June 2010 (Vol. 43, No. 6) pp. 4-5
0018-9162/10/$31.00 © 2010 IEEE
Published by the IEEE Computer Society
Published by the IEEE Computer Society
Computer Highlights Society Magazines
|Security & Privacy|
PDFs Require Adobe Acrobat
The IEEE Computer Society offers a lineup of 13 peer-reviewed technical magazines that cover cutting-edge topics in computing including scientific applications, design and test, security, Internet computing, machine intelligence, digital graphics, and computer history. Select articles from recent issues of Computer Society magazines are highlighted below.
Many government and commercial organizations, from small groups to global corporations, have tried to implement a software product line approach. Two strategic pitfalls repeatedly occur: failure to recognize that a software product line approach is a business and technical strategy, and failure to manage the unique aspects of governance for a product line and roll it out appropriately. "Clearing the Way for Software Product Line Success," in the May/June issue of Software, provides a set of diagnostic questions and remedies for problems related to these failures.
An immense amount of company, industry, product, and customer information can be gathered from the Web and organized and visualized through various knowledge-mapping, Web portal, and multilingual retrieval techniques. In response to this opportunity, market intelligence 2.0 has gained considerable traction in the IT and academic communities during the past decade. In "Business and Market Intelligence 2.0, Part 2," in the March/April issue of Intelligent Systems, experts in business intelligence for finance present unique, innovative research frameworks; computational methods; and selected results and examples of market intelligence.
IT Pro's May/June issue includes four articles on the ways mobile computing has altered the place of technology in our lives. In their guest editors' introduction, Jinan Fiaidhi of Lakehead University in Canada, Wes Chou of the US Department of Defense, and Joseph Williams of Microsoft describe "calm mobile technology" as a way to embed computation in the periphery of our awareness and so make computing more about the environment and users.
The Jing-Hang Grand Canal is an important part of China's cultural heritage. Through techniques such as image-based animation, 3D modeling, and computer games, viewers can immersively interact with a re-creation of the canal. In the May/June issue of CG&A, "Animations, Games, and Virtual Reality for the Jing-Hang Grand Canal" by Wenzhi Chen, Mingmin Zhang, Zhigeng Pan, Gengdai Liu, Huaqing Shen, Shengnan Chen, and Yong Liu takes an in-depth look at these technologies.
"Simulation-Based Engineering for Industrial Competitive Advantage," in the May/June issue of CiSE, looks at a notable field application of SBE. Through their simulation-based engineering design partnership, Goodyear achieved a substantial competitive advantage in new product development while Sandia National Laboratories was able to solve previously intractable nuclear weapons design problems. However, while other governments invest heavily in SBE for global competitiveness, the US has eliminated the technical-transfer funding that was critical to establishing the Goodyear-Sandia partnership.
Security & Privacy
Bluetooth has become a prominent technology since its public debut in 1998, finding its way into everything from BlackBerry smart phones to Samsung home theaters to the Toyota Prius and millions of other devices worldwide. This growth has also made Bluetooth a prime target for hackers. "Taming the Blue Beast: A Survey of Bluetooth Based Threats," in the March/April issue of S&P, presents a taxonomy of threats against Bluetooth-enabled devices, a discussion of several of these threats, and steps for threat mitigation.
Product-tracking technology is increasingly available to big players in the value chain connecting producers to consumers, giving them new competitive advantages. Such shifts in technology don't benefit small producers, especially those in developing regions, to the same degree. "Bridging Global Divides with Tracking and Tracing Technology," in the April-June issue of PvC, examines the practicalities of leveling the playing field by creating a generic form of tracing technology that any producer, large or small, can use. It goes beyond considering engineering solutions to look at what happens in the context of use, reporting on work with partners in Chile and India and reflecting on the potential for impact on business and community well-being.
Crafting coherent network deployment and development strategies across global political regimes with wildly divergent philosophies is growing more difficult. Some believe that the intertwining of technology deployment and amorphous public policy directions should be at the forefront of policy decision making, but developers and engineers will need to get on board first. Greg Goth takes a look at the politics of deployment in "Conflicting Policies Lead to Disharmonic Convergence" in the May/June issue of Internet Computing.
The Hot Chips conference, held each August at Stanford University, has emerged as a leading forum to present new processor architectures and technologies that advance chip design. In Micro's March/April issue, Krste Asanović from the University of California, Berkeley, and Ralph Wittig from Xilinx present seven articles representing four important themes from the 2009 conference, Hot Chips 21: multicore processor architectures, parallel programming, the use of accelerators to improve domain-specific performance, and new technologies that will affect future chip designs.
In "Visual Navigation for Mobile Devices," from the latest issue of MultiMedia, authors Harlan Hile, Alan Liu, Gaetano Borriello, Radek Grzeszczuk, Ramakrishna Vedantham, and Jana Kosecka present the integration of an improved camera pose recovery method into a landmark-based visual navigation system for mobile devices.
"Microprocessor Software-Based Self-Testing," in the May/June issue of D&T, discusses the potential role of software-based self-testing in the microprocessor test and validation process, as well as its supplementary role in other classic functional- and structural-test methods. In addition, the article proposes a taxonomy for different SBST methodologies according to their test program development philosophy, and summarizes research approaches based on SBST techniques for optimizing other key aspects.
The April-June special issue of Annals is titled "Appropriating America: Americanization in the History of European Computing." Guest editor Gerard Alberts from the University of Amsterdam selected five articles from a conference that addressed America's influence on European science and technology after World War II and the interpretations of that influence. In his introduction, Alberts writes, "All five articles convey the tension between hegemonic and consensus interpretations. More than that, [they] show a pathway beyond."