing Copyright into the Information Age [Column], S. Santini, Aug., pp. 104, 102-103

Companies Look for Unit of Computing Consumption [News, sidebar], L.D. Paulson, Oct., p. 19

Multiple Online Auctions [Column], Y.A. Tung et al., Feb., pp. 100-102

Value-Based Software Engineering: A Case Study, B. Boehm and L. Huang, Mar., pp. 33-41

Education, computer uses in

Handhelds Go to School: Lessons Learned, D. Tatar et al., Sept., pp. 30-37

Students Help Put a Computer in Every Classroom [News, sidebar], L.D. Paulson, Mar., p. 24

Will Distance Learning Create a Global University? [Column], V. Milutinovic and N. Skundric, Mar., pp. 100, 98-99

VeGame: Exploring Art and History in Venice, F. Bellotti et al., Sept., pp. 48-55

Education, computers and information science

The Computing Profession at a Crossroads [Column], V.N. Gudivada, May, pp. 92, 90-91

The Information Systems Research Cycle [Column], A.R. Hevner and S.T. March, Nov., pp. 111-113

Metadata Standards for Educational Resources [Column], M. McClelland, Nov., pp. 107-109

Nurturing Next-Generation Computer Scientists [Column], P. Fishwick, Dec., pp. 132-134

Shaping an Entertaining Future at Carnegie Mellon [Column], J. Schell, Aug., pp. 96-98

Education, engineering and science

How Not to Teach Science [Opinion], B. Colwell, Nov., pp. 7-9

Science Fairs [Opinion], B. Colwell, Apr., pp. 13-16

That's Not Computing— This Is Computing [Opinion], B. Colwell, June, pp. 6-8

Electronic commerce

Evaluating Servers with Commercial Workloads [Guest Editors' Intro], K. Keeton et al., Feb., pp. 29-32

Multiple Online Auctions [Column], Y.A. Tung et al., Feb., pp. 100-102

TPC-W E-Commerce Benchmark Evaluation, D.F. García and J. García, Feb., pp. 42-48

Electronic design automation

Closing the SoC Design Gap [Column], J. Henkel, Sept., pp. 119-121

Electronic System-Level Design: Challenges on the Road Ahead [Sidebar], D. Nadamuni, Apr., pp. 36-37

Metropolis: An Integrated Electronic System Design Environment, F. Balarin et al., Apr., pp. 45-52

Taking on the Embedded System Design Challenge [Guest Editors' Intro], J. Henkel et al., Apr., pp. 35-37

Toward IP-Based System-Level SoC Design [Column], J. Kunkel, May, pp. 88-89

Electronic mail

Group Considers Drastic Measure to Stop Spam [News], L.D. Paulson, July, pp. 21-22

Spammers Begin Sending Viruses with their Junk Mail [News], L.D. Paulson, Aug., p. 26

Electronic messaging

Context-Aware Communication, A. Ranganathan and H. Lei, Apr., pp. 90-92

Instant Messaging Puts on a Business Suit [News], G. Lawton, Mar., pp. 14-16

Presence Technology: More than Just Instant Messaging [News], S.J. Vaughan-Nichols, Oct., pp. 11-13

Electronic publishing

Weblogs: Simplifying Web Publishing [Column], C. Lindahl and E. Blount, Nov., pp. 114-116

Embedded systems

Closing the SoC Design Gap [Column], J. Henkel, Sept., pp. 119-121

Computer Electronics Meet Animal Brains, C. Diorio and J. Mavoori, Jan., pp. 69-75

Configurable Processors for Embedded Computing [Column], N. Dutt and K. Choi, Jan., pp. 120-123

Domain-Specific Codesign for Embedded Security, P. Schaumont and I. Verbauwhede, Apr., pp. 68-74

Formal Methods in Embedded Design [Column], S.D. Johnson, Nov., pp. 104-106

How Many System Architectures? [Column], W. Wolf, Mar., pp. 93-95

The Softening of Hardware, F. Vahid, Apr., pp. 27-34

Taking on the Embedded System Design Challenge [Guest Editors' Intro], J. Henkel et al., Apr., pp. 35-37

Engineering,
see also Design engineering

Engineering Decisions [Opinion], B. Colwell, Aug., pp. 9-11

Engineering, Marketing Teams, and Management [Opinion], B. Colwell, Sept., pp. 5-7

Me and My Theremin [Opinion], B. Colwell, Feb., pp. 8-9

That's Not Computing— This Is Computing [Opinion], B. Colwell, June, pp. 6-8

Tools of the Trade [Opinion], B. Colwell, July, pp. 7-9

Entertainment computing

The Coming Revolution in Massively Multiuser Persistent Worlds [Column], R. Gehorsam, Apr., pp. 93-95

The GPU Enters Computing's Mainstream [Column], M. Macedonia, Oct., pp. 106-108

Minifilm Festival for Handheld Devices [News], L.D. Paulson, May, p. 23

Revitalizing Museums with Digital Technology [Column], M. Macedonia, Feb., pp. 94-96

Shaping an Entertaining Future at Carnegie Mellon [Column], J. Schell, Aug., pp. 96-98

Technical Challenges of Protecting Digital Entertainment Content, C.B.S. Traw, July, pp. 72-78

Extreme programming
see Software engineering
F
Formal methods

A Formal Approach to MpSoC Performance Verification, K. Richter et al., Apr., pp. 60-67

Formal Methods in Embedded Design [Column], S.D. Johnson, Nov., pp. 104-106

G
Games

The Coming Revolution in Massively Multiuser Persistent Worlds [Column], R. Gehorsam, Apr., pp. 93-95

Evolutionary Entertainment with Intelligent Agents [Column], D.B. Fogel, June, pp. 106-108

Solving Awari with Parallel Retrograde Analysis, J.W. Romein and H. Bal, Oct., pp. 26-33

Using AI in Games that Adapt to Users [News], L.D. Paulson, July, p. 21

VeGame: Exploring Art and History in Venice, F. Bellotti et al., Sept., pp. 48-55

Will Wireless Gaming Be a Winner? [News], N. Leavitt, Jan., pp. 24-27

Grid computing

Grids, the TeraGrid, and Beyond, D.A. Reed, Jan., pp. 62-68

Toward Internet Distributed Computing, M. Milenkovic et al., May, pp. 38-46

Groupware

ANTS Framework for Cooperative Work Environments, P.G. López and A. Skarmeta, Mar., pp. 56-62

Interactive Workspaces [Column], B. Johanson et al., Apr., pp. 99-101

H
Handheld devices

Battery Modeling for Energy-Aware System Design, R. Rao et al., Dec., pp. 77-87

Context-Aware Mobile Communication in Hospitals, M.A. Muños et al., Sept., pp. 38-46

Fostering a Symbiotic Handheld Environment, M. Raghunath et al., Sept., pp. 56-65

Handheld Computing [Guest Editors' Intro], B.A. Myers and M. Beigl, Sept., pp. 27-29

Handhelds Go to School: Lessons Learned, D. Tatar et al., Sept., pp. 30-37

Software Architectural Support for Handheld Computing, N. Medvidovic et al., Sept., pp. 66-73

VeGame: Exploring Art and History in Venice, F. Bellotti et al., Sept., pp. 48-55

Hardware-software codesign,
see Codesign
History

Bringing Copyright into the Information Age [Column], S. Santini, Aug., pp. 104, 102-103

A Decade of Hardware/Software Codesign, W. Wolf, Apr., pp. 38-43

Iterative and Incremental Development: A Brief History, C. Larman and V. Basili, June, pp. 47-56

Human factors

A Man, a Dog, and a Machine [Opinion], B. Colwell, Jan., pp. 14-16

I
IEEE

IEEE Foundation Donates Over US$425,000 to Projects [CS Connection], M-L.G. Piner, Feb. p. 75

IEEE Names Fellows for 2003 [CS Connection], M-L.G. Piner, Feb., pp. 72-73

IEEE President-Elect Candidates Answer Questions on Critical Governance Issues [CS Connection], Sept., pp. 83-88

Virginia Teen Wins IEEE Presidents' Scholarship with MHD-Based DC Transformer [CS Connection, sidebar], B. Ward, Aug., p. 79

IEEE Computer Society

Board of Governors Approves Reading of Bylaws Amendment [CS Connection], M-L.G. Piner, Apr., p. 77

Board of Governors Approves Technical Committee on Bioinformatics [CS Connection], M-L.G. Piner, Feb., p. 76

Building a Better Computer Society [President's Message], S.L. Diamond, Jan., pp. 8-10

Building on the Past, Looking to the Future [EIC's Message], D.L. Carver, Jan., pp. 6-7, 10

Computer Society Board of Governors Approves Reading of Proposed Bylaw Changes [CS Connection], B. Ward, Aug., pp. 78-79

Conferences Explore Key Computing Topics [CS Connection], B. Ward, May, pp. 78-80

Cray, Kanai Awards Recognize Achievement in High-Performance Computing and Distributed Systems [CS Connection], B. Ward, June, pp. 89-91

Engel Voted IEEE Computer Society President-Elect [CS Connection], B. Ward, Dec., pp. 100-101

IEEE Computer Society Election: Nominees for IEEE Computer Society Office and Board of Governors, Sept., pp. 75-81

IEEE Computer Society Recognizes Certified Software Development Professionals [CS Connection], Oct., pp. 82-82

Looking Forward [President's Message], S.L. Diamond, Dec., pp. 12-13

New Distance Learning Catalog Features Wireless, Microsoft .NET Courses [CS Connection], M-L.G. Piner, Mar., p. 72

New Education Board Mission Statement Highlights Increased Vitality [CS Connection], M-L.G. Piner, Apr., p. 76

New Journals Address Biology, Security [CS Connection], B. Ward, Oct., pp. 81-82

Russian Teen Wins Top IEEE Computer Society Prize at Intel Science Fair [CS Connection], B. Ward, Aug., pp. 77-78

Service, Education, and Technical Awards Honor Outstanding Achievements [CS Connection], B. Ward, July, pp. 79-80

Students from around the World Receive Scholarship Funds [CS Connection], M-L.G. Piner, Apr., p. 75

IEEE Computer Society International Design Competition

CSIDC 2003 World Finals Projects in Brief [Sidebar], B. Ward, August, p. 16

CSIDC Challenge Receives $1,000,000 Donation from Microsoft [CS Connection], M-L.G. Piner, Apr., p. 76

Tablet-PC Classroom System Wins Design Competition [News], B. Ward, Aug., pp. 15-19

Universities from around the World Compete in CSIDC 2003 [CS Connection], T. Manuel, Mar., p. 73

Industry trends

Andhra Pradesh: Lessons for Global Software Development, K. Eischen, June, pp. 31-37

The Ins and Outs of New Local I/O Trends [News], L.D. Paulson, July, pp. 13-16

Instant Messaging Puts on a Business Suit [News], G. Lawton, Mar., pp. 14-16

Low-Power Chips for High-Powered Handhelds [News], L.D. Paulson, Jan., pp. 21-23

New Monitor Technologies Are on Display [News], S. Ortiz Jr., Feb., pp. 13-16

Optical Networking Chips Get Faster in a Slow Market [News], L.D. Paulson, Apr., pp. 18-20

OSs Battle in the Smart-Phone Market [News], S.J. Vaughan-Nichols, June, pp. 10-12

Presence Technology: More than Just Instant Messaging [News], S.J. Vaughan-Nichols, Oct., pp. 11-13

Reconfiguring Wireless Phones with Adaptive Chips [News], L.D. Paulson, Sept., pp. 9-11

Seeking Better Web Search Technologies [News], S.J. Vaughan-Nichols, Aug., pp. 19-21

Will Fuel Cells Replace Batteries in Mobile Devices? [News], L.D. Paulson, Nov., pp. 10-12

XML Raises Concerns as It Gains Prominence [News], S.J. Vaughan-Nichols, May, pp. 14-16

Information retrieval

Comparison of Three Vertical Search Spiders, M. Chau and H. Chen, May, pp. 56-62

Metadata's Role in a Scientific Archive, J. Thomson et al., Dec., pp. 27-34

New Search Engines Keep Humming Along [News, sidebar], L.D. Paulson, Apr., p. 26

Search in Vain: Challenges for Internet Search [Column], H. Tirri, Jan., pp. 115-116

Seeking Better Web Search Technologies [News], S.J. Vaughan-Nichols, Aug., pp. 19-21

Technological Solutions for Protecting Privacy [Column], R.J. Bayardo and R. Srikant, Sept., pp. 115-118

Ubiquitous Recommendation Systems [Column], D.W. McDonald, Oct., pp. 111

Information technology

The Information Systems Research Cycle [Column], A.R. Hevner and S.T. March, Nov., pp. 111-113

Instant messaging,
see Electronic messaging
Integrated circuitry

Chip Makers Turn to Multigate Transistors [News], L.D. Paulson, Feb., p. 23

A Decade of Hardware/Software Codesign, W. Wolf, Apr., pp. 38-43

The Softening of Hardware, F. Vahid, Apr., pp. 27-34

Intellectual property,
see also Copy protection, Legal issues

Dual Tragedies: IP Rights in Industry Standards, D. Lin, Feb., pp. 25-27

Protecting Intellectual Property in Digital Multimedia Networks, A.M. Eskicioglu, July, pp. 39-45

Interactive systems

The Coming Revolution in Massively Multiuser Persistent Worlds [Column], R. Gehorsam, Apr., pp. 93-95

Internet

FAST Approach Could Accelerate Internet Downloads [News], L.D. Paulson, Aug., pp. 27-28

Integrating Mobile IP with Ad Hoc Networks, Y-C. Tseng et al., May, pp. 48-55

Mobile IPv6 and the Future of Wireless Internet Access [News], S.J. Vaughan-Nichols, Feb., pp. 18-20

SCTP: A Proposed Standard for Robust Internet Data Transport, A.L. Caro Jr. et al., Nov., pp. 56-63

Search in Vain: Challenges for Internet Search [Column], H. Tirri, Jan., pp. 115-116

Toward Internet Distributed Computing, M. Milenkovic et al., May, pp. 38-46

J
Java
see Computer languages
K
Knowledge-based systems

The Business Rule Approach [Column], R.G. Ross, May, pp. 85-87

L
Legal issues,
see also Computer crime, Intellectual property

Bringing Copyright into the Information Age [Column], S. Santini, Aug., pp. 104, 102-103

Proponents Drop Support for Controversial Software Proposal [News], L.D. Paulson, Oct., p. 18

US Court Establishes Protection against Reverse Engineering [News], L.D. Paulson, Sept., p. 16

M
Machine learning

Using Machine-Learning Methods for Musical Style Modeling, S. Dubnov et al., Oct., pp. 73-80

Machine translation

Statistical Language Approach Translates into Success [News], S.J. Vaughan-Nichols, Nov., pp. 14-16

Management, business

The Business Rule Approach [Column], R.G. Ross, May, pp. 85-87

Engineering, Marketing Teams, and Management [Opinion], B. Colwell, Sept., pp. 5-7

Managing IT with Systems Thinking [Column], A. Dutta, Mar., pp. 96-97

Medical computing
see Biology and medical computing
Memory management

Energy Management for Commercial Servers, C. Lefurgy et al., Dec., pp. 39-48

VIM: Taming Software with Hardware, M. Halpern, Oct., pp. 21-25

Microprocessors and microprocessor design

Benchmarking Internet Servers on Superscalar Machines, Y. Luo et al., Feb., pp. 34-40

Benchmarking Next-Generation Switch Fabrics [Column], I. Elhanany and V. Tabatabaee, Oct., pp. 109-110

Computer Electronics Meet Animal Brains, C. Diorio and J. Mavoori, Jan., pp. 69-75

Configurable Processors for Embedded Computing [Column], N. Dutt and K. Choi, Jan., pp. 120-123

A Decade of Hardware/Software Codesign, W. Wolf, Apr., pp. 38-43

Dynamically Tuning Processor Resources with Adaptive Processing, D.H. Albonesi et al., Dec., pp. 49-58

The GPU Enters Computing's Mainstream [Column], M. Macedonia, Oct., pp. 106-108

GRACE: A Cross-Layer Adaptation Framework for Saving Energy [Sidebar], D.G. Sachs et al., Dec., pp. 56-57

Leakage Current: Moore's Law Meets Static Power, N.S. Kim et al., Dec., pp. 68-75

Low-Power Chips for High-Powered Handhelds [News], L.D. Paulson, Jan., pp. 21-23

Programmable Stream Processors, U.J. Kapasi et al., Aug., pp. 54-62

The Softening of Hardware, F. Vahid, Apr., pp. 27-34

Switch Fabric Interfaces [Column], I. Elhanany et al., Sept., pp. 106-108

Xerox Hopes Chip Will Cut Costs of Fiber Services [News], L.D. Paulson, June, p. 18

Middleware

Federated Approach Expands Database-Access Technology [News], D. Geer, May, pp. 18-20

Rigorous Evaluation of COTS Middleware Technology, I. Gorton et al., Mar., pp. 50-55

Mobile communications

Integrating Mobile IP with Ad Hoc Networks, Y-C. Tseng et al., May, pp. 48-55

Mobile IPv6 and the Future of Wireless Internet Access [News], S.J. Vaughan-Nichols, Feb., pp. 18-20

Next-Generation Wearable Networks, R.L. Ashok and D.P. Agrawal, Nov., pp. 31-39

Software Radios Add Flexibility to Wireless Technology [News], S. Ortiz Jr., Aug., pp. 23-25

Mobile computing

Going Mobile with Web Services [News], L.D. Paulson, Feb., p. 24

Handheld Computing [Guest Editors' Intro], B.A. Myers and M. Beigl, Sept., pp. 27-29

OSs Battle in the Smart-Phone Market [News], S.J. Vaughan-Nichols, June, pp. 10-12

Software Architectural Support for Handheld Computing, N. Medvidovic et al., Sept., pp. 66-73

Taking Back Cyberspace [Column], J.M. Bradshaw et al., July, pp. 89-92

Modeling

Battery Modeling for Energy-Aware System Design, R. Rao et al., Dec., pp. 77-87

Ten Reasons to Use Divisible Load Theory, T.G. Robertazzi, May, pp. 63-68

Multiprocessor systems

Energy Management for Commercial Servers, C. Lefurgy et al., Dec., pp. 39-48

A Formal Approach to MpSoC Performance Verification, K. Richter et al., Apr., pp. 60-67

Queuing Simulation Model for Multiprocessor Systems, T-F. Tsuei and W. Yamamoto, Feb., pp. 58-64

Simulating a $2M Commercial Server on a $2K PC, A.R. Alameldeen et al., Feb., pp. 50-57

SystemC Cosimulation and Emulation of Multiprocessor SoC Designs, L. Benini et al., Apr., pp. 53-59

Ten Reasons to Use Divisible Load Theory, T.G. Robertazzi, May, pp. 63-68

Music

Me and My Theremin [Opinion], B. Colwell, Feb., pp. 8-9

Researcher Has New Approach to Making Music with Computers [News], L.D. Paulson, Nov., p. 19

Researcher Puts the Network to Music [News], Mar., pp. 23-24

Using Machine-Learning Methods for Musical Style Modeling, S. Dubnov et al., Oct., pp. 73-80

N
Nanotechnology

The Future of Nanocomputing, G. Bourianoff, Aug., pp. 44-53

Nanotech RAM Holds Promise for Universal Memory [News], L.D. Paulson, Sept., p. 15

Network protocols

Integrating Mobile IP with Ad Hoc Networks, Y-C. Tseng et al., May, pp. 48-55

SCTP: A Proposed Standard for Robust Internet Data Transport, A.L. Caro Jr. et al., Nov., pp. 56- 63

Network servers

Benchmarking Internet Servers on Superscalar Machines, Y. Luo et al., Feb., pp. 34-40

Evaluating Servers with Commercial Workloads [Guest Editors' Intro ], K. Keeton et al., Feb., pp. 29-32

Simulating a $2M Commercial Server on a $2K PC, A.R. Alameldeen et al., Feb., pp. 50-57

TPC-W E-Commerce Benchmark Evaluation, D.F. García and J. García, Feb., pp. 42-48

Network services,
see also Service-based systems, Web services

Toward Internet Distributed Computing, M. Milenkovic et al., May, pp. 38-46

Neural networks

Comparison of Three Vertical Search Spiders, M. Chau and H. Chen, May, pp. 56-62

Fighting Epidemics in the Information and Knowledge Age [Column], H. Zhuge and X. Shi, Oct., pp. 116, 114-115

Neurochips
see Microprocessors
O
Obituaries

B. Ramakrishna (Bob) Rau (1951-2002) [CS Connection], M-L.G. Piner, Feb., p. 74

IFIP TC-2 Chair Armando Haeberer, 1947-2003 [CS Connection], M-L.G. Piner, Apr., p. 75

Open source software

The Battle over the Universal Java IDE [News], S.J. Vaughan-Nichols, Apr., pp. 21-23

SystemC Cosimulation and Emulation of Multiprocessor SoC Designs, L. Benini et al., Apr., pp. 53-59

Toward IP-Based System-Level SoC Design [Column], J. Kunkel, May, pp. 88-89

Optical technology

Common Fabric Dyes Promise to Help Optical Communications [News], L.D. Paulson, Oct., p. 17

Optical Networking Chips Get Faster in a Slow Market [News], L.D. Paulson, Apr., pp. 18-20

Researchers Plan Advanced, Experimental Optical Network [News], L.D. Paulson, Dec., pp. 24-26

Xerox Hopes Chip Will Cut Costs of Fiber Services [News], L.D. Paulson, June, p. 18

P
Parallel processing

Researchers Improve Parallel Processing [News], L.D. Paulson, May, p. 23

Performance measurement and evaluation

Benchmarketing Competition [Opinion], B. Colwell, Dec., pp. 9-11

Benchmarking Next-Generation Switch Fabrics [Column], I. Elhanany and V. Tabatabaee, Oct., pp. 109-110

Benchmarking Internet Servers on Superscalar Machines, Y. Luo et al., Feb., pp. 34-40

Challenges in Computer Architecture Evaluation, K. Skadron et al., Aug., pp. 30-36

Designing Computer Architecture Research Workloads, L. Eeckhout et al., Feb., pp. 65-71

Evaluating Servers with Commercial Workloads [Guest Editors' Intro], K. Keeton et al., Feb., pp. 29-32

A Formal Approach to MpSoC Performance Verification, K. Richter et al., Apr., pp. 60-67

Metric and Workload Effects on Computer Systems Evaluation, D.G. Feitelson, Sept., pp. 18-25

Queuing Simulation Model for Multiprocessor Systems, T-F. Tsuei and W. Yamamoto, Feb., pp. 58-64

Simulating a $2M Commercial Server on a $2K PC, A.R. Alameldeen et al., Feb., pp. 50-57

Ten Reasons to Use Divisible Load Theory, T.G. Robertazzi, May, pp. 63-68

TPC-W E-Commerce Benchmark Evaluation, D.F. García and J. García, Feb., pp. 42-48

Pervasive computing

Context-Aware Mobile Communication in Hospitals, M.A. Muños et al., Sept., pp. 38-46

Design Patterns for Ubiquitous Computing [Column], J.A. Landay and G. Borriello, Aug., pp. 93-95

Interactive Workspaces [Column], B. Johanson et al., Apr., pp. 99-101

Mega-Utilities Drive Invisible Technologies [Column], B.N. Schilit, Feb., pp. 97-99

Pervasive Computing: A Paradigm for the 21st Century, D. Saha and A. Mukherjee, Mar., pp. 25-31

Pervasive Healthcare [Column], U. Varshney, Dec., pp. 138-140

Software Architectural Support for Handheld Computing, N. Medvidovic et al., Sept., pp. 66-73

SPECs: Personal Pervasive Systems [Column], M. Lamming and D. Bohm, June, pp. 109-111

Ubiquitous Recommendation Systems [Column], D.W. McDonald, Oct., pp. 111

Piracy,
see Computer crime
Power management

Dynamically Tuning Processor Resources with Adaptive Processing, D.H. Albonesi et al., Dec., pp. 49-58

Energy Conservation in Clustered Servers, R. Bianchini and R. Rajamony [Sidebar], Dec., pp. 44-45

Energy Management for Commercial Servers, C. Lefurgy et al., Dec., pp. 38-48

Leakage Current: Moore's Law Meets Static Power, N.S. Kim et al., Dec., pp. 68-75

Managing Multiple Low-Power Adaptation Techniques: The Positional Approach [Sidebar], M.C. Huang et al., Dec., pp. 52-53

Power-Aware Computing [Guest Editors' Intro], M.R. Stan and K. Skadron, Dec. pp. 35-38

Reducing Disk Power Consumption in Servers with DRPM, S. Gurumurthi et al., Dec., pp. 59-66

Power systems

Battery Modeling for Energy-Aware System Design, R. Rao et al., Dec., pp. 77-87

Will Fuel Cells Replace Batteries in Mobile Devices? [News], L.D. Paulson, Nov., pp. 10-12

Privacy

On Piracy and Privacy [Guest Editor's Intro], S. Srinivasan, July, pp. 36-38

Preventing Piracy, Reverse Engineering, and Tampering, G. Naumovich and N. Memon, July, pp. 64-71

Security and Privacy in Sensor Networks [Column], H. Chan and A. Perrig, Oct., pp. 103-105

Technological Solutions for Protecting Privacy [Column], R.J. Bayardo and R. Srikant, Sept., pp. 115-118

Wireless Location Privacy Protection [Column], B. Schilit, J. Hong, and M. Gruteser, Dec., pp. 135-137

Product development

The Art of Requirements Triage, A.M. Davis, Mar., pp. 42-49

Professional issues

Andhra Pradesh: Lessons for Global Software Development, K. Eischen, June, pp. 31-37

Artificial Intelligence: Arrogance or Ignorance? [Column], N. Holmes, Nov., pp. 120, 118-119

Bringing Copyright into the Information Age [Column], S. Santini, Aug., pp. 104, 102-103

The Case for Perspicuous Programming [Column], N. Holmes, Apr., pp. 104, 102-103

The Computing Profession at a Crossroads [Column], V.N. Gudivada, May, pp. 92, 90-91

The Digital Divide, the UN, and the Computing Profession [Column], Neville Holmes, Dec., pp. 144, 142-143

Iterative and Incremental Development: A Brief History, C. Larman and V. Basili, June, pp. 47-56

The Profession's Role in the Global Information Society [Column], W. Cellary, Sept., pp. 124, 122-123

Revising the Principles of Technorealism [Column], N. Holmes, Jan., pp. 128, 126-127

Salaries Rise Slightly for US, Canadian Computing Faculty [CS Connection], M-L.G. Piner, Mar., p. 74

Science Fairs [Opinion], B. Colwell, Apr., pp. 13-16

Should Professionals Be Political? [Column], N. Holmes, July, pp. 100, 98-99

Surviving Unemployment in the High-Tech Downturn, S. Blanchette Jr., July, pp. 24-28

Truth and Clarity in Arithmetic [Column], N. Holmes, Feb., pp. 108, 106-107

Programming languages
see Computer languages
Project management

Agile Software Development: It's about Feedback and Change [Guest Editors' Intro], L. Williams and A. Cockburn, June, pp. 39-43

Design Reviews [Opinion], B. Colwell, Oct., pp. 8-10

Developing Complex Projects Using XP with Extensions, M. Lippert et al., June, pp. 67-73

Introducing an Agile Process to an Organization, M. Cohn and D. Ford, June, pp. 74-78

Migrating Agile Methods to Standardized Development Practice, M. Lycett et al., June, pp. 79-85

Using Risk to Balance Agile and Plan-Driven Methods, B. Boehm and R. Turner, June, pp. 57-66

R
Research initiatives

"Ballistic" Technique Boosts Storage Capacity [News], L.D. Paulson, Aug., pp. 26-27

Grids, the TeraGrid, and Beyond, D.A. Reed, Jan., pp. 62-68

IBM Seeks to Unify Data-Access Approaches [News], L.D. Paulson, Mar., p. 22

Intel Research Extends Moore's Law, S. Hamilton Jan., pp. 31-40

Next-Generation Wearable Networks, R.L. Ashok and D.P. Agrawal, Nov., pp. 31-39

Pervasive Computing: A Paradigm for the 21st Century, D. Saha and A. Mukherjee, Mar., pp. 25-31

The Vision of Autonomic Computing, J.O. Kephart and D. Chess, Jan., pp. 41-50

Resource discovery
see Network services
Risk management

Designing Safety-Critical Computer Systems, W.R. Dunn, Nov., pp. 40-46

Risk Management Is Still Where the Money Is [Column], D. Geer, Dec., pp. 129-131

Using Risk to Balance Agile and Plan-Driven Methods, B. Boehm and R. Turner, June, pp. 57-66

Robots

Artificial Intelligence: Hype or Reality? A.A. Hopgood, May, pp. 24-28

NASA Advances Robotic Space Exploration, D.S. Katz and R.R. Some, Jan., pp. 52-61

S
Safety

CARE: An Automobile Crash Data Analysis Tool, A.S. Parrish et al., June, pp. 22-32

Designing Safety-Critical Computer Systems, W.R. Dunn, Nov., pp. 40-46

Search engines
see Information retrieval
Security,
see also Computer crime, Data security, Privacy

Domain-Specific Codesign for Embedded Security, P. Schaumont and I. Verbauwhede, Apr., pp. 68-74

Firewalls: An Outdated Defense [Column], W.A. Arbaugh, June, pp. 112-113

Microsoft .NET Passport: A Security Analysis, R. Oppliger, July, pp. 29-35

Penny Tag Technologies for Removable Data Storage, F. Thomas, Aug., pp. 70-76

Risk Management Is Still Where the Money Is [Column], D. Geer, Dec., pp. 129-131

Standards for XML and Web Services Security [Column], M. Naedele, Apr., pp. 96-98

The State of Web Services [Column], C.S. Langdon, July, pp. 93-94

Understanding the Windows EAL4 Evaluation [Column], J.S. Shapiro, Feb., pp. 103-105

Wireless Security Is Different [Column], W.A. Arbaugh, Aug., pp. 99-101

Semantic Web
see World Wide Web
Semiconductor technology

Chip Making to Dye For [News], L.D. Paulson, July, p. 20

Driving Research in System-Chip Design Technology [Column], R. Gupta, July, pp. 95-97

The Future of Nanocomputing, G. Bourianoff, Aug., pp. 44-53

Leakage Current: Moore's Law Meets Static Power, N.S. Kim et al., Dec., pp. 68-75

Sensor networks

Security and Privacy in Sensor Networks [Column], H. Chan and A. Perrig, Oct., pp. 103-105

Service-based systems

CPXe: Web Services for Internet Imaging, T. Thompson et al., Oct., pp. 54-62

Ontology-Mediated Integration of Intranet Web Services, T-M. Tsai et al., Oct., pp. 63-71

Turning Software into a Service, M. Turner et al., Oct., pp. 38-44

Simulation

Challenges in Computer Architecture Evaluation, K. Skadron et al., Aug., pp. 30-36

A Decade of Hardware/Software Codesign, W. Wolf, Apr., pp. 38-43

Designing Computer Architecture Research Workloads, L. Eeckhout et al., Feb., pp. 65-71

Evaluating Servers with Commercial Workloads [Guest Editors' Intro], K. Keeton et al., Feb., pp. 29-32

Fighting Epidemics in the Information and Knowledge Age [Column], H. Zhuge and X. Shi, Oct., pp. 116, 114-115

Metric and Workload Effects on Computer Systems Evaluation, D.G. Feitelson, Sept., pp. 18-25

Metropolis: An Integrated Electronic System Design Environment, F. Balarin et al., Apr., pp. 45-52

Queuing Simulation Model for Multiprocessor Systems, T-F. Tsuei and W. Yamamoto, Feb., pp. 58-64

Simulating a $2M Commercial Server on a $2K PC, A.R. Alameldeen et al., Feb., pp. 50-57

SystemC Cosimulation and Emulation of Multiprocessor SoC Designs, L. Benini et al., Apr., pp. 53-59

Toward IP-Based System-Level SoC Design [Column], J. Kunkel, May, pp. 88-89

Social issues

Andhra Pradesh: Lessons for Global Software Development, K. Eischen, June, pp. 31-37

Fighting Epidemics in the Information and Knowledge Age [Column], H. Zhuge and X. Shi, Oct., pp. 116, 114-115

The Profession's Role in the Global Information Society [Column], W. Cellary, Sept., pp. 124, 122-123

Revising the Principles of Technorealism [Column], N. Holmes, Jan., pp. 128, 126-127

Using Technology to Preserve the World's Languages [News, sidebar], L.D. Paulson, Feb., p. 23

Wireless Community Networks [Column], S. Jain and D. Agrawal, Aug., pp. 90-92

Software architecture

ANTS Framework for Cooperative Work Environments, P.G. López and A. Skarmeta, Mar., pp. 56-62

Toward Internet Distributed Computing, M. Milenkovic et al., May, pp. 38-46

Software engineering
see also Agile software development

The Case for Perspicuous Programming [Column], N. Holmes, Apr., pp. 104, 102-103

Developing Complex Projects Using XP with Extensions, M. Lippert et al., June, pp. 67-73

Iterative and Incremental Development: A Brief History, C. Larman and V. Basili, June, pp. 47-56

Uncovering Hidden Contracts: The .NET Example, K. Arnout and B. Meyer, Nov., pp. 48-55

Using Risk to Balance Agile and Plan-Driven Methods, B. Boehm and R. Turner, June, pp. 57-66

Value-Based Software Engineering: A Case Study, B. Boehm and L. Huang, Mar., pp. 33-41

VIM: Taming Software with Hardware, M. Halpern, Oct., pp. 21-25

Software quality

Building Better Software with Better Tools [News], S.J. Vaughan-Nichols, Sept., pp. 12-14

Think Tank Targets Better Software [News], L.D. Paulson, Jan., p. 30

Software requirements

The Art of Requirements Triage, A.M. Davis, Mar., pp. 42-49

Software reliability

Designing Safety-Critical Computer Systems, W.R. Dunn, Nov., pp. 40-46

Software Reliability from the Customer View, A.P. Wood, Aug., pp. 37-42

Web Services Orchestration and Choreography, C. Peltz, Oct., pp. 46-52

Speech recognition and synthesis

Intel Says: Read My Lips [News], L.D. Paulson, Oct., pp. 18-19

Two Technologies Vie for Recognition in Speech Market [News], N. Leavitt, June, pp. 13-16

Software reusability

Turning Software into a Service, M. Turner et al., Oct., pp. 38-44

Standards
see also Network protocols

The Challenge of Wi-Fi Roaming [News], S.J. Vaughan-Nichols, July, pp. 17-19

CPXe: Web Services for Internet Imaging, T. Thompson et al., Oct., pp. 54-62

Dual Tragedies: IP Rights in Industry Standards, D. Lin, Feb., pp. 25-27

IETF Will Continue Using Patented Technologies in Standards [News], L.D. Paulson, June, p. 20

The Ins and Outs of New Local I/O Trends [News], L.D. Paulson, July, pp. 13-16

Metadata Standards for Educational Resources [Column], M. McClelland, Nov., pp. 107-109

New Compression Technology Would Improve Online Video Quality [News], L.D. Paulson, Apr., p. 25

Penny Tag Technologies for Removable Data Storage, F. Thomas, Aug., pp. 70-76

The Problem with Unicode [Column], N. Holmes, June, pp. 116, 114-115

SCTP: A Proposed Standard for Robust Internet Data Transport, A.L. Caro Jr. et al., Nov., pp. 56-63

Security in Storage [Column], J. Hughes and J. Cole, Jan., pp. 124-125

Standards for XML and Web Services Security [Column], M. Naedele, Apr., pp. 96-98

The Status and Future of 802.11-Based WLANs [Column], U. Varshney, June, pp. 102-105

Switch Fabric Interfaces [Column], I. Elhanany et al., Sept., pp. 106-108

Toward Internet Distributed Computing, M. Milenkovic et al., May, pp. 38-46

Two Technologies Vie for Recognition in Speech Market [News], N. Leavitt, June, pp. 13-16

Understanding the Windows EAL4 Evaluation [Column], J.S. Shapiro, Feb., pp. 103-105

Web Services Orchestration and Choreography, C. Peltz, Oct., pp. 46-52

Wireless Community Networks [Column], S. Jain and D. Agrawal, Aug., pp. 90-92

Wireless Security Is Different [Column], W.A. Arbaugh, Aug., pp. 99-101

XrML's Role in Information Piracy Prevention and Privacy Protection [Sidebar], X. Wang and T. DeMartini, July, p. 74

X-VRML for Advanced Virtual Reality Applications [Column], K. Walczak et al., Mar., pp. 89-92

Storage management

Metadata's Role in a Scientific Archive, J. Thomson et al., Dec., pp. 27-34

A Popularity-Based Prediction Model for Web Prefetching, X. Chen and X. Zhang, Mar., pp. 63-70

Storage technology

"Ballistic" Technique Boosts Storage Capacity [News], L.D. Paulson, Aug., pp. 26-27

Hard-Drive Technology Navigates a Turning Point [News], SJ. Vaughan-Nichols, Dec., pp. 21-23

Reducing Disk Power Consumption in Servers with DRPM, S. Gurumurthi et al., Dec., pp. 59-66

Security in Storage [Column], J. Hughes and J. Cole, Jan., pp. 124-125

System integration

A Formal Approach to MpSoC Performance Verification, K. Richter et al., Apr., pp. 60-67

System-on-chip (SoC) technology

Closing the SoC Design Gap [Column], J. Henkel, Sept., pp. 119-121

Driving Research in System-Chip Design Technology [Column], R. Gupta, July, pp. 95-97

Toward IP-Based System-Level SoC Design [Column], J. Kunkel, May, pp. 88-89

Systems engineering

The Vision of Autonomic Computing, J.O. Kephart and D. Chess, Jan., pp. 41-50

T
Technology forecasting

Computer Electronics Meet Animal Brains, C. Diorio and J. Mavoori, Jan., pp. 69-75

Grids, the TeraGrid, and Beyond, D.A. Reed, Jan., pp. 62-68

Intel Research Extends Moore's Law, S. Hamilton Jan., pp. 31-40

NASA Advances Robotic Space Exploration, D.S. Katz and R.R. Some, Jan., pp. 52-61

The Vision of Autonomic Computing, J.O. Kephart and D. Chess, Jan., pp. 41-50

Telecommunications industry

Computers and Communications: A Symbiotic Relationship, R.M. Janowiak, Jan., pp. 76-79

Testing

Rigorous Evaluation of COTS Middleware Technology, I. Gorton et al., Mar., pp. 50-55

Trusted computing

Preventing Piracy, Reverse Engineering, and Tampering, G. Naumovich and N. Memon, July, pp. 64-71

A Trusted Open Platform, P. England et al., July, pp. 55-62

U
Ubiquitous computing
see Pervasive computing
User interfaces

Getting in Touch with Interactive Haptic Technology [News], L.D. Paulson, Nov., p. 18

Interactive Workspaces [Column], B. Johanson et al., Apr., pp. 99-101

Truth and Clarity in Arithmetic [Column], N. Holmes, Feb., pp. 108, 106-107

V
Virtual reality

Revitalizing Museums with Digital Technology [Column], M. Macedonia, Feb., pp. 94-96

X-VRML for Advanced Virtual Reality Applications [Column], K. Walczak et al., Mar., pp. 89-92

W
Wearable computing

Next-Generation Wearable Networks, R.L. Ashok and D.P. Agrawal, Nov., pp. 31-39

SPECs: Personal Pervasive Systems [Column], M. Lamming and D. Bohm, June, pp. 109-111

Web search
see Information retrieval
Web services

CPXe: Web Services for Internet Imaging, T. Thompson et al., Oct., pp. 54-62

Microsoft .NET Passport: A Security Analysis, R. Oppliger, July, pp. 29-35

Ontology-Mediated Integration of Intranet Web Services, T-M. Tsai et al., Oct., pp. 63-71

Scaling Web Services with Capacity Provision Networks, X. Geng et al., Nov., pp. 64-72

Standards for XML and Web Services Security [Column], M. Naedele, Apr., pp. 96-98

The State of Web Services [Column], C.S. Langdon, July, pp. 93-94

Taking Steps to Secure Web Services [News], D. Geer, Oct., pp. 14-16

Toward Internet Distributed Computing, M. Milenkovic et al., May, pp. 38-46

Turning Software into a Service, M. Turner et al., Oct., pp. 38-44

Web Services Computing—Advancing Software Interoperability [Guest Editors' Intro], J-Y. Chung et al., Oct., pp. 35-37

Web Services Orchestration and Choreography, C. Peltz, Oct., pp. 46-52

Web sites

Improving Web Accessibility [Column], E.T. Loiacono, Jan., pp. 117-119

Weblogs: Simplifying Web Publishing [Column], C. Lindahl and E. Blount, Nov., pp. 114-116

Wireless technology
see also Mobile computing

The Challenge of Wi-Fi Roaming [News], S.J. Vaughan-Nichols, July, pp. 17-19

Handhelds Go to School: Lessons Learned, D. Tatar et al., Sept., pp. 30-37

Integrating Mobile IP with Ad Hoc Networks, Y-C. Tseng et al., May, pp. 48-55

Mega-Utilities Drive Invisible Technologies [Column], B.N. Schilit, Feb., pp. 97-99

New Techniques for Speeding Wireless Streaming Video [News], L.D. Paulson, May, p. 21

Next-Generation Wearable Networks, R.L. Ashok and D.P. Agrawal, Nov., pp. 31-39

Pervasive Healthcare [Column], U. Varshney, Dec., pp. 138-140

Software Radios Add Flexibility to Wireless Technology [News], S. Ortiz Jr., Aug., pp. 23-25

SPECs: Personal Pervasive Systems [Column], M. Lamming and D. Bohm, June, pp. 109-111

The Status and Future of 802.11-Based WLANs [Column], U. Varshney, June, pp. 102-105

Using Magnets for Wireless Device Connectivity [News], L.D. Paulson, Dec., pp. 24-26

Vendors Push Wireless LAN Security [News], L.D. Paulson, Jan., p. 28

Vendors Support New Fixed Wireless Broadband Technology [News], L.D. Paulson, May, p. 22

Will Ultrawideband Technology Connect in the Marketplace? [News], L.D. Paulson, Dec., pp. 15-17

Wireless Advertising's Challenges and Opportunities, H.M. Yunos and S. Shim, May, pp. 30-37

Wireless Community Networks [Column], S. Jain and D. Agrawal, Aug., pp. 90-92

Wireless Location Privacy Protection [Column], B. Schilit, J. Hong, and M. Gruteser, Dec., pp. 135-137

Wireless Security Is Different [Column], W.A. Arbaugh, Aug., pp. 99-101

World Wide Web
see also Internet, Web services, Web sites

The State of Web Services [Column], C.S. Langdon, July, pp. 93-94

W3C Works on Semantic Web Proposal [News], L.D. Paulson, Nov., p. 20

X
XML

XML Raises Concerns as It Gains Prominence [News], S.J. Vaughan-Nichols, May, pp. 14-16

AUTHOR INDEX

A

Adams, Dan, see J. Thomson, Dec., pp. 27-34

Adve, Sarita V., see D.G. Sachs, Dec., pp. 56-57

Agrawal, Dharma P., see R. Ashok, Nov., pp. 31-39see S. Jain, Aug., pp. 90-92

Ahn, Jung Ho, see U. Kapasi, Aug., pp. 54-62

Alameldeen, Alaa R., et al., Simulating a $2M Commercial Server on a $2K PC, Feb., pp. 50-57

Albonesi, David H., et al., Dynamically Tuning Processor Resources with Adaptive Processing, Dec., pp. 49-58

Amer, Paul D., see A.L. Caro Jr., Nov., pp. 56-63

Anderson, Todd A., see M. Milenkovic, May, pp. 38-46

Arbaugh, William A. , Firewalls: An Outdated Defense, [Column], June, pp. 112-113 Wireless Security Is Different, [Column], Aug., pp. 99-101

Arnout, Karine, and B. Meyer, Uncovering Hidden Contracts: The .NET Example, Nov., pp. 48-55

Ashok, Roy L., and D. Agrawal, Next-Generation Wearable Networks, Nov., pp. 31-39

Assayag, Gerard, see S. Dubnov, Oct., pp. 73-80

August, David I., see K. Skadron, Aug., pp. 30-36

Austin, T., see N. Kim, Dec., pp. 68-75

B

Bal, Henri E., see J. Romein, Oct., pp. 26-33

Balarin, Felice, et al., Metropolis: An Integrated Electronic System Design Environment, Apr., pp. 45-52

Balasubramonian, Rajeev, , see D.H. Albonesi, Dec., pp. 49-58

Barkai, David, see M. Milenkovic, May, pp. 38-46

Basili, Victor R., see C. Larman, June, pp. 47-56

Bayardo, Roberto J., and R. Srikant, Technological Solutions for Protecting Privacy [Column], Sept., pp. 115-118

Beck, Kent, and B. Boehm, Agility through Discipline: A Debate, June, pp. 44-46

Becker-Pechau, Petra, see M. Lippert, June, pp. 67-73

Beigl, Michael, see B. Myers, Sept., pp. 27-29

Bejerano, Gill, see S. Dubnov, Oct., pp. 73-80

Bellotti, Francesco, et al., VeGame: Exploring Art and History in Venice, Sept., pp. 48-55

Benini, Luca, et al., SystemC Cosimulation and Emulation of Multiprocessor SoC Designs, Apr., pp. 53-59

Berta, Riccardo, see F. Bellotti, Sept., pp. 48-55

Bertozzi, Davide, see L. Benini, Apr., pp. 53-59

Beveridge, J. Ross, see W.A. Najjar, Aug., pp. 63-69

Bhattacharyya, Shuvra S., see J. Henkel, Apr., pp. 35-37

Bianchini, Ricardo, and R. Rajamony, Energy Conservation in Clustered Servers, Dec., pp. 44- 45

Blaauw, David, see N. Kim, Dec., pp. 68-75

Blanchette Jr., Stephen, Surviving Unemployment in the High-Tech Downturn, July, pp. 24-28

Blount, Elise, see Lindahl, C., Nov., pp. 114-116

Boehm, Barry, and L. Huang, Value-Based Software Engineering: A Case Study, Mar., pp. 33-41

Boehm, Barry, and K. Beck, Agility through Discipline: A Debate, June, pp. 44-46

Boehm, Barry, and R. Turner, Using Risk to Balance Agile and Plan-Driven Methods, June, pp. 57-66

Bohm, Denis, see M. Lamming, June, pp. 109-111

Borriello, Gaetano, see J. Landay, Aug., pp. 93-95

Bose, Pradip, , see D.H. Albonesi, Dec., pp. 49-58

Bourianoff, George, The Future of Nanocomputing, Aug., pp. 44-53

Bowman, Mic, see M. Milenkovic, May, pp. 38-46

Bradshaw, Jeffrey M., G. Cabri, and R. Montanari, Taking Back Cyberspace [Column], July, pp. 89-92

Brebner, Paul, see I. Gorton, Mar., pp. 50-55

Breitling, Holger, see M. Lippert, June, pp. 67-73

Brereton, Pearl, see M. Turner, Oct., pp. 38-44

Brown, David, see A. Parrish, June, pp. 22-32

Bruni, Davide, see L. Benini, Apr., pp. 53-59

Budgen, David, see M. Turner, Oct., pp. 38-44

Busch, Kurt, see I. Elhanany, Sept., pp. 106-108

Buyuktosunoglu, Alper, , see D.H. Albonesi, Dec., pp. 49-58

Böhm, Wim, see W.A. Najjar, Aug., pp. 63-69

C

Cabri, Giacomo, see J. Bradshaw, July, pp. 89-92

Caro Armando L., Jr., et al., SCTP: A Proposed Standard for Robust Internet Data Transport, Nov., pp. 56-63

Carver, Doris L., Building on the Past, Looking to the Future [EIC's Message], Jan., pp. 6-7, 10

Cellary, Wojciech, see also K. Walczak, Mar., pp. 89-92 The Profession's Role in the Global Information Society [Column], Sept., pp. 124, 122-123

Chan, Haowen, and A. Perrig, Security and Privacy in Sensor Networks [Column], Oct., pp. 103-105

Chau, Michael, and H. Chen , Comparison of Three Vertical Search Spiders, May, pp. 56-62

Chawathe, Monica, see W.A. Najjar, Aug., pp. 63-69

Chen, Hsinchun, see M. Chau, May, pp. 56-62

Chen, Wen-Tsuen, see Y. Tseng, May, pp. 48-55

Chen, Xin, and X. Zhang, A Popularity-Based Prediction Model for Web Prefetching, Mar., pp. 63-70

Chess, David M., see J. Kephart, Jan., pp. 41-50

Chiou, Derek, see I. Elhanany, Sept., pp. 106-108

Choi, Kiyoung, see N. Dutt, Jan., pp. 120-123

Chou, Seng-cho T., see T. Tsai, Oct., pp. 63-71

Chung, Jen-Yao, K. Lin, and R. Mathieu, Web Services Computing—Advancing Software Interoperability [Guest Editors' Intro], Oct., pp. 35-37

Clapp, Russell, see K. Keeton, Feb., pp. 29-32

Cockburn, Alistair, see L. Williams, June, pp. 39-43

Cohn, Mike, and D. Ford, Introducing an Agile Process to an Organization, June, pp. 74-78

Cole, Jack, see J. Hughes, Jan., pp. 124-125

Colwell, Bob, A Man, a Dog, and a Machine, [Opinion] Jan., pp. 14-16 Me and My Theremin, [Opinion] Feb., pp. 8-9 Ground Bounce, [Opinion] Mar., pp. 11-13 Science Fairs, [Opinion] Apr., pp. 13-16 Leave Bernoulli Out of This, [Opinion] May, pp. 10-12That's Not Computing— This Is Computing, [Opinion] June, pp. 6-8 Tools of the Trade, [Opinion] July, pp. 7-9 Engineering Decisions, [Opinion] Aug., pp. 9-11 Engineering, Marketing Teams, and Management, [Opinion] Sept., pp. 5-7 Design Reviews, [Opinion] Oct., pp. 8-10 How Not to Teach Science, [Opinion] Nov., pp. 7-9 Benchmarketing Competition, [Opinion] Dec., pp. 9-11

Cook, Peter W., , see D.H. Albonesi, Dec., pp. 49-58

Cordes, David, see A. Parrish, June, pp. 22-32

Cowley, Paula, see J. Thomson, Dec., pp. 27-34

D

Dally, William J., see U.J. Kapasi, Aug., pp. 54-62

Davis, Alan M., The Art of Requirements Triage, Mar., pp. 42-49

De Bosschere, Koen, see L. Eeckhout, Feb., pp. 65- 71

De Gloria, Alessandro, see F. Bellotti, Sept., pp. 48- 55

DeMartini, Thomas, see X. Wang, July, p. 74

Diamond, Stephen L. , Building a Better Computer Society, [President's Message], Jan., pp. 8-10 Looking Forward, [President's Message], Dec., pp. 12-14

Diorio, Chris, and J. Mavoori, Computer Electronics Meet Animal Brains, Jan., pp. 69-75

Dixon, Brandon, see A. Parrish, June, pp. 22-32

Drago, Nicola, see L. Benini, Apr., pp. 53-59

Draper, Bruce A., see W.A. Najjar, Aug., pp. 63-69

Dropsho, Steven G., , see D.H. Albonesi, Dec., pp. 49-58

Dubnov, Shlomo, et al., Using Machine-Learning Methods for Musical Style Modeling, Oct., pp. 73-80

Dunn, William R., Designing Safety-Critical Computer Systems, Nov., pp. 40-46

Dutt, Nikil, and K. Choi, Configurable Processors for Embedded Computing [Column], Jan., pp. 120-123

Dutta, Amitava, Managing IT with Systems Thinking [Column], Mar., pp. 96-97

Dwarkadas, Sandhya, , see D.H. Albonesi, Dec., pp. 49-58

E

Eeckhout, Lieven, H. Vandierendonck, and K. De Bosschere, Designing Computer Architecture Research Workloads, Feb., pp. 65-71

Eischen, Kyle, Andhra Pradesh: Lessons for Global Software Development, June, pp. 31-37

Elhanany, Itamar, K. Busch and D. Chiou, Switch Fabric Interfaces [Column], Sept., pp. 106-108

Elhanany, Itamar, and V. Tabatabaee, Benchmarking Next-Generation Switch Fabrics [Column], Oct., pp. 109-110

England, Paul, et al., A Trusted Open Platform, July, pp. 55-62

Ernst, Rolf, see K. Richter, Apr., pp. 60-67

Eskicioglu, Ahmet M., Protecting Intellectual Property in Digital Multimedia Networks, July, pp. 39-45

F

Favela, Jesus, see M. Muñoz, Sept., pp. 38-46

Feitelson, Dror G., Metric and Workload Effects on Computer Systems Evaluation, Sept., pp. 18-25

Felter, Wes, see C. Lefurgy, Dec., pp. 39-48

Ferretti, Edmondo, see F. Bellotti, Sept., pp. 48-55

Fishwick, Paul, Nurturing Next-Generation Computer Scientists [Column], Dec., pp. 132-134

Flautner, Krisztián, see N. Kim, Dec., pp. 68-75

Fogel, David B., Evolutionary Entertainment with Intelligent Agents [Column], June, pp. 106-108

Ford, Doris, see M. Cohn, June, pp. 74-78

Fox, Armando, see B. Johanson, Apr., pp. 99-101

Franke, Hubertus, see S. Gurumurthi, Dec., pp. 59-66

Friedman, Eby G., see D.H. Albonesi, Dec., pp. 49-58

Fummi, Franco, see L. Benini, Apr., pp. 53-59

G

Gao, Jerry Zeyu, see H. Yunos, May, pp. 30-37

García, Daniel F., and J. García, TPC-W E-Commerce Benchmark Evaluation, Feb., pp. 42-48

García, Javier, see D. García, Feb., pp. 42-48

Garg, Sharad, see M. Milenkovic, May, pp. 38-46

Geer, Dan, Risk Management Is Still Where the Money Is [Column], Dec., pp. 129-131

Geer, David , Federated Approach Expands Database-Access Technology, [News],May, pp. 18-20 Taking Steps to Secure Web Services,[News], Oct., pp. 14-16

Gehorsam, Robert, The Coming Revolution in Massively Multiuser Persistent Worlds [Column], Apr., pp. 93-95

Geng, Xianjun, et al., Scaling Web Services with Capacity Provision Networks, Nov., pp. 64-72

Ghahramani, Bahador, and M. Pauley, Java in High-Performance Environments [Column], Sept., pp. 109-111

González, Victor M., see M. Muñoz, Sept., pp. 38-46

Gopal, Ram D. , see Y. Tung, Feb., pp. 100-102see X. Geng, Nov., pp. 64-72

Gorton, Ian, A. Liu, and P. Brebner, Rigorous Evaluation of COTS Middleware Technology, Mar., pp. 50-55

Gruteser, Marco, see B. Schilit, Dec., pp. 135-137

Gudivada, Venkat N., The Computing Profession at a Crossroads [Column], May, pp. 92, 90-91

Gupta, Rajesh, Driving Research in System-Chip Design Technology [Column], July, pp. 95-97

Gurumurthi, Sudhanva, et al., Reducing the Disk Power Consumption in Servers with DRPM, Dec., pp. 59-66

H

Halpern, Mark, VIM: Taming Software with Hardware, Oct., pp. 21-25

Hamilton, Scott, Intel Research Extends Moore's Law, Jan., pp. 31-40

Hammes, Jeff, see W.A. Najjar, Aug., pp. 63-69

Harris, Albert F. III, see D.G. Sachs, Dec., pp. 56-57

Heinz, Gerard J. II, see A.L. Caro Jr., Nov., pp. 56-63

Henkel, Jörg, , X. Hu, and S. Bhattacharyya, Taking on the Embedded System Design Challenge [Guest Editors' Intro], Apr., pp. 35-37 Closing the SoC Design Gap [Column], Sept., pp. 119-121

Hevner, Alan R., and S.T. March, The Information Systems Research Cycle [Column], Nov., pp. 111-113

Hill, Mark D. , see A.R. Alameldeen, Feb., pp. 50-57see K. Skadron, Aug., pp. 30-36

Holmes, Neville , Revising the Principles of Technorealism, Jan., pp. 128, [Column] 126-127 Truth and Clarity in Arithmetic, [Column] Feb., pp. 108, 106-107 The Case for Perspicuous Programming, [Column] Apr., pp. 104, 102-103 The Problem with Unicode, [Column] June, pp. 116, 114-115 Should Professionals Be Political?, [Column] July, pp. 100, 98-99 Artificial Intelligence: Arrogance or Ignorance?, [Column] Nov., pp. 120, 118-119 The Digital Divide, the UN, and the Computing Profession, [Column] Dec., pp. 144, 142-143

Hong, Jason, see B. Schilit, Dec., pp. 135-137

Hopgood, Adrian A., Artificial Intelligence: Hype or Reality?, May, pp. 24-28

Hsieh, Harry, see F. Balarin, Apr., pp. 45-52

Hu, J.S., see N. Kim, Dec., pp. 68-75

Hu, Xiaobo Sharon, see J. Henkel, Apr., pp. 35-37

Hu, Ying, see T. Menzies, Nov. pp. 22-29

Huang, Li Guo, see B. Boehm, Mar., pp. 33-41

Huang, Michael C., J. Renau, and J. Torrellas,see D.H. Albonesi, Dec., pp. 49-58 Managing Multiple Low-Power Adaptation Techniques: The Positional Approach [Sidebar], Dec., pp. 52-53

Hughes, Christopher J., see D.G. Sachs, Dec., pp. 56-57

Hughes, Jim, and J. Cole, Security in Storage, Jan., pp. 124-125

I

Irwin, M.J., see N. Kim, Dec., pp. 68-75

Iyengar, Janardhan R., see A.L. Caro Jr., Nov., pp. 56-63

J

Jain, Saurabh, and D. Agrawal, Wireless Community Networks [Column], Aug., pp. 90-92

Janowiak, Robert M., Computers and Communications: A Symbiotic Relationship, Jan., pp. 76-79

Jersak, Marek, see K. Richter, Apr., pp. 60-67

Johanson, Brad, T. Winograd, and A. Fox, Interactive Workspaces [Column], Apr., pp. 99-101

John, Lizy Kurian, see Y. Luo, Feb., pp. 34-40

Johnson, Steven D., , Formal Methods in Embedded Design [Column], Nov., pp. 104-106

Jones, Douglas L., see D.G. Sachs, Dec., pp. 56-57

K

Kandemir, M., see N. Kim, Dec., pp. 68-75

Kandemir, Mahmut, see S. Gurumurthi, Dec., pp. 59-66

Kapasi, Ujval J., et al., Programmable Stream Processors, Aug., pp. 54-62

Katz, Daniel S., and R. Some, NASA Advances Robotic Space Exploration, Jan., pp. 52-61

Keeton, Kimberly, R. Clapp, and A. Nanda, Evaluating Servers with Commercial Workloads [Guest Editors' Intro], Feb., pp. 29-32

Keller, Tom W., see C. Lefurgy, Dec., pp. 39-48

Kephart, Jeffrey O., and D. Chess, The Vision of Autonomic Computing, Jan., pp. 41-50

Khailany, Brucek, see U. Kapasi, Aug., pp. 54-62

Kim, Nam Sung, et al., Leakage Current: Moore's Law Meets Static Power, Dec., pp. 68-75

Kistler, Michael, see C. Lefurgy, Dec., pp. 39-48

Knauerhase, Rob C., see M. Milenkovic, May, pp. 38-46

Koch, Jörn, see M. Lippert, June, pp. 67-73

Kornstädt, Andreas, see M. Lippert, June, pp. 67-73

Kravets, Robin H., see D.G. Sachs, Dec., pp. 56-57

Kunkel, Joachim, Toward IP-Based System-Level SoC Design [Column], May, pp. 88-89

Kursun, Volkan, see D.H. Albonesi, Dec., pp. 49-58

L

Ladha Sourabh, see A.L. Caro Jr., Nov., pp. 56-63

López, Pedro García, and A. Skarmeta, ANTS Framework for Cooperative Work Environments, Mar., pp. 56-62

Lamming, Mik, and D. Bohm, SPECs: Personal Pervasive Systems [Column], June, pp. 109-111

Lampson, Butler, see P. England, July, pp. 55-62

Landay, James A., and G. Borriello, Design Patterns for Ubiquitous Computing [Column], Aug., pp. 93-95

Langdon, Christoph Schlueter, The State of Web Services [Column], July, pp. 93-94

Larman, Craig, and V.R. Basili, Iterative and Incremental Development: A Brief History, June, pp. 47-56

Lartillot, Olivier, see S. Dubnov, Oct., pp. 73-80

Lavagno, Luciano, see F. Balarin, Apr., pp. 45-52

Lawton, Geroge, [News] Instant Messaging Puts on a Business Suit, Mar., pp. 14-16

Leavitt, Neal , Will Wireless Gaming Be a Winner?, [News], Jan., pp. 24-27 Two Technologies Vie for Recognition in Speech Market, [News], June, pp. 13-16

Lefurgy, Charles, et al., Energy Management for Commercial Servers, Dec., pp. 39-48

Lei, Hui, see A. Ranganathan, Apr., pp. 90-92

Liao, Ping-Yao, see T. Tsai, Oct., pp. 63-71

Lilja, David J., see K. Skadron, Aug., pp. 30-36

Lin, Daniel, Dual Tragedies: IP Rights in Industry Standards, Feb., pp. 25-27

Lin, Kwei-Jay, see J. Chung, Oct., pp. 35-37

Lindahl, Charlie, and E. Blount, Weblogs: Simplifying Web Publishing [Column], Nov., pp. 114-116

Lippert, Martin, et al., Developing Complex Projects Using XP with Extensions, June, pp. 67-73

Liu, Anna, see I. Gorton, Mar., pp. 50-55

Loiacono, Eleanor T., Improving Web Accessibility [Column], Jan., pp. 117-119

Luo, Yue, et al., Benchmarking Internet Servers on Superscalar Machines, Feb., pp. 34-40

Lycett, Mark, et al., Migrating Agile Methods to Standardized Development Practice, June, pp. 79-85

M

Macedonia, Michael , Revitalizing Museums with Digital Technology, [Column], Feb., pp. 94-96 The GPU Enters Computing's Mainstream, [Column] Oct., pp. 106-108

Macredie, Robert D., see M. Lycett, June, pp. 79-85

Magklis, Grigorios, see D.H. Albonesi, Dec., pp. 49-58

Malek, Sam, see N. Medvidovic, Sept., pp. 66-73

Manferdelli, John, see P. England, July, pp. 55-62

Manuel, Tyrus, Universities from around the World Compete in CSIDC 2003 [CS Connection], Mar., p. 73

March, Salvatore T., see A. Hevner, Nov., pp. 111-113

Margarone, Massimiliano, see F. Bellotti, Sept., pp. 48-55

Martin, Milo M.K., see A.R. Alameldeen, Feb., pp. 50-57

Martinez-Garcia, Ana I., see M. Muñoz, Sept., pp. 38-46

Martonosi, Margaret, see K. Skadron, Aug., pp. 30-36

Mathieu, Richard G., see J. Chung, Oct., pp. 35-37

Mattson, Peter, see U. Kapasi, Aug., pp. 54-62

Mauer, Carl J., see A.R. Alameldeen, Feb., pp. 50-57

Mavoori, Jaideep, see C. Diorio, Jan., pp. 69-75

McDonald, David W., Ubiquitous Recommendation Systems [Column], Oct., pp. 111-112

McClelland, Marilyn, Metadata Standards for Educational Resources [Column], Nov., pp. 107-109

Medvidovic, Nenad, et al., Software Architectural Support for Handheld Computing, Sept., pp. 66-73

Mehta, Nikunj R., see N. Medvidovic, Sept., pp. 66-73

Memon, Nasir, see G. Naumovich, July, pp. 64-71

Menzies, Tim, and Y. Hu, Data Mining for Very Busy People, Nov. pp. 22-29

Mericas, Alex, see Y. Luo, Feb., pp. 34-40

Meyer, Bertrand, see K. Arnout, Nov., pp. 48-55

Mikic-Rakic, Marija, see N. Medvidovic, Sept., pp. 66-73

Milenkovic, Milan, et al., Toward Internet Distributed Computing, May, pp. 38-46

Milutinovic, Veljko, and N. Skundric, Will Distance Learning Create a Global University? [Column], Mar., pp. 100, 98-99

Montanari, Rebecca, see J. Bradshaw, July, pp. 89-92

Moore, Kevin E., see A.R. Alameldeen, Feb., pp. 50-57

Mudge, Trevor, see N. Kim, Dec., pp. 68-75

Mukherjee, Amitava, see D. Saha, Mar., pp. 25-31

Muñoz, Miguel A., et al., Context-Aware Mobile Communication in Hospitals, Sept., pp. 38-46

Myers, Brad A., and M. Beigl, Handheld Computing [Guest Editors' Intro], Sept., pp. 27-29

N

Nadamuni, Daya, , and G. Smith, Electronic System-Level Design: Challenges on the Road Ahead [Sidebar], Apr., pp. 36-37

Naedele, Martin, Standards for XML and Web Services Security, Apr., pp. 96-98

Nahrstedt, Klara, see D.G. Sachs, Dec., pp. 56-57

Najjar, Walid A., et al., High-Level Language Abstraction for Reconfigurable Computing, Aug., pp. 63-69

Nanda, Ashwini, see K. Keeton, Feb., pp. 29-32

Naor, Dalit, and M. Naor, Protecting Cryptographic Keys: The Trace-and-Revoke Approach, July, pp. 47-53

Naor, Moni, see D. Naor, July, pp. 47-53

Narayanaswami, Chandra, see M. Raghunath, Sept., pp. 56-65

Naumovich, Gleb, and N. Memon, Preventing Piracy, Reverse Engineering, and Tampering, July, pp. 64-71

O

Oppliger, Rolf, Microsoft .NET Passport: A Security Analysis, July, pp. 29-35

Ortiz Jr., Sixto , New Monitor Technologies Are on Display, [News], Feb., pp. 13-16 Software Radios Add Flexibility to Wireless Technology, [News], Aug., pp. 23-25

Owens, John D., see U. Kapasi, Aug., pp. 54-62

P

Pai, Vijay S., see K. Skadron, Aug., pp. 30-36

Parrish, Allen S., et al., CARE: An Automobile Crash Data Analysis Tool, June, pp. 22-32

Passerone, Claudio, see F. Balarin, Apr., pp. 45-52

Patel, Chaitali, see M. Lycett, June, pp. 79-85

Paul, Ray J., see M. Lycett, June, pp. 79-85

Pauley, Mark A., see B. Ghahramani, Sept., pp. 109-111

Paulson, Linda Dailey , Low-Power Chips for High-Powered Handhelds,[News], Jan., pp. 21-23 Vendors Push Wireless LAN Security,[News], Jan., p. 28 Picturing a New Encryption Technique,[News], Jan., p. 29 Think Tank Targets Better Software,[News], Jan., p. 30 Databases That Heal Themselves,[News], Feb., p. 22 Chip Makers Turn to Multigate Transistors,[News], Feb., p. 23 Using Technology to Preserve the World's Languages,[News], Feb., p. 23 Going Mobile with Web Services,[News], Feb., p. 24 IBM Seeks to Unify Data-Access Approaches,[News], Mar., p. 22 Researcher Puts the Network to Music,[News], Mar., pp. 23-24 DARPA Creating Self-Aware Computing,[News], Mar., p. 24 Students Help Put a Computer in Every Classroom,[News], Mar., p. 24 Optical Networking Chips Get Faster in a Slow Market,[News], Apr., pp. 18-20 Researchers Automate the Digital Animation Process,[News], Apr., p. 24 New Compression Technology Would Improve Online Video Quality,[News], Apr., p. 25 Sun Tries to Guide Mobile Java,[News], Apr., pp. 25-26 New Search Engines Keep Humming Along,[News], Apr., p. 26 New Techniques for Speeding Wireless Streaming Video,[News], May, p. 21 Vendors Support New Fixed Wireless Broadband Technology,[News], May, p. 22 Researchers Improve Parallel Processing,[News], May, p. 23 Minifilm Festival for Handheld Devices,[News], May, p. 23 Xerox Hopes Chip Will Cut Costs of Fiber Services,[News], June, p. 18 Sharp Develops a 3D Display for Cell Phones and Computers,[News], June, p. 19 IETF Will Continue Using Patented Technologies in Standards,[News], June, p. 20 The Ins and Outs of New Local I/O Trends, July,[News], pp. 13-16 Chip Making to Dye For,[News], July, p. 20 Using AI in Games that Adapt to Users,[News], July, p. 21 Group Considers Drastic Measure to Stop Spam,[News], July, pp. 21-22 Technology Enables Online Voice Auditions,[News], July, p. 22 Spammers Begin Sending Viruses with their Junk Mail,[News], Aug., p. 26 "Ballistic" Technique Boosts Storage Capacity,[News], Aug., pp. 26-27 FAST Approach Could Accelerate Internet Down-loads,[News], Aug., pp. 27-28 Reconfiguring Wireless Phones with Adaptive Chips,[News], Sept., pp. 9-11 Nanotech RAM Holds Promise for Universal Memory,[News], Sept., p. 15 US Court Establishes Protection against Reverse Engineering,[News], Sept., p. 16 Using Web Crawlers to Fight Piracy,[News], Sept., pp. 16-17 Common Fabric Dyes Promise to Help Optical Communications,[News], Oct., p. 17 Proponents Drop Support for Controversial Software Proposal,[News], Oct., p. 18 Intel Says: Read My Lips,[News], Oct., pp. 18-19 Companies Look for Unit of Computing Consumption,[News], Oct. p. 19 Will Fuel Cells Replace Batteries in Mobile Devices?[News], Nov., pp. 10-12 Getting in Touch with Interactive Haptic Technology,[News], Nov., p. 18 Finding Optical Fiber in the Deep Blue Sea,[News], Nov., pp. 18-19 W3C Works on Semantic Web Proposal,[News], Nov., p. 20 Researcher Has New Approach to Making Music with Computers,[News], Nov., p. 19 Will Ultrawideband Technology Connect in the Marketplace?[News], Dec., pp. 15-17 New Electronic Paper Can Display Moving Images,[News], Dec., pp. 24-26 Researchers Plan Advanced, Experimental Optical Network,[News], Dec., pp. 24-26 Using Magnets for Wireless Device Connectivity,[News], Dec., pp. 24-26

Peinado, Marcus, see P. England, July, pp. 55-62

Peltz, Chris, Web Services Orchestration and Choreography, Oct., pp. 46-52

Penuel, William R., see D. Tatar, Sept., pp. 30-37

Perrig, Adrian, see H. Chan, Oct., pp. 103-105

Piner, Mary-Louise G. , B. Ramakrishna (Bob) Rau (1951-2002),[CS Connection], Feb., p. 74 IEEE Names Fellows for 2003, Feb.,[CS Connection], pp. 72-73 IEEE Foundation Donates Over US$425,000 to Projects,[CS Connection], Feb. p. 75 Board of Governors Approves Technical Committee on Bioinformatics,[CS Connection], Feb., p. 76 Salaries Rise Slightly for US, Canadian Computing Faculty,[CS Connection], Mar., p. 74 Students from around the World Receive Scholarship Funds,[CS Connection], Apr., p. 75 IFIP TC-2 Chair Armando Haeberer, 1947-2003,[CS Connection], Apr., p. 75 New Education Board Mission Statement Highlights Increased Vitality,[CS Connection], Apr., p. 76 Board of Governors Approves Reading of Bylaws Amendment,[CS Connection], Apr., p. 77

Pinhanez, Claudio, see M. Raghunath, Sept., pp. 56-65

Poncino, Massimo, see L. Benini, Apr., pp. 53-59

R

Raghunath, Mandayam, C. Narayanaswami, and C. Pinhanez, Fostering a Symbiotic Handheld Environment, Sept., pp. 56-65

Rajamani, Karthick, see C. Lefurgy, Dec., pp. 39-48

Rajamony, Ram, see R. Bianchini, Dec., pp. 44-45

Rakhmatov, Daler, , see R. Rao, Dec., pp. 77-87

Ramesh, R., see X. Geng, Nov., pp. 64-72

Ranganathan, Anand, and H. Lei, Context-Aware Communication, Apr., pp. 90-92

Rao, Ravishankar, S. Vrudhula, and D. Rakhmatov, Battery Modeling for Energy-Aware System Design, Dec., pp. 77-87

Rawson, Freeman, see C. Lefurgy, Dec., pp. 39-48

Reed, Daniel A., Grids, the TeraGrid, and Beyond, Jan., pp. 62-68

Renau, Jose, see M.C. Huang Dec., pp. 52-53

Richter, Kai, M. Jersak, and R. Ernst, A Formal Approach to MpSoC Performance Verification, Apr., pp. 60-67

Rinker, Robert, see W.A. Najjar, Aug., pp. 63-69

Rixner, Scott, see U. Kapasi, Aug., pp. 54-62

Robertazzi, Thomas G., Ten Reasons to Use Divisible Load Theory, May, pp. 63-68

Robinson, Scott H., see M. Milenkovic, May, pp. 38-46

Rodríguez, Marcela, see M. Muñoz, Sept., pp. 38-46

Romein, John W., and H. Bal, Solving Awari with Parallel Retrograde Analysis, Oct., pp. 26-33

Roock, Stefan, see M. Lippert, June, pp. 67-73

Roschelle, Jeremy, see D. Tatar, Sept., pp. 30-37

Ross, Charles, see W.A. Najjar, Aug., pp. 63-69

Ross, Ronald G., The Business Rule Approach, May, pp. 85-87

Rubio, Juan, see Y. Luo, Feb., pp. 34-40

S

Sachs, Daniel Grobe, et al., GRACE: A Cross-Layer Adaptation Framework for Saving Energy [Sidebar], Dec., pp. 56-57

Saha, Debashis, and A. Mukherjee, Pervasive Computing: A Paradigm for the 21st Century, Mar., pp. 25-31

Sangiovanni-Vincentelli, Alberto, see F. Balarin, Apr., pp. 45-52

Santini, Simone, Bringing Copyright into the Information Age [Column], Aug., pp. 104, 102-103

Schaumont, Patrick, and I. Verbauwhede, Domain-Specific Codesign for Embedded Security, Apr., pp. 68-74

Schell, Jesse, Shaping an Entertaining Future at Carnegie Mellon [Column], Aug., pp. 96-98

Schilit, Bill N. , Mega-Utilities Drive Invisible Technologies,[Column], Feb., pp. 97-99

Schilit, Bill N. , and Jason Hong and Marco Gruteser, Wireless Location Privacy Detection,[Column], Dec., pp. 135-137

Schmolitzky, Axel, see M. Lippert, June, pp. 67-73

Schuster, Stanley E., , see D.H. Albonesi, Dec., pp. 49-58

Scott, Michael L., see D.H. Albonesi, Dec., pp. 49-58

Semeraro, Greg, see D.H. Albonesi, Dec., pp. 49-58

Seshadri, Pattabi, see Y. Luo, Feb., pp. 34-40

Shah, Keyur C., see A.L. Caro Jr., Nov., pp. 56-63

Shapiro, Jonathan S., Understanding the Windows EAL4 Evaluation [Column], Feb., pp. 103-105

Shen, Chia-Ching, see Y. Tseng, May, pp. 48-55

Shi, Xiaoqing, see H. Zhuge, Oct., pp. 116, 114-115

Shih, Hsin-Te, see T. Tsai, Oct., pp. 63-71

Shim, Simon, see H. Yunos, May, pp. 30-37

Sivasubramaniam, Anand, see Gurumurthi, S., Dec., pp. 59-66

Skadron, Kevin, et al., Challenges in Computer Architecture Evaluation, Aug., pp. 30-36

Skadron, Kevin, see M. Stan, Dec. pp. 35-38

Skarmeta, Antonio F. Gómez, see P. López, Mar., pp. 56-62

Skundric, Nikola, see V. Milutinovic, Mar., pp. 100, 98-99

Smith, Gary, see D. Nadamuni, Apr., pp. 36-37

Some, Raphael R., see D. Katz, Jan., pp. 52-61

Sorin, Daniel J., see A.R. Alameldeen, Feb., pp. 50-57

Srikant, Ramakrishnan, see R. Bayardo, Sept., pp. 115-118

Srinivasan, Savitha, On Piracy and Privacy [Guest Editor's Intro], July, pp. 36-38

Stan, Mircea R., and K. Skadron, Power-Aware Computing [Guest Editors' Intro], Dec., pp. 35-38

T

Tabatabaee, Vahid, see I. Elhanany, Oct., pp. 109-110

Tatar, Deborah, et al., Handhelds Go to School: Lessons Learned, Sept., pp. 30-37

Tewari, Vijay, see M. Milenkovic, May, pp. 38-46

Thomas, Fred, Penny Tag Technologies for Removable Data Storage, Aug., pp. 70-76

Thomson, Judi, et al., Metadata's Role in a Scientific Archive, Dec., pp. 27-34

Thompson, Timothy, R. Weil, and M. Wood, CPXe: Web Services for Internet Imaging, Oct., pp. 54-62

Tirri, Henry, Search in Vain: Challenges for Internet Search [Column], Jan., pp. 115-116

Torrellas, Josep, see M. Huang, Dec., pp. 52-53

Traw, C. Brendan S., Technical Challenges of Protecting Digital Entertainment Content, July, pp. 72-78

Tsai, Tse-Ming, et al., Ontology-Mediated Integration of Intranet Web Services, Oct., pp. 63-71

Tseng, Yu-Chee, C. Shen, and W. Chen, Integrating Mobile IP with Ad Hoc Networks, May, pp. 48-55

Tsuei, Thin-Fong, and W. Yamamoto, Queuing Simulation Model for Multiprocessor Systems, Feb., pp. 58-64

Tung, Y. Alex, R. Gopal, and A. Whinston, Multiple Online Auctions [Column], Feb., pp. 100-102

Turner, Mark, D. Budgen, and P. Brereton, Turning Software into a Service, Oct., pp. 38-44

Turner, Richard, see B. Boehm, June, pp. 57-66

V

Vahey, Phil, see D. Tatar, Sept., pp. 30-37

Vahid, Frank, The Softening of Hardware, Apr., pp. 27-34

Vandierendonck, Hans, see L. Eeckhout, Feb., pp. 65-71

Varshney, Upkar , The Status and Future of 802.11-Based WLANs, [Column], June, pp. 102-105 Pervasive Healthcare, [Column], Dec., pp. 138-140

Vaughan-Nichols, Steven J. , Mobile IPv6 and the Future of Wireless Internet Access, [News], Feb., pp. 18-20 How Trustworthy Is Trusted Computing? [News], Mar., pp. 18-20 The Battle over the Universal Java IDE, [News], Apr., pp. 21-23 XML Raises Concerns as It Gains Prominence, [News], May, pp. 14-16 OSs Battle in the Smart-Phone Market, [News], June, pp. 10-12 The Challenge of Wi-Fi Roaming, [News], July, pp. 17-19 Seeking Better Web Search Technologies, [News], Aug., pp. 19-21 Building Better Software with Better Tools, [News], Sept., pp. 12-14 Presence Technology: More than Just Instant Messaging, [News], Oct., pp. 11-13 Statistical Language Approach Translates into Success, [News], Nov., pp. 14-16 Hard-Drive Technology Reaches a Turning Point, [News], Dec., pp. 21-23

Verbauwhede, Ingrid, see P. Schaumont, Apr., pp. 68-74

Vijaykrishnan, N., see N. Kim, Dec., pp. 68-75

Vrbsky, Susan, see A. Parrish, June, pp. 22-32

Vrudhula, Sarma, , see R. Rao, Dec., pp. 77-78

W

Walczak, Krzysztof, and W. Cellary, X-VRML for Advanced Virtual Reality Applications [Column], Mar., pp. 89-92

Walker, Kevin, see J. Thomson, Dec., pp. 27-34

Wang, Xin, and T. DeMartini, XrML's Role in Information Piracy Prevention and Privacy Protection [Sidebar], July, p. 74

Ward, Bob , Computer Society Board of Governors Approves Reading of Proposed Bylaw Changes, [CS Connection], Aug., pp. 78-79 Conferences Explore Key Computing Topics, [CS Connection], May, pp. 78-80 Cray, Kanai Awards Recognize Achievement in High-Performance Computing and Distributed Systems, [CS Connection], June, pp. 89-91 CSIDC 2003 World Finals Projects in Brief, [CS Connection], July, p. 16 Engel Voted IEEE Computer Society President-Elect, [CS Connection], Dec., pp. 100-101 Russian Teen Wins Top IEEE Computer Society Prize at Intel Science Fair, [CS Connection], Aug., pp. 77-78 Service, Education, and Technical Awards Honor Outstanding Achievements, [CS Connection], July, pp. 79-80 Tablet-PC Classroom System Wins Design Competition, [CS Connection], Aug., pp. 15-19 Virginia Teen Wins IEEE Presidents' Scholarship with MHD-Based DC Transformer, [CS Connection], Aug., p. 79

Watanabe, Yosinori, see F. Balarin, Apr., pp. 45-52

Weil, Rick, see T. Thompson, Oct., pp. 54-62

Whinston, Andrew B. , see X. Geng, Nov., pp. 64-72see Y. Tung, Feb., pp. 100-102

Williams, Laurie, , and A. Cockburn, Agile Software Development: It's about Feedback and Change [Guest Editors' Intro], June, pp. 39-43

Willman, Bryan, see P. England, July, pp. 55-62

Winograd, Terry, see B. Johanson, Apr., pp. 99-101

Wolf, Henning, see M. Lippert, June, pp. 67-73

Wolf, Wayne , A Decade of Hardware/Software Codesign, Apr., pp. 38-43 How Many System Architectures? [Column], Mar., pp. 93-95

Wood, Alan P., Software Reliability from the Customer View, Aug., pp. 37-42

Wood, David A., see A.R. Alameldeen, Feb., pp. 50-57

Wood, Mark D., see T. Thompson, Oct., pp. 54-62

X

Xu, Min, see A.R. Alameldeen, Feb., pp. 50-57

Y

Yamamoto, Wayne, see T. Tsuei, Feb., pp. 58-64

Yang, Ren-Dar, see T. Tsai, Oct., pp. 63-71

Yu, Han-Kuan, see T. Tsai, Oct., pp. 63-71

Yuan, Wanghong, see D.G. Sachs, Dec., pp. 56-57

Yunos, Hassim Mohamed, J. Gao, and S. Shim, Wireless Advertising's Challenges and Opportunities, May, pp. 30-37

Z

Zhang, Xiaodong, see X. Chen, Mar., pp. 63-70

Zhuge, Hai, and X. Shi, Fighting Epidemics in the Information and Knowledge Age [Column], Oct., pp. 116, 114-115

Züllighoven, Heinz, see M. Lippert, June, pp. 67-73

27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool