AUTHOR INDEX

A

Aalst, W.M.P.V., K.M.V. Hee, J.M.V. Werf, and M. Verdonk, "Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor," Mar., pp. 90-93.

Ackermann, J., see Goesele, M., June pp. 48-53.

Agarwal, S., Y. Furukawa, N. Snavely, B. Curless, S.M. Seitz, and R. Szeliski, "Reconstructing Rome," June, pp. 40-47.

Agarwal, V., see Pasetto, D., Mar. pp. 50-58.

Agresti, W.W., "The Four Forces Shaping Cybersecurity," Feb., pp. 101-104.

Aiken, P., R.M. Stanley, J. Billings, and L. Anderson, "Using Codes of Conduct to Resolve Legal Disputes," Apr., pp. 29-34.

Alan Grier, D., "The Age of Accountability," May, pp. 6-8.

Alan Grier, D., "The Curious and the Confident," Oct., pp. 8-10.

Alan Grier, D., "Designing the Future," Jan., pp. 9-11.

Alan Grier, D., "Finding What You Want," Sept., pp. 8-10.

Alan Grier, D., "Investing in Ignorance," Dec., pp. 14-16.

Alan Grier, D., "Mental Discipline," Aug., pp. 6-8.

Alan Grier, D., "Raising Barns," Feb., pp. 7-9.

Alan Grier, D., "Sabotage!," Nov., pp. 6-8.

Alan Grier, D., "Someday, You Will Understand," Mar., pp. 11-13.

Alan Grier, D., "The Spirit of Combination," July, pp. 6-9.

Alan Grier, D., "Utter Chaos," Apr., pp. 6-9.

Alan Grier, D., "The Value of a Good Name," June, pp. 7-9.

Ali, M., see Chandramouli, B., Dec. pp. 45-52.

Alkhalaf, M., see Halle, S., Mar. pp. 59-66.

Amft, O., see Lukowicz, P., Oct. pp. 92-96.

Anderson, L., see Aiken, P., Apr. pp. 29-34.

Anguelov, D., C. Dulong, D. Filip, C. Frueh, S. Lafon, R. Lyon, A. Ogale, L. Vincent, and J. Weaver, "Google Street View: Capturing the World at Street Level," June, pp. 32-38.

Avetisyan, A.I., R. Campbell, I. Gupta, M.T. Heath, S.Y. Ko, G.R. Ganger, M.A. Kozuch, D. O'Hallaron, M. Kunze, T.T. Kwan, K. Lai, M. Lyons, D.S. Milojicic, H.Y. Lee, Y.C. Soh, N.K. Ming, J. Luke, and H. Namgoong, "Open Cirrus: A Global Cloud Computing Testbed," Apr., pp. 35-43.

Azambuja, M., see Breitman, K., Apr. pp. 81-83.

B

Bach, M., M. Charney, R. Cohn, E. Demikhovsky, T. Devor, K. Hazelwood, A. Jaleel, C. Luk, G. Lyons, H. Patil, and A. Tal, "Analyzing Parallel Programs with Pin," Mar., pp. 34-41.

Bal, H.E., J. Maassen, R.V. van Nieuwpoort, N. Drost, R. Kemp, N. Palmer, N. Palmer, T. Kielmann, F. Seinstra, and C. Jacobs, "Real-World Distributed Computing with Ibis," Aug., pp. 54-62.

Banerjee, P., R. Friedrich, and L. Morell, "Open Innovation at HP Labs," Nov., pp. 88-90.

Barker, L., J.M. Cohoon, and L. Sanders, "Strategy Trumps Money: Recruiting Undergraduate Women into Computing," June, pp. 82-85.

Barrero, F., see Toral Marin, S., Oct. pp. 22-29.

Basili, V.R., M. Lindvall, M. Regardie, C. Seaman, J. Heidrich, J. Munch, D. Rombach, and A. Trendowicz, "Linking Software Development and Business Strategy Through Measurement," Apr., pp. 57-65.

Bertot, J.C., P.T. Jaeger, S. Munson, and T. Glaisyer, "Social Media Technology and Government Transparency," Nov., pp. 53-59.

Bhojwani, P.S., see Mandal, S.K., Mar. pp. 67-71.

Billings, J., see Aiken, P., Apr. pp. 29-34.

Bimber, O., "Capturing the World," June, pp. 22-23.

Bischof, H., see Leberl, F., June pp. 24-31.

Blake, M..B., see Schall, D., July pp. 82-85.

Bowen, N., and J. Spohrer, "Viewpoint: The Future of Computing Practice and Education," Mar., pp. 86-89.

Boxer, P., see Cohen, B., May pp. 56-63.

Breitman, K., M. Endler, R. Pereira, and M. Azambuja, "When TV Dies, Will It Go to the Cloud?," Apr., pp. 81-83.

Brisken, W., see Walker, E., Apr. pp. 44-50.

Broy, M., and R. Reussner, "Architectural Concepts in Programming Languages," Oct., pp. 88-91.

Buckley, J.H., see Chamberlain, R.D., Mar. pp. 42-49.

Buechley, L., "Questioning Invisibility," Apr., pp. 84-86.

Buhler, J., see Chamberlain, R.D., Mar. pp. 42-49.

Bultan, T., see Halle, S., Mar. pp. 59-66.

C

Cameron, K.W., "The Challenges of Energy-Proportional Computing," May, pp. 82-83.

Cameron, K.W., "Green with Envy," Nov., pp. 95-96.

Cameron, K.W., "A Tale of Two Green Lists," Sept., pp. 86-88.

Cameron, K.W., "Trading in Green IT," Mar., pp. 83-85.

Campbell, R., see Avetisyan, A.I., Apr. pp. 35-43.

Carroll, R., see Piniewski, B., July pp. 27-34.

Carter, J., and K. Rajamani, "Designing Energy-Efficient Servers and Data Centers," July, pp. 76-78.

Chakrabarti, C., see Woh, M., Jan. pp. 81-85.

Chamberlain, R.D., M.A. Franklin, E.J. Tyson, J.H. Buckley, J. Buhler, G. Galloway, S. Gayen, M. Hall, E.F..B. Shands, and N. Singla, "Auto-Pipe: Streaming Applications on Architecturally Diverse Systems," Mar., pp. 42-49.

Chandramouli, B., M. Ali, J. Goldstein, B. Sezgin, and B.S. Raman, "Data Stream Management Systems for Computational Finance," Dec., pp. 45-52.

Chang, C.K., "It Has Been a Long Journey - From the Heart of a Loyal Computer Society Volunteer," Dec., pp. 9-10.

Charney, M., see Bach, M., Mar. pp. 34-41.

Chauncey, K., see Peck, E.M., Dec. pp. 86-89.

Cheek, G.P., see Ko, M.N., Aug. pp. 37-43.

Chellappa, R., P. Sinha, and P..J. Phillips, "Face Recognition by Computers and Humans," Feb., pp. 46-55.

Chen, H., see Schumaker, R.P., Jan. pp. 51-56.

Chen, T.M., and V. Wang, "Web Filtering and Censoring," Mar., pp. 94-97.

Cheng, J., see Lukowicz, P., Oct. pp. 92-96.

Chi, E.H., S. Munson, G. Fischer, S. Vieweg, and C. Parr, "Advancing the Design of Technology-Mediated Social Participation Systems," Nov., pp. 29-35.

Chitchyan, R., see Rashid, A., Feb. pp. 19-26.

Christensen, K., see Nordman, B., Jan. pp. 91-93.

Churchill, E., see Olson, G., Nov. pp. 37-43.

Cleve, A., T. Mens, and J. Hainaut, "Data-Intensive System Evolution," Aug., pp. 110-112.

Cnossen, R., see Piniewski, B., July pp. 27-34.

Coelho, R., see Rashid, A., Feb. pp. 19-26.

Cohen, B., and P. Boxer, "Why Critical Systems Need Help to Evolve," May, pp. 56-63.

Cohn, R., see Bach, M., Mar. pp. 34-41.

Cohoon, J.M., see Barker, L., June pp. 82-85.

Conti, M., and M. Kumar, "Opportunities in Opportunistic Computing," Jan., pp. 42-50.

Contractor, N., see Tian, Y., Aug. pp. 27-36.

Coronato, A., and G.D. Pietro, " Formal Design of Ambient Intelligence Applications," Dec., pp. 60-68.

Cottenier, T., see Rashid, A., Feb. pp. 19-26.

Coyle, L., M. Hinchey, B. Nuseibeh, and J.L. Fiadeiro, "Guest Editors' Introduction: Evolving Critical Systems," May, pp. 28-33.

Coyne, E.J., see Kuhn, D..R., June pp. 79-81.

Curless, B., see Agarwal, S., June pp. 40-47.

D

de Laat, C., see Portegies Zwart, S., Aug. pp. 63-70.

Dementis, G., see Michael, J.B., Apr. pp. 90-92.

Demikhovsky, E., see Bach, M., Mar. pp. 34-41.

Deshmeh, A., see Sodan, A.C., Mar. pp. 24-32.

Deugd, S.D., see Weitzel, M., July pp. 43-50.

Devor, T., see Bach, M., Mar. pp. 34-41.

Diwan, A., see Mytkowicz, T., Sept. pp. 62-67.

Dobson, S., R. Sterritt, P. Nixon, and M. Hinchey, "Fulfilling the Vision of Autonomic Computing," Jan., pp. 35-41.

Domingo, M.C., "Managing Healthcare through Social Networks," July, pp. 20-25.

Dozier, G., see Savvides, M., Feb. pp. 56-62.

Drost, N., see Bal, H.E., Aug. pp. 54-62.

Dulong, C., see Anguelov, D., June pp. 32-38.

Dustdar, S., see Schall, D., July pp. 82-85.

E

Eeckhout, L., see Hamers, J., Oct. pp. 56-63.

Endler, M., see Breitman, K., Apr. pp. 81-83.

Esbaugh, B., see Sodan, A.C., Mar. pp. 24-32.

Estevez, L., see Piniewski, B., July pp. 27-34.

F

Falkner, N., R. Sooriamurthi, and Z. Michalewicz, "Puzzle-Based Learning for Engineering and Computer Science," Apr., pp. 20-28.

Fantini, S., see Peck, E.M., Dec. pp. 86-89.

Feng, J., see Jain, A.K., Feb. pp. 36-44.

Feng, Z., see Wang, F., Aug. pp. 45-53.

Fiadeiro, J.L., see Coyle, L., May pp. 28-33.

Filip, D., see Anguelov, D., June pp. 32-38.

Finholt, T., see Hesse, B.W., Nov. pp. 45-52.

Fischer, G., see Chi, E.H., Nov. pp. 29-35.

Fleischmann, K., and W. Wallace, "Value Conflicts in Computational Modeling," July, pp. 57-63.

Forte, A., see Lampe, C., Nov. pp. 60-67.

Foster, I., see Tan, W., Sept. pp. 54-61.

Franklin, M.A., see Chamberlain, R.D., Mar. pp. 42-49.

Frezza, S.T., "Computer Science: Is It Really the Scientific Foundation for Software Engineering?," Aug., pp. 98-101.

Friedrich, R., see Banerjee, P., Nov. pp. 88-90.

Frouhar, V.A., see Palta, J.R., July pp. 35-42.

Frueh, C., see Anguelov, D., June pp. 32-38.

Fuhrmann, S., see Goesele, M., June pp. 48-53.

Furukawa, Y., see Agarwal, S., June pp. 40-47.

G

Galloway, G., see Chamberlain, R.D., Mar. pp. 42-49.

Ganger, G.R., see Avetisyan, A.I., Apr. pp. 35-43.

Gao, W., see Huang, T., Dec. pp. 28-35.

Gao, Y., see Wang, F., Aug. pp. 45-53.

Gates, A.Q., "Discovery, Innovation, and Creativity: The Core of Computing," Feb., pp. 98-100.

Gayen, S., see Chamberlain, R.D., Mar. pp. 42-49.

Geer, D., "Are Companies Actually Using Secure Development Life Cycles?," June, pp. 12-16.

Geer, D., "Is It Really Time for Real-Time Search?," Mar., pp. 16-19.

Geer, D., "Whatever Happened to Network-Access-Control Technology?," Sept., pp. 13-16.

Girouard, A., see Peck, E.M., Dec. pp. 86-89.

Glaisyer, T., see Bertot, J.C., Nov. pp. 53-59.

Goesele, M., J. Ackermann, S. Fuhrmann, R. Klowsky, F. Langguth, P. Mucke, and M. Ritz, "Scene Reconstruction from Community Photo Collections," June, pp. 48-53.

Goldstein, J., see Chandramouli, B., Dec. pp. 45-52.

Goodman, M., see Sharkey, N., Aug. pp. 116, 114-115.

Gowan, A., and H. Reichgelt, "Emergence of the Information Technology Discipline," July, pp. 79-81.

Greenwood, P., see Rashid, A., Feb. pp. 19-26.

Groen, D., see Portegies Zwart, S., Aug. pp. 63-70.

Grosso, P., see Portegies Zwart, S., Aug. pp. 63-70.

Gupta, I., see Avetisyan, A.I., Apr. pp. 35-43.

H

Hainaut, J., see Cleve, A., Aug. pp. 110-112.

Hall, M., see Chamberlain, R.D., Mar. pp. 42-49.

Halle, S., T. Bultan, G. Hughes, M. Alkhalaf, and R. Villemaire, "Runtime Verification of Web Service Interface Contracts," Mar., pp. 59-66.

Hamers, J., and L. Eeckhout, "Scenario-Based Resource Prediction for QoS-Aware Media Processing," Oct., pp. 56-63.

Hanauer, D., see Ramakrishnan, N., Oct. pp. 77-81.

Hanna, E., see O'Hagan, P., Feb. pp. 90-93.

Hannay, T., "What Can the Web Do for Science?," Nov., pp. 84-87.

Hansen, D., see Hesse, B.W., Nov. pp. 45-52.

Harfst, S., see Portegies Zwart, S., Aug. pp. 63-70.

Harrison, C., "Appropriated Interaction Surfaces," June, pp. 86-89.

Hauswirth, M., see Mytkowicz, T., Sept. pp. 62-67.

Hazelwood, K., see Bach, M., Mar. pp. 34-41.

Heath, M.T., see Avetisyan, A.I., Apr. pp. 35-43.

Hee, K.M.V., see Aalst, W.M.P.V., Mar. pp. 90-93.

Heidrich, J., see Basili, V.R., Apr. pp. 57-65.

Hendler, J.A., see Wang, F., Aug. pp. 45-53.

Hendler, J., "Web 3.0: The Dawn of Semantic Search," Jan., pp. 77-80.

Hesse, B.W., D. Hansen, T. Finholt, S. Munson, W. Kellogg, and J.C. Thomas, "Social Participation in Health 2.0," Nov., pp. 45-52.

Hinchey, M., see Vassev, E., Dec. pp. 93-96.

Hinchey, M., see Dobson, S., Jan. pp. 35-41.

Hinchey, M., see Coyle, L., May pp. 28-33.

Hiraki, K., see Portegies Zwart, S., Aug. pp. 63-70.

Hirshfield, L.M., see Peck, E.M., Dec. pp. 86-89.

Hodges, S., and N. Villar, "The Hardware Is Not a Given," Aug., pp. 106-109.

Hoek, A.V.D., see Sarma, A., June pp. 61-67.

Holmes, N., "The Digital Climate of English Change," Mar., pp. 100, 98-99.

Holmes, N., "The Future of the Computing Profession," July, pp. 88, 86-87.

Holmes, N., "The Future of the Computing Profession: Readers' E-mails," Oct., pp. 100, 98-99.

Holmes, N., "The Profession," Jan., pp. 96, 94-95.

Holmes, N., "The Rise and Rise of Digital Gluttony," May, pp. 96, 94-95.

Holmes, N., "Seven Digital Steps to Avoid Utter Hell," Sept., pp. 92, 90-91.

Holmes, N., "Some Social Aspects of Computers and Numbers," Nov., pp. 100, 98-99.

Huang, T., Y. Tian, W. Gao, and J. Lu, "Mediaprinting: Identifying Multimedia Content for Digital Rights Management," Dec., pp. 28-35.

Huang, T., see Tian, Y., Aug. pp. 27-36.

Huedo, E., R. Montero, and I. Llorente, "Grid Architecture from a Metascheduling Perspective," July, pp. 51-56.

Hughes, G., see Halle, S., Mar. pp. 59-66.

Huntley, C.L., see Vinekar, V., May pp. 87-89.

Hurlburt, G., J. Voas, K. Miller, P. Laplante, and B. Michael, "A Nonlinear Perspective on Higher Education," Dec., pp. 90-92.

I

Irschara, A., see Leberl, F., June pp. 24-31.

Isaak, J.D., "2010 to 2020 - Looking Forward," Dec., pp. 11-13.

Isaak, J.D., "Computer Society 2010: Innovation, Leadership, Community, and Careers," Jan., pp. 6-8.

Ishiyama, T., see Portegies Zwart, S., Aug. pp. 63-70.

Iyengar, S.S., S. Mukhopadhyay, C. Steinmuller, and X. Li, "Preventing Future Oil Spills with Software-Based Event Detection," Aug., pp. 95-97.

Izydorczyk, J., and M. Izydorczyk, "Microprocessor Scaling: What Limits Will Hold?," Aug., pp. 20-26.

Izydorczyk, M., see Izydorczyk, J., Aug. pp. 20-26.

J

Jacob, R.J.K., see Peck, E.M., Dec. pp. 86-89.

Jacobs, C., see Bal, H.E., Aug. pp. 54-62.

Jaeger, P.T., see Bertot, J.C., Nov. pp. 53-59.

Jain, A.K., J. Feng, and K. Nandakumar, "Fingerprint Matching," Feb., pp. 36-44.

Jaleel, A., see Bach, M., Mar. pp. 34-41.

Jarzombek, J., see Mead, N.R., Sept. pp. 21-30.

Joosen, W., see Rashid, A., Feb. pp. 19-26.

Jr., K.R., see Savvides, M., Feb. pp. 56-62.

Jr., S.T..R., "Fitting Software Assurance into Higher Education," Sept., pp. 41-46.

K

Karri, R., J. Rajendran, K. Rosenfeld, and M. Tehranipoor, "Trustworthy Hardware: Identifying and Classifying Hardware Trojans," Oct., pp. 39-46.

Karsai, G., F. Massacci, L. Osterweil, and I. Schieferdecker, "Evolving Embedded Systems," May, pp. 34-40.

Keller, B., see Ramakrishnan, N., Oct. pp. 77-81.

Kellogg, W., see Hesse, B.W., Nov. pp. 45-52.

Kemp, R., see Bal, H.E., Aug. pp. 54-62.

Kielmann, T., see Bal, H.E., Aug. pp. 54-62.

Kiesewetter-Kobinger, S., "Programmers' Capital," Feb., pp. 108, 106-107.

Klowsky, R., see Goesele, M., June pp. 48-53.

Kluckner, S., see Leberl, F., June pp. 24-31.

Ko, M.N., G.P. Cheek, M. Shehab, and R. Sandhu, "Social-Networks Connect Services," Aug., pp. 37-43.

Ko, S.Y., see Avetisyan, A.I., Apr. pp. 35-43.

Kohavi, R., R. Longbotham, and T. Walker, "Online Experiments: Practical Lessons," Sept., pp. 82-85.

Koushanfar, F., see Roy, J.A., Oct. pp. 30-38.

Kozuch, M.A., see Avetisyan, A.I., Apr. pp. 35-43.

Kraut, R., M.L. Maher, J. Olson, T.W. Malone, P. Pirolli, and J.C. Thomas, "Scientific Foundations: A Case for Technology- Mediated Social- Participation Theory," Nov., pp. 22-28.

Kshetri, N., "Cloud Computing in Developing Economies," Oct., pp. 47-55.

Kuhn, D..R., E.J. Coyne, and T.R. Weil, "Adding Attributes to Role-Based Access Control," June, pp. 79-81.

Kumar, K., and Y. Lu, "Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?," Apr., pp. 51-56.

Kumar, M., see Conti, M., Jan. pp. 42-50.

Kunze, M., see Avetisyan, A.I., Apr. pp. 35-43.

Kushiki, Y., "The Future of Embedded Software: Adapting to Drastic Change," May, pp. 84-86.

Kwan, T.T., see Avetisyan, A.I., Apr. pp. 35-43.

L

Lafon, S., see Anguelov, D., June pp. 32-38.

Lai, G., see Wang, F., Aug. pp. 45-53.

Lai, K., see Avetisyan, A.I., Apr. pp. 35-43.

Lampe, C., P. Resnick, A. Forte, S. Yardi, D. Rotman, T. Marshall, and W. Lutters, "Educational Priorities for Technology-Mediated Social Participation," Nov., pp. 60-67.

Langguth, F., see Goesele, M., June pp. 48-53.

Laplante, P., see Miller, K.W., Oct. pp. 85-87.

Laplante, P., see Hurlburt, G., Dec. pp. 90-92.

Lawton, G., "Fighting Intrusions into Wireless Networks," May, pp. 12-15.

Leavitt, N., "Network-Usage Changes Push Internet Traffic to the Edge," Oct., pp. 13-15.

Leavitt, N., "Payment Applications Make E-Commerce Mobile," Dec., pp. 19-22.

Leavitt, N., "Researchers Fight to Keep Implanted Medical Devices Safe from Hackers," Aug., pp. 11-14.

Leavitt, N., "Will NoSQL Databases Live Up to Their Promise?," Feb., pp. 12-14.

Leberl, F., H. Bischof, T. Pock, A. Irschara, and S. Kluckner, "Aerial Computer Vision for a 3D Virtual Habitat," June, pp. 24-31.

LeBlanc, R.J., "What Should All CS Graduates Know?," Oct., pp. 82-84.

Lee, H.Y., see Avetisyan, A.I., Apr. pp. 35-43.

Li, X., see Iyengar, S.S., Aug. pp. 95-97.

Liebowitz, J., "Strategic Intelligence, Social Networking, and Knowledge Retention," Feb., pp. 87-89.

Lindvall, M., see Basili, V.R., Apr. pp. 57-65.

Llorente, I., see Huedo, E., July pp. 51-56.

Longbotham, R., see Kohavi, R., Sept. pp. 82-85.

Lu, J., see Huang, T., Dec. pp. 28-35.

Lu, Y., see Kumar, K., Apr. pp. 51-56.

Luk, C., see Bach, M., Mar. pp. 34-41.

Luke, J., see Avetisyan, A.I., Apr. pp. 35-43.

Lukowicz, P., O. Amft, D. Roggen, and J. Cheng, "On-Body Sensing: From Gesture-Based Input to Activity-Driven Interaction," Oct., pp. 92-96.

Lund, M.S., B. Solhaug, and K. Stolen, "Evolution in Relation to Risk and Trust Management," May, pp. 49-55.

Lutters, W., see Lampe, C., Nov. pp. 60-67.

Lyon, R., see Anguelov, D., June pp. 32-38.

Lyons, G., see Bach, M., Mar. pp. 34-41.

Lyons, M., see Avetisyan, A.I., Apr. pp. 35-43.

M

Maassen, J., see Bal, H.E., Aug. pp. 54-62.

Machina, J., see Sodan, A.C., Mar. pp. 24-32.

Macnaughton, K., see Sodan, A.C., Mar. pp. 24-32.

Magee, J., see Mens, T., May pp. 42-48.

Mahapatra, R.N., see Mandal, S.K., Mar. pp. 67-71.

Maher, M.L., see Kraut, R., Nov. pp. 22-28.

Mahlke, S., see Woh, M., Jan. pp. 81-85.

Mahmood, M..A., see Siponen, M., Feb. pp. 64-71.

makino, J., see Portegies Zwart, S., Aug. pp. 63-70.

Malone, T.W., see Kraut, R., Nov. pp. 22-28.

Mandal, S.K., R.N. Mahapatra, P.S. Bhojwani, and S.P. Mohanty, "IntellBatt: Toward a Smarter Battery," Mar., pp. 67-71.

Margaria, T., and B. Steffen, "Simplicity as a Driver for Agile Innovation," June, pp. 90-92.

Mark, G., see Olson, G., Nov. pp. 37-43.

Markov, I.L., see Roy, J.A., Oct. pp. 30-38.

Marshall, T., see Lampe, C., Nov. pp. 60-67.

Martinez-Torres, M.D.R., see Toral Marin, S., Oct. pp. 22-29.

Massacci, F., see Karsai, G., May pp. 34-40.

McGraw, G., see Sobel, A.E.K., Sept. pp. 47-53.

McMillan, S., see Portegies Zwart, S., Aug. pp. 63-70.

Mead, N.R., and J. Jarzombek, "Advancing Software Assurance with Public-Private Collaboration," Sept., pp. 21-30.

Mens, T., see Cleve, A., Aug. pp. 110-112.

Mens, T., J. Magee, and B. Rumpe, "Evolving Software Architecture Descriptions of Critical Systems," May, pp. 42-48.

Meunier, R., see Rashid, A., Feb. pp. 19-26.

Michael, B., see Hurlburt, G., Dec. pp. 90-92.

Michael, J.B., E. Tikk, P. Wahlgren, and T.C. Wingfield, "From Chaos to Collective Defense," Aug., pp. 91-94.

Michael, J.B., J.F. Sarkesain, T.C. Wingfield, G. Dementis, and G.N.B. Sousa, "Integrating Legal and Policy Factors in Cyberpreparedness," Apr., pp. 90-92.

Michalewicz, Z., see Falkner, N., Apr. pp. 20-28.

Miller, K.W., J. Voas, and P. Laplante, "In Trust We Trust," Oct., pp. 85-87.

Miller, K., see Hurlburt, G., Dec. pp. 90-92.

Milojicic, D.S., see Avetisyan, A.I., Apr. pp. 35-43.

Ming, N.K., see Avetisyan, A.I., Apr. pp. 35-43.

Mohanty, S.P., see Mandal, S.K., Mar. pp. 67-71.

Montero, R., see Huedo, E., July pp. 51-56.

Morell, L., see Banerjee, P., Nov. pp. 88-90.

Mucke, P., see Goesele, M., June pp. 48-53.

Mudge, T., see Woh, M., Jan. pp. 81-85.

Mukhopadhyay, S., see Iyengar, S.S., Aug. pp. 95-97.

Munch, J., see Basili, V.R., Apr. pp. 57-65.

Munson, S., see Chi, E.H., Nov. pp. 29-35.

Munson, S., see Bertot, J.C., Nov. pp. 53-59.

Munson, S., see Hesse, B.W., Nov. pp. 45-52.

Muskens, J., see Piniewski, B., July pp. 27-34.

Mytkowicz, T., A. Diwan, M. Hauswirth, and P. Sweeney, "The Effect of Omitted-Variable Bias on the Evaluation of Compiler Optimizations," Sept., pp. 62-67.

N

Namgoong, H., see Avetisyan, A.I., Apr. pp. 35-43.

Nandakumar, K., see Jain, A.K., Feb. pp. 36-44.

Nitadori, K., see Portegies Zwart, S., Aug. pp. 63-70.

Nixon, P., see Dobson, S., Jan. pp. 35-41.

Nordman, B., and K. Christensen, "Proxying: The Next Step in Reducing IT Energy Use," Jan., pp. 91-93.

Nuseibeh, B., see Coyle, L., May pp. 28-33.

Nuti, G., see Yingsaeree, C., Dec. pp. 36-43.

O

O'Hagan, P., E. Hanna, and R. Sterritt, "Addressing the Corrections Crisis with Software Technology," Feb., pp. 90-93.

O'Hallaron, D., see Avetisyan, A.I., Apr. pp. 35-43.

Ogale, A., see Anguelov, D., June pp. 32-38.

Olsen, K.A., "Computing a Better World," Apr., pp. 96, 94-95.

Olson, G., G. Mark, E. Churchill, and D. Rotman, "New Missions for a Sociotechnical Infrastructure," Nov., pp. 37-43.

Olson, J., see Kraut, R., Nov. pp. 22-28.

Ortiz Jr., S., "Is 3D Finally Ready for the Web?," Jan., pp. 14-16.

Ortiz Jr., S., "Taking Business Intelligence to the Masses," July, pp. 12-15.

Osterweil, L., see Karsai, G., May pp. 34-40.

P

Pahnila, S., see Siponen, M., Feb. pp. 64-71.

Palmer, N., see Bal, H.E., Aug. pp. 54-62.

Palta, J.R., V.A. Frouhar, and R.A. Zlotecki, "Leveraging Pervasive Technologies to Improve Collection of Prostate Cancer Outcome Data," July, pp. 35-42.

Parnas, D.L., "Really Rethinking 'Formal Methods'," Jan., pp. 28-34.

Parr, C., see Chi, E.H., Nov. pp. 29-35.

Pasetto, D., F. Petrini, and V. Agarwal, "Tools for Very Fast Regular Expression Matching," Mar., pp. 50-58.

Patil, H., see Bach, M., Mar. pp. 34-41.

Paulson, L.D., "Energy-Saving PCs Work while Sleeping," Dec., pp. 23-26.

Paulson, L.D., "How Safe Are Secure Websites?," Oct., pp. 17-20.

Paulson, L.D., "Libraries Face the Challenge of Archiving Digital Material," May, pp. 16-19.

Paulson, L.D., "New Approach Combines TV and Social Networking," July, pp. 16-19.

Paulson, L.D., "New Lithography Approach Promises Powerful Chips," Jan., pp. 17-20.

Paulson, L.D., "New Service Promises to Improve Online Search," Sept., pp. 17-20.

Paulson, L.D., "New Technique Provides Energy Wirelessly," Apr., pp. 16-19.

Paulson, L.D., "Onboard Cooler Keeps Chips Comfortable," Feb., pp. 15-18.

Paulson, L.D., "Project Converts Arms and Hands into Input Devices," Aug., pp. 15-18.

Paulson, L.D., "Scientists Develop Camera Made of Fabric," Mar., pp. 20-22.

Paulson, L.D., "Steganography Development Offers Promise," June, pp. 18-21.

Peck, E.M., E.T. Solovey, K. Chauncey, A. Sassaroli, S. Fantini, R.J.K. Jacob, A. Girouard, and L.M. Hirshfield, "Your Brain, Your Computer, and You," Dec., pp. 86-89.

Peng, G., see Wan, Y., May pp. 20-26.

Pereira, R., see Breitman, K., Apr. pp. 81-83.

Petrini, F., see Pasetto, D., Mar. pp. 50-58.

Phillips, P..J., see Chellappa, R., Feb. pp. 46-55.

Pietro, G.D., see Coronato, A., Dec. pp. 60-68.

Piniewski, B., J. Muskens, L. Estevez, R. Carroll, and R. Cnossen, "Empowering Healthcare Patients with Smart Technology," July, pp. 27-34.

Pirolli, P., J. Preece, and B. Shneiderman, "Cyberinfrastructure for Social Action on National Priorities," Nov., pp. 20-21.

Pirolli, P., see Kraut, R., Nov. pp. 22-28.

Pock, T., see Leberl, F., June pp. 24-31.

Portegies Zwart, S., D. Groen, T. Ishiyama, K. Nitadori, J. makino, C. de Laat, S. McMillan, K. Hiraki, S. Harfst, and P. Grosso, "Simulating the Universe on an Intercontinental Grid," Aug., pp. 63-70.

Poston, R., see Stafford, T.F., Jan. pp. 58-64.

Preece, J., see Pirolli, P., Nov. pp. 20-21.

Purao, S., see Umapathy, K., Nov. pp. 91-94.

R

Rajamani, K., see Carter, J., July pp. 76-78.

Rajendran, J., see Karri, R., Oct. pp. 39-46.

Ramakrishnan, N., D. Hanauer, and B. Keller, "Mining Electronic Health Records," Oct., pp. 77-81.

Raman, B.S., see Chandramouli, B., Dec. pp. 45-52.

Rao, R.P.N., "Probabilistic Analysis of an Ancient Undeciphered Script," Apr., pp. 76-80.

Rashid, A., T. Cottenier, P. Greenwood, R. Chitchyan, R. Meunier, R. Coelho, M. Sudholt, and W. Joosen, "Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe," Feb., pp. 19-26.

Redmiles, D., see Sarma, A., June pp. 61-67.

Regardie, M., see Basili, V.R., Apr. pp. 57-65.

Reichgelt, H., see Gowan, A., July pp. 79-81.

Resnick, P., see Lampe, C., Nov. pp. 60-67.

Reussner, R., see Broy, M., Oct. pp. 88-91.

Riehle, D., "The Economic Case for Open Source Foundations," Jan., pp. 86-90.

Ritz, M., see Goesele, M., June pp. 48-53.

Robinson, W., "A Roadmap for Comprehensive Requirements Modeling," May, pp. 64-72.

Roggen, D., see Lukowicz, P., Oct. pp. 92-96.

Rombach, D., see Basili, V.R., Apr. pp. 57-65.

Romney, J., see Walker, E., Apr. pp. 44-50.

Rosenfeld, K., see Karri, R., Oct. pp. 39-46.

Ross, A., "Iris Recognition: The Path Forward," Feb., pp. 30-35.

Ross, N., see Sharkey, N., Aug. pp. 116, 114-115.

Rotman, D., see Lampe, C., Nov. pp. 60-67.

Rotman, D., see Olson, G., Nov. pp. 37-43.

Roure, D.D., "e-Science and the Web," May, pp. 90-93.

Roy, J.A., F. Koushanfar, and I.L. Markov, "Ending Piracy of Integrated Circuits," Oct., pp. 30-38.

Rumpe, B., see Mens, T., May pp. 42-48.

Rutkowski, A., and C.S. Saunders, "Growing Pains with Information Overload," June, pp. 96, 94-95.

S

Sanders, L., see Barker, L., June pp. 82-85.

Sandhu, R., see Ko, M.N., Aug. pp. 37-43.

Santini, S., "Is Your Phone Killing the Internet?," Dec., pp. 100, 98-99.

Sarkesain, J.F., see Michael, J.B., Apr. pp. 90-92.

Sarma, A., D. Redmiles, and A.V.D. Hoek, "Categorizing the Spectrum of Coordination Technology," June, pp. 61-67.

Sassaroli, A., see Peck, E.M., Dec. pp. 86-89.

Saunders, C.S., see Rutkowski, A., June pp. 96, 94-95.

Savvides, M., K.R. Jr., D.L. Woodard, and G. Dozier, "Unconstrained Biometric Identification: Emerging Technologies," Feb., pp. 56-62.

Schall, D., S. Dustdar, and M..B. Blake, "Programming Human and Software-Based Web Services," July, pp. 82-85.

Schell, G.P., "IT Value: From Moore's Law to a Flat World," Sept., pp. 79-81.

Schieferdecker, I., see Karsai, G., May pp. 34-40.

Schmidt, A., "Ubiquitous Computing: Are We There Yet?," Feb., pp. 95-97.

Schumaker, R.P., and H. Chen, "A Discrete Stock Price Prediction Engine Based on Financial News," Jan., pp. 51-56.

Seaman, C., see Basili, V.R., Apr. pp. 57-65.

Seinstra, F., see Bal, H.E., Aug. pp. 54-62.

Seitz, S.M., see Agarwal, S., June pp. 40-47.

Sezgin, B., see Chandramouli, B., Dec. pp. 45-52.

Shands, E.F..B., see Chamberlain, R.D., Mar. pp. 42-49.

Sharkey, N., M. Goodman, and N. Ross, "The Coming Robot Crime Wave," Aug., pp. 116, 114-115.

Shehab, M., see Ko, M.N., Aug. pp. 37-43.

Sheldon, F.T., and C. Vishik, "Moving Toward Trustworthy Systems," Sept., pp. 31-40.

Shneiderman, B., see Pirolli, P., Nov. pp. 20-21.

Singla, N., see Chamberlain, R.D., Mar. pp. 42-49.

Sinha, P., see Chellappa, R., Feb. pp. 46-55.

Siponen, M., S. Pahnila, and M..A. Mahmood, "Compliance with Information Security Policies: An Empirical Investigation," Feb., pp. 64-71.

Smarr, L., "Project GreenLight: Optimizing Cyber-infrastructure for a Carbon-Constrained World," Jan., pp. 22-27.

Smeulders, A.W.M., see Snoek, C.G.M., June pp. 76-78.

Smith, A., see Weitzel, M., July pp. 43-50.

Snavely, N., see Agarwal, S., June pp. 40-47.

Snoek, C.G.M., and A.W.M. Smeulders, "Visual-Concept Search Solved?," June, pp. 76-78.

Sobel, A.E.K., and G. McGraw, "Interview: Software Security in the Real World," Sept., pp. 47-53.

Sodan, A.C., J. Machina, A. Deshmeh, K. Macnaughton, and B. Esbaugh, "Parallelism via Multithreaded and Multicore CPUs," Mar., pp. 24-32.

Soh, Y.C., see Avetisyan, A.I., Apr. pp. 35-43.

Solhaug, B., see Lund, M.S., May pp. 49-55.

Solovey, E.T., see Peck, E.M., Dec. pp. 86-89.

Sooriamurthi, R., see Falkner, N., Apr. pp. 20-28.

Sousa, G.N.B., see Michael, J.B., Apr. pp. 90-92.

Spiers, B., and D. Wallez, "High-Performance Computing on Wall Street," Dec., pp. 53-59.

Spohrer, J.C., "IBM's University Programs," Aug., pp. 102-104.

Spohrer, J., see Bowen, N., Mar. pp. 86-89.

Srivastava, J., see Tian, Y., Aug. pp. 27-36.

Stafford, T.F., and R. Poston, "Online Security Threats and Computer User Intentions," Jan., pp. 58-64.

Stanley, R.M., see Aiken, P., Apr. pp. 29-34.

Steffen, B., see Margaria, T., June pp. 90-92.

Steinmuller, C., see Iyengar, S.S., Aug. pp. 95-97.

Sterritt, R., see O'Hagan, P., Feb. pp. 90-93.

Sterritt, R., see Dobson, S., Jan. pp. 35-41.

Stolen, K., see Lund, M.S., May pp. 49-55.

Sudholt, M., see Rashid, A., Feb. pp. 19-26.

Sweeney, P., see Mytkowicz, T., Sept. pp. 62-67.

Szeliski, R., see Agarwal, S., June pp. 40-47.

T

Tahhirov, I., see Tepandi, J., June pp. 54-60.

Tal, A., see Bach, M., Mar. pp. 34-41.

Tan, W., J. Zhang, and I. Foster, "Network Analysis of Scientific Workflows: A Gateway to Reuse," Sept., pp. 54-61.

Tehranipoor, M., see Karri, R., Oct. pp. 39-46.

Tepandi, J., I. Tahhirov, and S. Vassiljev, "Wireless PKI Security and Mobile Voting," June, pp. 54-60.

Thomas, J.C., see Kraut, R., Nov. pp. 22-28.

Thomas, J.C., see Hesse, B.W., Nov. pp. 45-52.

Tian, Y., see Huang, T., Dec. pp. 28-35.

Tian, Y., J. Srivastava, T. Huang, and N. Contractor, "Social Multimedia Computing," Aug., pp. 27-36.

Tikk, E., see Michael, J.B., Aug. pp. 91-94.

Toral Marin, S., M.D.R. Martinez-Torres, and F. Barrero, "Reforming ICT Graduate Programs to Meet Professional Needs," Oct., pp. 22-29.

Treleaven, P., see Yingsaeree, C., Dec. pp. 36-43.

Trendowicz, A., see Basili, V.R., Apr. pp. 57-65.

Tyson, E.J., see Chamberlain, R.D., Mar. pp. 42-49.

U

Umapathy, K., and S. Purao, "Systems Integration and Web Services," Nov., pp. 91-94.

V

Vallino, J., "Cutting Across the Disciplines," Apr., pp. 87-89.

van Nieuwpoort, R.V., see Bal, H.E., Aug. pp. 54-62.

Vassev, E., and M. Hinchey, "The Challenge of Developing Autonomic Systems," Dec., pp. 93-96.

Vassiljev, S., see Tepandi, J., June pp. 54-60.

Vaughan-Nichols, S.J., "Gigabit Wi-Fi Is on Its Way," Nov., pp. 11-14.

Vaughan-Nichols, S.J., "Will HTML 5 Restandardize the Web?," Apr., pp. 13-15.

Verdonk, M., see Aalst, W.M.P.V., Mar. pp. 90-93.

Vetter, R., "Authentication by Biometric Verification," Feb., pp. 28-29.

Vieweg, S., see Chi, E.H., Nov. pp. 29-35.

Villar, N., see Hodges, S., Aug. pp. 106-109.

Villemaire, R., see Halle, S., Mar. pp. 59-66.

Vincent, L., see Anguelov, D., June pp. 32-38.

Vinekar, V., and C.L. Huntley, "Agility versus Maturity: Is There Really a Trade-Off?," May, pp. 87-89.

Vishik, C., see Sheldon, F.T., Sept. pp. 31-40.

Voas, J., see Miller, K.W., Oct. pp. 85-87.

Voas, J., see Hurlburt, G., Dec. pp. 90-92.

W

Wahlgren, P., see Michael, J.B., Aug. pp. 91-94.

Walker, E., W. Brisken, and J. Romney, "To Lease or Not to Lease from Storage Clouds," Apr., pp. 44-50.

Walker, T., see Kohavi, R., Sept. pp. 82-85.

Wallace, W., see Fleischmann, K., July pp. 57-63.

Wallez, D., see Spiers, B., Dec. pp. 53-59.

Wan, Y., and G. Peng, "What's Next for Shopbots?," May, pp. 20-26.

Wang, F., D. Zeng, J.A. Hendler, Q. Zhang, Z. Feng, Y. Gao, H. Wang, and G. Lai, "A Study of the Human Flesh Search Engine: Crowd-Powered Expansion of Online Knowledge," Aug., pp. 45-53.

Wang, H., see Wang, F., Aug. pp. 45-53.

Wang, V., see Chen, T.M., Mar. pp. 94-97.

Ward, B., "Blue Gene Architect Gara Receives 2010 Cray Award," Nov., pp. 78-80.

Ward, B., "Ken Birman Wins Kanai Award," Apr., pp. 66-68.

Ward, B., "Society Forms New Technical Committee on Semantic Computing," Oct., pp. 64-65.

Ward, B., "Bertrand Meyer Recieves 2010 Mills Award," May, pp. 77-79.

Ward, B., "Computer Society Announces Award Winners," June, pp. 72-73.

Ward, B., "Computer Society Names Award Recipients," Mar., pp. 77-80.

Ward, B., "Computer Society Programs Serve Members," Jan., pp. 65-69.

Ward, B., "Moore Wins Karlsson Award," Feb., pp. 79-84.

Ward, B., "Society Honors Five Top Computing Professionals," Sept., pp. 74-76.

Weaver, J., see Anguelov, D., June pp. 32-38.

Weil, T.R., see Kuhn, D..R., June pp. 79-81.

Weitzel, M., A. Smith, S.D. Deugd, and R. Yates, "A Web 2.0 Model for Patient-Centered Health Informatics Applications," July, pp. 43-50.

Werf, J.M.V., see Aalst, W.M.P.V., Mar. pp. 90-93.

Wingfield, T.C., see Michael, J.B., Aug. pp. 91-94.

Wingfield, T.C., see Michael, J.B., Apr. pp. 90-92.

Woh, M., S. Mahlke, T. Mudge, and C. Chakrabarti, "Mobile Supercomputers for the Next-Generation Cell Phone," Jan., pp. 81-85.

Woodard, D.L., see Savvides, M., Feb. pp. 56-62.

Y

Yardi, S., see Lampe, C., Nov. pp. 60-67.

Yates, R., see Weitzel, M., July pp. 43-50.

Yingsaeree, C., G. Nuti, and P. Treleaven, "Computational Finance," Dec., pp. 36-43.

Z

Zeng, D., see Wang, F., Aug. pp. 45-53.

Zhang, J., see Tan, W., Sept. pp. 54-61.

Zhang, Q., see Wang, F., Aug. pp. 45-53.

Zlotecki, R.A., see Palta, J.R., July pp. 35-42.

Subject Index

A

Advances in Computing

"Computing a Better World," K.A. Olsen, Apr., pp. 96, 94-95.

AI

"Mining Electronic Health Records," N. Ramakrishnan, D. Hanauer, and B. Keller, Oct., pp. 77-81.

"Preventing Future Oil Spills with Software-Based Event Detection," S.S. Iyengar, S. Mukhopadhyay, C. Steinmuller, and X. Li, Aug., pp. 95-97.

"Probabilistic Analysis of an Ancient Undeciphered Script," R.P.N. Rao, Apr., pp. 76-80.

"Strategic Intelligence, Social Networking, and Knowledge Retention," J. Liebowitz, Feb., pp. 87-89.

"Visual-Concept Search Solved?," C.G.M. Snoek, and A.W.M. Smeulders, June, pp. 76-78.

Ambient Intelligence

" Formal Design of Ambient Intelligence Applications," A. Coronato, and G.D. Pietro, Dec., pp. 60-68.

Architecture

"Architectural Concepts in Programming Languages," M. Broy, and R. Reussner, Oct., pp. 88-91.

"Auto-Pipe: Streaming Applications on Architecturally Diverse Systems," R.D. Chamberlain, M.A. Franklin, E.J. Tyson, J.H. Buckley, J. Buhler, G. Galloway, S. Gayen, M. Hall, E.F..B. Shands, and N. Singla, Mar., pp. 42-49.

Augmented Reality

"How Safe Are Secure Websites?," L.D. Paulson, Oct., pp. 17-20.

Autonomic Computing

"The Challenge of Developing Autonomic Systems," E. Vassev, and M. Hinchey, Dec., pp. 93-96.

"Fulfilling the Vision of Autonomic Computing," S. Dobson, R. Sterritt, P. Nixon, and M. Hinchey, Jan., pp. 35-41.

B

Biometrics

"Authentication by Biometric Verification," R. Vetter, Feb., pp. 28-29.

"Face Recognition by Computers and Humans," R. Chellappa, P. Sinha, and P..J. Phillips, Feb., pp. 46-55.

"Fingerprint Matching," A.K. Jain, J. Feng, and K. Nandakumar, Feb., pp. 36-44.

"Iris Recognition: The Path Forward," A. Ross, Feb., pp. 30-35.

"Steganography Development Offers Promise," L.D. Paulson, June, pp. 18-21.

"Unconstrained Biometric Identification: Emerging Technologies," M. Savvides, K.R. Jr., D.L. Woodard, and G. Dozier, Feb., pp. 56-62.

C

Cloud Computing

"Cloud Computing in Developing Economies," N. Kshetri, Oct., pp. 47-55.

"Open Cirrus: A Global Cloud Computing Testbed," A.I. Avetisyan, R. Campbell, I. Gupta, M.T. Heath, S.Y. Ko, G.R. Ganger, M.A. Kozuch, D. O'Hallaron, M. Kunze, T.T. Kwan, K. Lai, M. Lyons, D.S. Milojicic, H.Y. Lee, Y.C. Soh, N.K. Ming, J. Luke, and H. Namgoong, Apr., pp. 35-43.

"To Lease or Not to Lease from Storage Clouds," E. Walker, W. Brisken, and J. Romney, Apr., pp. 44-50.

Computational Finance

"Computational Finance," C. Yingsaeree, G. Nuti, and P. Treleaven, Dec., pp. 36-43.

"Data Stream Management Systems for Computational Finance," B. Chandramouli, M. Ali, J. Goldstein, B. Sezgin, and B.S. Raman, Dec., pp. 45-52.

"A Discrete Stock Price Prediction Engine Based on Financial News," R.P. Schumaker, and H. Chen, Jan., pp. 51-56.

"High-Performance Computing on Wall Street," B. Spiers, and D. Wallez, Dec., pp. 53-59.

Computers and Society

"The Curious and the Confident," D. Alan Grier, Oct., pp. 8-10.

"Designing the Future," D. Alan Grier, Jan., pp. 9-11.

"Finding What You Want," D. Alan Grier, Sept., pp. 8-10.

"Investing in Ignorance," D. Alan Grier, Dec., pp. 14-16.

"Mental Discipline," D. Alan Grier, Aug., pp. 6-8.

"The Profession," N. Holmes, Jan., pp. 96, 94-95.

"Raising Barns," D. Alan Grier, Feb., pp. 7-9.

"Some Social Aspects of Computers and Numbers," N. Holmes, Nov., pp. 100, 98-99.

"Someday, You Will Understand," D. Alan Grier, Mar., pp. 11-13.

"The Spirit of Combination," D. Alan Grier, July, pp. 6-9.

D

Databases and Modeling

"Value Conflicts in Computational Modeling," K. Fleischmann, and W. Wallace, July, pp. 57-63.

"Will NoSQL Databases Live Up to Their Promise?," N. Leavitt, Feb., pp. 12-14.

Digital Trends

"The Coming Robot Crime Wave," N. Sharkey, M. Goodman, and N. Ross, Aug., pp. 116, 114-115.

"The Digital Climate of English Change," N. Holmes, Mar., pp. 100, 98-99.

"The Future of the Computing Profession," N. Holmes, July, pp. 88, 86-87.

"The Future of the Computing Profession: Readers' E-mails," N. Holmes, Oct., pp. 100, 98-99.

"Is It Really Time for Real-Time Search?," D. Geer, Mar., pp. 16-19.

"Libraries Face the Challenge of Archiving Digital Material," L.D. Paulson, May, pp. 16-19.

"Mediaprinting: Identifying Multimedia Content for Digital Rights Management," T. Huang, Y. Tian, W. Gao, and J. Lu, Dec., pp. 28-35.

"The Rise and Rise of Digital Gluttony," N. Holmes, May, pp. 96, 94-95.

"Seven Digital Steps to Avoid Utter Hell," N. Holmes, Sept., pp. 92, 90-91.

"A Study of the Human Flesh Search Engine: Crowd-Powered Expansion of Online Knowledge," F. Wang, D. Zeng, J.A. Hendler, Q. Zhang, Z. Feng, Y. Gao, H. Wang, and G. Lai, Aug., pp. 45-53.

"What's Next for Shopbots?," Y. Wan, and G. Peng, May, pp. 20-26.

Distributed Systems

"Grid Architecture from a Metascheduling Perspective," E. Huedo, R. Montero, and I. Llorente, July, pp. 51-56.

"Growing Pains with Information Overload," A. Rutkowski, and C.S. Saunders, June, pp. 96, 94-95.

E

E-Science

"e-Science and the Web," D.D. Roure, May, pp. 90-93.

"Empowering Healthcare Patients with Smart Technology," B. Piniewski, J. Muskens, L. Estevez, R. Carroll, and R. Cnossen, July, pp. 27-34.

"Leveraging Pervasive Technologies to Improve Collection of Prostate Cancer Outcome Data," J.R. Palta, V.A. Frouhar, and R.A. Zlotecki, July, pp. 35-42.

"Managing Healthcare through Social Networks," M.C. Domingo, July, pp. 20-25.

"A Web 2.0 Model for Patient-Centered Health Informatics Applications," M. Weitzel, A. Smith, S.D. Deugd, and R. Yates, July, pp. 43-50.

Education

"Computer Science: Is It Really the Scientific Foundation for Software Engineering?," S.T. Frezza, Aug., pp. 98-101.

"Cutting Across the Disciplines," J. Vallino, Apr., pp. 87-89.

"Discovery, Innovation, and Creativity: The Core of Computing," A.Q. Gates, Feb., pp. 98-100.

"IBM's University Programs," J.C. Spohrer, Aug., pp. 102-104.

"A Nonlinear Perspective on Higher Education," G. Hurlburt, J. Voas, K. Miller, P. Laplante, and B. Michael, Dec., pp. 90-92.

"Puzzle-Based Learning for Engineering and Computer Science," N. Falkner, R. Sooriamurthi, and Z. Michalewicz, Apr., pp. 20-28.

"Reforming ICT Graduate Programs to Meet Professional Needs," S. Toral Marin, M.D.R. Martinez-Torres, and F. Barrero, Oct., pp. 22-29.

"Strategy Trumps Money: Recruiting Undergraduate Women into Computing," L. Barker, J.M. Cohoon, and L. Sanders, June, pp. 82-85.

"What Should All CS Graduates Know?," R.J. LeBlanc, Oct., pp. 82-84.

G

Graphics and Multimedia

"Aerial Computer Vision for a 3D Virtual Habitat," F. Leberl, H. Bischof, T. Pock, A. Irschara, and S. Kluckner, June, pp. 24-31.

"Capturing the World," O. Bimber, June, pp. 22-23.

"Categorizing the Spectrum of Coordination Technology," A. Sarma, D. Redmiles, and A.V.D. Hoek, June, pp. 61-67.

"Google Street View: Capturing the World at Street Level," D. Anguelov, C. Dulong, D. Filip, C. Frueh, S. Lafon, R. Lyon, A. Ogale, L. Vincent, and J. Weaver, June, pp. 32-38.

"Reconstructing Rome," S. Agarwal, Y. Furukawa, N. Snavely, B. Curless, S.M. Seitz, and R. Szeliski, June, pp. 40-47.

"Scene Reconstruction from Community Photo Collections," M. Goesele, J. Ackermann, S. Fuhrmann, R. Klowsky, F. Langguth, P. Mucke, and M. Ritz, June, pp. 48-53.

"Scientists Develop Camera Made of Fabric," L.D. Paulson, Mar., pp. 20-22.

"Social Multimedia Computing," Y. Tian, J. Srivastava, T. Huang, and N. Contractor, Aug., pp. 27-36.

Green IT

"The Challenges of Energy-Proportional Computing," K.W. Cameron, May, pp. 82-83.

"Designing Energy-Efficient Servers and Data Centers," J. Carter, and K. Rajamani, July, pp. 76-78.

"Energy-Saving PCs Work while Sleeping," L.D. Paulson, Dec., pp. 23-26.

"Green with Envy," K.W. Cameron, Nov., pp. 95-96.

"Project GreenLight: Optimizing Cyber-infrastructure for a Carbon-Constrained World," L. Smarr, Jan., pp. 22-27.

"Proxying: The Next Step in Reducing IT Energy Use," B. Nordman, and K. Christensen, Jan., pp. 91-93.

"A Tale of Two Green Lists," K.W. Cameron, Sept., pp. 86-88.

"Trading in Green IT," K.W. Cameron, Mar., pp. 83-85.

H

Hardware

"Guest Editors' Introduction: Evolving Critical Systems," L. Coyle, M. Hinchey, B. Nuseibeh, and J.L. Fiadeiro, May, pp. 28-33.

"Evolving Embedded Systems," G. Karsai, F. Massacci, L. Osterweil, and I. Schieferdecker, May, pp. 34-40.

"Evolving Software Architecture Descriptions of Critical Systems," T. Mens, J. Magee, and B. Rumpe, May, pp. 42-48.

"IntellBatt: Toward a Smarter Battery," S.K. Mandal, R.N. Mahapatra, P.S. Bhojwani, and S.P. Mohanty, Mar., pp. 67-71.

"Microprocessor Scaling: What Limits Will Hold?," J. Izydorczyk, and M. Izydorczyk, Aug., pp. 20-26.

"New Approach Combines TV and Social Networking," L.D. Paulson, July, pp. 16-19.

"New Lithography Approach Promises Powerful Chips," L.D. Paulson, Jan., pp. 17-20.

"New Technique Provides Energy Wirelessly," L.D. Paulson, Apr., pp. 16-19.

"Onboard Cooler Keeps Chips Comfortable," L.D. Paulson, Feb., pp. 15-18.

"Opportunities in Opportunistic Computing," M. Conti, and M. Kumar, Jan., pp. 42-50.

"Scenario-Based Resource Prediction for QoS-Aware Media Processing," J. Hamers, and L. Eeckhout, Oct., pp. 56-63.

"Trustworthy Hardware: Identifying and Classifying Hardware Trojans," R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, Oct., pp. 39-46.

"Why Critical Systems Need Help to Evolve," B. Cohen, and P. Boxer, May, pp. 56-63.

I

IEEE Computer Society

"2010 to 2020 - Looking Forward," J.D. Isaak, Dec., pp. 11-13.

"Bertrand Meyer Recieves 2010 Mills Award," B. Ward, May, pp. 77-79.

"Computer Society 2010: Innovation, Leadership, Community, and Careers," J.D. Isaak, Jan., pp. 6-8.

"Computer Society Announces Award Winners," B. Ward, June, pp. 72-73.

"Computer Society Names Award Recipients," B. Ward, Mar., pp. 77-80.

"It Has Been a Long Journey - From the Heart of a Loyal Computer Society Volunteer," C.K. Chang, Dec., pp. 9-10.

"Ken Birman Wins Kanai Award," B. Ward, Apr., pp. 66-68.

"Moore Wins Karlsson Award," B. Ward, Feb., pp. 79-84.

"Society Forms New Technical Committee on Semantic Computing," B. Ward, Oct., pp. 64-65.

"Society Honors Five Top Computing Professionals," B. Ward, Sept., pp. 74-76.

Industry Perspective

"The Future of Embedded Software: Adapting to Drastic Change," Y. Kushiki, May, pp. 84-86.

"Open Innovation at HP Labs," P. Banerjee, R. Friedrich, and L. Morell, Nov., pp. 88-90.

"Viewpoint: The Future of Computing Practice and Education," N. Bowen, and J. Spohrer, Mar., pp. 86-89.

Information Technology

"Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor," W.M.P.V. Aalst, K.M.V. Hee, J.M.V. Werf, and M. Verdonk, Mar., pp. 90-93.

"Emergence of the Information Technology Discipline," A. Gowan, and H. Reichgelt, July, pp. 79-81.

"IT Value: From Moore's Law to a Flat World," G.P. Schell, Sept., pp. 79-81.

"Programmers' Capital," S. Kiesewetter-Kobinger, Feb., pp. 108, 106-107.

"Social Participation in Health 2.0," B.W. Hesse, D. Hansen, T. Finholt, S. Munson, W. Kellogg, and J.C. Thomas, Nov., pp. 45-52.

Internet/Web

"Agility versus Maturity: Is There Really a Trade-Off?," V. Vinekar, and C.L. Huntley, May, pp. 87-89.

"Is Your Phone Killing the Internet?," S. Santini, Dec., pp. 100, 98-99.

"Network-Usage Changes Push Internet Traffic to the Edge," N. Leavitt, Oct., pp. 13-15.

"Online Experiments: Practical Lessons," R. Kohavi, R. Longbotham, and T. Walker, Sept., pp. 82-85.

"Programming Human and Software-Based Web Services," D. Schall, S. Dustdar, and M..B. Blake, July, pp. 82-85.

"Social-Networks Connect Services," M.N. Ko, G.P. Cheek, M. Shehab, and R. Sandhu, Aug., pp. 37-43.

"Web 3.0: The Dawn of Semantic Search," J. Hendler, Jan., pp. 77-80.

"Web Filtering and Censoring," T.M. Chen, and V. Wang, Mar., pp. 94-97.

"What Can the Web Do for Science?," T. Hannay, Nov., pp. 84-87.

"When TV Dies, Will It Go to the Cloud?," K. Breitman, M. Endler, R. Pereira, and M. Azambuja, Apr., pp. 81-83.

Invisible Computing

"Appropriated Interaction Surfaces," C. Harrison, June, pp. 86-89.

"The Hardware Is Not a Given," S. Hodges, and N. Villar, Aug., pp. 106-109.

"On-Body Sensing: From Gesture-Based Input to Activity-Driven Interaction," P. Lukowicz, O. Amft, D. Roggen, and J. Cheng, Oct., pp. 92-96.

"Project Converts Arms and Hands into Input Devices," L.D. Paulson, Aug., pp. 15-18.

"Questioning Invisibility," L. Buechley, Apr., pp. 84-86.

"Ubiquitous Computing: Are We There Yet?," A. Schmidt, Feb., pp. 95-97.

"Your Brain, Your Computer, and You," E.M. Peck, E.T. Solovey, K. Chauncey, A. Sassaroli, S. Fantini, R.J.K. Jacob, A. Girouard, and L.M. Hirshfield, Dec., pp. 86-89.

M

Mobile/Wireless

"Cloud Computing for Mobile Users: Can Offloading Computation Save Energy?," K. Kumar, and Y. Lu, Apr., pp. 51-56.

"Mobile Supercomputers for the Next-Generation Cell Phone," M. Woh, S. Mahlke, T. Mudge, and C. Chakrabarti, Jan., pp. 81-85.

"Payment Applications Make E-Commerce Mobile," N. Leavitt, Dec., pp. 19-22.

Multicore Processors

"Analyzing Parallel Programs with Pin," M. Bach, M. Charney, R. Cohn, E. Demikhovsky, T. Devor, K. Hazelwood, A. Jaleel, C. Luk, G. Lyons, H. Patil, and A. Tal, Mar., pp. 34-41.

"The Effect of Omitted-Variable Bias on the Evaluation of Compiler Optimizations," T. Mytkowicz, A. Diwan, M. Hauswirth, and P. Sweeney, Sept., pp. 62-67.

"Parallelism via Multithreaded and Multicore CPUs," A.C. Sodan, J. Machina, A. Deshmeh, K. Macnaughton, and B. Esbaugh, Mar., pp. 24-32.

"Tools for Very Fast Regular Expression Matching," D. Pasetto, F. Petrini, and V. Agarwal, Mar., pp. 50-58.

S

Scientific computing

"Network Analysis of Scientific Workflows: A Gateway to Reuse," W. Tan, J. Zhang, and I. Foster, Sept., pp. 54-61.

"Real-World Distributed Computing with Ibis," H.E. Bal, J. Maassen, R.V. van Nieuwpoort, N. Drost, R. Kemp, N. Palmer, N. Palmer, T. Kielmann, F. Seinstra, and C. Jacobs, Aug., pp. 54-62.

"Simulating the Universe on an Intercontinental Grid," S. Portegies Zwart, D. Groen, T. Ishiyama, K. Nitadori, J. makino, C. de Laat, S. McMillan, K. Hiraki, S. Harfst, and P. Grosso, Aug., pp. 63-70.

Security and Privacy

"Adding Attributes to Role-Based Access Control," D..R. Kuhn, E.J. Coyne, and T.R. Weil, June, pp. 79-81.

"Are Companies Actually Using Secure Development Life Cycles?," D. Geer, June, pp. 12-16.

"Compliance with Information Security Policies: An Empirical Investigation," M. Siponen, S. Pahnila, and M..A. Mahmood, Feb., pp. 64-71.

"Evolution in Relation to Risk and Trust Management," M.S. Lund, B. Solhaug, and K. Stolen, May, pp. 49-55.

"From Chaos to Collective Defense," J.B. Michael, E. Tikk, P. Wahlgren, and T.C. Wingfield, Aug., pp. 91-94.

"The Four Forces Shaping Cybersecurity," W.W. Agresti, Feb., pp. 101-104.

"In Trust We Trust," K.W. Miller, J. Voas, and P. Laplante, Oct., pp. 85-87.

"Integrating Legal and Policy Factors in Cyberpreparedness," J.B. Michael, J.F. Sarkesain, T.C. Wingfield, G. Dementis, and G.N.B. Sousa, Apr., pp. 90-92.

"Moving Toward Trustworthy Systems," F.T. Sheldon, and C. Vishik, Sept., pp. 31-40.

"Online Security Threats and Computer User Intentions," T.F. Stafford, and R. Poston, Jan., pp. 58-64.

"Researchers Fight to Keep Implanted Medical Devices Safe from Hackers," N. Leavitt, Aug., pp. 11-14.

"Sabotage!," D. Alan Grier, Nov., pp. 6-8.

"Whatever Happened to Network-Access-Control Technology?," D. Geer, Sept., pp. 13-16.

"Wireless PKI Security and Mobile Voting," J. Tepandi, I. Tahhirov, and S. Vassiljev, June, pp. 54-60.

Software Assurance

"Advancing Software Assurance with Public-Private Collaboration," N.R. Mead, and J. Jarzombek, Sept., pp. 21-30.

"Fitting Software Assurance into Higher Education," S.T..R. Jr., Sept., pp. 41-46.

"Interview: Software Security in the Real World," A.E.K. Sobel, and G. McGraw, Sept., pp. 47-53.

Software Development

"The Economic Case for Open Source Foundations," D. Riehle, Jan., pp. 86-90.

"Linking Software Development and Business Strategy Through Measurement," V.R. Basili, M. Lindvall, M. Regardie, C. Seaman, J. Heidrich, J. Munch, D. Rombach, and A. Trendowicz, Apr., pp. 57-65.

"Really Rethinking 'Formal Methods'," D.L. Parnas, Jan., pp. 28-34.

"A Roadmap for Comprehensive Requirements Modeling," W. Robinson, May, pp. 64-72.

Software Technology

"Addressing the Corrections Crisis with Software Technology," P. O'Hagan, E. Hanna, and R. Sterritt, Feb., pp. 90-93.

"Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe," A. Rashid, T. Cottenier, P. Greenwood, R. Chitchyan, R. Meunier, R. Coelho, M. Sudholt, and W. Joosen, Feb., pp. 19-26.

"Data-Intensive System Evolution," A. Cleve, T. Mens, and J. Hainaut, Aug., pp. 110-112.

"Simplicity as a Driver for Agile Innovation," T. Margaria, and B. Steffen, June, pp. 90-92.

Standards

"Using Codes of Conduct to Resolve Legal Disputes," P. Aiken, R.M. Stanley, J. Billings, and L. Anderson, Apr., pp. 29-34.

"Will HTML 5 Restandardize the Web?," S.J. Vaughan-Nichols, Apr., pp. 13-15.

T

Technology-Mediated Social Participation

"Advancing the Design of Technology-Mediated Social Participation Systems," E.H. Chi, S. Munson, G. Fischer, S. Vieweg, and C. Parr, Nov., pp. 29-35.

"Cyberinfrastructure for Social Action on National Priorities," P. Pirolli, J. Preece, and B. Shneiderman, Nov., pp. 20-21.

"Educational Priorities for Technology-Mediated Social Participation," C. Lampe, P. Resnick, A. Forte, S. Yardi, D. Rotman, T. Marshall, and W. Lutters, Nov., pp. 60-67.

"Scientific Foundations: A Case for Technology-Mediated Social-Participation Theory," R. Kraut, M.L. Maher, J. Olson, T.W. Malone, P. Pirolli, and J.C. Thomas, Nov., pp. 22-28.

"Social Media Technology and Government Transparency," J.C. Bertot, P.T. Jaeger, S. Munson, and T. Glaisyer, Nov., pp. 53-59.

Testing

"Runtime Verification of Web Service Interface Contracts," S. Halle, T. Bultan, G. Hughes, M. Alkhalaf, and R. Villemaire, Mar., pp. 59-66.

W

Wi-Fi

"Fighting Intrusions into Wireless Networks," G. Lawton, May, pp. 12-15.

"Gigabit Wi-Fi Is on Its Way," S.J. Vaughan-Nichols, Nov., pp. 11-14.

"Taking Business Intelligence to the Masses," S. Ortiz Jr., July, pp. 12-15.