AUTHOR INDEX

A

Abbasi, A., and H. Chen, A Comparison of Tools for Detecting Fake Websites, Oct., pp. 78-86.

Abrial, J., Faultless Systems: Yes We Can!, Sept., pp. 30-36.

Adcock, M., J. Chung, and C. Schmandt, Are We There Yet? User-Centered Temporal Awareness, Feb., pp. 97-99.

Ajima, Y., S. Sumimoto, and T. Shimizu, Tofu: A 6D Mesh/Torus Interconnect for Exascale Computers, Nov., pp. 36-40.

Alexander, P., Rosetta: Standardization at the System Level, Jan., pp. 108-110.

Al-Masri, E., and Q. H. Mahmoud, Web Service Discovery and Client Goals, Jan., pp. 104-107.

Almeida, L., see Barranco, M., May, pp. 66-73.

Anderson, G. A., see Kouzes, R. T., Jan., pp. 26-34.

Anokwa, Y., C. Hartung, W. Brunette, G. Borriello, and A. Lerer, Open Source Data Collection in the Developing World, Oct., pp. 97-99.

Apolloni, A., V. S.A. Kumar, M. V. Marathe, and S. Swarup, Computational Epidemiology in a Connected World, Dec., pp. 83-86.

Arel, I., and S. Livingston, Beyond the Turing Test, Mar., pp. 90-91.

Atkinson, J., see Figueroa, A., Apr., pp. 68-76.

Aubrey, W., see King, R. D., Aug., pp. 46-54.

Averitt, S. F., see Schaffer, H. E., July, pp. 94-97.

Aylor, J. H., see Hanson, M. A., Jan., pp. 58-65.

B

Babar, M. A., and I. Gorton, Software Architecture Review: The State of Practice, July, pp. 26-32.

Bae, H., see Dave, C., Dec., pp. 36-42.

Baeza-Yates, R., see Jansen, B. J., May, pp. 98-101.

Baggi, D., and G. Haus, IEEE 1599: Music Encoding and Interaction, Mar., pp. 84-87.

Bainbridge, D., see Liesaputra, V., Feb., pp. 72-81.

Balaji, P., see Feng, W., Dec., pp. 26-27.

Balan, R. K., and N. Ramasubbu, The Digital Wallet: Opportunities and Prototypes, Apr., pp. 100-102.

Barais, O., see Morin, B., Oct., pp. 44-51.

Barker, K. J., K. Davis, A. Hoisie, D. J. Kerbyson, M. Lang, S. Pakin, and J. C. Sancho, Using Performance Modeling to Design Large-Scale Systems, Nov., pp. 42-49.

Barranco, M., J. Proenza, and L. Almeida, Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate, May, pp. 66-73.

Barrero, F., see Toral, S. L., Dec., pp. 61-68.

Barth, A. T., see Hanson, M. A., Jan., pp. 58-65.

Bash, C., see Shah, A., July, pp. 91-93.

Beckman, P., see Wilde, M., Nov., pp. 50-60.

Beecroft, A. J., and J. B. Michael, Passive Fingerprinting of Network Reconnaissance Tools, Dec., pp. 91-93.

Bell, R., see Koren, Y., Aug., pp. 30-37.

Benatallah, B., see Skogsrud, H., Feb., pp. 54-61.

Bencomo, N., see Blair, G., Oct., pp. 22-27.

Berenbach, B., and M. Broy, Professional and Ethical Dilemmas in Software Engineering, Jan., pp. 74-80.

Berry, D., see Grimshaw, A., Feb., pp. 27-34.

Bertino, E., see Paci, F., May, pp. 50-57.

Beyls, K., and E. H. D'Hollander, Refactoring for Data Locality, Feb., pp. 62-71.

Bhalla, U. S., see Ramakrishnan, N., Jan., pp. 47-56.

Bimber, O., Visual Effects and Beyond, July, pp. 33-34.

Bird, I., B. Jones, and K. F. Kee, The Organization and Management of Grid Infrastructures, Jan., pp. 36-46.

Birman, K., J. Cantwell, D. Freedman, Q. Huang, P. Nikolov, and K. Ostrowski, Edge Mashups for Service-Oriented Collaboration, May, pp. 90-94.

Black, S., P. P. Boca, J. P. Bowen, J. Gorman, and M. Hinchey, Formal Versus Agile: Survival of the Fittest, Sept., pp. 37-45.

Blair, G., N. Bencomo, and R. B. France, Models@ run.time, Oct., pp. 22-27.

Blaze, M., S. Kannan, I. Lee, O. Sokolsky, J. M. Smith, A. D. Keromytis, and W. Lee, Dynamic Trust Management, Feb., pp. 44-52.

Boca, P. P., see Black, S., Sept., pp. 37-45.

Bongard, J., Biologically Inspired Computing, Apr., pp. 95-98.

Borriello, G., see Anokwa, Y., Oct., pp. 97-99.

Bowen, J. P., see Black, S., Sept., pp. 37-45.

Brandtzæg, P. B., see Karahasanovic, A., June, pp. 42-49.

Broy, M., see Berenbach, B., Jan., pp. 74-80.

Broy, M., M. Gleirscher, S. Merenda, D. Wild, P. Kluge, and W. Krenzer, Toward a Holistic and Standardized Automotive Architecture Description, Dec., pp. 98-101.

Brunette, W., see Anokwa, Y., Oct., pp. 97-99.

Buckley, J., Requirements-Based Visualization Tools for Software Maintenance and Evolution, Apr., pp. 106-108.

C

Caicedo, C. E., J. B. Joshi, and S. R. Tuladhar, IPv6 Security Challenges, Feb., pp. 36-42.

Calhoun, B. H., see Hanson, M. A., Jan., pp. 58-65.

Cameron, K. W., Green Introspection, Jan., pp. 101-103.

  • My IT Carbon Footprint, Nov., pp. 99-101.

  • The Road to Greener IT Pastures, May, pp. 87-89.

  • Cánovas, A., see López, G., May, pp. 58-65.

    Cantwell, J., see Birman, K., May, pp. 90-94.

    Carrero, M., Innovation for the Web 2.0 Era, Nov., pp. 96-98.

    Casati, F., see Skogsrud, H., Feb., pp. 54-61.

    Cetina, C., P. Giner, J. Fons, and V. Pelechano, Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes, Oct., pp. 37-43.

    Chadwick, D. W., and G. Inman, Attribute Aggregation in Federated Identity Management, May, pp. 33-40.

    Chang, C. K., Reversing the Bipolar Drift—Introducing the IAB, July, pp. 20-24.

    Chen, H., see Abbasi, A., Oct., pp. 78-86.

    Chi, E. H., Information Seeking Can Be Social, Mar., pp. 42-46.

    Chockler, G., R. Guerraoui, I. Keidar, and M. Vukolic´, Reliable Distributed Storage, Apr., pp. 60-67.

    Chopra, A. K., see Singh, M. P., Nov., pp. 72-79.

    Christian, T., see Shah, A., July, pp. 91-93.

    Chu, M., Natural and Implicit Interaction Systems, Aug., pp. 109-111.

    Chung, J., see Adcock, M., Feb., pp. 97-99.

    Ciupa, I., see Meyer, B., Sept., pp. 46-55.

    Clare, A., see King, R. D., Aug., pp. 46-54.

    Clifford, B., see Wilde, M., Nov., pp. 50-60.

    Consolvo, S., J. A. Landay, and D. W. McDonald, Designing for Behavior Change in Everyday Life, June, pp. 86-89.

    Cooke, D. E., and J. N. Rushton, Taking Parnas's Principles to the Next Level: Declarative Language Design, Sept., pp. 56-63.

    D

    D'Hollander, E. H., see Beyls, K., Feb., pp. 62-71.

    Dave, C., H. Bae, S. Min, S. Lee, R. Eigenmann, and S. Midkiff, Cetus: A Source-to-Source Compiler Infrastructure for Multicores, Dec., pp. 36-42.

    Davis, K., see Barker, K. J., Nov., pp. 42-49.

    Desai, N., see Singh, M. P., Nov., pp. 72-79.

    Dinolt, G. W., see Petrakos, N., Oct., pp. 103-105.

    Doerschuk, P., J. Liu, and J. Mann, Increasing Participation of Females and Underrepresented Minorities in Computing, Apr., pp. 110-113.

    Donofrio, D., L. Oliker, J. Shalf, M. F. Wehner, C. Rowen, J. Krueger, S. Kamil, and M. Mohiyuddin, Energy-Efficient Computing for Extreme-Scale Science, Nov., pp. 62-71.

    Dumais, S., see Kelly, D., Mar., pp. 60-66.

    E

    Ebert, C., and C. Jones, Embedded Software: Facts, Figures, and Future, Apr., pp. 42-52.

    Eeckhout, L., see Hoste, K., Oct., pp. 70-76.

    Eigenmann, R., see Dave, C., Dec., pp. 36-42.

    Elbert, S. T., see Kouzes, R. T., Jan., pp. 26-34.

    Espinosa, A., see Wilde, M., Nov., pp. 50-60.

    F

    Feng, W., and P. Balaji, Tools and Environments for Multicore and Many-Core Architectures, Dec., pp. 26-27.

    Fernández-Sanz, L., Personal Skills for Computing Professionals, Oct., pp. 112, 110-111.

    Ferrini, R., see Paci, F., May, pp. 50-57.

    Figueroa, A., G. Neumann, and J. Atkinson, Searching for Definitional Answers on the Web Using Surface Patterns, Apr., pp. 68-76.

    Finkelstein, S., Managing Interns, Nov., pp. 93-95.

    Fiva, A., see Meyer, B., Sept., pp. 46-55.

    Flaherty, T. B., see Jansen, B. J., May, pp. 98-101.

    Fleurey, F., see Morin, B., Oct., pp. 44-51.

    Fons, J., see Cetina, C., Oct., pp. 37-43.

    Foster, C., see Nuseibeh, B., Sept., pp. 64-72.

    Foster, I., see Wilde, M., Nov., pp. 50-60.

    France, R. B., see Blair, G., Oct., pp. 22-27.

    Freedman, D., see Birman, K., May, pp. 90-94.

    G

    Gómez-Skarmeta, A. F., see López, G., May, pp. 58-65.

    Geer, D., The Future of Mobile VoIP in the Enterprise, June, pp. 15-18.

  • Networks on Processors Improve On-Chip Communications, Mar., pp. 17-20.

  • The OS Faces a Brave New World, Oct., pp. 15-17.

  • Georgas, J. C., A. van. Hoek, and R. N. Taylor, Using Architectural Models to Manage and Visualize Runtime Adaptation, Oct., pp. 52-60.

    Getov, V., see Hoisie, A., Nov., pp. 24-26.

    Giner, P., see Cetina, C., Oct., pp. 37-43.

    Girao, J., see López, G., May, pp. 58-65.

    Gjerlufsen, T., M. Ingstrup, J. Wolff, and O. Olsen, Mirrors of Meaning: Supporting Inspectable Runtime Models, Oct., pp. 61-68.

    Gleirscher, M., see Broy, M., Dec., pp. 98-101.

    Golovchinsky, G., P. Qvarfordt, and J. Pickens, Collaborative Information Seeking, Mar., pp. 47-51.

    Gorman, J., see Black, S., Sept., pp. 37-45.

    Gorton, I., see Kouzes, R. T., Jan., pp. 26-34.

    Gorton, I., see Babar, M. A., July, pp. 26-32.

    Gotterbarn, D., and K. W. Miller, The Public Is the Priority: Making Decisions Using the Software Engineering Code of Ethics, June, pp. 66-73.

    Gracio, D. K., see Kouzes, R. T., Jan., pp. 26-34.

    Grau, O., see Thomas, G., July, pp. 42-47.

    Grier, D. A., Bad Alignment, Nov., pp. 8-11.

  • The Character of Play, July, pp. 7-9.

  • Data of the Night, Sept., pp. 8-11.

  • The Dictator and the Web Design, May, pp. 6-8.

  • Honor Among Thieves, Dec., pp. 12-15.

  • The Marketplace of Ideas, Oct., pp. 8-11.

  • Marking the Fall of Sparrows, June, pp. 9-12.

  • Politics in Play, Jan., pp. 9-12.

  • Scanning the Horizon, Feb., pp. 8-11.

  • Top of the News, Apr., pp. 10-13.

  • Virtual Walls, Mar., pp. 8-10.

  • Welcome to the Family, Aug., pp. 8-10.

  • Grimshaw, A., M. Morgan, D. Merrill, H. Kishimoto, A. Savva, D. Snelling, C. Smith, and D. Berry, An Open Grid Services Architecture Primer, Feb., pp. 27-34.

    Guerraoui, R., see Chockler, G., Apr., pp. 60-67.

    Guestrin, C., see Krause, A., Aug., pp. 38-45.

    Gupta, A., The 24-Hour Knowledge Factory: Can It Replace the Graveyard Shift?, Jan., pp. 66-73.

    H

    Haley, C. B., see Nuseibeh, B., Sept., pp. 64-72.

    Hanson, M. A., H. C. Powell Jr., A. T. Barth, K. Ringgenberg, B. H. Calhoun, J. H. Aylor, and J. Lach, Body Area Sensor Networks: Challenges and Opportunities, Jan., pp. 58-65.

    Hartung, C., see Anokwa, Y., Oct., pp. 97-99.

    Hategan, M., see Wilde, M., Nov., pp. 50-60.

    Haus, G., see Baggi, D., Mar., pp. 84-87.

    Helal, S., University-Industry Synergy: An Eclectic Dialog for Revised Relationships, Sept., pp. 88-89.

    Henderson, P. B., Ubiquitous Computational Thinking, Oct., pp. 100-102.

    Hendler, J., Web 3.0 Emerging, Jan., pp. 111-113.

    Hinchey, M., see Black, S., Sept., pp. 37-45.

    Hinchey, M., see Lee, D., Feb., pp. 100-102.

    Hinchey, M., see Shokry, H., Apr., pp. 53-59.

    Hinchey, M., see Vassev, E., June, pp. 90-93.

    Hislop, G. W., The Inevitability of Teaching Online, Dec., pp. 94-96.

    Hoisie, A., and V. Getov, Extreme-Scale Computing_Where 'Just More of the Same' Does Not Work, Nov., pp. 24-26.

    Hoisie, A., see Barker, K. J., Nov., pp. 42-49.

    Hoit, M. I., see Schaffer, H. E., July, pp. 94-97.

    Holderegger, T., see Oppliger, R., June, pp. 27-33.

    Holmes, N., Agility and Respect, July, pp. 100, 98-99.

  • The Automation of Originality, Mar., pp. 100, 98-99.

  • The Credit Crunch and the Digital Bite, Jan., pp. 116, 114-115.

  • The Design of Government, May, pp. 102-104.

  • Music, Sociality, and Digital Technology, Sept., pp. 104, 102-103.

  • Truth and Breadth, Clarity and Depth in Algebra, Nov., pp. 108, 106-107.

  • Hoste, K., and L. Eeckhout, A Methodology for Analyzing Commercial Processor Performance Numbers, Oct., pp. 70-76.

    Huang, Q., see Birman, K., May, pp. 90-94.

    Hunter, J., see Kuhn, R., Aug., pp. 94-96.

    Hunter, L., see Jansen, B. J., May, pp. 98-101.

    Hwang, S. O., How Viable Is Digital Rights Management?, Apr., pp. 28-34.

    I

    In, H. P., see Lee, D., Feb., pp. 100-102.

    Ingstrup, M., see Gjerlufsen, T., Oct., pp. 61-68.

    Inman, G., see Chadwick, D. W., May, pp. 33-40.

    Iskra, K., see Wilde, M., Nov., pp. 50-60.

    Itoh, H., see Madsen, P., May, pp. 42-49.

    J

    Jansen, B. J., T. B. Flaherty, R. Baeza-Yates, L. Hunter, B. Kitts, and J. Murphy, The Components and Impact of Sponsored Search, May, pp. 98-101.

    Jones, B., see Bird, I., Jan., pp. 36-46.

    Jones, C., see Ebert, C., Apr., pp. 42-52.

    Joshi, J. B., see Caicedo, C. E., Feb., pp. 36-42.

    Jézéquel, J., see Morin, B., Oct., pp. 44-51.

    K

    Kacker, R., see Kuhn, R., Aug., pp. 94-96.

    Kamil, S., see Donofrio, D., Nov., pp. 62-71.

    Kannan, S., see Blaze, M., Feb., pp. 44-52.

    Kant, K., Toward a Science of Power Management, Sept., pp. 99-101.

    Karahasanovic, A., P. B. Brandtzæg, J. Vanattenhoven, B. Lievens, K. T. Nielsen, and J. Pierson, Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications, June, pp. 42-49.

    Kateeb, A. El., Hardware Reconfiguration Capability for Third-Generation Sensor Nodes, May, pp. 95-97.

    Kazman, R., see Ryoo, J., June, pp. 98-100.

    Kee, K. F., see Bird, I., Jan., pp. 36-46.

    Keidar, I., see Chockler, G., Apr., pp. 60-67.

    Kelly, D., S. Dumais, and J. O. Pedersen, Evaluation Challenges and Directions for Information-Seeking Support Systems, Mar., pp. 60-66.

    Kelly, T., Y. Wang, S. Lafortune, and S. Mahlke, Eliminating Concurrency Bugs with Control Engineering, Dec., pp. 52-60.

    Kerbyson, D. J., see Barker, K. J., Nov., pp. 42-49.

    Keromytis, A. D., see Blaze, M., Feb., pp. 44-52.

    King, R. D., J. Rowland, W. Aubrey, M. Liakata, M. Markham, L. N. Soldatova, K. E. Whelan, A. Clare, M. Young, A. Sparkes, S. G. Oliver, and P. Pir, The Robot Scientist Adam, Aug., pp. 46-54.

    Kishimoto, H., see Grimshaw, A., Feb., pp. 27-34.

    Kitts, B., see Jansen, B. J., May, pp. 98-101.

    Kluge, P., see Broy, M., Dec., pp. 98-101.

    Koren, Y., R. Bell, and C. Volinsky, Matrix Factorization Techniques for Recommender Systems, Aug., pp. 30-37.

    Kouzes, R. T., G. A. Anderson, S. T. Elbert, I. Gorton, and D. K. Gracio, The Changing Paradigm of Data-Intensive Computing, Jan., pp. 26-34.

    Krause, A., and C. Guestrin, Optimizing Sensing: From Water to the Web, Aug., pp. 38-45.

    Krenzer, W., see Broy, M., Dec., pp. 98-101.

    Krueger, J., see Donofrio, D., Nov., pp. 62-71.

    Kuhn, R., R. Kacker, Y. Lei, and J. Hunter, Combinatorial Software Testing, Aug., pp. 94-96.

    Kumar, N., see Mowshowitz, A., Feb., pp. 108, 106-107.

    Kumar, V. A., see Apolloni, A., Dec., pp. 83-86.

    Kumar, V., see Lach, J., Aug., pp. 64-74.

    L

    Lach, J., and V. Kumar, Application-Specific Product Generics, Aug., pp. 64-74.

    Lach, J., see Hanson, M. A., Jan., pp. 58-65.

    Lafortune, S., see Kelly, T., Dec., pp. 52-60.

    Land, S. K., A Leadership Challenge in 2009, Jan., pp. 6-8.

    Land, S. K., Implementing Organizational Strategies: Progress Made in 2009, Dec., pp. 9-11.

    Landay, J. A., see Consolvo, S., June, pp. 86-89.

    Lane, G. T., Best Practices for Standards Communities, July, pp. 86-87.

    Lang, M., see Barker, K. J., Nov., pp. 42-49.

    Lange, K., Identifying Shades of Green: The SPECpower Benchmarks, Mar., pp. 95-97.

    Laplante, P., see Ryoo, J., June, pp. 98-100.

    Lawton, G., The Changing Face of Open Source, May, pp. 14-17.

  • On the Trail of the Conficker Worm, June, pp. 19-22.

  • Routing Faces Dramatic Changes, Sept., pp. 15-17.

  • Users Take a Close Look at Visual Analytics, Feb., pp. 19-22.

  • WDM-PONs Hold Promise for the Long Haul, Mar., pp. 13-16.

  • Leavitt, N., Anonymization Technology Takes a High Profile, Nov., pp. 15-18.

  • Complex-Event Processing Poised for Growth, Apr., pp. 17-20.

  • Is Cloud Computing Really Ready for Prime Time?, Jan., pp. 15-20.

  • Lee, D., H. P. In, K. Lee, S. Park, and M. Hinchey, A Survival Kit: Adaptive Hardware/Software Codesign Life-Cycle Model, Feb., pp. 100-102.

    Lee, I., see Blaze, M., Feb., pp. 44-52.

    Lee, K., see Lee, D., Feb., pp. 100-102.

    Lee, S., see Dave, C., Dec., pp. 36-42.

    Lee, W., see Blaze, M., Feb., pp. 44-52.

    Lei, Y., see Kuhn, R., Aug., pp. 94-96.

    Leitner, A., see Meyer, B., Sept., pp. 46-55.

    Lerer, A., see Anokwa, Y., Oct., pp. 97-99.

    Li, Y., Beyond Pinch and Flick: Enriching Mobile Gesture Interaction, Dec., pp. 87-89.

    Liakata, M., see King, R. D., Aug., pp. 46-54.

    Liesaputra, V., I. H. Witten, and D. Bainbridge, Creating and Reading Realistic Electronic Books, Feb., pp. 72-81.

    Lievens, B., see Karahasanovic, A., June, pp. 42-49.

    Liu, C., see Xie, T., Aug., pp. 55-62.

    Liu, J., see Doerschuk, P., Apr., pp. 110-113.

    Liu, T., see Whitworth, B., July, pp. 63-72.

    Livingston, S., see Arel, I., Mar., pp. 90-91.

    Lo, D., see Xie, T., Aug., pp. 55-62.

    López, G., Cánovas, A. F. Gómez-Skarmeta, and J. Girao, A SWIFT Take on Identity Management, May, pp. 58-65.

    Lucas, R., see Rashid, A., June, pp. 34-41.

    M

    Madsen, P., and H. Itoh, Challenges to Supporting Federated Assurance, May, pp. 42-49.

    Mahlke, S., see Kelly, T., Dec., pp. 52-60.

    Mahmoud, Q. H., see Al-Masri, E., Jan., pp. 104-107.

    Mann, J., see Doerschuk, P., Apr., pp. 110-113.

    Maoz, S., Using Model-Based Traces as Runtime Models, Oct., pp. 28-36.

    Marathe, M. V., see Apolloni, A., Dec., pp. 83-86.

    Marchionini, G., and R. W. White, Information-Seeking Support Systems, Mar., pp. 30-32.

    Margaria, T., and B. Steffen, Continuous Model-Driven Engineering, Oct., pp. 106-109.

    Markham, M., see King, R. D., Aug., pp. 46-54.

    Mathieu, R. G., see Reif, H. L., Nov., pp. 102-104.

    McDonald, D. W., see Consolvo, S., June, pp. 86-89.

    Mellor-Crummey, J. M., see Tallent, N. R., Dec., pp. 44-50.

    Merenda, S., see Broy, M., Dec., pp. 98-101.

    Merrill, D., see Grimshaw, A., Feb., pp. 27-34.

    Meyer, B., A. Fiva, I. Ciupa, A. Leitner, Y. Wei, and E. Stapf, Programs That Test Themselves, Sept., pp. 46-55.

    Michael, J. B., see Beecroft, A. J., Dec., pp. 91-93.

    Michael, J. B., see Petrakos, N., Oct., pp. 103-105.

    Midkiff, S., see Dave, C., Dec., pp. 36-42.

    Miller, K. W., see Gotterbarn, D., June, pp. 66-73.

    Min, S., see Dave, C., Dec., pp. 36-42.

    Mohiyuddin, M., see Donofrio, D., Nov., pp. 62-71.

    Moncrieff, S., S. Venkatesh, and G. A.W. West, Dynamic Privacy in Public Surveillance, Sept., pp. 22-28.

    Morgan, M., see Grimshaw, A., Feb., pp. 27-34.

    Morin, B., O. Barais, J. Jézéquel, F. Fleurey, and A. Solberg, Models@ run.time to Support Dynamic Adaptation, Oct., pp. 44-51.

    Motahari-Nezhad, H. R., see Skogsrud, H., Feb., pp. 54-61.

    Mowshowitz, A., and N. Kumar, And Then There Were Three, Feb., pp. 108, 106-107.

    Murphy, J., see Jansen, B. J., May, pp. 98-101.

    Musci, A., see Paci, F., May, pp. 50-57.

    N

    Neumann, G., see Figueroa, A., Apr., pp. 68-76.

    Nielsen, K. T., see Karahasanovic, A., June, pp. 42-49.

    Nikolopoulos, D. S., see Schneider, S., Dec., pp. 28-34.

    Nikolov, P., see Birman, K., May, pp. 90-94.

    Nuseibeh, B., C. B. Haley, and C. Foster, Securing the Skies: In Requirements We Trust, Sept., pp. 64-72.

    O

    Oliker, L., see Donofrio, D., Nov., pp. 62-71.

    Oliver, S. G., see King, R. D., Aug., pp. 46-54.

    Olsen, K. A., In-House Programming Is Not Passé: Automating Originality, Apr., pp. 116, 114-115 .

    Olsen, O., see Gjerlufsen, T., Oct., pp. 61-68.

    Oppliger, R., R. Rytz, and T. Holderegger, Internet Banking: Client-Side Attacks and Protection Mechanisms, June, pp. 27-33.

    Ortiz, Jr., S., IEEE 802.11n: The Road Ahead, July, pp. 13-15.

    Ortiz, Jr., S., Securing the Internet's Routing Infrastructure, Apr., pp. 21-23.

    Ostrowski, K., see Birman, K., May, pp. 90-94.

    P

    Paci, F., R. Ferrini, A. Musci, K. Steuer Jr., and E. Bertino, An Interoperable Approach to Multifactor Identity Verification, May, pp. 50-57.

    Pacyna, P., A. Rutkowski, A. Sarma, and K. Takahashi, Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems, May, pp. 30-32.

    Pakin, S., see Barker, K. J., Nov., pp. 42-49.

    Parhami, B., Puzzling Problems in Computer Engineering, Mar., pp. 26-29.

    Park, S., see Lee, D., Feb., pp. 100-102.

    Patel, C., see Shah, A., July, pp. 91-93.

    Patnaik, D., see Ramakrishnan, N., Aug., pp. 97-101.

    Paul, N., and A. S. Tanenbaum, Trustworthy Voting: From Machine to System, May, pp. 23-29.

    Paulson, L. D., Advertisements Will Be Able to Tell Men from Women Viewers [News Briefs], Aug., pp. 16-18.

  • Approach Promises Real-Time Analysis of Large Data Streams [News Briefs], July, pp. 16-19.

  • Attachment Turns Mobile Phone into Microscope [News Briefs], Dec., pp. 23-25.

  • Caching Scheme Could Boost Developing World's Internet Access [News Briefs], Aug., pp. 16-18.

  • The Changing World of Outsourcing [News Briefs], May, pp. 18-21.

  • Company Releases Pocket-Size Projector [News Briefs], Mar., pp. 21-24.

  • Computerized Pen Takes Notes and Dictation [News Briefs], Apr., pp. 24-27.

  • Device Adds Robotics to Telepresence [News Briefs], Feb., pp. 23-26.

  • Display Technology Offers Extra-High Resolution [News Briefs], Apr., pp. 24-27.

  • Football Helmet Uses Sensors to Provide Heatstroke Warnings [News Briefs], Nov., pp. 20-23.

  • High-Tech Pill Is Programmable and Has a Chip [News Briefs], Jan., pp. 21-24.

  • HP Announces Breakthrough in Affordable, Flexible Displays [News Briefs], Sept., pp. 18-21.

  • IBM Supercomputer's Heat Will Warm University Structures [News Briefs], Sept., pp. 18-21.

  • In Troubled US Economy, H-1B Visa Demand Falls [News Briefs], July, pp. 16-19.

  • Malware Uses Two-Stage Attack to Compromise Victims [News Briefs], Mar., pp. 21-24.

  • Materials Breakthrough Could Eliminate Bootups [News Briefs], June, pp. 23-25.

  • New Adobe Flash Streams Internet Directly to TVs [News Briefs], June, pp. 23-25.

  • New Algorithm Makes Routers More Efficient [News Briefs], Feb., pp. 23-26.

  • New API Helps with Multicore-Chip Communications [News Briefs], Jan., pp. 21-24.

  • New Approach Fights Microchip Piracy [News Briefs], Apr., pp. 24-27.

  • New Technique Could Increae Chip Performance [News Briefs], Mar., pp. 21-24.

  • New Tool Could Eliminate Software Freezes [News Briefs], Aug., pp. 16-18.

  • North American CS Enrollment Rises for First Time in Seven Years [News Briefs], May, pp. 18-21.

  • Open source Approach for Mobile Apps: Write Once, Run Anywhere [News Briefs], June, pp. 23-25.

  • Program Uses Mobile Technology to Help with Crises [News Briefs], Nov., pp. 20-23.

  • Programming Language Enables Creative Visualization [News Briefs], Dec., pp. 23-25.

  • Research Promises Terabit Networks [News Briefs], Sept., pp. 18-21.

  • Researcher Develops System for Distributed Debugging [News Briefs], Nov., pp. 20-23.

  • Researchers Work on First Optical-Network Firewall [News Briefs], Feb., pp. 23-26.

  • Software Lets Devices Negotiate to Share Digital Content [News Briefs], Mar., pp. 21-24.

  • Software-Based Networking Approach Could Help Internet Research [News Briefs], July, pp. 16-19.

  • Start-up Opens Marketplace for Unused Wireless Spectrum [News Briefs], Jan., pp. 21-24.

  • Start-up Promises High-Definition Content over Wi-FI Connections [News Briefs], Dec., pp. 23-25.

  • Start-up Unveils Flexible Supercomputing Approach [News Briefs], Jan., pp. 21-24.

  • System Takes New Approach to Speech Search [News Briefs], Nov., pp. 20-23.

  • Technique Makes Strong Encryption Easier to Use [News Briefs], Apr., pp. 24-27.

  • Technique Promises to Deny Denial-of-Service Attacks [News Briefs], May, pp. 18-21.

  • Technology Enables Smart Litter Boxes [News Briefs], Sept., pp. 18-21.

  • US School Offers Green-IT Degree, Dec., pp. 23-25.

  • Using Technology for Historical analysis of Paintings [News Briefs], July, pp. 16-19.

  • W3C Adopts Web-Accessibility Specifications [News Briefs], Feb., pp. 23-26.

  • Pedersen, J. O., see Kelly, D., Mar., pp. 60-66.

    Peeler, A., see Schaffer, H. E., July, pp. 94-97.

    Pelechano, V., see Cetina, C., Oct., pp. 37-43.

    Pendyala, V. S., and S. Shim, The Web as the Ubiquitous Computer, Sept., pp. 90-92.

    Petrakos, N., G. W. Dinolt, J. B. Michael, and P. Stanica, Cube-Type Algebraic Attacks on Wireless Encryption Protocols, Oct., pp. 103-105.

    Pickens, J., see Golovchinsky, G., Mar., pp. 47-51.

    Pierson, J., see Karahasanovic, A., June, pp. 42-49.

    Pieters, W., and A. van Cleeff, The Precautionary Principle in a World of Digital Dependencies, June, pp. 50-56.

    Pir, P., see King, R. D., Aug., pp. 46-54.

    Pirolli, P., Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales, Mar., pp. 33-40.

    Powell, Jr., H. C., see Hanson, M. A., Jan., pp. 58-65.

    Proenza, J., see Barranco, M., May, pp. 66-73.

    Q

    Qvarfordt, P., see Golovchinsky, G., Mar., pp. 47-51.

    R

    Radenski, A., Expanding Computing as an Academic Service Discipline, June, pp. 104, 101-103.

    Raicu, I., see Wilde, M., Nov., pp. 50-60.

    Ramakrishnan, N., U. S. Bhalla, and J. J. Tyson, Computing with Proteins, Jan., pp. 47-56.

    Ramakrishnan, N., The Pervasiveness of Data Mining and Machine Learning, Aug., pp. 28-29.

    Ramakrishnan, N., D. Patnaik, and V. Sreedharan, Temporal Process Discovery in Many Guises, Aug., pp. 97-101.

    Ramasubbu, N., see Balan, R. K., Apr., pp. 100-102.

    Ranganathan, B., see Zyda, M., Apr., pp. 103-105.

    Rashid, A., J. Weckert, and R. Lucas, Software Engineering Ethics in a Digital World, June, pp. 34-41.

    Reif, H. L., and R. G. Mathieu, Global Trends in Computing Accreditation, Nov., pp. 102-104.

    Reisman, S., Using Learning Objects to Affect Educational Outcomes, Aug., pp. 102-104.

    Rich, C., Building Task-Based User Interfaces with ANSI/CEA-2018, Aug., pp. 20-27.

    Ringgenberg, K., see Hanson, M. A., Jan., pp. 58-65.

    Roble, D., and N. Bin Zafar, Don't Trust Your Eyes: Cutting-Edge Visual Effects, July, pp. 35-41.

    Rowen, C., see Donofrio, D., Nov., pp. 62-71.

    Rowland, J., see King, R. D., Aug., pp. 46-54.

    Rushton, J. N., see Cooke, D. E., Sept., pp. 56-63.

    Russell, D. M., Industry-Academic Relationships, Mar., pp. 67-68.

    Rutkowski, A., see Pacyna, P., May, pp. 30-32.

    Ryoo, J., P. Laplante, and R. Kazman, In Search of Architectural Patterns for Software Security, June, pp. 98-100.

    Rytz, R., see Oppliger, R., June, pp. 27-33.

    S

    Samtani, R., Ongoing Innovation in Digital Watermarking, Mar., pp. 92-94.

    Sancho, J. C., see Barker, K. J., Nov., pp. 42-49.

    Santini, S., Simplifying Humans, Dec., pp. 104, 102-103.

    Sarma, A., see Pacyna, P., May, pp. 30-32.

    Saunders, C., see Vogel, D., Sept., pp. 96-98.

    Savva, A., see Grimshaw, A., Feb., pp. 27-34.

    Schaffer, H. E., S. F. Averitt, M. I. Hoit, A. Peeler, E. D. Sills, and M. A. Vouk, NCSU's Virtual Computing Lab: A Cloud Computing Solution, July, pp. 94-97.

    Schmandt, C., see Adcock, M., Feb., pp. 97-99.

    Schneider, S., J. Yeom, and D. S. Nikolopoulos, Programming Multiprocessors with Explicitly Managed Memory Hierarchies, Dec., pp. 28-34.

    Schraefel, m. c., Building Knowledge: What's beyond Keyword Search?, Mar., pp. 52-59.

    Shah, A., T. Christian, C. Patel, C. Bash, and R. Sharma, Assessing ICT's Environmental Impact, July, pp. 91-93.

    Shalf, J., see Donofrio, D., Nov., pp. 62-71.

    Sharkey, N., The Robot Arm of the Law Grows Longer, Aug., pp. 116, 113-115.

    Sharma, R., see Shah, A., July, pp. 91-93.

    Shim, S., see Pendyala, V. S., Sept., pp. 90-92.

    Shimizu, T., see Ajima, Y., Nov., pp. 36-40.

    Shokry, H., and M. Hinchey, Model-Based Verification of Embedded Software, Apr., pp. 53-59.

    Shukla, S. K., Model-Driven Engineering and Safety-Critical Embedded Software, Sept., pp. 93-95.

    Sills, E. D., see Schaffer, H. E., July, pp. 94-97.

    Singh, M. P., A. K. Chopra, and N. Desai, Commitment-Based Service-Oriented Architecture, Nov., pp. 72-79.

    Skogsrud, H., H. R. Motahari-Nezhad, B. Benatallah, and F. Casati, Modeling Trust Negotiation for Web Services, Feb., pp. 54-61.

    Smith, C., see Grimshaw, A., Feb., pp. 27-34.

    Smith, J. M., see Blaze, M., Feb., pp. 44-52.

    Snelling, D., see Grimshaw, A., Feb., pp. 27-34.

    Sokolsky, O., see Blaze, M., Feb., pp. 44-52.

    Solberg, A., see Morin, B., Oct., pp. 44-51.

    Soldatova, L. N., see King, R. D., Aug., pp. 46-54.

    Sparkes, A., see King, R. D., Aug., pp. 46-54.

    Spraragen, M., see Zyda, M., Apr., pp. 103-105.

    Sreedharan, V., see Ramakrishnan, N., Aug., pp. 97-101.

    Stanica, P., see Petrakos, N., Oct., pp. 103-105.

    Stapf, E., see Meyer, B., Sept., pp. 46-55.

    Stapleton, C., see Trowbridge, S., July, pp. 57-62.

    Steffen, B., see Margaria, T., Oct., pp. 106-109.

    Steuer, Jr., K., see Paci, F., May, pp. 50-57.

    Subrahmanian, V., Mining Online Opinions, July, pp. 88-90.

    Sumimoto, S., see Ajima, Y., Nov., pp. 36-40.

    Swain, C., Who Needs a Publisher or a Retailer or a Marketer?, Feb., pp. 103-105.

    Swarup, S., see Apolloni, A., Dec., pp. 83-86.

    T

    Takahashi, K., see Pacyna, P., May, pp. 30-32.

    Tallent, N. R., and J. M. Mellor-Crummey, Identifying Performance Bottlenecks in Work-Stealing Computations, Dec., pp. 44-50.

    Tamai, T., Social Impact of Information System Failures, June, pp. 58-65.

    Tanenbaum, A. S., see Paul, N., May, pp. 23-29.

    Taylor, R. N., see Georgas, J. C., Oct., pp. 52-60.

    Thomas, G., and O. Grau, Virtual Graphics for Broadcast Production, July, pp. 42-47.

    Thummalapenta, S., see Xie, T., Aug., pp. 55-62.

    Toral, S. L., M. Vargas, and F. Barrero, Embedded Multimedia Processors for Road-Traffic Parameter Extension, Dec., pp. 61-68.

    Torrellas, J., Architectures for Extreme-Scale Computing, Nov., pp. 28-35.

    Trowbridge, S., and C. Stapleton, Melting the Boundaries Between Fantasy and Reality, July, pp. 57-62.

    Tuladhar, S. R., see Caicedo, C. E., Feb., pp. 36-42.

    Tyson, J. J., see Ramakrishnan, N., Jan., pp. 47-56.

    V

    van Cleeff, A., see Pieters, W., June, pp. 50-56.

    van Genuchten, M., see Vogel, D., Sept., pp. 96-98.

    van Hoek, A., see Georgas, J. C., Oct., pp. 52-60.

    Vanattenhoven, J., see Karahasanovic, A., June, pp. 42-49.

    Vargas, M., see Toral, S. L., Dec., pp. 61-68.

    Vassev, E., and M. Hinchey, ASSL: A Software Engineering Approach to Autonomic Computing, June, pp. 90-93.

    Vaughan-Nichols, S. J., Augmented Reality: No Longer a Novelty?, Dec., pp. 19-22.

  • Game-Console Makers Battle over Motion-Sensitive Controllers, Aug., pp. 13-15.

  • Vendors Draw up a New Graphics-Hardware Approach, May, pp. 11-13.

  • Will Mobile Computing's Future Be Location, Location, Location?, Feb., pp. 14-17.

  • Venkatesh, S., see Moncrieff, S., Sept., pp. 22-28.

    Viega, J., Cloud Computing and the Common Man, Aug., pp. 106-108.

    Vogel, D., M. van. Genuchten, and C. Saunders, IS Innovation: Thinking Beyond the Silo, Sept., pp. 96-98.

    Volinsky, C., see Koren, Y., Aug., pp. 30-37.

    Vouk, M. A., see Schaffer, H. E., July, pp. 94-97.

    Vukolic´, M., see Chockler, G., Apr., pp. 60-67.

    W

    Walker, E., The Real Cost of a CPU Hour, Apr., pp. 35-41.

    Wang, Y., see Kelly, T., Dec., pp. 52-60.

    Ward, B., Benjamin Wah Wins 2008 Kanai Award [CS Connection], Aug., pp. 85-89.

  • Board of Governors Votes to Amend Bylaws, Jan., pp. 91-98.

  • Car and Parrinello Named 2009 Fernbach Winners [CS Connection], Dec., pp. 71-73.

  • Computer Society Awards Honor Top Researchers [CS Connection], Feb., pp. 89-94.

  • Computer Society Awards Recognize Excellence [CS Connection], Oct., pp. 93-95.

  • Computer Society Hosts Key Conferences [CS Connection], May, pp. 79-83.

  • Computer Society Presents Technical Awards [CS Connection], July, pp. 81-84.

  • Computer Society Sponsors Prizes at Intel Science Fair [CS Connection], Mar., pp. 69-71.

  • CRA and CDC Announce 2009 Undergraduate Research Programs [CS Connection], Mar., pp. 69-71.

  • CRA Survey Counts New PhDs, Apr., pp. 87-92.

  • CRA-W Distributed Mentor Program Supports Women in Computing [CS Connection], Dec., pp. 71-73.

  • IBM's Robert Dennard Receives 2009 IEEE Medal of Honor [CS Connection], Mar., pp. 69-71.

  • IEEE Computer Society Election, Sept., pp. 73-80.

  • IEEE Elevates 302 Fellows in 2009 [CS Connection], Feb., pp. 89-94.

  • IEEE Foundation Gives Away More than $300,000 [CS Connection], June, pp. 78-79.

  • Miura Wins Cray Award [CS Connection], Dec., pp. 71-73.

  • Reisman Voted 2010 Computer Society President-Elect, Dec., pp. 69-70.

  • Society Announces Bylaws Changes [CS Connection], Aug., pp. 85-89.

  • Society Launches New Student Design Competition [CS Connection], Dec., pp. 71-73.

  • Society Names 2009 Intel ISEF Prize Winners [CS Connection], July, pp. 81-84.

  • Society Supports Software Engineering PE Examination [CS Connection], Nov., pp. 87-89.

  • Weckert, J., see Rashid, A., June, pp. 34-41.

    Wehner, M. F., see Donofrio, D., Nov., pp. 62-71.

    Wei, Y., see Meyer, B., Sept., pp. 46-55.

    West, G. A.W., see Moncrieff, S., Sept., pp. 22-28.

    Whelan, K. E., see King, R. D., Aug., pp. 46-54.

    White, R. W., see Marchionini, G., Mar., pp. 30-32.

    Whitworth, B., and T. Liu, Channel E-mail: A Sociotechnical Response to Spam, July, pp. 63-72.

    Wild, D., see Broy, M., Dec., pp. 98-101.

    Wilde, M., I. Foster, K. Iskra, P. Beckman, Z. Zhang, A. Espinosa, M. Hategan, B. Clifford, and I. Raicu, Parallel Scripting for Applications at the Petascale and Beyond, Nov., pp. 50-60.

    Witten, I. H., see Liesaputra, V., Feb., pp. 72-81.

    Wolf, W., Cyber-physical Systems, Mar., pp. 88-89.

    Wolff, J., see Gjerlufsen, T., Oct., pp. 61-68.

    X

    Xie, T., S. Thummalapenta, D. Lo, and C. Liu, Data Mining for Software Engineering, Aug., pp. 55-62.

    Xu, X., see Yang, X., July, pp. 48-56.

    Y

    Yang, X., M. Yip, and X. Xu, Visual Effects in Computer Games, July, pp. 48-56.

    Yates, A., Extracting World Knowledge from the Web, June, pp. 94-97.

    Yeom, J., see Schneider, S., Dec., pp. 28-34.

    Yip, M., see Yang, X., July, pp. 48-56.

    Young, M., see King, R. D., Aug., pp. 46-54.

    Z

    Zafar, N. B., see Roble, D., July, pp. 35-41.

    Zhang, Z., see Wilde, M., Nov., pp. 50-60.

    Zyda, M., M. Spraragen, and B. Ranganathan, Testing Behavioral Models with an Online Game, Apr., pp. 103-105.

    Subject Index

    A

    Accreditation

    Global Trends in Computing Accreditation, H. L. Reif, and R. G. Mathieu, Nov., pp. 102-104.

    Active learning

    Optimizing Sensing: From Water to the Web, A. Krause, and C. Guestrin, Aug., pp. 38-45.

    Active networks

    Opportunities in opportunistic computing, M. Conti, and M. Kumar, Jan., pp. .

    Adam

    The Robot Scientist Adam, R. D. King, J. Rowland, W. Aubrey, M. Liakata, M. Markham, L. N. Soldatova, K. E. Whelan, A. Clare, M. Young, A. Sparkes, S. G. Oliver, and P. Pir, Aug., pp. 46-54.

    Adaptive software systems

    Using Architectural Models to Manage and Visualize Runtime Adaptation, J. C. Georgas, A. van. Hoek, and R. N. Taylor, Oct., pp. 52-60.

    Agile methods

    Formal Versus Agile: Survival of the Fittest, S. Black, P. P. Boca, J. P. Bowen, J. Gorman, and M. Hinchey, Sept., pp. 37-45.

    Anonymization technology

    Anonymization Technology Takes a High Profile, N. Leavitt, Nov., pp. 15-18.

    Application service providers

    Cloud Computing and the Common Man, J. Viega, Aug., pp. 106-108.

    Application-driven design

    Energy-Efficient Computing for Extreme-Scale Science, D. Donofrio, L. Oliker, J. Shalf, M. F. Wehner, C. Rowen, J. Krueger, S. Kamil, and M. Mohiyuddin, Nov., pp. 62-71.

    Architectural models

    In Search of Architectural Patterns for Software Security, J. Ryoo, P. Laplante, and R. Kazman, June, pp. 98-100.

    Using Architectural Models to Manage and Visualize Runtime Adaptation, J. C. Georgas, A. van. Hoek, and R. N. Taylor, Oct., pp. 52-60.

    Artificial intelligence

    Beyond the Turing Test, I. Arel, and S. Livingston, Mar., pp. 90-91.

    Biologically Inspired Computing, J. Bongard, Apr., pp. 95-98.

    A Comparison of Tools for Detecting Fake Websites, A. Abbasi and H. Chen, Oct., pp. 78-86.

    Computational Epidemiology in a Connected World, A. Apolloni, V. S.A. Kumar, M. V. Marathe, and S. Swarup, Dec., pp. 83-86.

    Extracting World Knowledge from the Web, A. Yates, June, pp. 94-97.

    The Robot Scientist Adam, R. D. King, J. Rowland, W. Aubrey, M. Liakata, M. Markham, L. N. Soldatova, K. E. Whelan, A. Clare, M. Young, A. Sparkes, S. G. Oliver, and P. Pir, Aug., pp. 46-54.

    Simplifying Humans, S. Santini, Dec., pp. 104, 102-103.

    Temporal Process Discovery in Many Guises, N. Ramakrishnan, D. Patnaik, and V. Sreedharan, Aug., pp. 97-101.

    ASICs

    Application-Specific Product Generics, J. Lach and V. Kumar, Aug., pp. 64-74.

    Aspect-oriented modeling

    Models@ run.time to Support Dynamic Adaptation, B. Morin, O. Barais, J. Jézéquel, F. Fleurey, and A. Solberg, Oct., pp. 44-51.

    ASSL

    ASSL: A Software Engineering Approach to Autonomic Computing, E. Vassev, and M. Hinchey, June, pp. 90-93.

    Attribute aggregation

    Attribute Aggregation in Federated Identity Management, D. W. Chadwick and G. Inman, May, pp. 33-40.

    Autocode generation

    Model-Driven Engineering and Safety-Critical Embedded Software, S. K. Shukla, Sept., pp. 93-95.

    Automated technology

    Cetus: A Source-to-Source Compiler Infrastructure for Multicores, C. Dave, H. Bae, S. Min, S. Lee, R. Eigenmann, and S. Midkiff, Dec., pp. 36-42.

    Programs That Test Themselves, B. Meyer, A. Fiva, I. Ciupa, A. Leitner, Y. Wei, and E. Stapf, Sept., pp. 46-55.

    Taking Parnas's Principles to the Next Level: Declarative Language Design, D. E. Cooke and J. N. Rushton, Sept., pp. 56-63.

    Technology Enables Smart Litter Boxes [News Briefs], L. D. Paulson, Sept., pp. 18-21.

    Automotive architecture framework

    Toward a Holistic and Standardized Automotive Architecture Description, M. Broy, M. Gleirscher, S. Merenda, D. Wild, P. Kluge, and W. Krenzer, Dec., pp. 98-101.

    Autonomic computing

    ASSL: A Software Engineering Approach to Autonomic Computing, E. Vassev and M. Hinchey, June, pp. 90-93.

    Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes, C. Cetina, P. Giner, J. Fons, and V. Pelechano, Oct., pp. 37-43.

    AUTOSAR

    Toward a Holistic and Standardized Automotive Architecture Description, M. Broy, M. Gleirscher, S. Merenda, D. Wild, P. Kluge, and W. Krenzer, Dec., pp. 98-101.

    B

    BASNs

    Body Area Sensor Networks: Challenges and Opportunities, M. A. Hanson, H. C. Powell Jr., A. T. Barth, K. Ringgenberg, B. H. Calhoun, J. H. Aylor, and J. Lach, Jan., pp. 58-65.

    Behavioral models

    Testing Behavioral Models with an Online Game, M. Zyda, M. Spraragen, and B. Ranganathan, Apr., pp. 103-105.

    Benchmarks

    Identifying Shades of Green: The SPECpower Benchmarks, K. Lange, Mar., pp. 95-97.

    Refactoring for Data Locality, K. Beyls and E. H. D'Hollander, Feb., pp. 62-71.

    Bio-inspired computing

    Biologically Inspired Computing, J. Bongard, Apr., pp. 95-98.

    Biomedical technology

    Body Area Sensor Networks: Challenges and Opportunities, M. A. Hanson, H. C. Powell Jr., A. T. Barth, K. Ringgenberg, B. H. Calhoun, J. H. Aylor, and J. Lach, Jan., pp. 58-65.

    Blogs

    Optimizing Sensing: From Water to the Web, A. Krause and C. Guestrin, Aug., pp. 38-45.

    Body area sensor networks

    Body Area Sensor Networks: Challenges and Opportunities, M. A. Hanson, H. C. Powell Jr., A. T. Barth, K. Ringgenberg, B. H. Calhoun, J. H. Aylor, and J. Lach, Jan., pp. 58-65.

    Broadening participation in computing

    Increasing Participation of Females and Underrepresented Minorities in Computing, P. Doerschuk, J. Liu, and J. Mann, Apr., pp. 110-113.

    Buses

    Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate, M. Barranco, J. Proenza, and L. Almeida, May, pp. 66-73.

    Business-process management

    Complex-Event Processing Poised for Growth, N. Leavitt, Apr., pp. 17-20.

    C

    Call path profiling

    Identifying Performance Bottlenecks in Work-Stealing Computations, N. R. Tallent and J. M. Mellor-Crummey, Dec., pp. 44-50.

    CAN protocol

    Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate, M. Barranco, J. Proenza, and L. Almeida, May, pp. 66-73.

    Carbon footprint

    My IT Carbon Footprint, K. W. Cameron, Nov., pp. 99-101.

    CardSpace

    Attribute Aggregation in Federated Identity Management, D. W. Chadwick, and G. Inman, May, pp. 33-40.

    Cell Broadband Engine processor

    Programming Multiprocessors with Explicitly Managed Memory Hierarchies, S. Schneider, J. Yeom, and D. S. Nikolopoulos, Dec., pp. 28-34.

    Channel e-mail

    Channel E-mail: A Sociotechnical Response to Spam, B. Whitworth and T. Liu, July, pp. 63-72.

    Chip architectures

    Energy-Efficient Computing for Extreme-Scale Science, D. Donofrio, L. Oliker, J. Shalf, M. F. Wehner, C. Rowen, J. Krueger, S. Kamil, and M. Mohiyuddin, Nov., pp. 62-71.

    Chroma key

    Virtual Graphics for Broadcast Production, G. Thomas and O. Grau, July, pp. 42-47.

    Client goals

    Web Service Discovery and Client Goals, E. Al-Masri and Q. H. Mahmoud, Jan., pp. 104-107.

    Climate modeling

    Energy-Efficient Computing for Extreme-Scale Science, D. Donofrio, L. Oliker, J. Shalf, M. F. Wehner, C. Rowen, J. Krueger, S. Kamil, and M. Mohiyuddin, Nov., pp. 62-71.

    Cloud computing

    Cloud Computing and the Common Man, J. Viega, Aug., pp. 106-108.

    Is Cloud Computing Really Ready for Prime Time?, N. Leavitt, Jan., pp. 15-20.

    The OS Faces a Brave New World, D. Geer, Oct., pp. 15-17.

    The Precautionary Principle in a World of Digital Dependencies, W. Pieters and A. van Cleeff, June, pp. 50-56.

    The Real Cost of a CPU Hour, E. Walker, Apr., pp. 35-41.

    Users Take a Close Look at Visual Analytics, G. Lawton, Feb., pp. 19-22.

    CMMI

    Embedded Software: Facts, Figures, and Future, C. Ebert and C. Jones, Apr., pp. 42-52.

    Codes of ethics

    The Public Is the Priority: Making Decisions Using the Software Engineering Code of Ethics, D. Gotterbarn, and K. W. Miller, June, pp. 66-73.

    Collaborative computing

    The 24-Hour Knowledge Factory: Can It Replace the Graveyard Shift?, A. Gupta, Jan., pp. 66-73.

    Columbus project

    Who Needs a Publisher or a Retailer or a Marketer?, C. Swain, Feb., pp. 103-105.

    Combinatorial software testing

    Combinatorial Software Testing, R. Kuhn, R. Kacker, Y. Lei, and J. Hunter, Aug., pp. 94-96.

    Commitment-based SOA

    Commitment-Based Service-Oriented Architecture, M. P. Singh, A. K. Chopra, and N. Desai, Nov., pp. 72-79.

    Common architecture framework

    Toward a Holistic and Standardized Automotive Architecture Description, M. Broy, M. Gleirscher, S. Merenda, D. Wild, P. Kluge, and W. Krenzer, Dec., pp. 98-101.

    Communication/networking and information technology

    An Open Grid Services Architecture Primer, A. Grimshaw, M. Morgan, D. Merrill, H. Kishimoto, A. Savva, D. Snelling, C. Smith, and D. Berry, Feb., pp. 27-34.

    Compilers

    Cetus: A Source-to-Source Compiler Infrastructure for Multicores, C. Dave, H. Bae, S. Min, S. Lee, R. Eigenmann, and S. Midkiff, Dec., pp. 36-42.

    Refactoring for Data Locality, K. Beyls and E. H. D'Hollander, Feb., pp. 62-71.

    Component libraries

    Hardware Reconfiguration Capability for Third-Generation Sensor Nodes, A. El. Kateeb, May, pp. 95-97.

    Computational biology

    Computing with Proteins, N. Ramakrishnan, U. S. Bhalla, and J. J. Tyson, Jan., pp. 47-56.

    Computational intelligence

    Data Mining for Software Engineering, T. Xie, S. Thummalapenta, D. Lo, and C. Liu, Aug., pp. 55-62.

    Matrix Factorization Techniques for Recommender Systems, Y. Koren, R. Bell, and C. Volinsky, Aug., pp. 30-37.

    Ubiquitous Computational Thinking, P. B. Henderson, Oct., pp. 100-102.

    Computer applications

    The Changing Paradigm of Data-Intensive Computing, R. T. Kouzes, G. A. Anderson, S. T. Elbert, I. Gorton, and D. K. Gracio, Jan., pp. 26-34.

    Computer architectures

    Architectures for Extreme-Scale Computing, J. Torrellas, Nov., pp. 28-35.

    A Methodology for Analyzing Commercial Processor Performance Numbers, K. Hoste, and L. Eeckhout, Oct., pp. 70-76.

    Computer engineering education

    Puzzling Problems in Computer Engineering, B. Parhami, Mar., pp. 26-29.

    Computer systems organization

    The Changing Paradigm of Data-Intensive Computing, R. T. Kouzes, G. A. Anderson, S. T. Elbert, I. Gorton, and D. K. Gracio, Jan., pp. 26-34.

    A Comparison of Tools for Detecting Fake Websites, A. Abbasi and H. Chen, Oct., pp. 78-86.

    A Methodology for Analyzing Commercial Processor Performance Numbers, K. Hoste and L. Eeckhout, Oct., pp. 70-76.

    An Open Grid Services Architecture Primer, A. Grimshaw, M. Morgan, D. Merrill, H. Kishimoto, A. Savva, D. Snelling, C. Smith, and D. Berry, Feb., pp. 27-34.

    Computer-generated imagery

    Don't Trust Your Eyes: Cutting-Edge Visual Effects, D. Roble, and N. Bin Zafar, July, pp. 35-41.

    Computers and education

    The Inevitability of Teaching Online, G. W. Hislop, Dec., pp. 94-96.

    Music, Sociality, and Digital Technology, N. Holmes, Sept., pp. 104, 102-103.

    Professional and Ethical Dilemmas in Software Engineering, B. Berenbach and M. Broy, Jan., pp. 74-80.

    Computers and society

    Agility and Respect, N. Holmes, July, pp. 100, 98-99.

    And Then There Were Three, A. Mowshowitz and N. Kumar, Feb., pp. 108, 106-107.

    The Automation of Originality, N. Holmes, Mar., pp. 100, 98-99.

    Bad Alignment, D. A. Grier, Nov., pp. 8-11.

    The Character of Play, D. A. Grier, July, pp. 7-9.

    Data of the Night, D. A. Grier, Sept., pp. 8-11.

    The Design of Government, N. Holmes, May, pp. 102-104.

    The Dictator and the Web Design, D. A. Grier, May, pp. 6-8.

    Expanding Computing as an Academic Service Discipline, A. Radenski, June, pp. 104, 101-103.

    Honor Among Thieves, D. A. Grier, Dec., pp. 12-15.

    Increasing Participation of Females and Underrepresented Minorities in Computing, P. Doerschuk, J. Liu, and J. Mann, Apr., pp. 110-113.

    Internet Banking: Client-Side Attacks and Protection Mechanisms, R. Oppliger, R. Rytz, and T. Holderegger, June, pp. 27-33.

    The Marketplace of Ideas, D. A. Grier, Oct., pp. 8-11.

    Marking the Fall of Sparrows, D. A. Grier, June, pp. 9-12.

    Music, Sociality, and Digital Technology, N. Holmes, Sept., pp. 104, 102-103.

    The Real Cost of a CPU Hour, E. Walker, Apr., pp. 35-41.

    The Robot Arm of the Law Grows Longer, N. Sharkey, Aug., pp. 116, 113-115.

    Scanning the Horizon, D. A. Grier, Feb., pp. 8-11.

    Simplifying Humans, S. Santini, Dec., pp. 104, 102-103.

    Social Impact of Information System Failures, T. Tamai, June, pp. 58-65.

    Top of the News, D. A. Grier, Apr., pp. 10-13.

    Trustworthy Voting: From Machine to System, N. Paul and A. S. Tanenbaum, May, pp. 23-29.

    Virtual Walls, D. A. Grier, Mar., pp. 8-10.

    Computing curricula

    Agility and Respect, N. Holmes, July, pp. 100, 98-99.

    Expanding Computing as an Academic Service Discipline, A. Radenski, June, pp. 104, 101-103.

    Computing methodologies

    A Comparison of Tools for Detecting Fake Websites, A. Abbasi and H. Chen, Oct., pp. 78-86.

    Refactoring for Data Locality, K. Beyls and E. H. D'Hollander, Feb., pp. 62-71.

    Computing milieux

    Social Impact of Information System Failures, T. Tamai, June, pp. 58-65.

    Computing profession

    The 24-Hour Knowledge Factory: Can It Replace the Graveyard Shift?, A. Gupta, Jan., pp. 66-73.

    Agility and Respect, N. Holmes, July, pp. 100, 98-99.

    The Automation of Originality, N. Holmes, Mar., pp. 100, 98-99.

    Bad Alignment, D. A. Grier, Nov., pp. 8-11.

    The Character of Play, D. A. Grier, July, pp. 7-9.

    The Credit Crunch and the Digital Bite, N. Holmes, Jan., pp. 116, 114-115.

    The Design of Government, N. Holmes, May, pp. 102-104.

    The Dictator and the Web Design, D. A. Grier, May, pp. 6-8.

    Expanding Computing as an Academic Service Discipline, A. Radenski, June, pp. 104, 101-103.

    Honor Among Thieves, D. Alan. Grier, Dec., pp. 12-15.

    Managing Interns, S. Finkelstein, Nov., pp. 93-95.

    The Marketplace of Ideas, D. A. Grier, Oct., pp. 8-11.

    Marking the Fall of Sparrows, D. A. Grier, June, pp. 9-12.

    Personal Skills for Computing Professionals, L. Fernández-Sanz, Oct., pp. 112, 110-111.

    Politics in Play, D. A. Grier, Jan., pp. 9-12.

    Professional and Ethical Dilemmas in Software Engineering, B. Berenbach and M. Broy, Jan., pp. 74-80.

    Scanning the Horizon, D. A. Grier, Feb., pp. 8-11.

    Top of the News, D. A. Grier, Apr., pp. 10-13.

    Truth and Breadth, Clarity and Depth in Algebra, N. Holmes, Nov., pp. 108, 106-107.

    Virtual Walls, D. A. Grier, Mar., pp. 8-10.

    Welcome to the Family, D. A. Grier, Aug., pp. 8-10.

    Consistency semantics

    Reliable Distributed Storage, G. Chockler, R. Guerraoui, I. Keidar, and M. Vukolic´, Apr., pp. 60-67.

    Consumer electronics

    Requirements-Based Visualization Tools for Software Maintenance and Evolution, J. Buckley, Apr., pp. 106-108.

    A Survival Kit: Adaptive Hardware/Software Codesign Life-Cycle Model, D. Lee, H. P. In, K. Lee, S. Park, and M. Hinchey, Feb., pp. 100-102.

    Control engineering

    Eliminating Concurrency Bugs with Control Engineering, T. Kelly, Y. Wang, S. Lafortune, and S. Mahlke, Dec., pp. 52-60.

    Controller area networks

    Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate, M. Barranco, J. Proenza, and L. Almeida, May, pp. 66-73.

    Cube-type algebraic attacks

    Cube-Type Algebraic Attacks on Wireless Encryption Protocols, N. Petrakos, G. W. Dinolt, J. B. Michael, and P. Stanica, Oct., pp. 103-105.

    Cyber-physical systems

    Cyber-physical Systems, W. Wolf, Mar., pp. 88-89.

    Cyberinfrastructure

    The Organization and Management of Grid Infrastructures, I. Bird, B. Jones, and K. F. Kee, Jan., pp. 36-46.

    Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales, P. Pirolli, Mar., pp. 33-40.

    D

    Data mining

    Data Mining for Software Engineering, T. Xie, S. Thummalapenta, D. Lo, and C. Liu, Aug., pp. 55-62.

    Open Source Data Collection in the Developing World, Y. Anokwa, C. Hartung, W. Brunette, G. Borriello, and A. Lerer, Oct., pp. 97-99.

    The Pervasiveness of Data Mining and Machine Learning, N. Ramakrishnan, Aug., pp. 28-29.

    Data-intensive computing

    The Changing Paradigm of Data-Intensive Computing, R. T. Kouzes, G. A. Anderson, S. T. Elbert, I. Gorton, and D. K. Gracio, Jan., pp. 26-34.

    Deperimeterization

    The Precautionary Principle in a World of Digital Dependencies, W. Pieters and A. van Cleeff, June, pp. 50-56.

    Deregulation

    The Credit Crunch and the Digital Bite, N. Holmes, Jan., pp. 116, 114-115.

    Design and test

    Combinatorial Software Testing, R. Kuhn, R. Kacker, Y. Lei, and J. Hunter, Aug., pp. 94-96.

    Data Mining for Software Engineering, T. Xie, S. Thummalapenta, D. Lo, and C. Liu, Aug., pp. 55-62.

    Programs That Test Themselves, B. Meyer, A. Fiva, I. Ciupa, A. Leitner, Y. Wei, and E. Stapf, Sept., pp. 46-55.

    Development tools

    Refactoring for Data Locality, K. Beyls and E. H. D'Hollander, Feb., pp. 62-71.

    Digital dependencies

    The Precautionary Principle in a World of Digital Dependencies, W. Pieters and A. van Cleeff, June, pp. 50-56.

    Digital distribution

    Who Needs a Publisher or a Retailer or a Marketer?, C. Swain, Feb., pp. 103-105.

    Digital identity

    An Interoperable Approach to Multifactor Identity Verification, F. Paci, R. Ferrini, A. Musci, K. Steuer Jr., and E. Bertino, May, pp. 50-57.

    Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems, P. Pacyna, A. Rutkowski, A. Sarma, and K. Takahashi, May, pp. 30-32.

    Digital rights management

    Ongoing Innovation in Digital Watermarking, R. Samtani, Mar., pp. 92-94.

    Digital technology

    Creating and Reading Realistic Electronic Books, V. Liesaputra, I. H. Witten, and D. Bainbridge, Feb., pp. 72-81.

    The Credit Crunch and the Digital Bite, N. Holmes, Jan., pp. 116, 114-115.

    The Digital Wallet: Opportunities and Prototypes, R. K.. Balan and N. Ramasubbu, Apr., pp. 100-102.

    Music, Sociality, and Digital Technology, N. Holmes, Sept., pp. 104, 102-103.

    Ongoing Innovation in Digital Watermarking, R. Samtani, Mar., pp. 92-94.

    Discrete control theory

    Eliminating Concurrency Bugs with Control Engineering, T. Kelly, Y. Wang, S. Lafortune, and S. Mahlke, Dec., pp. 52-60.

    Distributed computing

    Parallel Scripting for Applications at the Petascale and Beyond, M. Wilde, I. Foster, K. Iskra, P. Beckman, Z. Zhang, A. Espinosa, M. Hategan, B. Clifford, and I. Raicu, Nov., pp. 50-60.

    Distributed storage algorithms

    Reliable Distributed Storage, G. Chockler, R. Guerraoui, I. Keidar, and M. Vukolic´, Apr., pp. 60-67.

    Distributed systems

    An Open Grid Services Architecture Primer, A. Grimshaw, M. Morgan, D. Merrill, H. Kishimoto, A. Savva, D. Snelling, C. Smith, and D. Berry, Feb., pp. 27-34.

    Programming Multiprocessors with Explicitly Managed Memory Hierarchies, S. Schneider, J. Yeom, and D. Nikolopoulos, Jan., pp. .

    Dynamically adaptive systems

    Models@ run.time to Support Dynamic Adaptation, B. Morin, O. Barais, J. Jézéquel, F. Fleurey, and A. Solberg, Oct., pp. 44-51.

    E

    E-books

    Creating and Reading Realistic Electronic Books, V. Liesaputra, I. H. Witten, and D. Bainbridge, Feb., pp. 72-81.

    E-commerce

    Internet Banking: Client-Side Attacks and Protection Mechanisms, R. Oppliger, R. Rytz, and T. Holderegger, June, pp. 27-33.

    The Real Cost of a CPU Hour, E. Walker, Apr., pp. 35-41.

    E-science

    The Organization and Management of Grid Infrastructures, I. Bird, B. Jones, and K. F. Kee, Jan., pp. 36-46.

    E-voting

    Trustworthy Voting: From Machine to System, N. Paul and A. S. Tanenbaum, May, pp. 23-29.

    Economics

    The Real Cost of a CPU Hour, E. Walker, Apr., pp. 35-41.

    Education

    Global Trends in Computing Accreditation, H. L. Reif and R. G. Mathieu, Nov., pp. 102-104.

    The Inevitability of Teaching Online, G. W. Hislop, Dec., pp. 94-96.

    IS Innovation: Thinking Beyond the Silo, D. Vogel, M. van Genuchten, and C. Saunders, Sept., pp. 96-98.

    NCSU's Virtual Computing Lab: A Cloud Computing Solution, H. E. Schaffer, S. F. Averitt, M. I. Hoit, A. Peeler, E. D. Sills, and M. A. Vouk, July, pp. 94-97.

    North American CS Enrollment Rises for First Time in Seven Years [News Briefs], L. D. Paulson, May, pp. 18-21.

    Ubiquitous Computational Thinking, P. B. Henderson, Oct., pp. 100-102.

    Using Learning Objects to Affect Educational Outcomes, S. Reisman, Aug., pp. 102-104.

    Embedded computing

    Cyber-physical Systems, W. Wolf, Mar., pp. 88-89.

    Hardware Reconfiguration Capability for Third-Generation Sensor Nodes, A. El. Kateeb, May, pp. 95-97.

    Embedded software

    Embedded Software: Facts, Figures, and Future, C. Ebert and C. Jones, Apr., pp. 42-52.

    Model-Based Verification of Embedded Software, H. Shokry and M. Hinchey, Apr., pp. 53-59.

    Embedded systems

    Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate, M. Barranco, J. Proenza, and L. Almeida, May, pp. 66-73.

    Energy-Efficient Computing for Extreme-Scale Science, D. Donofrio, L. Oliker, J. Shalf, M. F. Wehner, C. Rowen, J. Krueger, S. Kamil, and M. Mohiyuddin, Nov., pp. 62-71.

    Enabling Grids for E-SciencE (EGEE)

    The Organization and Management of Grid Infrastructures, I. Bird, B. Jones, and K. F. Kee, Jan., pp. 36-46.

    Energy efficiency

    Architectures for Extreme-Scale Computing, J. Torrellas, Nov., pp. 28-35.

    The Road to Greener IT Pastures, K. W. Cameron, May, pp. 87-89.

    Entertainment computing

    Testing Behavioral Models with an Online Game, M. Zyda, M. Spraragen, and B. Ranganathan, Apr., pp. 103-105.

    Who Needs a Publisher or a Retailer or a Marketer?, C. Swain, Feb., pp. 103-105.

    Environmental monitoring

    Optimizing Sensing: From Water to the Web, A. Krause and C. Guestrin, Aug., pp. 38-45.

    Epidemiology

    Computational Epidemiology in a Connected World, A. Apolloni, V. A. Kumar, M. V. Marathe, and S. Swarup, Dec., pp. 83-86.

    Error checking

    Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate, M. Barranco, J. Proenza, and L. Almeida, May, pp. 66-73.

    Estimation

    Embedded Software: Facts, Figures, and Future, C. Ebert and C. Jones, Apr., pp. 42-52.

    Ethics

    Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications, A. Karahasanovic, P. B. Brandtzæg, J. Vanattenhoven, B. Lievens, K. T. Nielsen, and J. Pierson, June, pp. 42-49.

    The Precautionary Principle in a World of Digital Dependencies, W. Pieters and A. van Cleeff, June, pp. 50-56.

    Professional and Ethical Dilemmas in Software Engineering, B. Berenbach and M. Broy, Jan., pp. 74-80.

    The Public Is the Priority: Making Decisions Using the Software Engineering Code of Ethics, D. Gotterbarn, and K. W. Miller, June, pp. 66-73.

    Social Impact of Information System Failures, T. Tamai, June, pp. 58-65.

    Software Engineering Ethics in a Digital World, A. Rashid, J. Weckert, and R. Lucas, June, pp. 34-41.

    Evaluation design

    Evaluation Challenges and Directions for Information-Seeking Support Systems, D. Kelly, S. Dumais, and J. O. Pedersen, Mar., pp. 60-66.

    Evolutionary robotics

    Biologically Inspired Computing, J. Bongard, Apr., pp. 95-98.

    Explicitly managed memory hierarchies

    Programming Multiprocessors with Explicitly Managed Memory Hierarchies, S. Schneider, J. Yeom, and D. S. Nikolopoulos, Dec., pp. 28-34.

    Extreme-scale computing

    Architectures for Extreme-Scale Computing, J. Torrellas, Nov., pp. 28-35.

    Energy-Efficient Computing for Extreme-Scale Science, D. Donofrio, L. Oliker, J. Shalf, M. F. Wehner, C. Rowen, J. Krueger, S. Kamil, and M. Mohiyuddin, Nov., pp. 62-71.

    Parallel Scripting for Applications at the Petascale and Beyond, M. Wilde, I. Foster, K. Iskra, P. Beckman, Z. Zhang, A. Espinosa, M. Hategan, B. Clifford, and I. Raicu, Nov., pp. 50-60.

    Using Performance Modeling to Design Large-Scale Systems, K. J. Barker, K. Davis, A. Hoisie, D. J. Kerbyson, M. Lang, S. Pakin, and J. C. Sancho, Nov., pp. 42-49.

    F

    Faultless software systems

    Faultless Systems: Yes We Can!, J. Abrial, Sept., pp. 30-36.

    Formal methods

    Formal Versus Agile: Survival of the Fittest, S. Black, P. P. Boca, J. P. Bowen, J. Gorman, and M. Hinchey, Sept., pp. 37-45.

    Formulator

    Truth and Breadth, Clarity and Depth in Algebra, N. Holmes, Nov., pp. 108, 106-107.

    FPGAs

    Application-Specific Product Generics, J. Lach and V. Kumar, Aug., pp. 64-74.

    Free speech abridgement

    And Then There Were Three, A. Mowshowitz and N. Kumar, Feb., pp. 108, 106-107.

    Function points

    Embedded Software: Facts, Figures, and Future, C. Ebert and C. Jones, Apr., pp. 42-52.

    G

    Gesture recognition

    Beyond Pinch and Flick: Enriching Mobile Gesture Interaction, Y. Li, Dec., pp. 87-89.

    Global Information Grid

    Dynamic Trust Management, M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J. M. Smith, A. D. Keromytis, and W. Lee, Feb., pp. 44-52.

    Government regulation

    And Then There Were Three, A. Mowshowitz and N. Kumar, Feb., pp. 108, 106-107.

    Graphics and multimedia

    Don't Trust Your Eyes: Cutting-Edge Visual Effects, D. Roble and N. Bin Zafar, July, pp. 35-41.

    Melting the Boundaries Between Fantasy and Reality, S. Trowbridge and C. Stapleton, July, pp. 57-62.

    Vendors Draw up a New Graphics-Hardware Approach, S. J. Vaughn-Nichols, May, pp. 11-13.

    Virtual Graphics for Broadcast Production, G. Thomas and O. Grau, July, pp. 42-47.

    Visual Effects and Beyond, O. Bimber, July, pp. 33-34.

    Visual Effects in Computer Games, X. Yang, M. Yip, and X. Xu, July, pp. 48-56.

    Green Flash

    Energy-Efficient Computing for Extreme-Scale Science, D. Donofrio, L. Oliker, J. Shalf, M. F. Wehner, C. Rowen, J. Krueger, S. Kamil, and M. Mohiyuddin, Nov., pp. 62-71.

    Green IT

    Assessing ICT's Environmental Impact, A. Shah, T. Christian, C. Patel, C. Bash, and R. Sharma, July, pp. 91-93.

    Green Introspection, K. W. Cameron, Jan., pp. 101-103.

    Identifying Shades of Green: The SPECpower Benchmarks, K. Lange, Mar., pp. 95-97.

    My IT Carbon Footprint, K. W. Cameron, Nov., pp. 99-101.

    The Road to Greener IT Pastures, K. W. Cameron, May, pp. 87-89.

    Toward a Science of Power Management, K. Kant, Sept., pp. 99-101.

    US School Offers Green-IT Degree, L. D. Paulson, Dec., pp. 23-25.

    Grid infrastructures

    The Organization and Management of Grid Infrastructures, I. Bird, B. Jones, and K. F. Kee, Jan., pp. 36-46.

    Gunshot detection systems

    Data of the Night, D. A. Grier, Sept., pp. 8-11.

    H

    Hardware

    Embedded Multimedia Processors for Road-Traffic Parameter Extension, S. L. Toral, M. Vargas, and F. Barrero, Dec., pp. 61-68.

    Hardware Reconfiguration Capability for Third-Generation Sensor Nodes, A. El. Kateeb, May, pp. 95-97.

    Programming Multiprocessors with Explicitly Managed Memory Hierarchies, S. Schneider, J. Yeom, and D. S. Nikolopoulos, Dec., pp. 28-34.

    Hardware/software codesign

    Requirements-Based Visualization Tools for Software Maintenance and Evolution, J. Buckley, Apr., pp. 106-108.

    A Survival Kit: Adaptive Hardware/Software Codesign Life-Cycle Model, D. Lee, H. P. In, K. Lee, S. Park, and M. Hinchey, Feb., pp. 100-102.

    Hierarchical clustering

    In Search of Architectural Patterns for Software Security, J. Ryoo, P. Laplante, and R. Kazman, June, pp. 98-100.

    High-level synthesis

    Application-Specific Product Generics, J. Lach and V. Kumar, Aug., pp. 64-74.

    High-performance computing

    Tofu: A 6D Mesh/Torus Interconnect for Exascale Computers, Y. Ajima, S. Sumimoto, and T. Shimizu, Nov., pp. 36-40.

    Using Performance Modeling to Design Large-Scale Systems, K. J. Barker, K. Davis, A. Hoisie, D. J. Kerbyson, M. Lang, S. Pakin, and J. C. Sancho, Nov., pp. 42-49.

    HPCToolkit

    Identifying Performance Bottlenecks in Work-Stealing Computations, N. R. Tallent, and J. M. Mellor-Crummey, Dec., pp. 44-50.

    Human-centered computing

    Beyond Pinch and Flick: Enriching Mobile Gesture Interaction, Y. Li, Dec., pp. 87-89.

    Designing for Behavior Change in Everyday Life, S. Consolvo, J. A. Landay, and D. W. McDonald, June, pp. 86-89.

    Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications, A. Karahasanovic, P. B. Brandtzæg, J. Vanattenhoven, B. Lievens, K. T. Nielsen, and J. Pierson, June, pp. 42-49.

    Information Seeking Can Be Social, E. H. Chi, Mar., pp. 42-46.

    Natural and Implicit Interaction Systems, M. Chu, Aug., pp. 109-111.

    Open Source Data Collection in the Developing World, Y. Anokwa, C. Hartung, W. Brunette, G. Borriello, and A. Lerer, Oct., pp. 97-99.

    Human-computer interfaces

    Creating and Reading Realistic Electronic Books, V. Liesaputra, I. H. Witten, and D. Bainbridge, Feb., pp. 72-81.

    I

    IBM System 360

    Welcome to the Family, D. A. Grier, Aug., pp. 8-10.

    ICT

    Assessing ICT's Environmental Impact, A. Shah, T. Christian, C. Patel, C. Bash, and R. Sharma, July, pp. 91-93.

    Identity management systems

    An Interoperable Approach to Multifactor Identity Verification, F. Paci, R. Ferrini, A. Musci, K. Steuer Jr., and E. Bertino, May, pp. 50-57.

    Attribute Aggregation in Federated Identity Management, D. W. Chadwick, and G. Inman, May, pp. 33-40.

    Challenges to Supporting Federated Assurance, P. Madsen and H. Itoh, May, pp. 42-49.

    An Interoperable Approach to Multifactor Identity Verification, F. Paci, R. Ferrini, A. Musci, K. Steuer Jr., and E. Bertino, May, pp. 50-57.

    A SWIFT Take on Identity Management, G. López, CánovasA. F. Gómez-Skarmetaand J. Girao, May, pp. 58-65.

    Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems, P. Pacyna, A. Rutkowski, A. Sarma, and K. Takahashi, May, pp. 30-32.

    IEEE Computer Society

    Board of Governors Votes to Amend Bylaws, B. Ward, Jan., pp. 91-98.

    Car and Parrinello Named 2009 Fernbach Winners [CS Connection], B. Ward, Dec., pp. 71-73.

    Computer Society Awards Honor Top Researchers [CS Connection], B. Ward, Feb., pp. 89-94.

    Computer Society Awards Recognize Excellence [CS Connection], B. Ward, Oct., pp. 93-95.

    Computer Society Hosts Key Conferences [CS Connection], B. Ward, May, pp. 79-83.

    Computer Society Presents Technical Awards [CS Connection], B. Ward, July, pp. 81-84.

    Computer Society Sponsors Prizes at Intel Science Fair [CS Connection], B. Ward, Mar., pp. 69-71.

    CRA and CDC Announce 2009 Undergraduate Research Programs [CS Connection], B. Ward, Mar., pp. 69-71.

    CRA Survey Counts New PhDs, B. Ward, Apr., pp. 87-92.

    CRA-W Distributed Mentor Program Supports Women in Computing [CS Connection], B. Ward, Dec., pp. 71-73.

    IBM's Robert Dennard Receives 2009 IEEE Medal of Honor [CS Connection], B. Ward, Mar., pp. 69-71.

    IEEE Computer Society Election, B. Ward, Sept., pp. 73-80.

    IEEE Elevates 302 Fellows in 2009 [CS Connection], B. Ward, Feb., pp. 89-94.

    Implementing Organizational Strategies: Progress Made in 2009, S. K. Land, Dec., pp. 9-11.

    A Leadership Challenge in 2009, S. K. Land, Jan., pp. 6-8.

    Miura Wins Cray Award [CS Connection], B. Ward, Dec., pp. 71-73.

    Reisman Voted 2010 Computer Society President-Elect, B. Ward, Dec., pp. 69-70.

    Reversing the Bipolar Drift—Introducing the IAB, C. K. Chang, July, pp. 20-24.

    Society Announces Bylaws Changes [CS Connection], B. Ward, Aug., pp. 85-89.

    Society Launches New Student Design Competition [CS Connection], B. Ward, Dec., pp. 71-73.

    Society Supports Software Engineering PE Examination [CS Connection], B. Ward, Nov., pp. 87-89.

    IEEE Std 1599

    IEEE 1599: Music Encoding and Interaction, D. Baggi and G. Haus, Mar., pp. 84-87.

    IEEE Std P1699

    Rosetta: Standardization at the System Level, P. Alexander, Jan., pp. 108-110.

    In-house programming

    In-House Programming Is Not Passé: Automating Originality, K. A. Olsen, Apr., pp. 116, 114-115 .

    Industry-academia issues

    University-Industry Synergy: An Eclectic Dialog for Revised Relationships, S. Helal, Sept., pp. 88-89.

    Information overload

    Optimizing Sensing: From Water to the Web, A. Krause and C. Guestrin, Aug., pp. 38-45.

    Information retrieval

    Building Knowledge: What's beyond Keyword Search?, m. c. Schraefel, Mar., pp. 52-59.

    Evaluation Challenges and Directions for Information-Seeking Support Systems, D. Kelly, S. Dumais, and J. O. Pedersen, Mar., pp. 60-66.

    Industry-Academic Relationships, D. M. Russell, Mar., pp. 67-68.

    Information technology

    The Changing Paradigm of Data-Intensive Computing, R. T. Kouzes, G. A. Anderson, S. T. Elbert, I. Gorton, and D. K. Gracio, Jan., pp. 26-34.

    The Components and Impact of Sponsored Search, B. J. Jansen, T. B. Flaherty, R. Baeza-Yates, L. Hunter, B. Kitts, and J. Murphy, May, pp. 98-101.

    Global Trends in Computing Accreditation, H. L. Reif and R. G. Mathieu, Nov., pp. 102-104.

    IS Innovation: Thinking Beyond the Silo, D. Vogel, M. van. Genuchten, and C. Saunders, Sept., pp. 96-98.

    My IT Carbon Footprint, K. W. Cameron, Nov., pp. 99-101.

    NCSU's Virtual Computing Lab: A Cloud Computing Solution, H. E. Schaffer, S. F. Averitt, M. I. Hoit, A. Peeler, E. D. Sills, and M. A. Vouk, July, pp. 94-97.

    The Road to Greener IT Pastures, K. W. Cameron, May, pp. 87-89.

    Social Impact of Information System Failures, T. Tamai, June, pp. 58-65.

    Toward a Science of Power Management, K. Kant, Sept., pp. 99-101.

    Information-seeking support systems

    Building Knowledge: What's beyond Keyword Search?, m. c. Schraefel, Mar., pp. 52-59.

    Collaborative Information Seeking, G. Golovchinsky, P. Qvarfordt, and J. Pickens, Mar., pp. 47-51.

    Evaluation Challenges and Directions for Information-Seeking Support Systems, D. Kelly, S. Dumais, and J. O. Pedersen, Mar., pp. 60-66.

    Industry-Academic Relationships, D. M. Russell, Mar., pp. 67-68.

    Information Seeking Can Be Social, E. H. Chi, Mar., pp. 42-46.

    Information-Seeking Support Systems, G. Marchionini and R. W. White, Mar., pp. 30-32.

    Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales, P. Pirolli, Mar., pp. 33-40.

    Infrastructure-as-a-service

    Cloud Computing and the Common Man, J. Viega, Aug., pp. 106-108.

    Intelligent systems

    Biologically Inspired Computing, J. Bongard, Apr., pp. 95-98.

    Intelligent transportation systems (ITSs)

    Embedded Multimedia Processors for Road-Traffic Parameter Extension, S. L. Toral, M. Vargas, and F. Barrero, Dec., pp. 61-68.

    Interaction systems

    Natural and Implicit Interaction Systems, M. Chu, Aug., pp. 109-111.

    Interactive media

    Who Needs a Publisher or a Retailer or a Marketer?, C. Swain, Feb., pp. 103-105.

    Internet Protocol

    How Viable Is Digital Rights Management?, S. O. Hwang, Apr., pp. 28-34.

    IPv6 Security Challenges, C. E. Caicedo, J. B. Joshi, and S. R. Tuladhar, Feb., pp. 36-42.

    Internet/Web

    Edge Mashups for Service-Oriented Collaboration, K. Birman, J. Cantwell, D. Freedman, Q. Huang, P. Nikolov, and K. Ostrowski, May, pp. 90-94.

    Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications, A. Karahasanovic, P. B. Brandtzæg, J. Vanattenhoven, B. Lievens, K. T. Nielsen, and J. Pierson, June, pp. 42-49.

    Extracting World Knowledge from the Web, A. Yates, June, pp. 94-97.

    Innovation for the Web 2.0 Era, M. Carrero, Nov., pp. 96-98.

    Internet Banking: Client-Side Attacks and Protection Mechanisms, R. Oppliger, R. Rytz, and T. Holderegger, June, pp. 27-33.

    Mining Online Opinions, V. Subrahmanian, July, pp. 88-90.

    The Web as the Ubiquitous Computer, V. S. Pendyala, and S. Shim, Sept., pp. 90-92.

    Internships

    Managing Interns, S. Finkelstein, Nov., pp. 93-95.

    Invisible computing

    Are We There Yet? User-Centered Temporal Awareness, M. Adcock, J. Chung, and C. Schmandt, Feb., pp. 97-99.

    Beyond Pinch and Flick: Enriching Mobile Gesture Interaction, Y. Li, Dec., pp. 87-89.

    Designing for Behavior Change in Everyday Life, S. Consolvo, J. A. Landay, and D. W. McDonald, June, pp. 86-89.

    The Digital Wallet: Opportunities and Prototypes, R. K.. Balan and N. Ramasubbu, Apr., pp. 100-102.

    Natural and Implicit Interaction Systems, M. Chu, Aug., pp. 109-111.

    Open Source Data Collection in the Developing World, Y. Anokwa, C. Hartung, W. Brunette, G. Borriello, and A. Lerer, Oct., pp. 97-99.

    IPhone

    Who Needs a Publisher or a Retailer or a Marketer?, C. Swain, Feb., pp. 103-105.

    IPSec

    How Viable Is Digital Rights Management?, S. O. Hwang, Apr., pp. 28-34.

    IPv6 Security Challenges, C. E. Caicedo, J. B. Joshi, and S. R. Tuladhar, Feb., pp. 36-42.

    IPv4

    How Viable Is Digital Rights Management?, S. O. Hwang, Apr., pp. 28-34.

    IPv6 Security Challenges, C. E. Caicedo, J. B. Joshi, and S. R. Tuladhar, Feb., pp. 36-42.

    IPv6

    How Viable Is Digital Rights Management?, S. O. Hwang, Apr., pp. 28-34.

    IPv6 Security Challenges, C. E. Caicedo, J. B. Joshi, and S. R. Tuladhar, Feb., pp. 36-42.

    ISSSs

    Evaluation Challenges and Directions for Information-Seeking Support Systems, D. Kelly, S. Dumais, and J. O. Pedersen, Mar., pp. 60-66.

    Information-Seeking Support Systems, G. Marchionini and R. W. White, Mar., pp. 30-32.

    IT systems

    Beyond the Turing Test, I. Arel and S. Livingston, Mar., pp. 90-91.

    The Components and Impact of Sponsored Search, B. J. Jansen, T. B. Flaherty, R. Baeza-Yates, L. Hunter, B. Kitts, and J. Murphy, May, pp. 98-101.

    Global Trends in Computing Accreditation, H. L. Reif and R. G. Mathieu, Nov., pp. 102-104.

    In-House Programming Is Not Passé: Automating Originality, K. A. Olsen, Apr., pp. 116, 114-115 .

    IS Innovation: Thinking Beyond the Silo, D. Vogel, M. van Genuchten, and C. Saunders, Sept., pp. 96-98.

    NCSU's Virtual Computing Lab: A Cloud Computing Solution, H. E. Schaffer, S. F. Averitt, M. I. Hoit, A. Peeler, E. D. Sills, and M. A. Vouk, July, pp. 94-97.

    Web Service Discovery and Client Goals, E. Al-Masri and Q. H. Mahmoud, Jan., pp. 104-107.

    IView

    Virtual Graphics for Broadcast Production, G. Thomas and O. Grau, July, pp. 42-47.

    J

    JeOS

    The OS Faces a Brave New World, D. Geer, Oct., pp. 15-17.

    K

    Knowledge extraction

    Extracting World Knowledge from the Web, A. Yates, June, pp. 94-97.

    Knowledge factory

    The 24-Hour Knowledge Factory: Can It Replace the Graveyard Shift?, A. Gupta, Jan., pp. 66-73.

    L

    Laboratory automation software

    The Robot Scientist Adam, R. D. King, J. Rowland, W. Aubrey, M. Liakata, M. Markham, L. N. Soldatova, K. E. Whelan, A. Clare, M. Young, A. Sparkes, S. G. Oliver, and P. Pir, Aug., pp. 46-54.

    Large Hadron Collider (LHC)

    The Organization and Management of Grid Infrastructures, I. Bird, B. Jones, and K. F. Kee, Jan., pp. 36-46.

    Large-scale applications

    Using Performance Modeling to Design Large-Scale Systems, K. J. Barker, K. Davis, A. Hoisie, D. J. Kerbyson, M. Lang, S. Pakin, and J. C. Sancho, Nov., pp. 42-49.

    Learning objects

    Using Learning Objects to Affect Educational Outcomes, S. Reisman, Aug., pp. 102-104.

    Liberty Alliance

    Attribute Aggregation in Federated Identity Management, D. W. Chadwick and G. Inman, May, pp. 33-40.

    Linear-feedback shift registers

    Cube-Type Algebraic Attacks on Wireless Encryption Protocols, N. Petrakos, G. W. Dinolt, J. B. Michael, and P. Stanica, Oct., pp. 103-105.

    Linked data

    Web 3.0 Emerging, J. Hendler, Jan., pp. 111-113.

    Linking service

    Attribute Aggregation in Federated Identity Management, D. W. Chadwick and G. Inman, May, pp. 33-40.

    Live Distributed Objects

    Edge Mashups for Service-Oriented Collaboration, K. Birman, J. Cantwell, D. Freedman, Q. Huang, P. Nikolov, and K. Ostrowski, May, pp. 90-94.

    M

    Machine learning

    The Pervasiveness of Data Mining and Machine Learning, N. Ramakrishnan, Aug., pp. 28-29.

    A Comparison of Tools for Detecting Fake Websites, A. Abbasi and H. Chen, Oct., pp. 78-86.

    Mathematical thinking

    Ubiquitous Computational Thinking, P. B. Henderson, Oct., pp. 100-102.

    Matrix factorization

    Matrix Factorization Techniques for Recommender Systems, Y. Koren, R. Bell, and C. Volinsky, Aug., pp. 30-37.

    MMOGs

    Testing Behavioral Models with an Online Game, M. Zyda, M. Spraragen, and B. Ranganathan, Apr., pp. 103-105.

    Mobile computing

    Are We There Yet? User-Centered Temporal Awareness, M. Adcock, J. Chung, and C. Schmandt, Feb., pp. 97-99.

    Beyond Pinch and Flick: Enriching Mobile Gesture Interaction, Y. Li, Dec., pp. 87-89.

    Designing for Behavior Change in Everyday Life, S. Consolvo, J. A. Landay, and D. W. McDonald, June, pp. 86-89.

    The Digital Wallet: Opportunities and Prototypes, R. K. Balan and N. Ramasubbu, Apr., pp. 100-102.

    Opportunities in opportunistic computing, M. Conti and M. Kumar, Jan., pp. .

    Open Source Data Collection in the Developing World, Y. Anokwa, C. Hartung, W. Brunette, G. Borriello, and A. Lerer, Oct., pp. 97-99.

    Model-based development

    Model-Based Verification of Embedded Software, H. Shokry and M. Hinchey, Apr., pp. 53-59.

    Model checking

    Temporal Process Discovery in Many Guises, N. Ramakrishnan, D. Patnaik, and V. Sreedharan, Aug., pp. 97-101.

    Model-driven engineering

    Continuous Model-Driven Engineering, T. Margaria and B. Steffen, Oct., pp. 106-109.

    Model-Driven Engineering and Safety-Critical Embedded Software, S. K. Shukla, Sept., pp. 93-95.

    Models@ run.time, G. Blair, N. Bencomo, and R. B. France, Oct., pp. 22-27.

    Models@ run.time to Support Dynamic Adaptation, B. Morin, O. Barais, J. Jézéquel, F. Fleurey, and A. Solberg, Oct., pp. 44-51.

    Models@ run.time, G. Blair, N. Bencomo, and R. B. France, Oct., pp. 22-27.

    Using Model-Based Traces as Runtime Models, S. Maoz, Oct., pp. 28-36.

    Multicore processors

    Identifying Performance Bottlenecks in Work-Stealing Computations, N. R. Tallent and J. M. Mellor-Crummey, Dec., pp. 44-50.

    Programming Multiprocessors with Explicitly Managed Memory Hierarchies, S. Schneider, J. Yeom, and D. S. Nikolopoulos, Dec., pp. 28-34.

    Cetus: A Source-to-Source Compiler Infrastructure for Multicores, C. Dave, H. Bae, S. Min, S. Lee, R. Eigenmann, and S. Midkiff, Dec., pp. 36-42.

    Eliminating Concurrency Bugs with Control Engineering, T. Kelly, Y. Wang, S. Lafortune, and S. Mahlke, Dec., pp. 52-60.

    Tools and Environments for Multicore and Many-Core Architectures, W. Feng and P. Balaji, Dec., pp. 26-27.

    Multithreaded software

    Eliminating Concurrency Bugs with Control Engineering, T. Kelly, Y. Wang, S. Lafortune, and S. Mahlke, Dec., pp. 52-60.

    Music education

    Music, Sociality, and Digital Technology, N. Holmes, Sept., pp. 104, 102-103.

    N

    Natural-language processing

    A Comparison of Tools for Detecting Fake Websites, A. Abbasi and H. Chen, Oct., pp. 78-86.

    Searching for Definitional Answers on the Web Using Surface Patterns, A. Figueroa, G. Neumann, and J. Atkinson, Apr., pp. 68-76.

    Netflix Prize

    Matrix Factorization Techniques for Recommender Systems, Y. Koren, R. Bell, and C. Volinsky, Aug., pp. 30-37.

    Network security

    How Viable Is Digital Rights Management?, S. O. Hwang, Apr., pp. 28-34.

    IPv6 Security Challenges, C. E. Caicedo, J. B. Joshi, and S. R. Tuladhar, Feb., pp. 36-42.

    Passive Fingerprinting of Network Reconnaissance Tools, A. J. Beecroft and J. B. Michael, Dec., pp. 91-93.

    Network topology

    Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate, M. Barranco, J. Proenza, and L. Almeida, May, pp. 66-73.

    Networking and communications

    The Changing Paradigm of Data-Intensive Computing, R. T. Kouzes, G. A. Anderson, S. T. Elbert, I. Gorton, and D. K. Gracio, Jan., pp. 26-34.

    IS Innovation: Thinking Beyond the Silo, D. Vogel, M. van Genuchten, and C. Saunders, Sept., pp. 96-98.

    NCSU's Virtual Computing Lab: A Cloud Computing Solution, H. E. Schaffer, S. F. Averitt, M. I. Hoit, A. Peeler, E. D. Sills, and M. A. Vouk, July, pp. 94-97.

    Networks on Processors Improve On-Chip Communications, D. Geer, Mar., pp. 17-20.

    Nonrecurring engineering costs

    Application-Specific Product Generics, J. Lach and V. Kumar, Aug., pp. 64-74.

    O

    Object-oriented programming

    Programs That Test Themselves, B. Meyer, A. Fiva, I. Ciupa, A. Leitner, Y. Wei, and E. Stapf, Sept., pp. 46-55.

    Observation selection

    Optimizing Sensing: From Water to the Web, A. Krause and C. Guestrin, Aug., pp. 38-45.

    Online games

    Testing Behavioral Models with an Online Game, M. Zyda, M. Spraragen, and B. Ranganathan, Apr., pp. 103-105.

    Online learning

    The Inevitability of Teaching Online, G. W. Hislop, Dec., pp. 94-96.

    Ontology mappings

    An Interoperable Approach to Multifactor Identity Verification, F. Paci, R. Ferrini, A. Musci, K. Steuer Jr., and E. Bertino, May, pp. 50-57.

    Operating systems

    The OS Faces a Brave New World, D. Geer, Oct., pp. 15-17.

    Refactoring for Data Locality, K. Beyls and E. H. D'Hollander, Feb., pp. 62-71.

    Opinion-mining systems

    Mining Online Opinions, V. Subrahmanian, July, pp. 88-90.

    P

    PaaS

    Is Cloud Computing Really Ready for Prime Time?, N. Leavitt, Jan., pp. 15-20.

    Users Take a Close Look at Visual Analytics, G. Lawton, Feb., pp. 19-22.

    Pairwise testing

    Combinatorial Software Testing, R. Kuhn, R. Kacker, Y. Lei, and J. Hunter, Aug., pp. 94-96.

    Parallel programming

    Eliminating Concurrency Bugs with Control Engineering, T. Kelly, Y. Wang, S. Lafortune, and S. Mahlke, Dec., pp. 52-60.

    Tools and Environments for Multicore and Many-Core Architectures, W. Feng and P. Balaji, Dec., pp. 26-27.

    Parallel scripting

    Parallel Scripting for Applications at the Petascale and Beyond, M. Wilde, I. Foster, K. Iskra, P. Beckman, Z. Zhang, A. Espinosa, M. Hategan, B. Clifford, and I. Raicu, Nov., pp. 50-60.

    Parallel systems

    Using Performance Modeling to Design Large-Scale Systems, K. J. Barker, K. Davis, A. Hoisie, D. J. Kerbyson, M. Lang, S. Pakin, and J. C. Sancho, Nov., pp. 42-49.

    Performance modeling and analysis

    Identifying Performance Bottlenecks in Work-Stealing Computations, N. R. Tallent and J. M. Mellor-Crummey, Dec., pp. 44-50.

    Using Performance Modeling to Design Large-Scale Systems, K. J. Barker, K. Davis, A. Hoisie, D. J. Kerbyson, M. Lang, S. Pakin, and J. C. Sancho, Nov., pp. 42-49.

    Persuasive technologies

    Designing for Behavior Change in Everyday Life, S. Consolvo, J. A. Landay, and D. W. McDonald, June, pp. 86-89.

    Pervasive computing

    Mirrors of Meaning: Supporting Inspectable Runtime Models, T. Gjerlufsen, M. Ingstrup, J. Wolff, and O. Olsen, Oct., pp. 61-68.

    Platform-as-a-service

    Cloud Computing and the Common Man, J. Viega, Aug., pp. 106-108.

    Power grids

    Politics in Play, D. A. Grier, Jan., pp. 9-12.

    PREView

    Toward a Holistic and Standardized Automotive Architecture Description, M. Broy, M. Gleirscher, S. Merenda, D. Wild, P. Kluge, and W. Krenzer, Dec., pp. 98-101.

    Privacy

    Modeling Trust Negotiation for Web Services, H. Skogsrud, H. R. Motahari-Nezhad, B. Benatallah, and F. Casati, Feb., pp. 54-61.

    A SWIFT Take on Identity Management, G. López, CánovasA. F. Gómez-Skarmetaand J. Girao, May, pp. 58-65.

    Problem solving

    Puzzling Problems in Computer Engineering, B. Parhami, Mar., pp. 26-29.

    Process automation

    In-House Programming Is Not Passé: Automating Originality, K. A. Olsen, Apr., pp. 116, 114-115 .

    Process modeling

    Temporal Process Discovery in Many Guises, N. Ramakrishnan, D. Patnaik, and V. Sreedharan, Aug., pp. 97-101.

    Program translation

    Cetus: A Source-to-Source Compiler Infrastructure for Multicores, C. Dave, H. Bae, S. Min, S. Lee, R. Eigenmann, and S. Midkiff, Dec., pp. 36-42.

    Programmability

    Architectures for Extreme-Scale Computing, J. Torrellas, Nov., pp. 28-35.

    Programming languages

    Programming Language Enables Creative Visualization [News Briefs], L. D. Paulson, Dec., pp. 23-25.

    Refactoring for Data Locality, K. Beyls and E. H. D'Hollander, Feb., pp. 62-71.

    Taking Parnas's Principles to the Next Level: Declarative Language Design, D. E. Cooke and J. N. Rushton, Sept., pp. 56-63.

    Programming models

    Programming Multiprocessors with Explicitly Managed Memory Hierarchies, S. Schneider, J. Yeom, and D. S. Nikolopoulos, Dec., pp. 28-34.

    Project management

    Eliminating Concurrency Bugs with Control Engineering, T. Kelly, Y. Wang, S. Lafortune, and S. Mahlke, Jan., pp. .

    Parallelism via Multithreaded and Multicore CPUs, A. Sodan, J. Machina, A. Deshmeh, K. Macnaughton, and B. Esbaugh, Jan., pp. .

    Proofs

    Faultless Systems: Yes We Can!, J. Abrial, Sept., pp. 30-36.

    Protein-based computers

    Computing with Proteins, N. Ramakrishnan, U. S. Bhalla, and J. J. Tyson, Jan., pp. 47-56.

    Public opinion mining

    Mining Online Opinions, V. Subrahmanian, July, pp. 88-90.

    Python

    Agility and Respect, N. Holmes, July, pp. 100, 98-99.

    Expanding Computing as an Academic Service Discipline, A. Radenski, June, pp. 104, 101-103.

    Q

    Quality control

    Embedded Software: Facts, Figures, and Future, C. Ebert and C. Jones, Apr., pp. 42-52.

    Web Service Discovery and Client Goals, E. Al-Masri and Q. H. Mahmoud, Jan., pp. 104-107.

    Quantitative cell biology

    Computing with Proteins, N. Ramakrishnan, U. S. Bhalla, and J. J. Tyson, Jan., pp. 47-56.

    Question-answering systems

    Searching for Definitional Answers on the Web Using Surface Patterns, A. Figueroa, G. Neumann, and J. Atkinson, Apr., pp. 68-76.

    R

    Rational analysis

    Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales, P. Pirolli, Mar., pp. 33-40.

    Real-time and embedded systems

    Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate, M. Barranco, J. Proenza, and L. Almeida, May, pp. 66-73.

    Embedded Multimedia Processors for Road-Traffic Parameter Extension, S. L. Toral, M. Vargas, and F. Barrero, Dec., pp. 61-68.

    Reconnaissance fingerprinting

    Passive Fingerprinting of Network Reconnaissance Tools, A. J. Beecroft and J. B. Michael, Dec., pp. 91-93.

    Reliability

    Reliable Distributed Storage, G. Chockler, R. Guerraoui, I. Keidar, and M. Vukolic´, Apr., pp. 60-67.

    RENTIC

    Personal Skills for Computing Professionals, L. Fernández-Sanz, Oct., pp. 112, 110-111.

    Reusable software

    Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes, C. Cetina, P. Giner, J. Fons, and V. Pelechano, Oct., pp. 37-43.

    Robotics

    The Robot Arm of the Law Grows Longer, N. Sharkey, Aug., pp. 116, 113-115.

    Rosetta Working Group

    Rosetta: Standardization at the System Level, P. Alexander, Jan., pp. 108-110.

    Runtime modeling

    Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes, C. Cetina, P. Giner, J. Fons, and V. Pelechano, Oct., pp. 37-43.

    Mirrors of Meaning: Supporting Inspectable Runtime Models, T. Gjerlufsen, M. Ingstrup, J. Wolff, and O. Olsen, Oct., pp. 61-68.

    Models@ run.time to Support Dynamic Adaptation, B. Morin, O. Barais, J. Jézéquel, F. Fleurey, and A. Solberg, Oct., pp. 44-51.

    Using Architectural Models to Manage and Visualize Runtime Adaptation, J. C. Georgas, A. van. Hoek, and R. N. Taylor, Oct., pp. 52-60.

    Using Model-Based Traces as Runtime Models, S. Maoz, Oct., pp. 28-36.

    S

    SaaS

    Is Cloud Computing Really Ready for Prime Time?, N. Leavitt, Jan., pp. 15-20.

    Users Take a Close Look at Visual Analytics, G. Lawton, Feb., pp. 19-22.

    Safety-critical embedded software

    Model-Driven Engineering and Safety-Critical Embedded Software, S. K. Shukla, Sept., pp. 93-95.

    SAML

    Attribute Aggregation in Federated Identity Management, D. W. Chadwick and G. Inman, May, pp. 33-40.

    A SWIFT Take on Identity Management, G. López, CánovasA. F. Gómez-Skarmetaand J. Girao, May, pp. 58-65.

    Scalability

    Mirrors of Meaning: Supporting Inspectable Runtime Models, T. Gjerlufsen, M. Ingstrup, J. Wolff, and O. Olsen, Oct., pp. 61-68.

    Scientific computing

    Computational Epidemiology in a Connected World, A. Apolloni, V. S.A. Kumar, M. V. Marathe, and S. Swarup, Dec., pp. 83-86.

    Parallel Scripting for Applications at the Petascale and Beyond, M. Wilde, I. Foster, K. Iskra, P. Beckman, Z. Zhang, A. Espinosa, M. Hategan, B. Clifford, and I. Raicu, Nov., pp. 50-60.

    Search

    And Then There Were Three, A. Mowshowitz and N. Kumar, Feb., pp. 108, 106-107.

    Building Knowledge: What's beyond Keyword Search?, m. c. Schraefel, Mar., pp. 52-59.

    Collaborative Information Seeking, G. Golovchinsky, P. Qvarfordt, and J. Pickens, Mar., pp. 47-51.

    The Components and Impact of Sponsored Search, B. J. Jansen, T. B. Flaherty, R. Baeza-Yates, L. Hunter, B. Kitts, and J. Murphy, May, pp. 98-101.

    Industry-Academic Relationships, D. M. Russell, Mar., pp. 67-68.

    Information-Seeking Support Systems, G. Marchionini and R. W. White, Mar., pp. 30-32.

    Powers of 10: Modeling Complex Information-Seeking Systems at Multiple Scales, P. Pirolli, Mar., pp. 33-40.

    Security and privacy

    Anonymization Technology Takes a High Profile, N. Leavitt, Nov., pp. 15-18.

    Attribute Aggregation in Federated Identity Management, D. W. Chadwick and G. Inman, May, pp. 33-40.

    Challenges to Supporting Federated Assurance, P. Madsen and H. Itoh, May, pp. 42-49.

    Cube-Type Algebraic Attacks on Wireless Encryption Protocols, N. Petrakos, G. W. Dinolt, J. B. Michael, and P. Stanica, Oct., pp. 103-105.

    Dynamic Privacy in Public Surveillance, S. Moncrieff, S. Venkatesh, and G. A. W. West, Sept., pp. 22-28.

    Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications, A. Karahasanovic, P. B. Brandtzæg, J. Vanattenhoven, B. Lievens, K. T. Nielsen, and J. Pierson, June, pp. 42-49.

    Internet Banking: Client-Side Attacks and Protection Mechanisms, R. Oppliger, R. Rytz, and T. Holderegger, June, pp. 27-33.

    An Interoperable Approach to Multifactor Identity Verification, F. Paci, R. Ferrini, A. Musci, K. Steuer Jr., and E. Bertino, May, pp. 50-57.

    Modeling Trust Negotiation for Web Services, H. Skogsrud, H. R. Motahari-Nezhad, B. Benatallah, and F. Casati, Feb., pp. 54-61.

    On the Trail of the Conficker Worm, G. Lawton, June, pp. 19-22.

    Passive Fingerprinting of Network Reconnaissance Tools, A. J. Beecroft and J. B. Michael, Dec., pp. 91-93.

    The Robot Arm of the Law Grows Longer, N. Sharkey, Aug., pp. 116, 113-115.

    In Search of Architectural Patterns for Software Security, J. Ryoo, P. Laplante, and R. Kazman, June, pp. 98-100.

    Securing the Skies: In Requirements We Trust, B. Nuseibeh, C. B. Haley, and C. Foster, Sept., pp. 64-72.

    A SWIFT Take on Identity Management, G. López, O. Cánovas, A. F. Gómez-Skarmetaand J. Girao, May, pp. 58-65.

    Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems, P. Pacyna, A. Rutkowski, A. Sarma, and K. Takahashi, May, pp. 30-32.

    Semantic Web

    Web 3.0 Emerging, J. Hendler, Jan., pp. 111-113.

    Sensor technology

    Body Area Sensor Networks: Challenges and Opportunities, M. A. Hanson, H. C. Powell Jr., A. T. Barth, K. Ringgenberg, B. H. Calhoun, J. H. Aylor, and J. Lach, Jan., pp. 58-65.

    Football Helmet Uses Sensors to Provide Heatstroke Warnings [News Briefs], L. D. Paulson, Nov., pp. 20-23.

    Hardware Reconfiguration Capability for Third-Generation Sensor Nodes, A. El. Kateeb, May, pp. 95-97.

    Service delivery platforms

    Innovation for the Web 2.0 Era, M. Carrero, Nov., pp. 96-98.

    Service-oriented architectures

    Commitment-Based Service-Oriented Architecture, M. P. Singh, A. K. Chopra, and N. Desai, Nov., pp. 72-79.

    Dynamic Trust Management, M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J. M. Smith, A. D. Keromytis, and W. Lee, Feb., pp. 44-52.

    Service-oriented computing

    Commitment-Based Service-Oriented Architecture, M. P. Singh, A. K. Chopra, and N. Desai, Nov., pp. 72-79.

    Edge Mashups for Service-Oriented Collaboration, K. Birman, J. Cantwell, D. Freedman, Q. Huang, P. Nikolov, and K. Ostrowski, May, pp. 90-94.

    Smart environments

    Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes, C. Cetina, P. Giner, J. Fons, and V. Pelechano, Oct., pp. 37-43.

    Embedded Multimedia Processors for Road-Traffic Parameter Extension, S. L. Toral, M. Vargas, and F. Barrero, Dec., pp. 61-68.

    Social computing

    Channel E-mail: A Sociotechnical Response to Spam, B. Whitworth, and T. Liu, July, pp. 63-72.

    Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications, A. Karahasanovic, P. B. Brandtzæg, J. Vanattenhoven, B. Lievens, K. T. Nielsen, and J. Pierson, June, pp. 42-49.

    Information Seeking Can Be Social, E. H. Chi, Mar., pp. 42-46.

    Software architectures

    In Search of Architectural Patterns for Software Security, J. Ryoo, P. Laplante, and R. Kazman, June, pp. 98-100.

    Software Architecture Review: The State of Practice, M. A. Babar and I. Gorton, July, pp. 26-32.

    Software development

    Channel E-mail: A Sociotechnical Response to Spam, B. Whitworth, and T. Liu, July, pp. 63-72.

    Continuous Model-Driven Engineering, T. Margaria and B. Steffen, Oct., pp. 106-109.

    Faultless Systems: Yes We Can!, J. Abrial, Sept., pp. 30-36.

    Models@ run.time, G. Blair, N. Bencomo, and R. B. France, Oct., pp. 22-27.

    New Tool Could Eliminate Software Freezes [News Briefs], L. D. Paulson, Aug., pp. 16-18.

    Software Lets Devices Negotiate to Share Digital Content [News Briefs], L. D. Paulson, Mar., pp. 21-24.

    Taking Parnas's Principles to the Next Level: Declarative Language Design, D. E. Cooke and J. N. Rushton, Sept., pp. 56-63.

    Using Architectural Models to Manage and Visualize Runtime Adaptation, J. C. Georgas, A. van Hoek, and R. N. Taylor, Oct., pp. 52-60.

    Software engineering

    ASSL: A Software Engineering Approach to Autonomic Computing, E. Vassev and M. Hinchey, June, pp. 90-93.

    Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes, C. Cetina, P. Giner, J. Fons, and V. Pelechano, Oct., pp. 37-43.

    Cetus: A Source-to-Source Compiler Infrastructure for Multicores, C. Dave, H. Bae, S. Min, S. Lee, R. Eigenmann, and S. Midkiff, Dec., pp. 36-42.

    Data Mining for Software Engineering, T. Xie, S. Thummalapenta, D. Lo, and C. Liu, Aug., pp. 55-62.

    Eliminating Concurrency Bugs with Control Engineering, T. Kelly, Y. Wang, S. Lafortune, and S. Mahlke, Dec., pp. 52-60.

    Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications, A. Karahasanovic, P. B. Brandtzæg, J. Vanattenhoven, B. Lievens, K. T. Nielsen, and J. Pierson, June, pp. 42-49.

    Formal Versus Agile: Survival of the Fittest, S. Black, P. P. Boca, J. P. Bowen, J. Gorman, and M. Hinchey, Sept., pp. 37-45.

    Modeling Trust Negotiation for Web Services, H. Skogsrud, H. R. Motahari-Nezhad, B. Benatallah, and F. Casati, Feb., pp. 54-61.

    Models@ run.time to Support Dynamic Adaptation, B. Morin, O. Barais, J. Jézéquel, F. Fleurey, and A. Solberg, Oct., pp. 44-51.

    The Precautionary Principle in a World of Digital Dependencies, W. Pieters and A. van Cleeff, June, pp. 50-56.

    Professional and Ethical Dilemmas in Software Engineering, B. Berenbach and M. Broy, Jan., pp. 74-80.

    Programs That Test Themselves, B. Meyer, A. Fiva, I. Ciupa, A. Leitner, Y. Wei, and E. Stapf, Sept., pp. 46-55.

    The Public Is the Priority: Making Decisions Using the Software Engineering Code of Ethics, D. Gotterbarn and K. W. Miller, June, pp. 66-73.

    Refactoring for Data Locality, K. Beyls and E. H. D'Hollander, Feb., pp. 62-71.

    Social Impact of Information System Failures, T. Tamai, June, pp. 58-65.

    Software Engineering Ethics in a Digital World, A. Rashid, J. Weckert, and R. Lucas, June, pp. 34-41.

    Software technologies

    Combinatorial Software Testing, R. Kuhn, R. Kacker, Y. Lei, and J. Hunter, Aug., pp. 94-96.

    Continuous Model-Driven Engineering, T. Margaria and B. Steffen, Oct., pp. 106-109.

    Requirements-Based Visualization Tools for Software Maintenance and Evolution, J. Buckley, Apr., pp. 106-108.

    A Survival Kit: Adaptive Hardware/Software Codesign Life-Cycle Model, D. Lee, H. P. In, K. Lee, S. Park, and M. Hinchey, Feb., pp. 100-102.

    Using Model-Based Traces as Runtime Models, S. Maoz, Oct., pp. 28-36.

    Software-as-a-service

    Cloud Computing and the Common Man, J. Viega, Aug., pp. 106-108.

    Software

    Trustworthy Voting: From Machine to System, N. Paul and A. S. Tanenbaum, May, pp. 23-29.

    Spam

    Channel E-mail: A Sociotechnical Response to Spam, B. Whitworth, and T. Liu, July, pp. 63-72.

    SPEC2000 benchmarks

    Refactoring for Data Locality, K. Beyls and E. H. D'Hollander, Feb., pp. 62-71.

    Specification languages

    Rosetta: Standardization at the System Level, P. Alexander, Jan., pp. 108-110.

    SPECpower_ssj2008

    Identifying Shades of Green: The SPECpower Benchmarks, K. Lange, Mar., pp. 95-97.

    Standards

    Best Practices for Standards Communities, G. T. Lane, July, pp. 86-87.

    IEEE 1599: Music Encoding and Interaction, D. Baggi and G. Haus, Mar., pp. 84-87.

    An Open Grid Services Architecture Primer, A. Grimshaw, M. Morgan, D. Merrill, H. Kishimoto, A. Savva, D. Snelling, C. Smith, and D. Berry, Feb., pp. 27-34.

    Rosetta: Standardization at the System Level, P. Alexander, Jan., pp. 108-110.

    W3C Adopts Web-Accessibility Specifications [News Briefs], L. D. Paulson, Feb., pp. 23-26.

    Surveillance systems

    Dynamic Privacy in Public Surveillance, S. Moncrieff, S. Venkatesh, and G. A. W. West, Sept., pp. 22-28.

    Surveys

    Software Architecture Review: The State of Practice, M. A. Babar and I. Gorton, July, pp. 26-32.

    SWIFT

    A SWIFT Take on Identity Management, G. López, O. Cánovas, A. F. Gómez-Skarmetaand J. Girao, May, pp. 58-65.

    Symbolic and interactive music

    IEEE 1599: Music Encoding and Interaction, D. Baggi and G. Haus, Mar., pp. 84-87.

    Synthetic information environments

    Computational Epidemiology in a Connected World, A. Apolloni, V. S.A. Kumar, M. V. Marathe, and S. Swarup, Dec., pp. 83-86.

    System performance

    A Methodology for Analyzing Commercial Processor Performance Numbers, K. Hoste and L. Eeckhout, Oct., pp. 70-76.

    Systems engineering

    Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate, M. Barranco, J. Proenza, and L. Almeida, May, pp. 66-73.

    Commitment-Based Service-Oriented Architecture, M. P. Singh, A. K. Chopra, and N. Desai, Nov., pp. 72-79.

    IS Innovation: Thinking Beyond the Silo, D. Vogel, M. van Genuchten, and C. Saunders, Sept., pp. 96-98.

    NCSU's Virtual Computing Lab: A Cloud Computing Solution, H. E. Schaffer, S. F. Averitt, M. I. Hoit, A. Peeler, E. D. Sills, and M. A. Vouk, July, pp. 94-97.

    Tofu: A 6D Mesh/Torus Interconnect for Exascale Computers, Y. Ajima, S. Sumimoto, and T. Shimizu, Nov., pp. 36-40.

    Toward a Science of Power Management, K. Kant, Sept., pp. 99-101.

    T

    Taulbee Survey

    CRA Survey Counts New PhDs, B. Ward, Apr., pp. 87-92.

    Technology and human rights

    The Robot Arm of the Law Grows Longer, N. Sharkey, Aug., pp. 116, 113-115.

    Temporal awareness

    Are We There Yet? User-Centered Temporal Awareness, M. Adcock, J. Chung, and C. Schmandt, Feb., pp. 97-99.

    Temporal data mining

    Temporal Process Discovery in Many Guises, N. Ramakrishnan, D. Patnaik, and V. Sreedharan, Aug., pp. 97-101.

    Text mining

    Searching for Definitional Answers on the Web Using Surface Patterns, A. Figueroa, G. Neumann, and J. Atkinson, Apr., pp. 68-76.

    Theoretical computing

    Simplifying Humans, S. Santini, Dec., pp. 104, 102-103.

    Thin clients

    Cloud Computing and the Common Man, J. Viega, Aug., pp. 106-108.

    Tofu

    Tofu: A 6D Mesh/Torus Interconnect for Exascale Computers, Y. Ajima, S. Sumimoto, and T. Shimizu, Nov., pp. 36-40.

    Trace analysis

    Using Model-Based Traces as Runtime Models, S. Maoz, Oct., pp. 28-36.

    Trust management

    Dynamic Trust Management, M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J. M. Smith, A. D. Keromytis, and W. Lee, Feb., pp. 44-52.

    Modeling Trust Negotiation for Web Services, H. Skogsrud, H. R. Motahari-Nezhad, B. Benatallah, and F. Casati, Feb., pp. 54-61.

    Turing machine

    Simplifying Humans, S. Santini, Dec., pp. 104, 102-103.

    U

    UbiFit

    Designing for Behavior Change in Everyday Life, S. Consolvo, J. A. Landay, and D. W. McDonald, June, pp. 86-89.

    Ubiquitous computing

    Dynamic Privacy in Public Surveillance, S. Moncrieff, S. Venkatesh, and G. AW.. West, Sept., pp. 22-28.

    The Web as the Ubiquitous Computer, V. S. Pendyala and S. Shim, Sept., pp. 90-92.

    User interfaces

    Building Task-Based User Interfaces with ANSI/CEA-2018, C. Rich, Aug., pp. 20-27.

    V

    Variability modeling

    Autonomic Computing through Reuse of Variability Models at Runtime: The Case of Smart Homes, C. Cetina, P. Giner, J. Fons, and V. Pelechano, Oct., pp. 37-43.

    Video retrieval

    Embedded Multimedia Processors for Road-Traffic Parameter Extension, S. L. Toral, M. Vargas, and F. Barrero, Dec., pp. 61-68.

    Videogame technology

    Visual Effects in Computer Games, X. Yang, M. Yip, and X. Xu, July, pp. 48-56.

    Virtual identity

    A SWIFT Take on Identity Management, G. López, CánovasA. F. Gómez-Skarmetaand J. Girao, May, pp. 58-65.

    Virtual private services

    Dynamic Trust Management, M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J. M. Smith, A. D. Keromytis, and W. Lee, Feb., pp. 44-52.

    Virtualization

    Is Cloud Computing Really Ready for Prime Time?, N. Leavitt, Jan., pp. 15-20.

    The Organization and Management of Grid Infrastructures, I. Bird, B. Jones and K. F. Kee, Jan., pp. 36-46.

    The OS Faces a Brave New World, D. Geer, Oct., pp. 15-17.

    The Road to Greener IT Pastures, K. W. Cameron, May, pp. 87-89.

    Users Take a Close Look at Visual Analytics, G. Lawton, Feb., pp. 19-22.

    Virtual Walls, D. A. Grier, Mar., pp. 8-10.

    Visual effects

    Don't Trust Your Eyes: Cutting-Edge Visual Effects, D. Roble and N. Bin Zafar, July, pp. 35-41.

    Melting the Boundaries Between Fantasy and Reality, S. Trowbridge and C. Stapleton, July, pp. 57-62.

    Visual Effects and Beyond, O. Bimber, July, pp. 33-34.

    Visual Effects in Computer Games, X. Yang, M. Yip, and X. Xu, July, pp. 48-56.

    W

    Web 2.0

    Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications, A. Karahasanovic, P. B. Brandtzæg, J. Vanattenhoven, B. Lievens, K. T. Nielsen, and J. Pierson, June, pp. 42-49.

    Information Seeking Can Be Social, E. H. Chi, Mar., pp. 42-46.

    Innovation for the Web 2.0 Era, M. Carrero, Nov., pp. 96-98.

    Web 3.0

    Web 3.0 Emerging, J. Hendler, Jan., pp. 111-113.

    Web design

    The Dictator and the Web Design, D. A. Grier, May, pp. 6-8.

    Web services

    Modeling Trust Negotiation for Web Services, H. Skogsrud, H. R. Motahari-Nezhad, B. Benatallah, and F. Casati, Feb., pp. 54-61.

    Web Service Discovery and Client Goals, E. Al-Masri and Q. H. Mahmoud, Jan., pp. 104-107.

    Web single sign-on

    Challenges to Supporting Federated Assurance, P. Madsen and H. Itoh, May, pp. 42-49.

    Web technologies

    Edge Mashups for Service-Oriented Collaboration, K. Birman, J. Cantwell, D. Freedman, Q. Huang, P. Nikolov, and K. Ostrowski, May, pp. 90-94.

    Innovation for the Web 2.0 Era, M. Carrero, Nov., pp. 96-98.

    Mining Online Opinions, V. Subrahmanian, July, pp. 88-90.

    Ongoing Innovation in Digital Watermarking, R. Samtani, Mar., pp. 92-94.

    Web 3.0 Emerging, J. Hendler, Jan., pp. 111-113.

    The Web as the Ubiquitous Computer, V. S. Pendyala, and S. Shim, Sept., pp. 90-92.

    Web text analysis

    A Comparison of Tools for Detecting Fake Websites, A. Abbasi and H. Chen, Oct., pp. 78-86.

    Wireless-encryption protocols

    Cube-Type Algebraic Attacks on Wireless Encryption Protocols, N. Petrakos, G. W. Dinolt, J. B. Michael, and P. Stanica, Oct., pp. 103-105.

    Worldwide LHC Computing Grid (WLCG)

    The Organization and Management of Grid Infrastructures, I. Bird, B. Jones, and K. F. Kee, Jan., pp. 36-46.

    X

    Xbox Live Community Games

    Who Needs a Publisher or a Retailer or a Marketer?, C. Swain, Feb., pp. 103-105.

    Y

    Yeast functional genomics

    The Robot Scientist Adam, R. D. King, J. Rowland, W. Aubrey, M. Liakata, M. Markham, L. N. Soldatova, K. E. Whelan, A. Clare, M. Young, A. Sparkes, S. G. Oliver, and P. Pir, Aug., pp. 46-54.