The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.12 - December (2004 vol.37)
pp: 74-86
Published by the IEEE Computer Society

Subject Index

A
Access control

Computer Security in the Real World, B.W. Lampson, June, pp. 37-46.

Making the Gigabit IPsec VPN Architecture Secure, R. Friend, June, pp. 54-60.

XML-Based Specification for Web Services Document Security, R. Bhatti et al., Apr., pp. 41-49.

Accessibility

Internet Accessibility: Beyond Disability [Column], C. Hofstader, Sept., pp. 103-105.

Accessibility
see also Assistive technologies
Acoustic systems

Shooter Localization in Urban Terrain, M. Maroti et al., Aug., pp. 60-61.

Designing an Urban-Scale Auditory Alert System, F. Avanzini et al., Sept., pp. 55-61.

Acoustic systems
see also Sensor networks
Adaptive software

Composing Adaptive Software, P.K. McKinley et al., July, pp. 56-64.

Policy-Based Dynamic Reconfiguration of Mobile-Code Applications, R. Montanari et al., July, pp. 73-80.

Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure, D. Garlan et al., Oct., pp. 46-54.

Ad hoc networks

Ad Hoc Networks [Guest Editors' Intro.], J. Wu and Stojmenovic, I., Feb., pp. 29-31.

Cooperative Cache-Based Data Access in Ad Hoc Networks, G. Cao et al., Feb., pp. 32-39.

Cross-Layering in Mobile Ad Hoc Network Design, M. Conti et al., Feb., pp. 48-51.

Group Communications in Mobile Ad Hoc Networks, P. Mohapatra et al., Feb., pp. 52-59.

Prioritized Overlay Multicast in Mobile Ad Hoc Environments, L. Xiao et al., Feb., pp. 67-74.

Routing and Security in Mobile Ad Hoc Networks, N. Milanovic et al., Feb., pp. 61-65.

Shooter Localization in Urban Terrain, M. Maroti et al., Aug., pp. 60-61.

Ad hoc networks,
see also Sensor networks
Aerospace computing

NASA's Mission Reliable, P. Regan and Hamilton, S., Jan., pp. 59-68.

Algorithms

Adaptive Neural Network Clustering of Web Users, S.K. Rangarajan et al., Apr., pp. 34-40.

Epidemic Information Dissemination in Distributed Systems, P.T. Eugster et al., May, pp. 60-67.

Routing and Security in Mobile Ad Hoc Networks, N. Milanovic et al., Feb., pp. 61-65.

Shooter Localization in Urban Terrain, M. Maroti et al., Aug., pp. 60-61.

Algorithms,
see also Scheduling algorithms
Agent technologies

Agent Hell: A Scenario of Worst Practices [Column], F. Zambonelli and Luck, M., Mar., pp. 96-98.

Mobile Agents in Wireless Devices [Column], L. Vasiu and Mahmoud, Q.H., Feb., pp. 104-105.

Agile software development

Agile Software Development in Large Organizations, M. Lindvall et al., Dec., pp. 26-34.

Do Agile Methods Marginalize Problem Solvers? [Column], V. Skowronski, Oct., pp. 120, 118-119.

Sharing Agile Expertise through the SEC [Sidebar], A. Willey, Dec., p. 27.

Assistive technologies

Inventing Wellness Systems for Aging in Place, E. Dishman, May, pp. 34-41.

Taking Handheld Devices to the Next Level, B.A. Myers et al., Dec., pp. 36-43.

Auditory display,
see Display technologies
Authentication

Computer Security in the Real World, B.W. Lampson, June, pp. 37-46.

Authentication,
see also Biometrics
Autonomous systems

BEES: Exploring Mars with Bioinspired Technologies, S. Thakoor et al., Sept., pp. 38-47.

NASA's Mission Reliable, P. Regan and Hamilton, S., Jan., pp. 59-68.

Awards

Burton J. Smith Named Cray Award Winner [CS Connection], B. Ward, Apr., p. 69.

Computer Society Awards Honor Researchers from Academia and Industry [CS Connection], B. Ward, Oct., pp. 82-83.

Computer Society Awards Program Honors Achievements in Many Computing Fields [CS Connection], B. Ward, July, pp. 85-86.

Computer Society Awards Recognize Top Professionals [CS Connection], B. Ward, June, pp. 68-69.

IEEE Recognizes NEC's Sekimoto with Medal of Honor [CS Connection], B. Ward, Mar., p. 80.

Students Earn Top IEEE Computer Society Prizes at Intel Science Fair [CS Connection], B. Ward, Aug., pp. 80-81.

B
Benchmarking,
see Performance measurement and evaluation
Biology and medical computing

Computational Challenges of Systems Biology, A. Finkelstein et al., May, pp. 26-33.

Healthwear: Medical Technology Becomes Wearable, A. Pentland, May, pp. 42-49.

Inventing Wellness Systems for Aging in Place, E. Dishman, May, pp. 34-41.

Private-to-Private Communications over the Internet, A. Kara, May, pp. 53-59.

Biometrics

Biometrics and the Threat to Civil Liberties, M.L. Johnson, Apr., pp. 92, 90-91.

Voice Authentication Speaks to the Marketplace, S.J. Vaughan-Nichols, Mar., pp. 13-15.

Biomimetics,
see Robots
Broadband communication

Achieving Wireless Broadband with WiMax [News], S.J. Vaughan-Nichols, June, pp. 10-13.

DakNet: Rethinking Connectivity in Developing Nations, A. Pentland et al., Jan., pp. 78-83.

Epidemic Information Dissemination in Distributed Systems, P.T. Eugster et al., May, pp. 60-67.

Group Communications in Mobile Ad Hoc Networks, P. Mohapatra et al., Feb., pp. 52-59.

Is Broadband over Power Lines About to Take Off? [News], L.D. Paulson, June, p. 18.

C
Cache memory,
see Storage technology
Code mobility,
see Mobile computing
Codesign

WiseNET: An Ultralow-Power Wireless Sensor Network Solution, C.C. Enz et al., Aug., pp. 62-70.

Computer architecture

Applications and Architectures [Column], W. Wolf, Nov., pp. 114-116.

Billion-Transistor Architectures: There and Back Again, D. Burger and Goodman, J.R., Mar., pp. 22-28.

Going Beyond Worst-Case Specs with TEAtime, A.K. Uht, Mar., pp. 51-56.

Making the Gigabit IPsec VPN Architecture Secure, R. Friend, June, pp. 54-60.

Making Typical Silicon Matter with Razor, T. Austin et al., Mar., pp. 57-65.

Scaling to the End of Silicon with EDGE Architectures, D. Burger et al., July, pp. 44-55.

Speeding Up High-Speed Protocol Processors [Column], D.N. Serpanos, Sept., pp. 108-111.

We May Need a New Box [Theme Issue Intro.], B. Colwell, Mar., pp. 40-41.

Worm Epidemics in High-Speed Networks, T.M. Chen and Robert, J-M., June, pp. 48-53.

Computer crime

Computer Security in the Real World, B.W. Lampson, June, pp. 37-46.

Crime Data Mining: A General Framework and Some Examples, H. Chen et al., Apr., pp. 50-56.

Issues in High-Speed Internet Security, P. Jungck and Shim, S.S.Y., July, pp. 36-42.

Who Is Liable for Insecure Systems? N.R. Mead, July, pp. 27-34.

Computer graphics

Combining Optical Holograms with Interactive Computer Graphics, O. Bimber, Jan., pp. 85-91.

Creating Blazing Hot Images of Fire [News], L.D. Paulson, July, p. 25.

The Panda3D Graphics Engine [Column], M. Goslin and Mine, M.R., Oct., pp. 112-114.

Visualizing Web Search Results in 3D [Column], W. Cellary et al., May, pp. 87-89.

Computer industry

Company Develops Disposable Paper Computer, L.D. Paulson, June, p. 19.

The Digital World's Midlife Crisis [Column], M. Macedonia, Aug., pp. 100-101.

Is Peer-to-Peer Secure Enough for Corporate Use? [News], G. Lawton, Jan., pp. 22-25.

A Tale of Three Disciplines ... and a Revolution, J.H. Poore, Jan., pp. 30-36.

Who Is Liable for Insecure Systems? N.R. Mead, July, pp. 27-34.

Computer industry,
see also Industry trends
Computer networks

A Taxonomy of Network Computing Systems [Column], M. Maheswaran and Ali, S., Oct., pp. 115-117.

Using MPLS to Unify Multiple Network Types [News], L.D. Paulson, May, pp. 15-17.

Computer networks,
see also Ad hoc networks, Internet, Sensor networks
Computer-supported cooperative work (CSCW),
see Groupware
Constraint logic programming,
see Programming techniques
Context-aware applications

Context-Aware Trails [Column], S. Clarke and Driver, C., Aug., pp. 97-99.

Context-aware applications,
see also Location-aware computing
Cryptography,
see Data security
Curricula,
see Education, computer science and engineering
D
Database management systems

Biometrics and the Threat to Civil Liberties, M.L. Johnson, Apr., pp. 92, 90-91.

A Copper Bullet for Software Quality Improvement, M. Blaha, Feb., pp. 21-25.

Databases Deepen the Web [Column], T.M. Ghanem and Aref, W., Jan., pp. 116-117.

Open Source Databases Move into the Marketplace [News], L.D. Paulson, July, pp. 13-15.

Database management systems,
see also Information systems
Data centers

Internet Data Centers [Guest Editors' Intro.], K. Kant and Mohapatra, P., Nov., pp. 35-37.

SoftUDC: A Software-Based Data Center for Utility Computing, M. Kallahalla et al., Nov., pp. 38-46.

TCP Onloading for Data Center Servers, G. Regnier et al., Nov., pp. 48-58.

Data centers,
see also Network management
Data mining,
see Information search and retrieval
Data security

Crime Data Mining: A General Framework and Some Examples, H. Chen et al., Apr., pp. 50-56.

Embedded System Security [Column], P. Koopman, July, pp. 95-97.

IEEE Standard for Encrypted Storage [Column], J. Hughes, Nov., pp. 110-112.

Simplifying Public-Key Management [Column], P. Gutmann, Feb., pp. 101-103.

A Software Infrastructure for Authenticated Web Metering, C. Blundo and Cimato, S., Apr., pp. 28-33.

Who Is Liable for Insecure Systems? N.R. Mead, July, pp. 27-34.

XML-Based Specification for Web Services Document Security, R. Bhatti et al., Apr., pp. 41-49.

Data security,
see also Security
Data visualization,
see Computer graphics
Dependability,
see Reliability
Design engineering

2003 Technology Roadmap for Semiconductors, D. Edenfeld et al., Jan., pp. 47-56.

The Art of the Possible [Opinion], B. Colwell, Aug., pp. 8-10.

Design Fragility [Opinion], B. Colwell, Jan., pp. 13-16.

The Flock: Mote Sensors Sing in Undergraduate Curriculum, B. Hemingway et al., Aug., pp. 72-78.

Modeling Complex Spoken Dialog, H. Dybkjær and Dybkjær, L., Aug., pp. 32-40.

We May Need a New Box [Theme Issue Intro.], B. Colwell, Mar., pp. 40-41.

Digital home technologies

Inventing Wellness Systems for Aging in Place, E. Dishman, May, pp. 34-41.

Display technologies

Combining Optical Holograms with Interactive Computer Graphics, O. Bimber, Jan., pp. 85-91.

Designing an Urban-Scale Auditory Alert System, F. Avanzini et al., Sept., pp. 55-61.

Displaying Data in Thin Air [News], L.D. Paulson, Mar., p. 19.

Expanding the Digital Camera's Reach, C. Narayanaswami and Raghunath, M.T., Dec., pp. 65-73.

The Panda3D Graphics Engine [Column], M. Goslin and Mine, M.R., Oct., pp. 112-114.

Viewing the World through Interactive Panoramic Images [News], L.D. Paulson, Jan., p. 28.

Distributed computing

Embedded Is the New Paradigm(s) [Column], W. Wolf, Mar., pp. 99-101.

Epidemic Information Dissemination in Distributed Systems, P.T. Eugster et al., May, pp. 60-67.

Is Peer-to-Peer Secure Enough for Corporate Use? [News], G. Lawton, Jan., pp. 22-25.

Seamless Mobile Computing on Fixed Infrastructure, M. Kozuch et al., July, pp. 65-72.

XML-Based Specification for Web Services Document Security, R. Bhatti et al., Apr., pp. 41-49.

Distributed computing,
see also Computer networks
Distributed learning,
see Education, computer uses in
E
Economics

Design Fragility [Opinion], B. Colwell, Jan., pp. 13-16.

The Economics of International Conferences [Column], K.A. Olsen, June, pp. 92, 90-91.

Fighting Internet Auction Fraud: An Assessment and Proposal, C.E.H. Chua and Wareham, J., Oct., pp. 31-37.

Hacking the Business Climate for Network Security [Column], B. Schneier, Apr., pp. 87-89.

Education, computer uses in

ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing, W.G. Griswold et al., Oct., pp. 73-81.

Diagnosing Attention Disorders in a Virtual Classroom [Column], A.A. Rizzo et al., June, pp. 87-89.

Distributed Learning Environments [Column], M. Alavi, Jan., pp. 121-122.

Interactivity, Interfaces, and Smart Toys [Column], L. Plowman and Luckin, R., Feb., pp. 98-100.

Education, computer science and engineering

CRA Releases Taulbee Survey Numbers for 2002-2003 [CS Connection], B. Ward, Aug., p. 82.

The Flock: Mote Sensors Sing in Undergraduate Curriculum, B. Hemingway et al., Aug., pp. 72-78.

Making Computer Programming Fun and Accessible, Q.H. Mahmoud et al., Feb., pp. 108, 106-107.

A New Framework for Computer Science and Engineering, P.S. Rosenbloom, Nov., pp. 23-28.

An Offshore-Resistant Degree Program [Column], D.A. Swayne, Aug., pp. 104, 102-103.

Rationality and Digital Technology [Column], N. Holmes, Sept., pp. 116, 114-115.

Restructuring Computing Programs to Meet Employment Challenges, M. O'Neal, Nov., pp. 29-34.

A Tale of Three Disciplines ... and a Revolution, J.H. Poore, Jan., pp. 30-36.

Teaching Computer Science through Game Design [Column], M. Overmars, Apr., pp. 81-83.

US University Tells Women to -Let the Games Begin- [News], L.D. Paulson, Nov., p. 21.

Electronic commerce

Are Web Services Finally Ready to Deliver? [News], N. Leavitt, Nov., pp. 14-18.

E-Micropayments Sweat the Small Stuff, D. Geer, Aug., pp. 19-22.

A Software Infrastructure for Authenticated Web Metering, C. Blundo and Cimato, S., Apr., pp. 28-33.

Vehicular Mobile Commerce [Column], U. Varshney, Dec., pp. 116-118.

Electronic mail,
see Spam
Embedded computing and systems

Applications and Architectures [Column], W. Wolf, Nov., pp. 114-116.

Embedded Is the New Paradigm(s) [Column], W. Wolf, Mar., pp. 99-101.

Embedded System Security [Column], P. Koopman, July, pp. 95-97.

The Flock: Mote Sensors Sing in Undergraduate Curriculum, B. Hemingway et al., Aug., pp. 72-78.

Programming Models for Hybrid CPU/FPGA Chips [Column], D. Andrews et al., Jan., pp. 118-120.

Employment trends

Ceiling for Controversial US H-1B Visas Drops [News], L.D. Paulson, Jan., p. 27.

From Organization Man to Free Agent, M. Babu, Jan., pp. 128, 126-127.

IT Employment Prospects in 2004: A Mixed Bag, F. Niederman, Jan., pp. 69-77.

Restructuring Computing Programs to Meet Employment Challenges, M. O'Neal, Nov., pp. 29-34.

Engineering

All Things Are Connected [Opinion], B. Colwell, Nov., pp. 10-12.

Brainstorming, Influence, and Icebergs [Opinion], B. Colwell, Apr., pp. 9-12.

Computer Lessons from Pop Songs [Opinion], B. Colwell, Feb., pp. 7-9.

Engineering a Sustainable World [Opinion], B. Colwell, May, pp. 9-12.

Engineers as Soothsayers [Opinion], B. Colwell, Sept., pp. 6-9.

Let's Hear from Those in the Back [Opinion], B. Colwell, June, pp. 6-9.

Travel Stories [Opinion], B. Colwell, July, pp. 8-10.

Engineering,
see also Design engineering
Ensemble computing

Device Ensembles, B.N. Schilit and Sengupta, U., Dec., pp. 56-64.

What We Carry [Sidebar], K. Anderson, Chang, M. and Mainwaring, S., Dec., pp. 58-61.

Ensemble computing,
see also Mobile computing
Enterprise systems

Extending the Reach of Business Processes [Column], D. Chakraborty and Lei, H., Apr., pp. 78-80.

A Roadmap for Enterprise System Implementation, D.M. Strong and Volkoff, O., June, pp. 22-29.

SoftUDC: A Software-Based Data Center for Utility Computing, M. Kallahalla et al., Nov., pp. 38-46.

Entertainment computing

The Digital World's Midlife Crisis [Column], M. Macedonia, Aug., pp. 100-101.

Empowering Sports Fans with Technology [Sports], T. Hayden, Sept., pp. 106-107.

Interactivity, Interfaces, and Smart Toys [Column], L. Plowman and Luckin, R., Feb., pp. 98-100.

The Panda3D Graphics Engine [Column], M. Goslin and Mine, M.R., Oct., pp. 112-114.

Small Is Beautiful [Column], M. Macedonia, Dec., pp. 122-123.

Teaching Computer Science through Game Design [Column], M. Overmars, Apr., pp. 81-83.

Environmental monitoring

Environmental Sensor Networks, K. Martinez et al., Aug., pp. 50-56.

Overview of Sensor Networks [Guest Editors' Intro.], D. Culler et al., Aug., pp. 41-49.

Radiation Detection with Distributed Sensor Networks, S.M. Brennan et al., Aug., pp. 57-59.

Extreme programming,
see Programming techniques
F
Field-programmable gate arrays,
see Microprocessors
Firewalls,
see Security
G
Games,
see Entertainment computing
Globalization

DakNet: Rethinking Connectivity in Developing Nations, A. Pentland et al., Jan., pp. 78-83.

IT Employment Prospects in 2004: A Mixed Bag, F. Niederman, Jan., pp. 69-77.

Localizing Open Source Software [News], L.D. Paulson, Apr., p. 17.

Trusting a Chaotic Future [Opinion], B. Colwell, Oct., pp. 8-10.

VoIP Development in China, R. Wang and Hu, X., Sept., pp. 30-37.

Groupware

Online Collaboration Products, V. Hassler, Nov., pp. 106-109.

Roomware: Computers Disappear and Interaction Evolves, T. Prante, Streitz, N., and Tandler, P., Dec., pp. 47-54.

Taking Handheld Devices to the Next Level, B.A. Myers et al., Dec., pp. 36-43.

H
Handheld devices

Device Ensembles, B.N. Schilit and Sengupta, U., Dec., pp. 56-64.

Taking Handheld Devices to the Next Level, B.A. Myers et al., Dec., pp. 36-43.

Hardware-software codesign,
see Codesign
Healthcare,
see Biology and medical computing
History of computing

Silicon Valley Museum Celebrates History of Computing [Membership News], B. Ward, Oct., pp. 15-19.

Home computing,
see Digital home technologies
Human-computer interaction

Modeling Complex Spoken Dialog, H. Dybkjær and Dybkjær, L., Aug., pp. 32-40.

Modeling Multimodal Human-Computer Interaction, Z. Obrenovic and Starcevic, D., Sept., pp. 65-72.

Roomware: Computers Disappear and Interaction Evolves, T. Prante, Streitz, N., and Tandler, P., Dec., pp. 47-54.

Taking Handheld Devices to the Next Level, B.A. Myers et al., Dec., pp. 36-43.

I
IEEE

IEEE Approves Intelligent Transportation Systems Society [CS Connection], B. Ward, Oct., p. 83.

IEEE Names Fellows for 2004 [CS Connection], B. Ward, Feb., pp. 75-77.

ISWC 2004 to Feature Student Wearable Computing Design Contest [CS Connection], B. Ward, Feb., p. 82.

Power Systems Pioneer Leaves $100,000 to IEEE Foundation [CS Connection], B. Ward, Oct., p. 84.

IEEE Computer Society

Beta Version of Software Engineering Online Goes Public [CS Connection], B. Ward, Nov., p. 82.

Board of Governors Names Two Candidates for IEEE Division V Director-Elect Race [CS Connection], B. Ward, Apr., p. 69.

Computer in 2004 [EIC's Message], D.L. Carver, Jan., pp. 8-9.

Computer Society Awards Program Honors Achievements in Many Computing Fields [CS Connection], B. Ward, July, pp. 85-86.

Computer Society Cluster Task Force Merges with Supercomputing Technical Committee [CS Connection], B. Ward, Aug., p. 83.

Computer Society Distance Learning Campus Expands [CS Connection], B. Ward, Oct., p. 85.

Computer Society Editors in Chief Return for Second Terms [CS Connection], B. Ward, May, p. 71.

Computer Society Honors Outstanding Students [CS Connection], B. Ward, Apr., p. 70.

Computer Society Magazines Gear Up for 2005 [CS Connection], B. Ward, p. 81.

Computer Society Transactions Cover Key Conferences in 2005 [CS Connection], B. Ward, Nov., p. 81.

Computing Curricula Volume Available for Review [CS Connection], B. Ward, Oct., p. 85.

Cooper Named 2005 Computer Society President-Elect [Membership News], B. Ward, Dec., pp. 92-93.

CRA Program Seeks University Women by 15 February [CS Connection], B. Ward, Dec., p. 91.

Distinguished Visitor Program Seeks Speakers [CS Connection], B. Ward, June, p. 70.

Evolving the World with the World's Computer Society [President's Message], C.K. Chang, Jan., pp. 10-12.

IEEE Computer Society Election Update [CS Connection], B. Ward, July, p. 87.

IEEE Computer Society Election [CS Connection], Sept., pp. 95-102.

IEEE President-Elect Candidates Address Computer Society Concerns [CS Connection], Sept., pp. 82-87.

Paving the Way to the Future: New Programs for 2004 [CS Connection], B. Ward, Jan., pp. 95-99.

Pennsylvania Student Wins IEEE President's Scholarship with Neural Interface Design [CS Connection], B. Ward, Aug., p. 81.

Researchers Connect at Society Conferences [CS Connection], B. Ward, May, pp. 68-71.

Society Program Certifies New Software Development Professionals [CS Connection], B. Ward, Oct., p. 84.

Top Student Teams Vie for $15,000 CSIDC Prize [CS Connection], B. Ward, July, p. 84.

Transforming the World's Computer Society: Together, We Will Get It Done! [President's Message], C.K. Chang, Dec., pp. 14-15.

IEEE Computer Society,
see also Awards
IEEE Computer Society International Design Competition

CSIDC 2004 Attracts Hundreds of Student Teams [CS Connection], B. Ward, Mar., pp. 77-79.

Poznan University Team Wins $18,000 at CSIDC 2004 [News], B. Ward, Aug., pp. 11-15.

Image retrieval,
see Information search and retrieval
Industry trends

2003 Technology Roadmap for Semiconductors, D. Edenfeld et al., Jan., pp. 47-56.

Achieving Wireless Broadband with WiMax [News], S.J. Vaughan-Nichols, June, pp. 10-13.

E-Micropayments Sweat the Small Stuff [News], D. Geer, Aug., pp. 19-22.

Machine-to-Machine Technology Gears Up for Growth [News], G. Lawton, Sept., pp. 12-15.

New Trends Revive Supercomputing Industry [News], S.J. Vaughan-Nichols, Feb., pp. 10-13.

Open Source Databases Move into the Marketplace [News], L.D. Paulson, July, pp. 13-15.

Vendors Go to Extreme Lengths for New Chips [News], S.J. Vaughan-Nichols, Jan., pp. 18-20.

Voice Authentication Speaks to the Marketplace [News], S.J. Vaughan-Nichols, Mar., pp. 13-15.

Will Gesture-Recognition Technology Point the Way? [News], D. Geer, Oct., pp. 20-23.

Will Interoperability Problems Give IP Telephony a Busy Signal? [News], N. Leavitt, Mar., pp. 16-18.

Will Network Processor Units Live Up to Their Promise? [News], G. Lawton, Apr., pp. 13-15.

The Zen of Overclocking [Opinion], B. Colwell, Mar., pp. 9-12.

Industry trends,
see also Computer industry
Information search and retrieval

Adaptive Neural Network Clustering of Web Users, S.K. Rangarajan et al., Apr., pp. 34-40.

Computational Challenges of Systems Biology, A. Finkelstein et al., May, pp. 26-33.

Crime Data Mining: A General Framework and Some Examples, H. Chen et al., Apr., pp. 50-56.

Databases Deepen the Web [Column], T.M. Ghanem and Aref, W.G., Jan., pp. 116-117.

3D Searching Starts to Take Shape [News], S. Ortiz Jr., Aug., pp. 24-26.

Visualizing Web Search Results in 3D [Column], W. Cellary et al., May, pp. 87-89.

Information systems,

Databases Deepen the Web [Column], T.M. Ghanem and Aref, W.G, Jan., pp. 116-117.

Managing Systems Development [Column], G. Richardson and Ives, B., Mar., pp. 93-94.

A Roadmap for Enterprise System Implementation, D.M. Strong and Volkoff, O., June, pp. 22-29.

Information systems,
see also Database management systems
Instant messaging,
see Message systems
Intellectual property

Data and Information as Property [Column], N. Holmes, May, pp. 92, 90-91.

Digital Rights Technology Sparks Interoperability Concerns [News], Dec., pp. 20-22.

Interactive systems,

Combining Optical Holograms with Interactive Computer Graphics, O. Bimber, Jan., pp. 85-91.

Roomware: Computers Disappear and Interaction Evolves, T. Prante, Streitz, N., and Tandler, P., Dec., pp. 47-54.

Interactive systems,
see also Real-time systems
Internet

Approach Gives Providers a New Way to Push Content [News], L.D. Paulson, May, p. 24.

Cross-Layering in Mobile Ad Hoc Network Design, M. Conti et al., Feb., pp. 48-51.

Embedded System Security [Column], P. Koopman, July, pp. 95-97.

Fighting Internet Auction Fraud: An Assessment and Proposal, C.E.H. Chua and Wareham, J., Oct., pp. 31-37.

Group Communications in Mobile Ad Hoc Networks, P. Mohapatra et al., Feb., pp. 52-59.

Internet Data Centers [Guest Editors' Intro.], K. Kant and Mohapatra, P., Nov., pp. 35-37.

Issues in High-Speed Internet Security, P. Jungck and Shim, S.S.Y., July, pp. 36-42.

New Technology Promises to Reduce Internet Congestion [News], L.D. Paulson, Sept., p. 22.

Power and Energy Management for Server Systems, R. Bianchini and Rajamony, R., Nov., pp. 68-76.

Prioritized Overlay Multicast in Mobile Ad Hoc Environments, L. Xiao et al., Feb., pp. 67-74.

Private-to-Private Communications over the Internet, A. Kara, May, pp. 53-59.

Recovery-Oriented Computing: Building Multitier Dependability, G. Candea et al., Nov., pp. 60-67.

Researcher Develops Colorful Map of the Internet [News], L.D. Paulson, Feb., p. 17.

Scob Attack: A Sign of Bad Things to Come? [News], N. Leavitt, Sept., pp. 16-18.

Seamless Mobile Computing on Fixed Infrastructure, M. Kozuch et al., July, pp. 65-72.

Securing the High-Speed Internet [Guest Editors' Intro.], S.S.Y. Shim et al., June, pp. 33-35.

TCP Onloading for Data Center Servers, G. Regnier et al., Nov., pp. 48-58.

Visualizing Web Search Results in 3D [Column], W. Cellary et al., May, pp. 87-89.

Worm Epidemics in High-Speed Networks, T.M. Chen and Robert, J-M., June, pp. 48-53.

Internet telephony

Internet Telephony Jumps off the Wires [News], S. Ortiz Jr., Dec., pp. 16-18.

VoIP Development in China, R. Wang and Hu, X., Sept., pp. 30-37.

Will Interoperability Problems Give IP Telephony a Busy Signal? [News], N. Leavitt, Mar., pp. 16-18.

Invisible computing,
see Ubiquitous computing
J
Java

Coping with Java Threads, B. Sandén, Apr., pp. 20-27.

K
Knowledge management

Crime Data Mining: A General Framework and Some Examples, H. Chen et al., Apr., pp. 50-56.

L
Language

Languages and the Computing Profession [Column], N. Holmes, Mar., pp. 104, 102-103.

Meaningful Modeling: What's the Semantics of "Semantics"? D. Harel and Rumpe, B., Oct., pp. 64-72.

Modeling Complex Spoken Dialog, H. Dybkjær and Dybkjær L., Aug., pp. 32-40.

Legal issues

Biometrics and the Threat to Civil Liberties, M.L. Johnson, Apr., pp. 92, 90-91.

Crime Data Mining: A General Framework and Some Examples, H. Chen et al., Apr., pp. 50-56.

Digital Rights Technology Sparks Interoperability Concerns [News], D. Geer, Dec., pp. 20-22.

Fighting Internet Auction Fraud: An Assessment and Proposal, C.E.H. Chua and Wareham, J., Oct., pp. 31-37.

Hacking the Business Climate for Network Security [Column], B. Schneier, Apr., pp. 87-89.

Who Is Liable for Insecure Systems? N.R. Mead, July, pp. 27-34.

Legal issues,
see also Computer crime, Social issues
Location-aware computing

Device Ensembles, B.N. Schilit and Sengupta, U., Dec., pp. 56-64.

Location-Aware Computing Comes of Age, M. Hazas et al., Feb., pp. 95-97.

User-Centered Location Awareness [Column], C. Schmandt and Marmasse, N., Oct., pp. 110-111.

Location-aware computing,
see also Context-aware applications
M
Machine perception

Imperceptible Sensory Channels [Column], J.R. Smith, June, pp. 84-85.

Machine translation

Languages and the Computing Profession [Column], N. Holmes, Mar., pp. 104, 102-103.

Management, business

Best Business Practices for Standards Groups, M. LoBue, Jan., pp. 124-125.

Message systems

New Software Uses Instant Messaging to Play Games [News], L.D. Paulson, Dec., p. 25.

Spam Hits Instant Messaging [News], L.D. Paulson, Apr., p. 18.

Micropayment technology,
see Electronic commerce
Microprocessors and integrated circuits

2003 Technology Roadmap for Semiconductors, D. Edenfeld et al., Jan., pp. 47-56.

Applications and Architectures [Column], W. Wolf, Nov., pp. 114-116.

Billion-Transistor Architectures: There and Back Again, D. Burger and Goodman, J.R., Mar., pp. 22-28.

Going Beyond Worst-Case Specs with TEAtime, A.K. Uht, Mar., pp. 51-56.

Is MIMO the Future of Wireless Communications? [News], G. Lawton, July, pp. 20-22.

The Lowdown on High-Rise Chips [News], G. Lawton, Oct., pp. 24-27.

Magic Boxes and Boots: Security in Hardware [Column], S. Smith, Oct., pp. 106-109.

Making the Gigabit IPsec VPN Architecture Secure, R. Friend, June, pp. 54-60.

Making Typical Silicon Matter with Razor, T. Austin et al., Mar., pp. 57-65.

"Mini-Storms" to Cool Hot Processors, L.D. Paulson, June, p. 20.

New Chips Stop Buffer Overflow Attacks [News], L.D. Paulson, Oct., p. 28.

Programming Models for Hybrid CPU/FPGA Chips [Column], D. Andrews et al., Jan., pp. 118-120.

Researchers to Move Speech Recognition to Hardware [News], L.D. Paulson, Dec., p. 24.

Scaling to the End of Silicon with EDGE Architectures, D. Burger et al., July, pp. 44-55.

Speeding Up High-Speed Protocol Processors [Column], D.N. Serpanos, Sept., pp. 108-111.

Technique Uses Viruses to Make Computing Components [News], L.D. Paulson, Dec., p. 23.

Vendors Go to Extreme Lengths for New Chips [News], S.J. Vaughan-Nichols, Jan., pp. 18-20.

We May Need a New Box [Theme Issue Intro.], B. Colwell, Mar., pp. 40-41.

Will Network Processor Units Live Up to Their Promise? [News], G. Lawton, Apr., pp. 13-15.

The Zen of Overclocking [Opinion], B. Colwell, Mar., pp. 9-12.

Middleware

Composing Adaptive Software, P.K. McKinley et al., July, pp. 56-64.

Extending the Reach of Business Processes [Column], D. Chakraborty and Lei, H., Apr., pp. 78-80.

Policy-Based Dynamic Reconfiguration of Mobile-Code Applications, R. Montanari et al., July, pp. 73-80.

Wireless Middleware: Glue for the Mobile Infrastructure [News], S.J. Vaughan-Nichols, May, pp. 18-20.

Mobile agents,
see Agent technologies
Mobile computing

ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing, W.G. Griswold et al., Oct., pp. 73-81.

Beyond 3G: Compound Wireless Services, T.J.A. Kobylarz, Sept., pp. 23-28.

Expanding the Digital Camera-s Reach, C. Narayanaswami and Raghunath, M.T., Dec., pp. 65-73.

Mobile Agents in Wireless Devices [Column], L. Vasiu and Mahmoud, Q.H., Feb., pp. 104-105.

Mobile Supercomputers [Column], T. Austin et al., May, pp. 81-83.

Policy-Based Dynamic Reconfiguration of Mobile-Code Applications, R. Montanari et al., July, pp. 73-80.

Seamless Mobile Computing on Fixed Infrastructure, M. Kozuch et al., July, pp. 65-72.

User-Centered Location Awareness [Column], C. Schmandt and Marmasse, N., Oct., pp. 110-111.

What We Carry [Sidebar], K. Anderson et al., Dec., pp. 58-61.

Modeling,

Computational Challenges of Systems Biology, A. Finkelstein et al., May, pp. 26-33.

Meaningful Modeling: What-s the Semantics of -Semantics-? D. Harel and Rumpe, B., Oct., pp. 64-72.

Modeling Multimodal Human-Computer Interaction, Z. Obrenovic and Starcevic, D., Sept., pp. 65-72.

Modeling,
see also Simulation
Multimedia communications

Enhancing Personal Communications with Multimedia, B.K. Yi and Subramanya, S.R., June, pp. 79-81.

Multicasting,
see Network protocols
Music

Computer Lessons from Pop Songs [Opinion], B. Colwell, Feb., pp. 7-9.

Using Computers to Accompany Musicians [News], L.D. Paulson, Oct., p. 30.

N
Nanotechnology

Companies Develop Nanotech RAM Chips [News], L.D. Paulson, Aug., p. 28.

Using a Pen to Draw Smaller Chip Features [News], L.D. Paulson, Sept., p. 21.

Natural-language processing

Modeling Complex Spoken Dialog, H. Dybkjær and Dybkjær, L., Aug., pp. 32-40.

Network architecture and design

Cross-Layering in Mobile Ad Hoc Network Design, M. Conti et al., Feb., pp. 48-51.

Making the Gigabit IPsec VPN Architecture Secure, R. Friend, June, pp. 54-60.

Seamless Mobile Computing on Fixed Infrastructure, M. Kozuch et al., July, pp. 65-72.

SoftUDC: A Software-Based Data Center for Utility Computing, M. Kallahalla et al., Nov., pp. 38-46.

Network computing

A Taxonomy of Network Computing Systems [Column], M. Maheswaran, Oct., pp. 115-117.

Network management

A Patch in Nine Saves Time? [Column], W.A. Arbaugh, June, pp. 82-83.

Patch on Demand Saves Even More Time? [Column], A.D. Keromytis, Aug., pp. 94-96.

Power Management in Networked Devices [Column], K. Christensen et al., Aug., pp. 91-93.

A Quantitative Study of Firewall Configuration Errors, A. Wool, June, pp. 62-67.

Network protocols

Cooperative Cache-Based Data Access in Ad Hoc Networks, G. Cao et al., Feb., pp. 32-39.

Group Communications in Mobile Ad Hoc Networks, P. Mohapatra et al., Feb., pp. 52-59.

Prioritized Overlay Multicast in Mobile Ad Hoc Environments, L. Xiao et al., Feb., pp. 67-74.

Routing and Security in Mobile Ad Hoc Networks, N. Milanovic et al., Feb., pp. 61-65.

TCP Onloading for Data Center Servers, G. Regnier et al., Nov., pp. 48-58.

Using MPLS to Unify Multiple Network Types [News], L.D. Paulson, May, pp. 15-17.

VoIP Development in China, R. Wang and Hu, X., Sept., pp. 30-37.

WiseNET: An Ultralow-Power Wireless Sensor Network Solution, C.C. Enz et al., Aug., pp. 62-70.

Neural networks

Adaptive Neural Network Clustering of Web Users, S.K. Rangarajan et al., Apr., pp. 34-40.

O
Object-oriented programming,
see Programming methodologies
Open source software

A Critical Look at Open Source [Column], B. Fitzgerald, July, pp. 92-94.

Localizing Open Source Software [News], L.D. Paulson, Apr., p. 17.

Open Source Databases Move into the Marketplace [News], L.D. Paulson, July, pp. 13-15.

Optical technologies

Combining Optical Holograms with Interactive Computer Graphics, O. Bimber, Jan., pp. 85-91.

Intel Develops Silicon That Switches Optical Signals [News], L.D. Paulson, Apr., p. 16.

P
Pair programming,
see Programming techniques
Peer-to-peer networking,
see Distributed computing
Performance measurement and evaluation

Going Beyond Worst-Case Specs with TEAtime, A.K. Uht, Mar., pp. 51-56.

Making Typical Silicon Matter with Razor, T. Austin et al., Mar., pp. 57-65.

Metamorphic Programming: Unconventional High Performance, P.M. Maurer, Mar., pp. 30-38.

Mobile Supercomputers [Column], T. Austin et al., May, pp. 81-83.

A Quantitative Study of Firewall Configuration Errors, A. Wool, June, pp. 62-67.

Recovery-Oriented Computing: Building Multitier Dependability, G. Candea et al., Nov., pp. 60-67.

Seamless Mobile Computing on Fixed Infrastructure, M. Kozuch et al., July, pp. 65-72.

TCP Onloading for Data Center Servers, G. Regnier et al., Nov., pp. 48-58.

Pervasive computing,
see Ubiquitous computing
Power management

Billion-Transistor Architectures: There and Back Again, D. Burger and Goodman, J.R., Mar., pp. 22-28.

Energy-Efficient Area Monitoring for Sensor Networks, J. Carle and Simplot-Ryl, D., Feb., pp. 40-46.

Environmental Sensor Networks, K. Martinez et al., Aug., pp. 50-56.

Making Typical Silicon Matter with Razor, T. Austin et al., Mar., pp. 57-65.

Power and Energy Management for Server Systems, R. Bianchini and Rajamony, R., Nov., pp. 68-76.

Power Management in Networked Devices [Column], K. Christensen et al., Aug., pp. 91-93.

Reliable and Efficient System-on-Chip Design, N.R. Shanbhag, Mar., pp. 42-50.

WiseNET: An Ultralow-Power Wireless Sensor Network Solution, C.C. Enz et al., Aug., pp. 62-70.

Power transmission

Getting Electric Power via Ethernet Cables [News], L.D. Paulson, Aug., p. 30.

Process engineering

Agile Software Development in Large Organizations, M. Lindvall et al., Dec., pp. 26-34.

Systems Development Processes [Column], G. Richardson and Ives, B., May, pp. 84-86.

Product development

The Art of the Possible [Opinion], B. Colwell, Aug., pp. 8-10.

Empowering Sports Fans with Technology [Column], T. Hayden, Sept., pp. 106-107.

Engineers as Soothsayers [Opinion], B. Colwell, Sept., pp. 6-9.

Professional issues

Determining Computing Science's Role [Column], S. Santini, Dec., pp. 128, 126-127.

Do Agile Methods Marginalize Problem Solvers? [Column], V. Skowronski, Oct., pp. 120, 118-119.

The Economics of International Conferences [Column], K.A. Olsen, June, pp. 92, 90-91.

From Organization Man to Free Agent [Column], M. Babu, Jan., pp. 128, 126-127.

In Defense of PowerPoint [Column], N. Holmes, July, pp. 100, 98-99.

IT Employment Prospects in 2004: A Mixed Bag, F. Niederman, Jan., pp. 69-77.

Languages and the Computing Profession [Column], N. Holmes, Mar., pp. 104, 102-103.

A New Framework for Computer Science and Engineering, P.S. Rosenbloom, Nov., pp. 23-28.

Rationality and Digital Technology [Column], N. Holmes, Sept., pp. 116, 114-115.

Restructuring Computing Programs to Meet Employment Challenges, M. O'Neal, Nov., pp. 29-34.

A Tale of Three Disciplines ... and a Revolution, J.H. Poore, Jan., pp. 30-36.

The Usefulness of Hindsight [Column], N. Holmes, Nov., pp. 120, 118-119.

Program compilers

Scaling to the End of Silicon with EDGE Architectures, D. Burger et al., July, pp. 44-55.

Programming techniques

Agile Software Development in Large Organizations, M. Lindvall et al., Dec., pp. 26-34.

Composing Adaptive Software, P.K. McKinley et al., July, pp. 56-64.

Coping with Java Threads, B. Sandén, Apr., pp. 20-27.

Designing an Urban-Scale Auditory Alert System, F. Avanzini et al., Sept., pp. 55-61.

Metamorphic Programming: Unconventional High Performance, P.M. Maurer, Mar., pp. 30-38.

Policy-Based Dynamic Reconfiguration of Mobile-Code Applications, R. Montanari et al., July, pp. 73-80.

Project management

Brainstorming, Influence, and Icebergs [Opinion], B. Colwell, Apr., pp. 9-12.

Managing Systems Development [Column], G. Richardson and Ives, B., Mar., pp. 93-94.

A Roadmap for Enterprise System Implementation, D.M. Strong and Volkoff, O., June, pp. 22-29.

Systems Development Processes [Column], G. Richardson and Ives, B., May, pp. 84-86.

Protocols,
see Network protocols
Public-key infrastructure,
see Data security
R
Radio communication

Overview of Sensor Networks [Guest Editors' Intro.], D. Culler et al., Aug., pp. 41-49.

Radio-frequency identification (RFID) technology,
see Sensing technology
Rate monotonic analysis,
see Scheduling algorithms
Real-time systems

Enhancing Personal Communications with Multimedia, B.K. Yi and Subramanya, S.R., June, pp. 79-81.

Using UML-Based Rate Monotonic Analysis to Predict Schedulability, H. Saiedian and Raguraman, S., Oct., pp. 56-63.

Recovery-oriented computing,
see System availability
Reliability

Going Beyond Worst-Case Specs with TEAtime, A.K. Uht, Mar., pp. 51-56.

Making Typical Silicon Matter with Razor, T. Austin et al., Mar., pp. 57-65.

NASA's Mission Reliable, P. Regan and Hamilton, S., Jan., pp. 59-68.

Recovery-Oriented Computing: Building Multitier Dependability, G. Candea et al., Nov., pp. 60-67.

Reliable and Efficient System-on-Chip Design, N.R. Shanbhag, Mar., pp. 42-50.

The Zen of Overclocking [Opinion], B. Colwell, Mar., pp. 9-12.

Research initiatives

BEES: Exploring Mars with Bioinspired Technologies, S. Thakoor et al., Sept., pp. 38-47.

Biomimetic Robots, L.D. Paulson, Sept., pp. 48-53.

NASA-s Mission Reliable, P. Regan and Hamilton, S., Jan., pp. 59-68.

PARC Develops Software to Connect Devices [News], L.D. Paulson, July, pp. 24-25.

TCP Onloading for Data Center Servers, G. Regnier et al., Nov., pp. 48-58.

Technique Speeds Data Transmission in Computers [News], L.D. Paulson, Jan., p. 27.

Reuse models,
see Software engineering
Reverse engineering

A Copper Bullet for Software Quality Improvement, M. Blaha, Feb., pp. 21-25.

Risk management

Computer Security in the Real World, B.W. Lampson, June, pp. 37-46.

Hacking the Business Climate for Network Security [Column], B. Schneier, Apr., pp. 87-89.

Robots

BEES: Exploring Mars with Bioinspired Technologies, S. Thakoor et al., Sept., pp. 38-47.

Biomimetic Robots, L.D. Paulson, Sept., pp. 48-53.

Robot Performs Origami [News], L.D. Paulson, Sept., p. 21.

Routing,
see Network protocols
S
Scheduling algorithms

Outperforming LRU with an Adaptive Replacement Cache Algorithm, N. Megiddo and Modha, D.S., Apr., pp. 58-65.

Using UML-Based Rate Monotonic Analysis to Predict Schedulability, H. Saiedian and Raguraman, S., Oct., pp. 56-63.

Science

All Things Are Connected [Opinion], B. Colwell, Nov., pp. 10-12.

Brainstorming, Influence, and Icebergs [Opinion], B. Colwell, Apr., pp. 9-12.

The End of Science Revisited, J. Horgan, Jan., pp. 37-43.

Security

Computer Security in the Real World, B.W. Lampson, June, pp. 37-46.

Hacking the Business Climate for Network Security [Column], B. Schneier, Apr., pp. 87-89.

Issues in High-Speed Internet Security, P. Jungck and Shim, S.S.Y., July, pp. 36-42.

Just How Secure Are Security Products? [News], D. Geer, June, pp. 14-16.

Magic Boxes and Boots: Security in Hardware [Column], S. Smith, Oct., pp. 106-109.

Making the Gigabit IPsec VPN Architecture Secure, R. Friend, June, pp. 54-60.

A Patch in Nine Saves Time? [Column], W.A. Arbaugh, June, pp. 82-83.

Private-to-Private Communications over the Internet, A. Kara, May, pp. 53-59.

Products Plug WiFi Security Holes [News], L.D. Paulson, June, pp. 18-19.

A Quantitative Study of Firewall Configuration Errors, A. Wool, June, pp. 62-67.

The Real Risk of Digital Voting? [Column], W.A. Arbaugh, Dec., pp. 124-125.

Researchers Develop Network-Security Visualization Tools [News], L.D. Paulson, Apr., pp. 17-18.

Routing and Security in Mobile Ad Hoc Networks, N. Milanovic et al., Feb., pp. 61-65.

Securing the High-Speed Internet [Guest Editors' Intro.], S.S.Y. Shim et al., June, pp. 33-35.

Security,
see also Authentication
Semantics,
see Language
Semiconductor technology

2003 Technology Roadmap for Semiconductors, D. Edenfeld et al., Jan., pp. 47-56.

Billion-Transistor Architectures: There and Back Again, D. Burger and Goodman, J.R., Mar., pp. 22-28.

IBM Develops Autonomous Chips [News], L.D. Paulson, Nov., p. 20.

Intel Develops Silicon That Switches Optical Signals [News], L.D. Paulson, Apr., p. 16.

The New Dope on Semiconductor Doping [News], L.D. Paulson, July, p. 24.

Overview of Sensor Networks [Guest Editors' Intro.], D. Culler et al., Aug., pp. 41-49.

Reliable and Efficient System-on-Chip Design, N.R. Shanbhag, Mar., pp. 42-50.

Researchers Develop Self-Assembling Chip Technique [News], L.D. Paulson, Feb., p. 19.

Reversible Computing May Improve Mobile Performance [News], L.D. Paulson, Mar., p. 21.

Scaling to the End of Silicon with EDGE Architectures, D. Burger et al., July, pp. 44-55.

Using Plastic to Make High-Capacity Memory [News], L.D. Paulson, Feb., p. 18.

Sensing technology

BEES: Exploring Mars with Bioinspired Technologies, S. Thakoor et al., Sept., pp. 38-47.

Biomimetic Robots, L.D. Paulson, Sept., pp. 48-53.

Dog on a Chip [News], L.D. Paulson, May, p. 23.

Enabling Ubiquitous Sensing with RFID [Column], R. Want, Apr., pp. 84-86.

Healthwear: Medical Technology Becomes Wearable, A. Pentland, May, pp. 42-49.

Imperceptible Sensory Channels [Column], J.R. Smith, June, pp. 84-85.

Sensor networks

Context-Aware Trails [Column], S. Clarke and Driver, C., Aug., pp. 97-99.

Energy-Efficient Area Monitoring for Sensor Networks, J. Carle and Simplot-Ryl, D., Feb., pp. 40-46.

Environmental Sensor Networks, K. Martinez et al., Aug., pp. 50-56.

The Flock: Mote Sensors Sing in Undergraduate Curriculum, B. Hemingway et al., Aug., pp. 72-78.

Overview of Sensor Networks [Guest Editors' Intro.], D. Culler et al., Aug., pp. 41-49.

Radiation Detection with Distributed Sensor Networks, S.M. Brennan et al., Aug., pp. 57-59.

Shooter Localization in Urban Terrain, M. Maroti et al., Aug., pp. 60-61.

WiseNET: An Ultralow-Power Wireless Sensor Network Solution, C.C. Enz et al., Aug., pp. 62-70.

Sensor networks,
see also Ad hoc networks
Server technology

Power and Energy Management for Server Systems, R. Bianchini and Rajamony, R., Nov., pp. 68-76.

Server technology,
see also Data centers
Simulation

Metamorphic Programming: Unconventional High Performance, P.M. Maurer, Mar., pp. 30-38.

Radiation Detection with Distributed Sensor Networks, S.M. Brennan et al., Aug., pp. 57-59.

Speeding Up High-Speed Protocol Processors [Column], D.N. Serpanos, Sept., pp. 108-111.

Simulation,
see also Modeling
Social issues

Biometrics and the Threat to Civil Liberties [Column], M.L. Johnson, Apr., pp. 92, 90-91.

DakNet: Rethinking Connectivity in Developing Nations, A. Pentland et al., Jan., pp. 78-83.

Data and Information as Property [Column], N. Holmes, May, pp. 92, 90-91.

The End of Science Revisited, J. Horgan, Jan., pp. 37-43.

Engineering a Sustainable World [Opinion], B. Colwell, May, pp. 9-12.

Interactivity, Interfaces, and Smart Toys [Column], L. Plowman and Luckin, R., Feb., pp. 98-100.

Inventing Wellness Systems for Aging in Place, E. Dishman, May, pp. 34-41.

Rationality and Digital Technology [Column], N. Holmes, Sept., pp. 116, 114-115.

The Real Risk of Digital Voting? [Column], W.A. Arbaugh, Dec., pp. 124-125.

Spam and the Social-Technical Gap, B. Whitworth and Whitworth, E., Oct., pp. 38-45.

What We Carry [Sidebar], K. Anderson et al., Dec., pp. 58-61.

Software engineering

Agent Hell: A Scenario of Worst Practices [Column], F. Zambonelli and Luck, M., Mar., pp. 96-98.

Composing Adaptive Software, P.K. McKinley et al., July, pp. 56-64.

Coping with Java Threads, B. Sandén, Apr., pp. 20-27.

A Copper Bullet for Software Quality Improvement, M. Blaha, Feb., pp. 21-25.

A Critical Look at Open Source [Column], B. Fitzgerald, July, pp. 92-94.

Do Agile Methods Marginalize Problem Solvers? [Column], V. Skowronski, Oct., pp. 120, 118-119.

NASA's Mission Reliable, P. Regan and Hamilton, S., Jan., pp. 59-68.

Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure, D. Garlan et al., Oct., pp. 46-54.

A Tale of Three Disciplines ... and a Revolution, J.H. Poore, Jan., pp. 30-36.

Software quality

Agile Software Development in Large Organizations, M. Lindvall et al., Dec., pp. 26-34.

A Critical Look at Open Source [Column], B. Fitzgerald, July, pp. 92-94.

Spam

E-Mail Security Gets Personal [News], L.D. Paulson, Jan., p. 26.

Spam and the Social-Technical Gap, B. Whitworth and Whitworth, E., Oct., pp. 38-45.

Spam-Plagued Researchers Develop Antispam Technique, L.D. Paulson, Oct., pp. 29-30.

Will New Standards Help Curb Spam? [News], D. Geer, Feb., pp. 14-16.

Specification languages

Meaningful Modeling: What's the Semantics of "Semantics"? D. Harel and Rumpe, B., Oct., pp. 64-72.

Modeling Complex Spoken Dialog, H. Dybkjær and Dybkjær, L., Aug., pp. 32-40.

Modeling Multimodal Human-Computer Interaction, Z. Obrenovic and Starcevic, D., Sept., pp. 65-72.

Using UML-Based Rate Monotonic Analysis to Predict Schedulability, H. Saiedian and Raguraman, S., Oct., pp. 56-63.

XML-Based Specification for Web Services Document Security, R. Bhatti et al., Apr., pp. 41-49.

Standards

Achieving Wireless Broadband with WiMax [News], S.J. Vaughan-Nichols, June, pp. 10-13.

Are Web Services Finally Ready to Deliver? [News], N. Leavitt, Nov., pp. 14-18.

Best Business Practices for Standards Groups [Column], M. LoBue, Jan., pp. 124-125.

IEEE Standard for Encrypted Storage [Column], J. Hughes, Nov., pp. 110-112.

Internet Accessibility: Beyond Disability [Column], C. Hofstader, Sept., pp. 103-105.

New Wireless Technology Provides Quality of Service [News], L.D. Paulson, Mar., pp. 19-20.

Raising the Bar [Standards], J. Cole, Sept., pp. 112-113.

Will Interoperability Problems Give IP Telephony a Busy Signal? [News], N. Leavitt, Mar., pp. 16-18.

Will New Standards Help Curb Spam? [News], D. Geer, Feb., pp. 14-16.

Storage technologies

Cooperative Cache-Based Data Access in Ad Hoc Networks, G. Cao et al., Feb., pp. 32-39.

Expanding the Digital Camera-s Reach, C. Narayanaswami and Raghunath, M.T., Dec., pp. 65-73.

IEEE Standard for Encrypted Storage [Column], J. Hughes, Nov., pp. 110-112.

Outperforming LRU with an Adaptive Replacement Cache Algorithm, N. Megiddo and Modha, D.S., Apr., pp. 58-65.

Power and Energy Management for Server Systems, R. Bianchini and Rajamony, R., Nov., pp. 68-76.

Supercomputing

Mobile Supercomputers [Column], T. Austin et al., May, pp. 81-83.

New Trends Revive Supercomputing Industry [News], S.J. Vaughan-Nichols, Feb., pp. 10-13.

Synchronization

Coping with Java Threads, B. Sandén, Apr., pp. 20-27.

System availability

Recovery-Oriented Computing: Building Multitier Dependability, G. Candea et al., Nov., pp. 60-67.

System engineering

A Roadmap for Enterprise System Implementation, D.M. Strong and Volkoff, O., June, pp. 22-29.

The Usefulness of Hindsight [Column], N. Holmes, Nov., pp. 120, 118-119.

System-on-chip (SoC) technology,
see Microprocessors, Semiconductor technology
Systems analysis

Design Fragility [Opinion], B. Colwell, Jan., pp. 13-16.

A New Framework for Computer Science and Engineering, P.S. Rosenbloom, Nov., pp. 23-28.

Trusting a Chaotic Future [Opinion], B. Colwell, Oct., pp. 8-10.

Using UML-Based Rate Monotonic Analysis to Predict Schedulability, H. Saiedian and Raguraman, S., Oct., pp. 56-63.

Systems biology,
see Biology and medical computing
T
Technology forecasting

Engineers as Soothsayers [Opinion], B. Colwell, Sept., pp. 6-9.

Trusting a Chaotic Future [Opinion], B. Colwell, Oct., pp. 8-10.

Technology transfer

Diagnosing Attention Disorders in a Virtual Classroom [Column], A.A. Rizzo et al., June, pp. 87-89.

Engineering a Sustainable World, [Opinion], B. Colwell, May, pp. 9-12.

Testing

2003 Technology Roadmap for Semiconductors, D. Edenfeld et al., Jan., pp. 47-56.

NASA's Mission Reliable, P. Regan and Hamilton, S., Jan., pp. 59-68.

Three-dimensional display,
see Display technologies
U
Ubiquitous computing,

ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing, W.G. Griswold et al., Oct., pp. 73-81.

Context-Aware Trails [Column], S. Clarke and Driver, C., Aug., pp. 97-99.

Enabling Ubiquitous Sensing with RFID [Column], R. Want, Apr., pp. 84-86.

Imperceptible Sensory Channels [Column], J.R. Smith, June, pp. 84-85.

Location-Aware Computing Comes of Age [Column], M. Hazas et al., Feb., pp. 95-97.

Machine-to-Machine Technology Gears Up for Growth [News], G. Lawton, Sept., pp. 12-15.

Roomware: Computers Disappear and Interaction Evolves, T. Prante, Streitz, N., and Tandler, P., Dec., pp. 47-54.

User-Centered Location Awareness, C. Schmandt and Marmasse, N., Oct., pp. 110-111.

Ubiquitous computing,
see also Digital home technologies
Unified Modeling Language (UML),
see Specification languages
Uniform Computer Information Transactions Act (UCITA),
see Legal issues
User-interface technology

Imperceptible Sensory Channels [Column], J.R. Smith, June, pp. 84-85.

Interface Quotas and Internet-Derived Value, [Opinion], B. Colwell, Dec., pp. 10-12.

Modeling Complex Spoken Dialog, H. Dybkjær and Dybkjær, L., Aug., pp. 32-40.

Modeling Multimodal Human-Computer Interaction, Z. Obrenovic and Starcevic, D., Sept., pp. 65-72.

Roomware: Computers Disappear and Interaction Evolves, T. Prante, Streitz, N., and Tandler, P., Dec., pp. 47-54.

Taking Handheld Devices to the Next Level, B.A. Myers et al., Dec., pp. 36-43.

Will Gesture-Recognition Technology Point the Way? [News], D. Geer, Oct., pp. 20-23.

V
Virtual machines

Internet Data Centers [Guest Editors' Intro.], K. Kant and Mohapatra, P., Nov., pp. 35-37.

Virtual reality

Diagnosing Attention Disorders in a Virtual Classroom [Column], A.A. Rizzo et al., June, pp. 87-89.

Viruses, computer

First Smart-Phone Virus Is Discovered [News], L.D. Paulson, Aug., p. 29.

P2P Hacker Tool Poses Escalating Threat [News], L.D. Paulson, May, pp. 22-23.

Patch on Demand Saves Even More Time? [Column], A.D. Keromytis, Aug., pp. 94-96.

"Peeping Tom" Virus Looks in on Its Victims [News], L.D. Paulson, Nov., p. 22.

Scob Attack: A Sign of Bad Things to Come? [News], N. Leavitt, Sept., pp. 16-18.

System Uses Existing Attacks to Predict Future Threats [News], L.D. Paulson, July, p. 26.

Worm Epidemics in High-Speed Networks, T.M. Chen and Robert, J-M., June, pp. 48-53.

Viruses, computer,
see also Data security, Security
W
Wearable computers

Healthwear: Medical Technology Becomes Wearable, A. Pentland, May, pp. 42-49.

Web search,
see Information retrieval and storage
Web services

Are Web Services Finally Ready to Deliver? [News], N. Leavitt, Nov., pp. 14-18.

Web technologies,
see World Wide Web
Wireless applications and technologies

Achieving Wireless Broadband with WiMax [News], S.J. Vaughan-Nichols, June, pp. 10-13.

ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing, W.G. Griswold et al., Oct., pp. 73-81.

Ad Hoc Networks [Guest Editors' Intro.], J. Wu and Stojmenovic, I., Feb., pp. 29-31.

Beyond 3G: Compound Wireless Services, T.J.A. Kobylarz, Sept., pp. 23-28.

Companies Make USB Interconnects Wireless [News], L.D. Paulson, Sept., p. 20.

DakNet: Rethinking Connectivity in Developing Nations, A. Pentland et al., Jan., pp. 78-83.

Empowering Sports Fans with Technology [Column], T. Hayden, Sept., pp. 106-107.

Energy-Efficient Area Monitoring for Sensor Networks, J. Carle and Simplot-Ryl, D., Feb., pp. 40-46.

Expanding the Digital Camera's Reach, C. Narayanaswami and Raghunath, M.T., Dec., pp. 65-73.

Is MIMO the Future of Wireless Communications? [News], G. Lawton, July, pp. 20-22.

Metropolitan-Scale Wi-Fi Mesh Networks [Column], M. Audeh, Dec., pp. 116-118.

Mobile Agents in Wireless Devices [Column], L. Vasiu and Mahmoud, Q.H., Feb., pp. 104-105.

New Wireless Technology Provides Quality of Service [News], L.D. Paulson, Mar., pp. 19-20.

Overview of Sensor Networks [Guest Editors' Intro.], D. Culler et al., Aug., pp. 41-49.

Routing and Security in Mobile Ad Hoc Networks, N. Milanovic et al., Feb., pp. 61-65.

Taking Handheld Devices to the Next Level, B.A. Myers et al., Dec., pp. 36-43.

Two Companies Make the Hard Drive Wireless [News], L.D. Paulson, Oct., p. 29.

"Wallet in a Phone" Pushes Mobile E-Commerce [News], L.D. Paulson, Nov., pp. 21-22.

Wireless Middleware: Glue for the Mobile Infrastructure [News], S.J. Vaughan-Nichols, May, pp. 18-20.

Wireless sensor networks,
see Sensor networks
World Wide Web

Adaptive Neural Network Clustering of Web Users, S.K. Rangarajan et al., Apr., pp. 34-40.

Databases Deepen the Web [Column], T.M. Ghanem and Aref, W.G., Jan., pp. 116-117.

Internet Accessibility: Beyond Disability, C. Hofstader, Sept., pp. 103-105.

A Software Infrastructure for Authenticated Web Metering, C. Blundo and Cimato, S., Apr., pp. 28-33.

XML-Based Specification for Web Services Document Security, R. Bhatti et al., Apr., pp. 41-49.

Worms,
see Viruses, computer
XYZ
XML,
see Specification languages, World Wide Web

Author Index

A

Alavi, Maryam, Distributed Learning Environments [Column], Jan., pp. 121-122.

Ali, Shoukat, see Maheswaran, M., Oct., pp. 115-117.

Anderl, Tom, see Hemingway, B., Aug., pp. 72-78.

Anderson, Ken, M. Chang, and S. Mainwaring, What We Carry [Sidebar], Dec., pp. 58-61.

Andrews, David, D. Niehaus, and P. Ashenden, Programming Models for Hybrid CPU/FPGA Chips [Column], Jan., pp. 118-120.

Arbaugh, William A., A Patch in Nine Saves Time? June, pp. 82-83.

Arbaugh, William A., The Real Risk of Digital Voting? Dec., pp. 124-125.

Aref, Walid G., see Ghanem, T.M., Jan., pp. 116-117.

Ashenden, Peter, see Andrews, D., Jan., pp. 118-120.

Audeh, Malik, Metropolitan-Scale Wi-Fi Mesh Networks, Dec., pp. 116-118.

Austin, Todd, D. Blaauw, T. Mudge, and K. Flautner, Making Typical Silicon Matter with Razor, Mar., pp. 57-65.

Austin, Todd, D. Blaauw, S. Mahlke, T. Mudge, C. Chakrabarti, and W. Wolf, Mobile Supercomputers [Column], May, pp. 81-83.

Avanzini, Federico, D. Rocchesso, A. Belussi, A. Dal Palu A. Dovier, Designing an Urban-Scale Auditory Alert System, Sept., pp. 55-61.

B

Babu, Mohan, From Organization Man to Free Agent [Column], Jan., pp. 128, 126-127.

Balagani, Kiran S., see Rangarajan, S.K., Apr., pp. 34-40.

Belussi, Alberto, see Avanzini, F., Sept., pp. 55-61.

Bertino, Elisa, see Bhatti, R., Apr., pp. 41-49.

Bhatti, Rafae, E. Bertino, A. Ghafoor, and J.B.D. Joshi, XML-Based Specification for Web Services Document Security, Apr., pp. 41-49.

Bianchini, Ricardo, and R. Rajamony, Power and Energy Management for Server Systems, Nov., pp. 68-76.

Bimber, Oliver, Combining Optical Holograms with Interactive Computer Graphics, Jan., pp. 85-91.

Blaauw, David, see Austin, T., Mar., pp. 57-65.

Blaauw, David, see Austin, T., May, pp. 81-83.

Blaha, Michael, A Copper Bullet for Software Quality Improvement, Feb., pp. 21-25.

Blundo, Carlo, and S. Cimato, A Software Infrastructure for Authenticated Web Metering, Apr., pp. 28-33.

Borriello, Gaetano, see Hemingway, B., Aug., pp. 72-78.

Bowerly, Todd, see Rizzo, A.A., June, pp. 87-89.

Boyer, Robert, see Griswold, W.G., Oct., pp. 73-81.

Brennan, Sean M., A.M. Mielke, D.C. Torney, and A.B. Maccabe, Radiation Detection with Distributed Sensor Networks, Aug., pp. 57-59.

Bressoud, Thomas, see Kozuch, M., July, pp. 65-72.

Brown, Aaron B., see Candea, G., Nov., pp. 60-67.

Brown, Rich, see Christensen, K., Aug., pp. 91-93.

Brown, Steven W., see Griswold, W.G., Oct., pp. 73-81.

Brunette, Waylon, see Hemingway, B., Aug., pp. 72-78.

Buckwalter, J. Galen, see Rizzo, A.A., June, pp. 87-89.

Burger, Doug, and J.R. Goodman, Billion-Transistor Architectures: There and Back Again, Mar., pp. 22-28.

Burger, Doug, S.W. Keckler, K.S. McKinley, M. Dahlin, L.K. John, C. Lin, C.R. Moore, J. Burrill, R.G. McDonald, W. Yoder, and the TRIPS Team, Scaling to the End of Silicon with EDGE Architectures, July, pp. 44-55.

Burrill, James, see Burger, D., July, pp. 44-55.

C

Candea, George, A.B. Brown, A. Fox, and D. Patterson, Recovery-Oriented Computing: Building Multitier Dependability, Nov., pp. 60-67.

Cao, Guohong, L. Yin, and C.R. Das, Cooperative Cache-Based Data Access in Ad Hoc Networks, Feb., pp. 32-39.

Carle, Jean, and D. Simplot-Ryl, Energy-Efficient Area Monitoring for Sensor Networks, Feb., pp. 40-46.

Carver, Doris L., Computer in 2004 [EIC's Message], Jan., pp. 8-9.

Cellary, Wojciech, W. Wiza, and K. Walczak, Visualizing Web Search Results in 3D [Column], May, pp. 87-89.

Chahl, Javaan, see Thakoor, S., Sept., pp. 38-47.

Chakrabarti, Chaitali, see Austin, T., May, pp. 81-83.

Chakraborty, Dipanjan, and H. Lei, Extending the Reach of Business Processes [Column], Apr., pp. 78-80.

Chang, Carl K., [President's Message] Evolving the World with the World's Computer Society, Jan., pp. 10-12.

Chang, Carl K., [President's Message] Transforming the World's Computer Society: Together, We Will Get It Done! Dec., pp. 14-15.

Chang, Michele, see Anderson, K., Dec., pp. 58-61.

Chau, Michael, see Chen, H., Apr., pp. 50-56.

Chen, Hsinchun, W. Chung, J.J. Xu, G. Wang, Y. Qin, and M. Chau, Crime Data Mining: A General Framework and Some Examples, Apr., pp. 50-56.

Chen, Thomas M., and J. Robert, Worm Epidemics in High-Speed Networks, June, pp. 48-53.

Cheng, Betty H.C., see McKinley, P.K., July, pp. 56-64.

Cheng, Shang-Wen, see Garlan, D., Oct., pp. 46-54.

Christensen, Ken, B. Nordman, and R. Brown, Power Management in Networked Devices [Column], Aug., pp. 91-93.

Christian, Tom, see Kallahalla, M., Nov., pp. 38-46.

Chua, Cecil Eng Huang, and J. Wareham, Fighting Internet Auction Fraud: An Assessment and Proposal, Oct., pp. 31-37.

Chung, Wingyan, see Chen, H., Apr., pp. 50-56.

Cimato, Stelvio, see Blundo, C., Apr., pp. 28-33.

Clarke, Siobhán, and C. Driver, Context-Aware Trails [Column], Aug., pp. 97-99.

Cline, Linda, see Regnier, G., Nov., pp. 48-58.

Cole, Jack, Raising the Bar [Column], Sept., pp. 112-113.

Colwell, Bob, We May Need a New Box [Theme Issue Intro.], Mar., pp. 40-41.

Colwell, Bob, [Opinion] Design Fragility, Jan., pp. 13-16.

Colwell, Bob, [Opinion] Computer Lessons from Pop Songs, Feb., pp. 7-9.

Colwell, Bob, [Opinion] The Zen of Overclocking, Mar., pp. 9-12.

Colwell, Bob, [Opinion] Brainstorming, Influence, and Icebergs, Apr., pp. 9-12.

Colwell, Bob, [Opinion] Engineering a Sustainable World, May, pp. 9-12.

Colwell, Bob, [Opinion] Let's Hear from Those in the Back, June, pp. 6-9.

Colwell, Bob, [Opinion] Travel Stories, July, pp. 8-10.

Colwell, Bob, [Opinion] The Art of the Possible, Aug., pp. 8-10.

Colwell, Bob, [Opinion] Engineers as Soothsayers, Sept., pp. 6-9.

Colwell, Bob, [Opinion] Trusting a Chaotic Future, Oct., pp. 8-10.

Colwell, Bob, [Opinion] All Things Are Connected, Nov., pp. 10-12.

Colwell, Bob, [Opinion] Interface Quotas and Internet-Derived Value, Dec., pp. 10-12.

Conti, Marco, G. Maselli, G. Turi, and S. Giordano, Cross-Layering in Mobile Ad Hoc Network Design, Feb., pp. 48-51.

Culler, David, D. Estrin, and M. Srivastava, Overview of Sensor Networks [Guest Editors' Intro.], Aug., pp. 41-49.

D

Dagnino, Aldo, see Lindvall, M., Dec., pp. 26-34.

Dahlin, Mike, see Burger, D., July, pp. 44-55.

Dal Palù, Alessandro, see Avanzini, F., Sept., pp. 55-61.

Dalton, Chris I., see Kallahalla, M., Nov., pp. 38-46.

Das, Chita R., see Cao, G., Feb., pp. 32-39.

Davidson, Anthony, see Milanovic, N., Feb., pp. 61-65.

Decotignie, Jean-Dominique, see Enz, C.C., Aug., pp. 62-70.

Dishman, Eric, Inventing Wellness Systems for Aging in Place, May, pp. 34-41.

Dobosiewicz, Wlodek, [Column] see Mahmoud, Q.H., Feb., pp. 108, 106-107.

Dobosiewicz, Wlodek, [Column] see Swayne, D.A., Aug., pp. 104, 102-103.

Dovier, Agostino, see Avanzini, F., Sept., pp. 55-61.

Driver, Cormac, see Clarke, S., Aug., pp. 97-99.

Dybkjær, Hans, and L. Dybkjær, Modeling Complex Spoken Dialog, Aug., pp. 32-40.

Dybkjær, Laila, see Dybkjær, H., Aug., pp. 32-40.

E

Edenfeld, Don, A.B. Kahng, M. Rodgers, and Y. Zorian, 2003 Technology Roadmap for Semiconductors, Jan., pp. 47-56.

Edwards, Nigel, see Kallahalla, M., Nov., pp. 38-46.

El-Hoiydi, Amre, see Enz, C.C., Aug., pp. 62-70.

Enz, Christian C., A. El-Hoiydi, J. Decotignie, and V. Peiris, WiseNET: An Ultralow-Power Wireless Sensor Network Solution, Aug., pp. 62-70.

Esfahanian, Abdol-Hossein, see Xiao, L., Feb., pp. 67-74.

Estrin, Deborah, see Culler, D., Aug., pp. 41-49.

Eugster, Patrick T., R. Guerraoui, A. Kermarrec, and L. Massoulié, Epidemic Information Dissemination in Distributed Systems, May, pp. 60-67.

F

Finkelstein, Anthony, J. Hetherington, L. Li, O. Margoninski, P. Saffrey, R. Seymour, and A. Warner, Computational Challenges of Systems Biology, May, pp. 26-33.

Fitzgerald, Brian, A Critical Look at Open Source [Column], July, pp. 92-94.

Flautner, Krisztián, see Austin, T., Mar., pp. 57-65.

Fletcher, Richard, see Pentland, A.S., Jan., pp. 78-83.

Foong, Annie, see Regnier, G., Nov., pp. 48-58.

Fox, Armando, see Candea, G., Nov., pp. 60-67.

Friend, Robert, Making the Gigabit IPsec VPN Architecture Secure, June, pp. 54-60.

G

Garlan, David, S. Cheng, A. Huang, B. Schmerl, and P. Steenkiste, Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure, Oct., pp. 46-54.

Geer, David, [News] Will New Standards Help Curb Spam? Feb., pp. 14-16.

Geer, David, [News] Just How Secure Are Security Products? June, pp. 14-16.

Geer, David, [News] E-Micropayments Sweat the Small Stuff, Aug., pp. 19-22.

Geer, David, [News] Will Gesture-Recognition Technology Point the Way? Oct., pp. 20-23.

Geer, David, [News] Dealing with Concerns over Digital Rights Management Technology, Dec., pp. 20-22.

Ghafoor, Arif, see Bhatti, R., Apr., pp. 41-49.

Ghanem, Thanaa M., and W.G. Aref, Databases Deepen the Web [Column], Jan., pp. 116-117.

Giordano, Silvia, see Conti, M., Feb., pp. 48-51.

Gittler, Frederic, see Kallahalla, M., Nov., pp. 38-46.

Gong, Li, see Shim, S.S.Y., June, pp. 33-35.

Goodman, James R., see Burger, D., Mar., pp. 22-28.

Goslin, Mike, and M.R. Mine, The Panda3D Graphics Engine [Column], Oct., pp. 112-114.

Griswold, William G., P. Shanahan, S.W. Brown, R. Boyer, M. Ratto, R.B. Shapiro, and T.M. Truong, ActiveCampus: Experiments in Community-Oriented Ubiquitous Computing, Oct., pp. 73-81.

Guerraoui, Rachid, see Eugster, P.T., May, pp. 60-67.

Gui, Chao, see Mohapatra, P., Feb., pp. 52-59.

Gutmann, Peter, Simplifying Public Key Management [Column], Feb., pp. 101-103.

Gwennap, Linley, see Shim, S.S.Y., June, pp. 33-35.

H

Hamilton, Scott, see Regan, P., Jan., pp. 59-68.

Harel, David, and B. Rumpe, Meaningful Modeling: What's the Semantics of "Semantics"? Oct., pp. 64-72.

Hart, Jane K., see Martinez, K., Aug., pp. 50-56.

Hassler, Vesna, Online Collaboration Products [Column], Nov., pp. 106-109.

Hasson, Amir, see Pentland, A.S., Jan., pp. 78-83.

Hayden, Tim, Empowering Sports Fans with Technology [Column], Sept., pp. 106-107.

Hazas, Mike, J. Scott, and J. Krumm, Location-Aware Computing Comes of Age [Column], Feb., pp. 95-97.

Helfrich, Casey, see Kozuch, M., July, pp. 65-72.

Hemingway, Bruce, W. Brunette, T. Anderl, and G. Borriello, The Flock: Mote Sensors Sing in Undergraduate Curriculum, Aug., pp. 72-78.

Hetherington, James, see Finkelstein, A., May, pp. 26-33.

Hine, Butler, see Thakoor, S., Sept., pp. 38-47.

Hofstader, Chris, Internet Accessibility: Beyond Disability [Column], Sept., pp. 103-105.

Holmes, Neville, [Column] Languages and the Computing Profession, Mar., pp. 104, 102-103.

Holmes, Neville, [Column] Data and Information as Property, May, pp. 92, 90-91.

Holmes, Neville, [Column] In Defense of PowerPoint, July, pp. 100, 98-99.

Holmes, Neville, [Column] Rationality and Digital Technology, Sept., pp. 116, 114-115.

Holmes, Neville, [Column] The Usefulness of Hindsight, Nov., pp. 120, 118-119.

Horgan, John, The End of Science Revisited, Jan., pp. 37-43.

Hu, Xiaorui, see Wang, R., Sept., pp. 30-37.

Huang, An-Cheng, see Garlan, D., Oct., pp. 46-54.

Huggahalli, Ram, see Regnier, G., Nov., pp. 48-58.

Hughes, Jim, IEEE Standard for Encrypted Storage [Column], Nov., pp. 110-112.

I

Illikkal, Ramesh, see Regnier, G., Nov., pp. 48-58.

Ives, Blake, [Column] see Richardson, G., Mar., pp. 93-94.

Ives, Blake, [Column] see Richardson, G., May, pp. 84-86.

Iyengar, S.S., see Rangarajan, S.K., Apr., pp. 34-40.

Iyer, Ravi, see Regnier, G., Nov., pp. 48-58.

J

John, Lizy K., see Burger, D., July, pp. 44-55.

Johnson, Margaret L., Biometrics and the Threat to Civil Liberties [Column], Apr., pp. 92, 90-91.

Joshi, James B.D., see Bhatti, R., Apr., pp. 41-49.

Jungck, Peder, and S.S.Y. Shim, Issues in High-Speed Internet Security, July, pp. 36-42.

K

Kähkönen, Tuomo, see Lindvall, M., Dec., pp. 26-34.

Kahng, Andrew B., see Edenfeld, D., Jan., pp. 47-56.

Kallahalla, Mahesh, M. Uysal, R. Swaminathan, D.E. Lowell, M. Wray, T. Christian, N. Edwards, C.I. Dalton, and F. Gittler, SoftUDC: A Software-Based Data Center for Utility Computing, Nov., pp. 38-46.

Kant, Krishna, and P. Mohapatra, Internet Data Centers [Guest Editors' Intro.], Nov., pp. 35-37.

Kara, Atsushi, Private-to-Private Communications over the Internet, May, pp. 53-59.

Kasten, Eric P., see McKinley, P.K., July, pp. 56-64.

Keckler, Stephen W., see Burger, D., July, pp. 44-55.

Kermarrec, Anne-Marie, see Eugster, P.T., May, pp. 60-67.

Keromytis, Angelos D., "Patch on Demand" Saves Even More Time? [Column], Aug., pp. 94-96.

Kiefer, David, see Lindvall, M., Dec., pp. 26-34.

Klimchuk, Dean, see Rizzo, A.A., June, pp. 87-89.

Kobylarz, Thaddeus J.A., Beyond 3G: Compound Wireless Services, Sept., pp. 23-28.

Koopman, Philip, Embedded System Security [Column], July, pp. 95-97.

Kozuch, Michael, M. Satyanarayanan, T. Bressoud, C. Helfrich, and S. Sinnamohideen, Seamless Mobile Computing on Fixed Infrastructure, July, pp. 65-72.

Krumm, John, see Hazas, M., Feb., pp. 95-97.

L

Lampson, Butler W., Computer Security in the Real World, June, pp. 37-46.

Lawton, George, [News] Is Peer-to-Peer Secure Enough for Corporate Use? Jan., pp. 22-25.

Lawton, George, [News] Will Network Processor Units Live Up to Their Promise? Apr., pp. 13-15.

Lawton, George [News] Is MIMO the Future of Wireless Communications? July, pp. 20-22.

Lawton, George, [News] Machine-to-Machine Technology Gears Up for Growth, Sept., pp. 12-15.

Lawton, George, [News] The Lowdown on High-Rise Chips, Oct., pp. 24-27.

Leavitt, Neal, [News] Will Interoperability Problems Give IP Telephony a Busy Signal? Mar., pp. 16-18.

Leavitt, Neal, [News] Scob Attack: A Sign of Bad Things to Come? Sept., pp. 16-18.

Leavitt, Neal, [News] Are Web Services Finally Ready to Deliver? Nov., pp. 14-18.

Ledeczi, Akos, see Maroti, M., Aug., pp. 60-61.

Lei, Hui, see Chakraborty, D., Apr., pp. 78-80.

Li, Jian, see Mohapatra, P., Feb., pp. 52-59.

Li, Linzhong, see Finkelstein, A., May, pp. 26-33.

Lin, Calvin, see Burger, D., July, pp. 44-55.

Lindvall, Mikael, D. Muthig, A. Dagnino, C. Wallin, M. Stupperich, D. Kiefer, J. May, and T. Kähkönen, Agile Software Development in Large Organizations, Dec., pp. 26-34.

Liu, Yunhao, see Xiao, L., Feb., pp. 67-74.

LoBue, Michael, Best Business Practices for Standards Groups [Column], Jan., pp. 124-125.

Lowell, David E., see Kallahalla, M., Nov., pp. 38-46.

Lu, Shih-Lien, Speeding Up Processing with Approximation Circuits, Mar., pp. 67-73.

Luck, Michael, see Zambonelli, F., Mar., pp. 96-98.

Luckin, Rosemary, see Plowman, L., Feb., pp. 98-100.

Lupu, Emil, see Montanari, R., July, pp. 73-80.

M

Maccabe, Arthur B., see Brennan, S.M., Aug., pp. 57-59.

Macedonia, Michael, [Column] The Digital World's Midlife Crisis, Aug., pp. 100-101.

Macedonia, Michael, [Column] Small Is Beautiful, Dec., pp. 122-123.

Maheswaran, Muthucumaru, and S. Ali, A Taxonomy of Network Computing Systems [Column], Oct., pp. 115-117.

Mahlke, Scott, see Austin, T., May, pp. 81-83.

Mahmoud, Qusay H., W. Dobosiewicz, and D. Swayne, Making Computer Programming Fun and Accessible[Column], Feb., pp. 108, 106-107.

Mahmoud, Qusay H., W. Dobosiewicz, and D. Swayne, see Vasiu, L., Feb., pp. 104-105.

Mahmoud, Qusay H., W. Dobosiewicz, and D. Swayne, see Swayne, D.A., Aug., pp. 104, 102-103.

Mainwaring, Scott, see Anderson, K., Dec., pp. 58-61.

Makineni, Srihari, see Regnier, G., Nov., pp. 48-58.

Malek, Miroslaw, see Milanovic, N., Feb., pp. 61-65.

Margoninski, Ofer, see Finkelstein, A., May, pp. 26-33.

Marmasse, Natalia, see Schmandt, C., Oct., pp. 110-111.

Maroti, Miklos, G. Simon, A. Ledeczi, and J. Sztipanovits, Shooter Localization in Urban Terrain, Aug., pp. 60-61.

Martinez, Kirk, J.K. Hart, and R. Ong, Environmental Sensor Networks, Aug., pp. 50-56.

Maselli, Gaia, see Conti, M., Feb., pp. 48-51.

Massoulié, Laurent, see Eugster, P.T., May, pp. 60-67.

Maurer, Peter M., Metamorphic Programming: Unconventional High Performance, Mar., pp. 30-38.

May, John, see Lindvall, M., Dec., pp. 26-34.

McDonald, Robert G., see Burger, D., July, pp. 44-55.

McKinley, Kathryn S., see Burger, D., July, pp. 44-55.

McKinley, Philip K., S.M. Sadjadi, E.P. Kasten, and B.H.C. Cheng, Composing Adaptive Software, July, pp. 56-64.

Mead, Nancy R., Who Is Liable for Insecure Systems? July, pp. 27-34.

Megiddo, Nimrod, and D.S. Modha, Outperforming LRU with an Adaptive Replacement Cache Algorithm, Apr., pp. 58-65.

Mielke, Angela M., see Brennan, S.M., Aug., pp. 57-59.

Milanovic, Nikola, M. Malek, A. Davidson, and V. Milutinovic, Routing and Security in Mobile Ad Hoc Networks, Feb., pp. 61-65.

Miller, Robert C., see Myers, B.A., Dec., pp. 36-43.

Milutinovic, Veljko, see Milanovic, N., Feb., pp. 61-65.

Mine, Mark R., see Goslin, M., Oct., pp. 112-114.

Minturn, Dave, see Regnier, G., Nov., pp. 48-58.

Mitura, Roman, see Rizzo, A.A., June, pp. 87-89.

Modha, Dharmendra S., see Megiddo, N., Apr., pp. 58-65.

Mohapatra, Prasant, C. Gui, and J. Li, Group Communications in Mobile Ad Hoc Networks, Feb., pp. 52-59.

Mohapatra, P., see Kant, K., Nov., pp. 35-37.

Montanari, Rebecca, E. Lupu, and C. Stefanelli, Policy-Based Dynamic Reconfiguration of Mobile-Code Applications, July, pp. 73-80.

Moore, Charles R., see Burger, D., July, pp. 44-55.

Morookian, John Michael, see Thakoor, S., Sept., pp. 38-47.

Mudge, Trevor, see Austin, T., Mar., pp. 57-65.

Mudge, Trevor, see Austin, T., May, pp. 81-83.

Muthig, Dirk, see Lindvall, M., Dec., pp. 26-34.

Myers, Brad, J. Nichols, J.O. Wobbrock, and R.C. Miller, Taking Handheld Devices to the Next Level, Dec., pp. 36-43.

N

Narayanaswami, Chandra, and M.T. Raghunath, Expanding the Digital Camera's Reach, Dec., pp. 65-73.

Newell, Don, see Regnier, G., Nov., pp. 48-58.

Ni, Lionel M., see Xiao, L., Feb., pp. 67-74.

Nichols, Jeffrey, see Myers, B.A., Dec., pp. 36-43.

Niederman, Fred, IT Employment Prospects in 2004: A Mixed Bag, Jan., pp. 69-77.

Niehaus, Douglas, see Andrews, D., Jan., pp. 118-120.

Nordman, Bruce, see Christensen, K., Aug., pp. 91-93.

O

Obrenovic, Zeljko, and D. Starcevic, Modeling Multimodal Human-Computer Interaction, Sept., pp. 65-72.

Olsen, Kai A., The Economics of International Conferences [Column], June, pp. 92, 90-91.

O'Neal, Mike, Restructuring Computing Programs to Meet Employment Challenges, Nov., pp. 29-34.

Ong, Royan, see Martinez, K., Aug., pp. 50-56.

Ortiz, Sixto Jr., [News] 3D Searching Starts to Take Shape, Aug., pp. 24-26.

Ortiz, Sixto Jr., [News] Internet Telephony Jumps Off the Wires, Dec., pp. 16-18.

Overmars, Mark, Teaching Computer Science through Game Design [Column], Apr., pp. 81-83.

P

Patil, Abhishek, see Xiao, L., Feb., pp. 67-74.

Patterson, David, see Candea, G., Nov., pp. 60-67.

Paulson, Linda Dailey, Biomimetic Robots, Sept., pp. 48-53.

Paulson, Linda Dailey, [News] E-Mail Security Gets Personal, Jan., p. 26.

Paulson, Linda Dailey, [News] Ceiling for Controversial US H-1B Visas Drops, Jan., p. 27.

Paulson, Linda Dailey, [News] Technique Speeds Data Transmission in Computers, Jan., p. 27.

Paulson, Linda Dailey, [News] Viewing the World through Interactive Panoramic Images, Jan., p. 28.

Paulson, Linda Dailey, [News] Researcher Develops Colorful Map of the Internet, Feb., p. 17.

Paulson, Linda Dailey, [News] Businesses Adopt Web Site's Satirical Company Names, Feb., p. 18.

Paulson, Linda Dailey, [News] Using Plastic to Make High-Capacity Memory, Feb., p. 18.

Paulson, Linda Dailey, [News] Researchers Develop Self-Assembling Chip Technique, Feb., p. 19.

Paulson, Linda Dailey, [News] Displaying Data in Thin Air, Mar., p. 19.

Paulson, Linda Dailey, [News] New Wireless Technology Provides Quality of Service, Mar., pp. 19-20.

Paulson, Linda Dailey, [News] Computers That Don't Look Like Computers, Mar., p. 20.

Paulson, Linda Dailey, [News] Reversible Computing May Improve Mobile Performance, Mar., p. 21.

Paulson, Linda Dailey, [News] Intel Develops Silicon That Switches Optical Signals, Apr., p. 16.

Paulson, Linda Dailey, [News] Localizing Open Source Software, Apr., p. 17.

Paulson, Linda Dailey, [News] Researchers Develop Network-Security Visualization Tools, Apr., pp. 17-18.

Paulson, Linda Dailey, [News] Spam Hits Instant Messaging, Apr., p. 18.

Paulson, Linda Dailey, [News] New Technology Beefs up BIOS, May, p. 22.

Paulson, Linda Dailey, [News] P2P Hacker Tool Poses Escalating Threat, May, pp. 22-23.

Paulson, Linda Dailey, [News] Dog on a Chip, May, p. 23.

Paulson, Linda Dailey, [News] Approach Gives Providers a New Way to Push Content, May, p. 24.

Paulson, Linda Dailey, [News] Is Broadband over Power Lines About to Take Off? June, p. 18.

Paulson, Linda Dailey, [News] Products Plug Wi-Fi Security Holes, June, pp. 18-19.

Paulson, Linda Dailey, [News] Company Develops Disposable Paper Computer, June, p. 19.

Paulson, Linda Dailey, [News] "Mini-Storms" to Cool Hot Processors, June, p. 20.

Paulson, Linda Dailey, [News] The New Dope on Semiconductor Doping, July, p. 24.

Paulson, Linda Dailey, [News] PARC Develops Software to Connect Devices, July, pp. 24-25.

Paulson, Linda Dailey, [News] Creating Blazing Hot Images of Fire, July, p. 25.

Paulson, Linda Dailey, [News] System Uses Existing Attacks to Predict Future Threats, July, p. 26.

Paulson, Linda Dailey, [News] Companies Develop Nanotech RAM Chips, Aug., p. 28.

Paulson, Linda Dailey, [News] First Smart-Phone Virus Is Discovered, Aug., p. 29.

Paulson, Linda Dailey, [News] Users Feel Flush with New Digital Toilet, Aug., p. 29.

Paulson, Linda Dailey, [News] Getting Electric Power via Ethernet Cables, Aug., p. 30.

Paulson, Linda Dailey, [News] Companies Make USB Interconnects Wireless, Sept., p. 20.

Paulson, Linda Dailey, [News] Robot Performs Origami, Sept., p. 21.

Paulson, Linda Dailey, [News] Using a Pen to Draw Smaller Chip Features, Sept., p. 21.

Paulson, Linda Dailey, [News] New Technology Promises to Reduce Internet Congestion, Sept., p. 22.

Paulson, Linda Dailey, [News] New Chips Stop Buffer Overflow Attacks, Oct., p. 28.

Paulson, Linda Dailey, [News] Two Companies Make the Hard Drive Wireless, Oct., p. 29.

Paulson, Linda Dailey, [News] Spam-Plagued Researchers Develop Antispam Technique, Oct., pp. 29-30.

Paulson, Linda Dailey, [News] Using Computers to Accompany Musicians, Oct., p. 30.

Paulson, Linda Dailey, [News] IBM Develops Autonomous Chips, Nov., p. 20.

Paulson, Linda Dailey, [News] "Wallet in a Phone" Pushes Mobile E-Commerce, Nov., pp. 21-22.

Paulson, Linda Dailey, [News] US University Tells Women to "Let the Games Begin," Nov., p. 21.

Paulson, Linda Dailey, [News] "Peeping Tom" Virus Looks in on Its Victims, Nov., p. 22.

Paulson, Linda Dailey, [News] Technique Uses Viruses to Make Computing Components, Dec., p. 23.

Paulson, Linda Dailey, [News] New Software Uses Instant Messaging to Play Games, Dec., p. 25.

Paulson, Linda Dailey, [News] Researchers to Move Speech Recognition to Hardware, Dec., p. 24.

Paulson, Linda Dailey, [News] Sewing Machines Go Digital, Dec., p. 24.

Peiris, Vincent, see Enz, C.C., Aug., pp. 62-70.

Pentland, Alex (Sandy), Healthwear: Medical Technology Becomes Wearable, May, pp. 42-49.

Pentland, Alex (Sandy), R. Fletcher, and A. Hasson, DakNet: Rethinking Connectivity in Developing Nations, Jan., pp. 78-83.

Phoha, Vir V., see Rangarajan, S.K., Apr., pp. 34-40.

Plowman, Lydia, and R. Luckin, Interactivity, Interfaces, and Smart Toys [Column], Feb., pp. 98-100.

Poore, Jesse H., A Tale of Three Disciplines...and a Revolution, Jan., pp. 30-36.

Prante, Thorsten, N. Streitz, and P. Tandler, Roomware: Computers Disappear and Interaction Evolves, Dec., pp. 47-54.

Q

Qin, Yi, see Chen, H., Apr., pp. 50-56.

R

Raghunath, M.T., see Narayanaswami, C., pp. 65-73.

Raguraman, S., see Saiedian, H., Oct., pp. 56-63.

Rajamony, Ram, see Bianchini, R., Nov., pp. 68-76.

Rangarajan, Santosh K., V.V. Phoha, K.S. Balagani, R.R. Selmic, and S.S. Iyengar, Adaptive Neural Network Clustering of Web Users, Apr., pp. 34-40.

Ratto, Matt, see Griswold, W.G., Oct., pp. 73-81.

Regan, Patrick, and S. Hamilton, NASA's Mission Reliable, Jan., pp. 59-68.

Regnier, Greg, S. Makineni, R. Illikkal, R. Iyer, D. Minturn, R. Huggahalli, D. Newell, L. Cline, and A. Foong, TCP Onloading for Data Center Servers, Nov., pp. 48-58.

Richardson, Gary, and B. Ives, [Column] Managing Systems Development, Mar., pp. 93-94.

Richardson, Gary, and B. Ives, [Column] Systems Development, March, pp. 93-94.

Richardson, Gary, and B. Ives, [Column] Systems Development Processes, May, pp. 84-86.

Rizzo, Albert A., T. Bowerly, C. Shahabi, J.G. Buckwalter, D. Klimchuk, and R. Mitura, Diagnosing Attention Disorders in a Virtual Classroom [Column], June, pp. 87-89.

Robert, Jean-Marc, see Chen, T.M., June, pp. 48-53.

Rocchesso, Davide, see Avanzini, F., Sept., pp. 55-61.

Rodgers, Mike, see Edenfeld, D., Jan., pp. 47-56.

Rosenbloom, Paul S., A New Framework for Computer Science and Engineering, Nov., pp. 23-28.

Rubin, Aviel D., see Shim, S.S.Y., June, pp. 33-35.

Rumpe, Bernhard, see Harel, D., Oct., pp. 64-72.

S

Sadjadi, Seyed Masoud, see McKinley, P.K., July, pp. 56-64.

Saffrey, Peter, see Finkelstein, A., May, pp. 26-33.

Saiedian, H., and S. Raguraman, Using UML-Based Rate Monotonic Analysis to Predict Schedulability, Oct., pp. 56-63.

Sandén, Bo, Coping with Java Threads, Apr., pp. 20-27.

Santini, Simone, Determining Computer Science's Role [Column], Dec., pp. 128, 126-127.

Satyanarayanan, Mahadev, see Kozuch, M., July, pp. 65-72.

Schilit, Bill N., and U. Sengupta, Device Ensembles, Dec., pp. 56-64.

Schmandt, Chris, and N. Marmasse, User-Centered Location Awareness [Column], Oct., pp. 110-111.

Schmerl, Bradley, see Garlan, D., Oct., pp. 46-54.

Schneier, Bruce, Hacking the Business Climate for Network Security [Column], Apr., pp. 87-89.

Scott, James, see Hazas, M., Feb., pp. 95-97.

Selmic, Rastko R., see Rangarajan, S.K., Apr., pp. 34-40.

Sengupta, Uttam, see Schilit, B.N., Dec., pp. 56-64.

Serpanos, Dimitrios N., Speeding Up High-Speed Protocol Processors [Column], Sept., pp. 108-111.

Seymour, Rob, see Finkelstein, A., May, pp. 26-33.

Shahabi, Cyrus, see Rizzo, A.A., June, pp. 87-89.

Shanahan, Patricia, see Griswold, W.G., Oct., pp. 73-81.

Shanbhag, Naresh R., Reliable and Efficient System-on-Chip Design, Mar., pp. 42-50.

Shapiro, R. Benjamin, see Griswold, W.G., Oct., pp. 73-81.

Shim, Simon S.Y., L. Gong, A.D. Rubin, and L. Gwennap, Guest Editors' Intro.: Securing the High-Speed Internet, June, pp. 33-35.

Shim, S.S.Y., see Jungck, P., July, pp. 36-42.

Simon, Gyula, see Maroti, M., Aug., pp. 60-61.

Simplot-Ryl, David, see Carle, J., Feb., pp. 40-46.

Sinnamohideen, Shafeeq, see Kozuch, M., July, pp. 65-72.

Skowronski, Victor, Do Agile Methods Marginalize Problem Solvers? [Column], Oct., pp. 120, 118-119.

Smith, Joshua R., Imperceptible Sensory Channels [Column], June, pp. 84-85.

Smith, Sean, Magic Boxes and Boots: Security in Hardware [Column], Oct., pp. 106-109.

Srivastava, Mani, see Culler, D., Aug., pp. 41-49.

Starcevic, Dusan, see Obrenovic, Z., Sept., pp. 65-72.

Steenkiste, Peter, see Garlan, D., Oct., pp. 46-54.

Stefanelli, Cesare, see Montanari, R., July, pp. 73-80.

Stojmenovic, Ivan, see Wu, J., Feb., pp. 29-31.

Streitz, Norbert, see Prante, T., Dec., pp. 47-54.

Strong, Diane M., and O. Volkoff, A Roadmap for Enterprise System Implementation, June, pp. 22-29.

Stupperich, Michael, see Lindvall, M., Dec., pp. 26-34.

Subramanya, S.R., see Yi, B.K., June, pp. 79-81.

Swaminathan, Ram, see Kallahalla, M., Nov., pp. 38-46.

Swayne, David A., Q.H. Mahmoud, and W. Dobosiewicz, An "Offshore-Resistant" Degree Program [Column], Aug., pp. 104, 102-103.

Swayne, D., see Mahmoud, Q.H., Feb., pp. 108, 106-107.

Sztipanovits, Janos, see Maroti, M., Aug., pp. 60-61.

T

Tandler, Peter, see Prante, T., Dec., pp. 47-54.

Thakoor, Sarita, J.M. Morookian, J. Chahl, B. Hine, and S. Zornetzer, BEES: Exploring Mars with Bioinspired Technologies, Sept., pp. 38-47.

Torney, David C., see Brennan, S.M., Aug., pp. 57-59.

Truong, Tan Minh, see Griswold, W.G., Oct., pp. 73-81.

Turi, Giovanni, see Conti, M., Feb., pp. 48-51.

U

Uht, Augustus K., Going Beyond Worst-Case Specs with TEAtime, Mar., pp. 51-56.

Uysal, Mustafa, see Kallahalla, M., Nov., pp. 38-46.

V

Varshney, Upkar, Vehicular Mobile Commerce [Column], Dec., pp. 116-118.

Vasiu, Luminita, and Q.H. Mahmoud, Mobile Agents in Wireless Devices [Column], Feb., pp. 104-105.

Vaughan-Nichols, Steven J., [News] Vendors Go to Extreme Lengths for New Chips, Jan., pp. 18-20.

Vaughan-Nichols, Steven J., [News] New Trends Revive Supercomputing Industry, Feb., pp. 10-13.

Vaughan-Nichols, Steven J., [News] Voice Authentication Speaks to the Marketplace, Mar., pp. 13-15.

Vaughan-Nichols, Steven J., [News] Wireless Middleware: Glue for the Mobile Infrastructure, May, pp. 18-20.

Vaughan-Nichols, Steven J., [News] Achieving Wireless Broadband with WiMax, June, pp. 10-13.

Volkoff, Olga, see Strong, D.M., June, pp. 22-29.

W

Walczak, Krzysztof, see Cellary, W., May, pp. 87-89.

Wallin, Christina, see Lindvall, M., Dec., pp. 26-34.

Wang, Gang, see Chen, H., Apr., pp. 50-56.

Wang, Runsheng, and X. Hu, VoIP Development in China, Sept., pp. 30-37.

Want, Roy, Enabling Ubiquitous Sensing with RFID [Column], Apr., pp. 84-86.

Ward, Bob, [CS Connection] Paving the Way to the Future: New Programs for 2004, Jan., pp. 95-99.

Ward, Bob, [CS Connection] IEEE Names Fellows for 2004, Feb., pp. 75-77.

Ward, Bob, [CS Connection] ISWC 2004 to Feature Student Wearable Computing Design Contest, Feb., p. 82.

Ward, Bob, [CS Connection] CSIDC 2004 Attracts Hundreds of Student Teams, Mar., pp. 77-79.

Ward, Bob, [CS Connection] IEEE Recognizes NEC's Sekimoto with Medal of Honor, Mar., p. 80.

Ward, Bob, [CS Connection] Burton J. Smith Named Cray Award Winner, Apr., p. 69.

Ward, Bob, [CS Connection] Board of Governors Names Two Candidates for IEEE Division V Director-Elect Race, Apr., p. 69.

Ward, Bob, [CS Connection] Computer Society Honors Outstanding Students, Apr., p. 70.

Ward, Bob, [CS Connection] Researchers Connect at Society Conferences, May, pp. 68-71.

Ward, Bob, [CS Connection] Computer Society Editors in Chief Return for Second Terms, May, p. 71.

Ward, Bob, [CS Connection] Computer Society Awards Recognize Top Professionals, June, pp. 68-69.

Ward, Bob, [CS Connection] Distinguished Visitor Program Seeks Speakers, June, p. 70.

Ward, Bob, [CS Connection] Top Student Teams Vie for $15,000 CSIDC Prize, July, p. 84.

Ward, Bob, [CS Connection] Computer Society Awards Program Honors Achievements in Many Computing Fields, July, pp. 85-86.

Ward, Bob, [CS Connection] IEEE Computer Society Election Update, July, p. 87.

Ward, Bob, [CS Connection] Students Earn Top IEEE Computer Society Prizes at Intel Science Fair, Aug., pp. 80-81.

Ward, Bob, [CS Connection] Pennsylvania Student Wins IEEE President's Scholarship with Neural Interface Design, Aug., p. 81.

Ward, Bob, [CS Connection] CRA Releases Taulbee Survey Numbers for 2002-2003, Aug., p. 82.

Ward, Bob, [CS Connection] Computer Society Cluster Task Force Merges with Supercomputing Technical Committee, Aug., p. 83.

Ward, Bob, [CS Connection] Silicon Valley Museum Celebrates History of Computing, Oct., pp. 15-19.

Ward, Bob, [CS Connection] Computer Society Awards Honor Researchers from Academia and Industry, Oct., pp. 82-83.

Ward, Bob, [CS Connection] IEEE Approves Intelligent Transportation Systems Society, Oct., p. 83.

Ward, Bob, [CS Connection] Society Program Certifies New Software Development Professionals, Oct., p. 84.

Ward, Bob, [CS Connection] Power Systems Pioneer Leaves $100,000 to IEEE Foundation, Oct., p. 84.

Ward, Bob, [CS Connection] Computing Curricula Volume Available for Review, Oct., p. 85.

Ward, Bob, [CS Connection] Computer Society Distance Learning Campus Expands, Oct., p. 85.

Ward, Bob, [CS Connection] Computer Society Transactions Cover Key Conferences in 2005, Nov., p. 81.

Ward, Bob, [CS Connection] Beta Version of Software Engineering Online Goes Public, Nov., p. 82.

Ward, Bob, [CS Connection] Reviewers Make Vital Contributions to Computer, Dec., pp. 89-91.

Wareham, Jonathan, see Chua, C.E.H., Oct., pp. 31-37.

Warner, Anne, see Finkelstein, A., May, pp. 26-33.

Whitworth, Brian, and E. Whitworth, Spam and the Social-Technical Gap, Oct., pp. 38-45.

Whitworth, Elizabeth, see Whitworth, B., Oct., pp. 38-45.

Willey, Allan, Sharing Agile Expertise through the SEC [Sidebar], Dec., p. 58.

Wiza, Wojciech, see Cellary, W., May, pp. 87-89.

Wobbrock, Jacob O., see Myers, B.A., Dec., pp. 36-43.

Wolf, Wayne, [Column] Applications and Architectures, Nov., pp. 114-116.

Wolf, Wayne, [Column] Embedded Is the New Paradigm(s), Mar., pp. 99-101.

Wolf, Wayne, see Austin, T., May, pp. 81-83.

Wool, Avishai, A Quantitative Study of Firewall Configuration Errors, June, pp. 62-67.

Wray, Mike, see Kallahalla, M., Nov., pp. 38-46.

Wu, Jie, and I. Stojmenovic, Ad Hoc Networks [Guest Editors' Intro.], Feb., pp. 29-31.

X

Xiao, Li, A. Patil, Y. Liu, L.M. Ni, and A. Esfahanian, Prioritized Overlay Multicast in Mobile Ad Hoc Environments, Feb., pp. 67-74.

Xu, Jennifer Jie, see Chen, H., Apr., pp. 50-56.

Y

Yi, Byung K., and S.R. Subramanya, Enhancing Personal Communications with Multimedia [Column], June, pp. 79-81.

Yin, Liangzhong, see Cao, G., Feb., pp. 32-39.

Yoder, William, see Burger, D., July, pp. 44-55.

Z

Zambonelli, Franco, and M. Luck, Agent Hell: A Scenario of Worst Practices [Column], Mar., pp. 96-98.

Zorian, Yervant, see Edenfeld, D., Jan., pp. 47-56.

Zornetzer, Steve, see Thakoor, S., Sept., pp. 38-47.

16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool