October 2010 (Vol. 43, No. 10) pp. 4-5
0018-9162/10/$31.00 © 2010 IEEE
Published by the IEEE Computer Society
Published by the IEEE Computer Society
Computer Highlights Society Magazines
|Security & Privacy|
PDFs Require Adobe Acrobat
The IEEE Computer Society offers a lineup of 13 peer-reviewed technical magazines that cover cutting-edge topics in computing including scientific applications, design and test, security, Internet computing, machine intelligence, digital graphics, and computer history. Select articles from recent issues of Computer Society magazines are highlighted below.
Programming languages, frameworks, and platforms require the developer to use a collection of provided programming features—abstractions—to express data, implement desired calculations, interact with other technologies, and create user interfaces. A collection of coherent abstractions constitutes a programming paradigm.
Well-known examples include object-oriented, relational, functional, constraint-based, theorem-proving, concurrent, imperative, and declarative. Less well-known (or perhaps less well-defined) examples include graphical, reflective, context-aware, rule-based, and agent-oriented. To gain a fresh perspective on multiparadigm programming, read the guest editors' introduction to the September/October issue of Software.
University of Arizona authors Yan Dang, Yulei Zhang, and HsinChun Chen propose a lexicon-enhanced classification method that combines machine-learning and semantic-orientation approaches into one framework that significantly improves sentiment-classification performance. To learn more, read “A Lexicon-Enhanced Method for Sentiment Classification: An Experiment on Online Product Reviews” in the July/August issue of Intelligent Systems.
Enterprise security, often considered a burden for system administrators and users alike, is one of the most rapidly evolving areas of IT. This rapid evolution is a consequence of the high value of IT systems and the unending battle between attackers and defenders. As with physical fortresses, advances by one side are met with subsequent advances by the other. In ancient times, defenders built stone walls; today, they build firewalls. In modern times, insider threats and Trojan horse programs constitute two of the most serious IT security risks.
Rick Kuhn of the US National Institute of Standards and Technology addresses new cybersecurity trends in the guest editor's introduction to the July/August issue of IT Pro.
A selection of articles stemming from the VisWeek 2009 conference reflects the range and quality of research that serves as a foundation for future multimedia analytics inquiry. The articles address topics that include spatial navigation for context-aware video surveillance, the interactive visual exploration of online news collections, and the interactive categorization of multimedia collections.
Guest editors Nancy Chinchor, Michael Christel, and William Ribarsky introduce these themes and more in “Multimedia Analytics” in the September/October issue of CG&A.
The High-Performance Computing Modernization Program's software development efforts aim to provide the US Department of Defense with superior technology faster and at a reduced cost. The September/October issue of CiSE features five software development projects sponsored by the DoD's High-Performance Computing Modernization Program Office. Authors Jeanie Osburn of the Naval Research Laboratory, Aram Kevorkian of the Space and Naval Warfare Systems Command, and Balu Sekar of the Air Force Research Laboratory highlight the projects' initial goals and challenges, their software development efforts, and their immediate results, as well as the impact on the DoD's overall mission.
Security & Privacy
Few practical tools and technologies provide data privacy, especially when entities have certain common goals and require (or are mandated) some sharing of sensitive information. To this end, privacy-preserving sharing of sensitive information technology aims to enable sharing information without exposing more than the minimum necessary to complete a common task.
In “Privacy-Preserving Sharing of Sensitive Information” in the July/August issue of S&P, authors Salvatore J. Stolfo of Columbia University and Gene Tsudik of the University of California, Irvine, discuss how the security research community has recently studied—and, in a few cases, deployed—techniques using secure, multiparty function evaluation, encrypted keywords, and private information retrieval.
Today's youth are the first generation to grow up with pervasive computing as part of their everyday lives. Increasingly, they're shaping the frontier of digital media in general, and pervasive computing in particular. Teens and preteens made social media a commercial success. It isn't unusual for them to own and carry a mobile phone, music player, and portable game console. Increasingly, these devices are becoming networked, offering youth more ways of staying connected to each other.
Guest editors John Canny and Jason Hong introduce articles that address the technological state of today's young people in “Connected Youth,” in the July-September issue of PvC.
The vast amount of data available on the Internet introduces new challenging data quality problems, such as accessibility and usability. Low information quality is common in various Web applications, including Web 2.0 tools. Consequently, information quality on the Internet is one of the most crucial requirements for an effective use of data from the Web and pervasive deployment of Web-based applications.
In “Trust and Reputation Management” in the September/October issue of IC, authors Ling Liu of the Georgia Institute of Technology and Weisong Shi of Wayne State University introduce key issues in the field, such as representation, recommendation aggregation, and attack-resilient reputation systems.
Although the field of datacenter computing is arguably still in its relative infancy, a sizable body of work from both academia and industry is already available, and some consistent technological trends have begun to emerge. The July/August special issue of Micro presents a sample of the work under way by researchers and professionals in this new field. The articles reflect the key role that hardware-software codesign plays in the development of effective datacenter-scale computer systems.
GeoDec is a three-tier system that allows users to formulate decision-making queries and evaluate them prior to implementation in the real world. It blends several techniques developed independently in the fields of databases, artificial intelligence, computer graphics, and computer vision into a hierarchical architecture.
A team of authors from the University of Southern California describes its work on the system in “GeoDec: A Framework to Visualize and Query Geospatial Data for Decision-Making” in the July-September issue of MultiMedia.
The July/August special issue of D&T highlights recent investigations of several revolutionary interconnect paradigms and explores whether or not they can deliver on the promise of greater integration, high performance, good scalability, and high energy efficiency in future SoCs and other computing platforms. Guest editors Partha Pratim Pande of Washington State University and Sriram Vangal of Intel introduce a selection of articles that represent a wide range of emerging interconnects including on-chip wireless communications, optical, RF, and carbon nanotubes.
Until recently, the earliest versions of the Unix operating system were believed to have been lost completely. In 2008, however, a restoration team from the Unix Heritage Society completed an effort to resurrect and restore the first-edition Unix to a running and usable state from a newly discovered listing of the system's assembly source code.
In “First Edition Unix: Its Creation and Restoration,” Warren Toomey of Australia's Bond University takes readers through the odyssey of returning the seminal edition of Unix to a working artifact of computing history.