AUTHOR INDEX

A

Aalst, W.v.d., "Using Process Mining to Bridge the Gap between BI and BPM," Dec., pp. 77-80.

Abaza, A., see Ross, A., Nov. pp. 79-81.

Abdalla, H., see Snider, G., Feb. pp. 21-28.

Abreu, S., see Rocha, F., Sept. pp. 44-50.

Abu-Nimeh, S., see Chen, T.M., Apr. pp. 91-93.

Abu-Nimeh, S., T. Chen, and O. Alzubi, "Malicious and Spam Posts in Online Social Networks," Sept., pp. 23-28.

Alan Grier, D., "The Chicken Bus," Aug., pp. 6-8.

Alan Grier, D., "Dumb Grids and Smart Markets," June, pp. 6-8.

Alan Grier, D., "Experienced Hands," July, pp. 6-8.

Alan Grier, D., "The Habit of Change," Oct., pp. 6-8.

Alan Grier, D., "The Honest Give-and-Take," Nov., pp. 6-8.

Alan Grier, D., "Leisure Science," Sept., pp. 6-8.

Alan Grier, D., "The Migration to the Middle," Jan., pp. 12-14.

Alan Grier, D., "Not for All Markets," May, pp. 6-8.

Alan Grier, D., "Uncharted Territory," Dec., pp. 12-14.

Alan Grier, D., "A Very Bad Idea," Feb., pp. 6-8.

Alan Grier, D., "The Voice of Wisdom," Mar., pp. 8-10.

Alan Grier, D., and E.D. Dumbacher, "Where Are You From?," Apr., pp. 8-10.

Alonso Jr., M., see Gates, A., Apr. pp. 48-55.

Alvarez-Lozano, J., see Garcia Macias, J..A., May pp. 46-52.

Alzubi, O., see Abu-Nimeh, S., Sept. pp. 23-28.

Amerson, R., see Snider, G., Feb. pp. 21-28.

Ames, H., see Snider, G., Feb. pp. 21-28.

An, H., see Yau, S., Oct. pp. 47-53.

Aviles Lopez, E., see Garcia Macias, J..A., May pp. 46-52.

B

Baik, S., see Lee, J., June pp. 56-63.

Baldwin, D., "Is Computer Science a Relevant Academic Discipline for the 21st Century?," Dec., pp. 81-83.

Banares-Alcantara, R., see Chen, M., Oct. pp. 84-87.

Banavar, G., see Naphade, M., June pp. 32-39.

Banerjee, P., R. Friedrich, C. Bash, P. Goldsack, B. Huberman, J. Manley, C. Patel, P. Ranganathan, and A. Veitch, "Everything as a Service: Powering the New Information Economy," Mar., pp. 36-43.

Barbour, B., see Ricanek Jr., K.R., Sept. pp. 106-108.

Barker, K., see Kerbyson, D., Nov. pp. 37-43.

Bash, C., see Banerjee, P., Mar. pp. 36-43.

Bash, C., see Marwah, M., Aug. pp. 103-106.

Basten, D., and A. Sunyaev, "Guidelines for Software Development Effort Estimation," Oct., pp. 88-90.

Bay, J., see Bryant, J., Aug. pp. 93-95.

Bhattacharya, S., K. Gopinath, K. Rajamani, and M. Gupta, "Software Bloat and Wasted Joules: Is Modularity a Hurdle to Green Software?," Sept., pp. 97-101.

Bimber, O., and C.K. Chang, "Computational Archaeology: Reviving the Past with Present-Day Tools," July, pp. 30-31.

Bollen, J., and H. Mao, "Twitter Mood as a Stock Market Predictor," Oct., pp. 91-94.

Bosch, J., see Capilla, R., Dec. pp. 93-95.

Bose, R., see Gil-Castineira, F., June pp. 48-55.

Bose, R., J. Brakensiek, K. Park, and J. Lester, "Morphing Smartphones into Automotive Application Platforms," May, pp. 53-61.

Bowyer, K.W., "What Surprises Do Identical Twins Have for Identity Science?," July, pp. 100-102.

Bradley, D., "A Personal History of the IBM PC," Aug., pp. 19-25.

Brakensiek, J., see Bose, R., May pp. 53-61.

Breitgand, D., see Rochwerger, B., Mar. pp. 44-51.

Breznitz, D., M. Murphree, and S. Goodman, "Ubiquitous Data Collection: Rethinking Privacy Debates," June, pp. 100-102.

Bride, E., "The IBM Personal Computer: A Software-Driven Market," Aug., pp. 34-39.

Broms, L., see Spagnolli, A., May pp. 38-45.

Broy, M., "Can Practitioners Neglect Theory and Theoreticians Neglect Practice?," Oct., pp. 19-24.

Broyles, D., see Saiedian, H., Sept. pp. 29-36.

Brun, Y., see Medvidovic, N., May pp. 62-71.

Bryant, J., and J. Bay, "Stereoscopic Technologies and Effects," Aug., pp. 93-95.

Butt, A.R., see Lu, Y., Nov. pp. 75-77.

C

Callieri, M., see Scopigno, R., July pp. 48-55.

Cameron, K.W., "Computing's Role in Resource Accounting," Mar., pp. 91-92.

Cameron, K.W., see Larrick, R.P., July pp. 97-99.

Cameron, K.W., see Lu, Y., Nov. pp. 75-77.

Capilla, R., and J. Bosch, "The Promise and Challenge of Runtime Variability," Dec., pp. 93-95.

Carmel, E., see Lacity, M., Dec. pp. 55-62.

Carter, D., see Snider, G., Feb. pp. 21-28.

Catrina, O., see Kerschbaum, F., Sept. pp. 38-43.

Ch'ng, E., H. Chapman, V. Gaffney, P. Murgatroyd, C. Gaffney, and W. Neubauer, "From Sites to Landscapes: How Computing Technology Is Shaping Archaeological Practice," July, pp. 40-46.

Chandler, B., see Snider, G., Feb. pp. 21-28.

Chang, C.K., see Bimber, O., July pp. 30-31.

Chang, C.K., D.M. Weiss, and M. Hinchey, "Where Software Engineering Meets ...," Oct., pp. 17-18.

Chang, J., see Ranganathan, P., May pp. 91-93.

Chapman, H., see Ch'ng, E., July pp. 40-46.

Chen, K., see Ye, J., Apr. pp. 99-101.

Chen, M., A. Trefethen, R. Banares-Alcantara, M. Jirotka, B. Coecke, T. Ertl, and A. Schmidt, "From Data Analysis and Visualization to Causality Discovery," Oct., pp. 84-87.

Chen, T.M., and S. Abu-Nimeh, "Lessons from Stuxnet," Apr., pp. 91-93.

Chen, T., see Abu-Nimeh, S., Sept. pp. 23-28.

Chesnais, A., and S. Reisman, "From the Presidents of the IEEE Computer Society and ACM," Aug., pp. 63-64.

Chung, S.W., see Kim, J.M., Oct. pp. 60-66.

Cignoni, P., see Scopigno, R., July pp. 48-55.

Cimato, S., see Kerschbaum, F., Sept. pp. 38-43.

Clark, J., "Object Digitization for Everyone," Oct., pp. 81-83.

Clayman, S., see Rochwerger, B., Mar. pp. 44-51.

Coecke, B., see Chen, M., Oct. pp. 84-87.

Compano, R., see Gomez-Barroso, J.L., Nov. pp. 83-85.

Conn, R.O., see Stevenson, D.S., Jan. pp. 49-57.

Copeland, P., see Savoia, A., Apr. pp. 56-61.

Corradi, N., see Spagnolli, A., May pp. 38-45.

Correia, M., see Rocha, F., Sept. pp. 44-50.

Corsini, M., see Scopigno, R., July pp. 48-55.

Costa-Montenegro, E., see Gil-Castineira, F., June pp. 48-55.

Cuny, J., "Transforming Computer Science Education in High Schools," June, pp. 107-109.

D

Damiani, E., see Kerschbaum, F., Sept. pp. 38-43.

Das, S., "Transitioning from Microelectronics to Nanoelectronics," Feb., pp. 18-19.

de Hoogh, S., see Kerschbaum, F., Sept. pp. 38-43.

De Turck, F., see Simoens, P., Aug. pp. 46-53.

DeFanti, T., see Petrovic, V., July pp. 56-60.

DeHon, A., and B. Gojman, "Crystals and Snowflakes: Building Computation from Nanowire Crossbars," Feb., pp. 37-45.

Dellepiane, M., see Scopigno, R., July pp. 48-55.

Demeester, P., see Simoens, P., Aug. pp. 46-53.

Denning, P.J., and N. Holmes, "Computer Science: An Interview," Mar., pp. 96, 94-95.

Dhoedt, B., see Simoens, P., Aug. pp. 46-53.

Di Spigna, N., see Schinke, D., Feb. pp. 29-36.

Dinakar, K., see Lieberman, H., Sept. pp. 93-96.

Douglass, J., see Yamaoka, S., Dec. pp. 39-48.

Dromey, R..G., see Myers, T., Apr. pp. 62-70.

Dumbacher, E.D., see Grier, D.A., Apr. pp. 8-10.

E

Edmunds, M., and T. Freeth, "Using Computation to Decode the First Known Computer," July, pp. 32-39.

Edwards, G., see Medvidovic, N., May pp. 62-71.

Eeckhout, L., see Ryckbosch, F., Sept. pp. 69-72.

El Ahmad, A.S., see Yan, J., Feb. pp. 54-60.

Epstein, A., see Rochwerger, B., Mar. pp. 44-51.

Ertl, T., see Chen, M., Oct. pp. 84-87.

Estrada-Martinez, P., see Garcia Macias, J..A., May pp. 46-52.

F

Fabian, R., "Computing Professionals," Feb., pp. 96, 94-95.

Feijoo, C., see Gomez-Barroso, J.L., Nov. pp. 83-85.

Ferguson, N., "Achieving Synergy in the Industry-Academia Relationship," Jan., pp. 90-92.

Ferrari, L., and m. mamei, "Discovering City Dynamics through Sports Tracking Applications," Dec., pp. 63-68.

Fitzgerald, B., "Open Source Software: Lessons from and for Software Engineering," Oct., pp. 25-30.

Fontana, S., "Technology Development as an Alternative to Traditional Technology Transfer Models," Apr., pp. 30-36.

Franzon, P., see Schinke, D., Feb. pp. 29-36.

Freeth, T., see Edmunds, M., July pp. 32-39.

Friedrich, R., see Banerjee, P., Mar. pp. 36-43.

Fritzson, P., see Myers, T., Apr. pp. 62-70.

Fuller, S.H., and L.I. Millett, "Computing Performance: Game Over or Next Level?," Jan., pp. 31-38.

G

Gaff, B.M., and C.J. Toppin, "Ten Things to Know When Applying for a Patent," July, pp. 11-12.

Gaff, B.M., and C.J. Toppin, "Ten Things to Know When Your Patent Application Is Allowed," Sept., pp. 11-13.

Gaff, B.M., and C.J. Toppin, "Ten Things to Know When Your Patent Application Is Pending," Aug., pp. 11-12.

Gaffney, C., see Ch'ng, E., July pp. 40-46.

Gaffney, V., see Ch'ng, E., July pp. 40-46.

Gamberini, L., see Spagnolli, A., May pp. 38-45.

Garber, L., "News Briefs," July, pp. 17-19.

Garber, L., "Turning on the Lights for Wireless Communications," Nov., pp. 11-14.

Garcia Macias, J..A., J. Alvarez-Lozano, P. Estrada-Martinez, and E. Aviles Lopez, "Browsing the Internet of Things with Sentient Visors," May, pp. 46-52.

Garcia, F., see Pardo, C., June pp. 94-96.

Garcia, J., see Medvidovic, N., May pp. 62-71.

Gates, A., R. Romero, M. Alonso Jr., F. Klett, J..F. Romero, and D. Requena, "Cultivating Entrepreneurial Thinking through IEEE-CS Student Chapters," Apr., pp. 48-55.

Geigel, J., M. Schweppe, D. Huynh, and B. Johnstone, "Adapting a Virtual World for Theatrical Performance," Dec., pp. 33-38.

Getov, V., A. Hoisie, and H.J. Wasserman, "Codesign for Systems and Applications: Charting the Path to Exascale Computing," Nov., pp. 19-21.

Getov, V., see Srinivasan, S., Mar. pp. 22-23.

Gidding, A., see Petrovic, V., July pp. 56-60.

Gil-Castineira, F., E. Costa-Montenegro, F. Gonzalez-Castano, C. Lopez-Bravo, T. Ojala, and R. Bose, "Experiences inside the Ubiquitous Oulu Smart City," June, pp. 48-55.

Gojman, B., see DeHon, A., Feb. pp. 37-45.

Goldsack, P., see Banerjee, P., Mar. pp. 36-43.

Gomez-Barroso, J.L., C. Feijoo, and R. Compano, "Opportunities in the Mobile Search Market," Nov., pp. 83-85.

Gonzalez-Castano, F., see Gil-Castineira, F., June pp. 48-55.

Goodman, S., see Breznitz, D., June pp. 100-102.

Gopinath, K., see Bhattacharya, S., Sept. pp. 97-101.

Gorchetchnikov, A., see Snider, G., Feb. pp. 21-28.

Goth, G., "IBM PC Retrospective: There Was Enough Right to Make It Work," Aug., pp. 26-33.

Govindaraju, V., see Menon, V., Sept. pp. 73-79.

Greher, G., see Heines, J., Dec. pp. 25-32.

Guo, B., see Leyvand, T., Apr. pp. 94-96.

Guo, B., see Zhang, D., July pp. 21-28.

Gupta, M., see Bhattacharya, S., Sept. pp. 97-101.

Guzdial, M., "Learning How to Prepare Computer Science High School Teachers," Oct., pp. 95-97.

H

Hadas, D., see Rochwerger, B., Mar. pp. 44-51.

Hahnle, R., see Schaefer, I., Feb. pp. 82-85.

Harman, M., "Software Engineering Meets Evolutionary Computation," Oct., pp. 31-39.

Harrison, C., see Naphade, M., June pp. 32-39.

Heines, J., G. Greher, S. Ruthmann, and B. Reilly, "Two Approaches to Interdisciplinary Computing+Music Courses," Dec., pp. 25-32.

Helal, S., "IT Footprinting - Groundwork for Future Smart Cities," June, pp. 30-31.

Hills, A., "Museums at Your Fingertips," Dec., pp. 87-89.

Hinchey, M., see Vassev, E., Aug. pp. 96-99.

Hinchey, M., see Chang, C.K., Oct. pp. 17-18.

Hirschheim, R., see Welke, R., Feb. pp. 61-67.

Hoe, J., see Sukwong, O., Mar. pp. 63-70.

Hoggan, E., see Spagnolli, A., May pp. 38-45.

Hoggan, E., see Kuikkaniemi, K., June pp. 40-47.

Hoisie, A., see Kerbyson, D., Nov. pp. 37-43.

Hoisie, A., see Getov, V., Nov. pp. 19-21.

Hollar, S., see Miller III, T., Apr. pp. 38-46.

Holmes, N., "Aspects of Data Obesity," May, pp. 104, 102-103.

Holmes, N., see Denning, P.J., Mar. pp. 96, 94-95.

Holmes, N., "Computers and Their Users," Jan., pp. 100, 98-99.

Holmes, N., "Computing and the Step Function," June, pp. 112, 110-111.

Holmes, N., "The Cultural Potential of Keyboards," Aug., pp. 112, 110-111.

Holmes, N., "Digital Machinery and Analog Brains," Oct., pp. 100, 98-99.

Holmes, N., "The Profession and Digital Technology," Dec., pp. 116, 114-115.

Honicky, R., "Understanding and Using Rendezvous to Enhance Mobile Crowdsourcing Applications," June, pp. 22-28.

Huberman, B., see Banerjee, P., Mar. pp. 36-43.

Huntley, C.L., "The Developer's Perspective," May, pp. 88-90.

Huntley, C.L., "Onshore Mobile App Development: Successes and Challenges," Sept., pp. 102-104.

Hurlburt, G., see Laplante, P., Feb. pp. 79-81.

Huynh, D., see Geigel, J., Dec. pp. 33-38.

I

Ierome, S., see Rudin, C., June pp. 103-105.

Iglesias, A., see Moreno, L., May pp. 18-26.

Isaac, D.F., see Rudin, C., June pp. 103-105.

J

Jacucci, G., see Spagnolli, A., May pp. 38-45.

Jacucci, G., see Kuikkaniemi, K., June pp. 40-47.

Jain, A.K., and B. Klare, "Matching Forensic Sketches and Mug Shots to Apprehend Criminals," May, pp. 94-96.

Jang, H.B., see Kim, J.M., Oct. pp. 60-66.

Janssen, C., see Shalf, J., Nov. pp. 22-30.

Jayaraman, B., see Menon, V., Sept. pp. 73-79.

Jirotka, M., see Chen, M., Oct. pp. 84-87.

Johnstone, B., see Geigel, J., Dec. pp. 33-38.

Jones, B., see Lieberman, H., Sept. pp. 93-96.

Jonsson, L., see Spagnolli, A., May pp. 38-45.

K

Kandalla, K.C., see Sur, S., Nov. pp. 31-36.

Karri, R., see Rao, W., Feb. pp. 46-53.

Karri, R., see Tehranipoor, M., July pp. 66-74.

Katzeff, C., see Spagnolli, A., May pp. 38-45.

Kerbyson, D., A. Vishnu, K. Barker, and A. Hoisie, "Codesign Challenges for Exascale Systems: Performance, Power, and Reliability," Nov., pp. 37-43.

Kerschbaum, F., A. Schroepfer, A. Zilli, R. Pibernik, O. Catrina, S. de Hoogh, B. Schoenmakers, S. Cimato, and E. Damiani, "Secure Collaborative Supply-Chain Management," Sept., pp. 38-43.

Kersting, K., see Schmidt,, A., Feb. pp. 86-88.

Khalidi, Y., "Building a Cloud Computing Platform for New Possibilities," Mar., pp. 29-34.

Kim, H., see Sukwong, O., Mar. pp. 63-70.

Kim, J.M., M. Kim, J. Kong, H.B. Jang, and S.W. Chung, "Display Power Management That Detects User Intent," Oct., pp. 60-66.

Kim, M., see Kim, J.M., Oct. pp. 60-66.

Klare, B., see Jain, A.K., May pp. 94-96.

Klett, F., see Gates, A., Apr. pp. 48-55.

Kong, J., see Kim, J.M., Oct. pp. 60-66.

Krka, I., see Medvidovic, N., May pp. 62-71.

Kruger, A., J. Schoning, and P. Olivier, "How Computing Will Change the Face of Retail," Apr., pp. 84-87.

Kuester, F., see Yamaoka, S., Dec. pp. 39-48.

Kuester, F., see Petrovic, V., July pp. 56-60.

Kuikkaniemi, K., G. Jacucci, M. Turpeinen, E. Hoggan, and J. Muller, "From Space to Stage: How Interactive Screens Will Change Urban Life," June, pp. 40-47.

L

Lacity, M., E. Carmel, and J. Rottman, "Rural Outsourcing: Delivering ITO and BPO Services from Remote Domestic Locations," Dec., pp. 55-62.

Lagerspetz, E., see Tarkoma, S., Apr. pp. 22-28.

Lam, S.(.K., and J. Riedl, "Expressing My Inner Gnome: Appearance and Behavior in Virtual Worlds," July, pp. 103-105.

Lam, S.(.K., and J. Riedl, "The Past, Present, and Future of Wikipedia," Mar., pp. 87-90.

Langheinrich, M., see Schmidt,, A., Feb. pp. 86-88.

Laplante, P., G. Hurlburt, K. Miller, and J. Voas, "Certainty through Uncertainty?," Feb., pp. 79-81.

Laplante, P., see Milojicic, D., June pp. 84-88.

Larrick, R.P., and K.W. Cameron, "Consumption-Based Metrics: From Autos to IT," July, pp. 97-99.

Lawton, G., "3D Displays without Glasses: Coming to a Screen near You," Jan., pp. 17-19.

Lawton, G., "4G: Engineering versus Marketing," Mar., pp. 14-16.

Leavitt, N., "Internet Security under Attack: The Undermining of Digital Certificates," Dec., pp. 17-20.

Leavitt, N., "IPv6: Any Closer to Adoption?," Sept., pp. 14-16.

Leavitt, N., "Mobile Security: Finally a Serious Problem?," June, pp. 11-14.

Lee, C., see Lee, J., June pp. 56-63.

Lee, H., see Yeo, S., Aug. pp. 55-62.

Lee, J., S. Baik, and C. Lee, "Building an Integrated Service Management Platform for Ubiquitous Cities," June, pp. 56-63.

Lester, J., see Bose, R., May pp. 53-61.

Leveille, J., see Snider, G., Feb. pp. 21-28.

Levy, E., see Rochwerger, B., Mar. pp. 44-51.

Levy, T., see Petrovic, V., July pp. 56-60.

Leyvand, T., C. Meekhof, Y. Wei, J. Sun, and B. Guo, "Kinect Identity: Technology and Experience," Apr., pp. 94-96.

Li, J., see Ye, J., Apr. pp. 99-101.

Li, R., T. Luo, H. Zha, and W. Lu, "Computer-Assisted Archaeological Line Drawing," July, pp. 62-65.

Lieberman, H., K. Dinakar, and B. Jones, "Let's Gang Up on Cyberbullying," Sept., pp. 93-96.

Lopez, J., see Roman, R., Sept. pp. 51-58.

Lopez-Bravo, C., see Gil-Castineira, F., June pp. 48-55.

Loy, I., see Rochwerger, B., Mar. pp. 44-51.

Lu, W., see Li, R., July pp. 62-65.

Lu, Y., Q. Qiu, A.R. Butt, and K.W. Cameron, "End-to-End Energy Management," Nov., pp. 75-77.

Luo, T., see Li, R., July pp. 62-65.

Lutz, R., "Software Engineering for Space Exploration," Oct., pp. 41-46.

M

Malizia, A., see Olsen, K.A., Nov. pp. 112, 110-111.

Malizia, A., and K.A. Olsen, "Has Everything Been Invented? On Software Development and the Future of Apps," Sept., pp. 112, 110-111.

mamei, m., see Ferrari, L., Dec. pp. 63-68.

Manley, J., see Banerjee, P., Mar. pp. 36-43.

Manovich, L., see Yamaoka, S., Dec. pp. 39-48.

Mao, H., see Bollen, J., Oct. pp. 91-94.

Maraschini, A., see Rochwerger, B., Mar. pp. 44-51.

Marowka, A., "Back to Thin-Core Massively Parallel Processors," Dec., pp. 49-54.

Martinez, P., see Moreno, L., May pp. 18-26.

Marwah, M., A. Shah, C. Bash, C. Patel, and N. Ramakrishnan, "Using Data Mining to Help Design Sustainable Products," Aug., pp. 103-106.

Masli, M., "Crowdsourcing Maps," Nov., pp. 90-93.

Massonet, P., see Rochwerger, B., Mar. pp. 44-51.

Medvidovic, N., H. Tajalli, J. Garcia, I. Krka, Y. Brun, and G. Edwards, "Engineering Heterogeneous Robotics Systems: A Software Architecture-Based Approach," May, pp. 62-71.

Meekhof, C., see Leyvand, T., Apr. pp. 94-96.

Menon, V., B. Jayaraman, and V. Govindaraju, "The Three Rs of Cyberphysical Spaces," Sept., pp. 73-79.

Mens, T., see Vandierendonck, H., Apr. pp. 88-90.

Meschtscherjakov, A., see Tscheligi, M., Aug. pp. 100-102.

Mikkonen, T., and A. Taivalsaari, "Reports of the Web's Death Are Greatly Exaggerated," May, pp. 30-36.

Miller III, T., S. Walsh, S. Hollar, E. Rideout, and B. Pittman, "Engineering and Innovation: An Immersive Start-up Experience," Apr., pp. 38-46.

Miller, K., see Laplante, P., Feb. pp. 79-81.

Millett, L.I., see Fuller, S.H., Jan. pp. 31-38.

Milojicic, D., and R. Wolski, "Eucalyptus: Delivering a Private Cloud," Apr., pp. 102-104.

Milojicic, D., and P. Laplante, "Special Technical Communities," June, pp. 84-88.

Mingolla, E., see Snider, G., Feb. pp. 21-28.

Mirghaemi, M., see Nuti, G., Nov. pp. 61-69.

Mont, M.C., see Squicciarini, A., Jan. pp. 66-73.

Mont, M., see Pearson, S., Sept. pp. 60-68.

Moreno, L., P. Martinez, B. Ruiz, and A. Iglesias, "Toward an Equal Opportunity Web: Applications, Standards, and Tools that Increase Accessibility," May, pp. 18-26.

Morris, C., and K.A. Olsen, "Democracy and Technology," Apr., pp. 108, 106-107.

Morris, R., see Naphade, M., June pp. 32-39.

Mrugalski, G., see Mukherjee, N., June pp. 64-71.

Mukherjee, N., J. Rajski, G. Mrugalski, A. Pogiel, and J. Tyszer, "Ring Generator: An Ultimate Linear Feedback Shift Register," June, pp. 64-71.

Mukherjee, S., "If Anything in This Life Is Certain, It's That You Can Kill Any ISA," Nov., pp. 87-88.

Muller, J., see Kuikkaniemi, K., June pp. 40-47.

Munoz, H., see Rochwerger, B., Mar. pp. 44-51.

Murgatroyd, P., see Ch'ng, E., July pp. 40-46.

Murphree, M., see Breznitz, D., June pp. 100-102.

Myers, T., R..G. Dromey, and P. Fritzson, "Comodeling: From Requirements to an Integrated Software/Hardware Model," Apr., pp. 62-70.

N

Nagin, K., see Rochwerger, B., Mar. pp. 44-51.

Najera, P., see Roman, R., Sept. pp. 51-58.

Naphade, M., G. Banavar, C. Harrison, J. Paraszczak, and R. Morris, "Smarter Cities and Their Innovation Challenges," June, pp. 32-39.

Narasimhan, B., and R. Nichols, "State of Cloud Applications and Platforms: The Cloud Adopters' View," Mar., pp. 24-28.

Neubauer, W., see Ch'ng, E., July pp. 40-46.

Nichols, R., see Narasimhan, B., Mar. pp. 24-28.

Nuti, G., M. Mirghaemi, P. Treleaven, and C. Yingsaeree, "Algorithmic Trading," Nov., pp. 61-69.

O

Ojala, T., see Gil-Castineira, F., June pp. 48-55.

Olden, E., "Architecting a Cloud-Scale Identity Fabric," Mar., pp. 52-59.

Olivier, P., see Kruger, A., Apr. pp. 84-87.

Olsen, K.A., and A. Malizia, "Automated Personal Assistants," Nov., pp. 112, 110-111.

Olsen, K.A., see Morris, C., Apr. pp. 108, 106-107.

Olsen, K.A., see Malizia, A., Sept. pp. 112, 110-111.

Olsen, K.A., "Programmed Politeness," July, pp. 108, 106-107.

Oppliger, R., "Security and Privacy in an Online World," Sept., pp. 21-22.

Orailoglu, A., see Rao, W., Feb. pp. 46-53.

Ortiz Jr., S., "Bringing 3D to the Small Screen," Oct., pp. 11-13.

Ortiz Jr., S., "Chipmakers ARM for Battle in Traditional Computing Market," Apr., pp. 14-17.

Ortiz Jr., S., "Is Peer-to-Peer on the Decline?," Feb., pp. 11-13.

Ortiz Jr., S., "The Problem with Cloud-Computing Standardization," July, pp. 13-16.

P

Padmanabhuni, B., and H.B.K. Tan, "Defending against Buffer-Overflow Vulnerabilities," Nov., pp. 53-60.

Panda, D.K., see Sur, S., Nov. pp. 31-36.

Paraszczak, J., see Naphade, M., June pp. 32-39.

Pardo, C., F.J. Pino, F. Garcia, and M. Piattini, "Harmonizing Quality Assurance Processes and Product Characteristics," June, pp. 94-96.

Park, K., see Bose, R., May pp. 53-61.

Parnas, D., "Software Engineering - Missing in Action: A Personal Perspective," Oct., pp. 54-58.

Passonneau, R.J., see Rudin, C., June pp. 103-105.

Patel, C., see Banerjee, P., Mar. pp. 36-43.

Patel, C., see Marwah, M., Aug. pp. 103-106.

Patrick, S., see Snider, G., Feb. pp. 21-28.

Paulson, L.D., "Accessing the Internet via Overhead Lights," Mar., pp. 18-21.

Paulson, L.D., "IBM Project Proposes Using Light to Make Chips Faster," Feb., pp. 14-17.

Paulson, L.D., "Scanning the Future with New Barcodes," Jan., pp. 20-23.

Paulson, L.D., "Some Users Find the Speed of Light Too Slow for Their Networks," Apr., pp. 18-21.

Pearson, S., and M. Mont, "Sticky Policies: An Approach for Managing Privacy across Multiple Parties," Sept., pp. 60-68.

Petrovic, V., A. Gidding, T. Wypych, F. Kuester, T. DeFanti, and T. Levy, "Dealing with Archaeology's Data Avalanche," July, pp. 56-60.

Phillips, P..J., "Improving Face Recognition Technology," Mar., pp. 84-86.

Piattini, M., see Pardo, C., June pp. 94-96.

Pibernik, R., see Kerschbaum, F., Sept. pp. 38-43.

Pino, F.J., see Pardo, C., June pp. 94-96.

Pittman, B., see Miller III, T., Apr. pp. 38-46.

Pogiel, A., see Mukherjee, N., June pp. 64-71.

Polfliet, S., see Ryckbosch, F., Sept. pp. 69-72.

Ponchio, F., see Scopigno, R., July pp. 48-55.

Potluri, S., see Sur, S., Nov. pp. 31-36.

Q

Qiu, Q., see Lu, Y., Nov. pp. 75-77.

Quinlan, D., see Shalf, J., Nov. pp. 22-30.

Qureshi, M.S., see Snider, G., Feb. pp. 21-28.

R

Radeva, A., see Rudin, C., June pp. 103-105.

Ragusa, C., see Rochwerger, B., Mar. pp. 44-51.

Rajamani, K., see Bhattacharya, S., Sept. pp. 97-101.

Rajasekaran, S.D., see Squicciarini, A., Jan. pp. 66-73.

Rajendran, J., see Tehranipoor, M., July pp. 66-74.

Rajski, J., see Mukherjee, N., June pp. 64-71.

Ramakrishnan, N., see Marwah, M., Aug. pp. 103-106.

Ranganathan, P., see Banerjee, P., Mar. pp. 36-43.

Ranganathan, P., "From Microprocessors to Nanostores: Rethinking Data-Centric Systems," Jan., pp. 39-48.

Ranganathan, P., and J. Chang, "Saving the World, One Server at a Time, Together," May, pp. 91-93.

Ranzuglia, G., see Scopigno, R., July pp. 48-55.

Rao, W., C. Yang, R. Karri, and A. Orailoglu, "Toward Future Systems with Nanoscale Devices: Overcoming the Reliability Challenge," Feb., pp. 46-53.

Reilly, B., see Heines, J., Dec. pp. 25-32.

Reisman, S., see Chesnais, A., Aug. pp. 63-64.

Reisman, S., "Looking Back, Looking Forward," Dec., pp. 8-10.

Reisman, S., "Planning for an Inevitable Future," Jan., pp. 6-8.

Rekimoto, J., see Tamaki, E., Dec. pp. 84-86.

Requena, D., see Gates, A., Apr. pp. 48-55.

Ricanek Jr., K.R., and B. Barbour, "What Are Soft Biometrics and How Can They Be Used?," Sept., pp. 106-108.

Ricanek Jr., K., "Dissecting the Human Identity," Jan., pp. 96-97.

Rideout, E., see Miller III, T., Apr. pp. 38-46.

Riedl, J., see Lam, S.(.K., Mar. pp. 87-90.

Riedl, J., see Lam, S.(.K., July pp. 103-105.

Riedl, J., see Sen, S., May pp. 97-101.

Riedl, J., "The Promise and Peril of Social Computing," Jan., pp. 93-95.

Riehle, D., "Controlling and Steering Open Source Projects," July, pp. 93-96.

Rocha, F., S. Abreu, and M. Correia, "The Final Frontier: Confidentiality and Privacy in the Cloud," Sept., pp. 44-50.

Rochwerger, B., D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, J. Tordsson, C. Ragusa, M. Villari, S. Clayman, E. Levy, A. Maraschini, P. Massonet, H. Munoz, and G. Toffetti, "Reservoir - When One Cloud Is Not Enough," Mar., pp. 44-51.

Roman, R., P. Najera, and J. Lopez, "Securing the Internet of Things," Sept., pp. 51-58.

Romero, J..F., see Gates, A., Apr. pp. 48-55.

Romero, R., see Gates, A., Apr. pp. 48-55.

Rosenfeld, K., see Tehranipoor, M., July pp. 66-74.

Ross, A., and A. Abaza, "Human Ear Recognition," Nov., pp. 79-81.

Rottman, J., see Lacity, M., Dec. pp. 55-62.

Rudin, C., R.J. Passonneau, A. Radeva, S. Ierome, and D.F. Isaac, "21st-Century Data Miners Meet 19th-Century Electrical Cables," June, pp. 103-105.

Ruiz, B., see Moreno, L., May pp. 18-26.

Ruthmann, S., see Heines, J., Dec. pp. 25-32.

Ryckbosch, F., S. Polfliet, and L. Eeckhout, "Trends in Server Energy Proportionality," Sept., pp. 69-72.

S

Saiedian, H., and D. Broyles, "Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives," Sept., pp. 29-36.

Salmani, H., see Tehranipoor, M., July pp. 66-74.

Sarangan, V., see Thiagarajan, G., Jan. pp. 24-30.

Savoia, A., and P. Copeland, "Entrepreneurial Innovation at Google," Apr., pp. 56-61.

Schaefer, I., and R. Hahnle, "Formal Methods in Software Product Line Engineering," Feb., pp. 82-85.

Schaffer, K., "Are Password Requirements too Difficult?," Dec., pp. 90-92.

Schilit, B.N., "Mobile Computing: Looking to the Future," May, pp. 28-29.

Schinke, D., N. Di Spigna, M. Shiveshwarkar, and P. Franzon, "Computing with Novel Floating-Gate Devices," Feb., pp. 29-36.

Schmidt, A., see Chen, M., Oct. pp. 84-87.

Schmidt,, A., M. Langheinrich, and K. Kersting, "Perception beyond the Here and Now," Feb., pp. 86-88.

Schoenmakers, B., see Kerschbaum, F., Sept. pp. 38-43.

Schoning, J., see Kruger, A., Apr. pp. 84-87.

Schroepfer, A., see Kerschbaum, F., Sept. pp. 38-43.

Schwarz, A., see Welke, R., Feb. pp. 61-67.

Schweppe, M., see Geigel, J., Dec. pp. 33-38.

Scopigno, R., M. Callieri, P. Cignoni, M. Corsini, M. Dellepiane, F. Ponchio, and G. Ranzuglia, "3D Models for Cultural Heritage: Beyond Plain Visualization," July, pp. 48-55.

Sen, S., and J. Riedl, "Folksonomy Formation," May, pp. 97-101.

Sethuraman, P., see Thiagarajan, G., Jan. pp. 24-30.

Severance, C., "Toward Developing an Education App Store," Aug., pp. 107-109.

Shah, A., see Marwah, M., Aug. pp. 103-106.

Shalf, J., D. Quinlan, and C. Janssen, "Rethinking Hardware-Software Codesign for Exascale Systems," Nov., pp. 22-30.

Shiveshwarkar, M., see Schinke, D., Feb. pp. 29-36.

Silberman, M..S., see Tomlinson, B., Jan. pp. 87-89.

Simoens, P., F. De Turck, B. Dhoedt, and P. Demeester, "Remote Display Solutions for Mobile Cloud Computing," Aug., pp. 46-53.

Singh, G., "The IBM PC: The Silicon Story," Aug., pp. 40-45.

Sivasubramaniam, A., see Thiagarajan, G., Jan. pp. 24-30.

Sluss Jr., J.J., "Engineering Education Activities in Electric Energy Systems," Apr., pp. 97-98.

Snider, G., R. Amerson, D. Carter, H. Abdalla, M.S. Qureshi, J. Leveille, M. Versace, H. Ames, S. Patrick, B. Chandler, A. Gorchetchnikov, and E. Mingolla, "From Synapses to Circuitry: Using Memristive Memory to Explore the Electronic Brain," Feb., pp. 21-28.

Sobel, A.E.K., "Academic Misconduct in the Early 21st Century," Feb., pp. 89-90.

Solaro, J., "The Kinect Digital Out-of-Box Experience," June, pp. 97-99.

Spagnolli, A., N. Corradi, L. Gamberini, E. Hoggan, G. Jacucci, C. Katzeff, L. Broms, and L. Jonsson, "Eco-Feedback on the Go: Motivating Energy Awareness," May, pp. 38-45.

Squicciarini, A., S.D. Rajasekaran, and M.C. Mont, "Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks," Jan., pp. 66-73.

Srinivasan, S., and V. Getov, "Navigating the Cloud Computing Landscape - Technologies, Services, and Adopters," Mar., pp. 22-23.

Stanzione, D., "The iPlant Collaborative: Cyberinfrastructure to Feed the World," Nov., pp. 44-52.

Sterritt, R., "Apoptotic Computing: Programmed Death by Default for Computer-Based Systems," Jan., pp. 59-65.

Stevenson, D.S., and R.O. Conn, "Bridging the Interconnection Density Gap for Exascale Computation," Jan., pp. 49-57.

Subramoni, H., see Sur, S., Nov. pp. 31-36.

Sukwong, O., H. Kim, and J. Hoe, "Commercial Antivirus Software Effectiveness: An Empirical Study," Mar., pp. 63-70.

Sun, J., see Leyvand, T., Apr. pp. 94-96.

Sung, K., "Recent Videogame Console Technologies," Feb., pp. 91-93.

Sunyaev, A., see Basten, D., Oct. pp. 88-90.

Sur, S., S. Potluri, K.C. Kandalla, H. Subramoni, D.K. Panda, and K. Tomko, "Codesign for InfiniBand Clusters," Nov., pp. 31-36.

Suriyanarayanan, R., see Thiagarajan, G., Jan. pp. 24-30.

T

Taivalsaari, A., see Mikkonen, T., May pp. 30-36.

Tajalli, H., see Medvidovic, N., May pp. 62-71.

Tamaki, E., and J. Rekimoto, "PossessedHand: Controlling Hand Movements with Computer Output," Dec., pp. 84-86.

Tan, H.B.K., see Padmanabhuni, B., Nov. pp. 53-60.

Tarkoma, S., and E. Lagerspetz, "Arching over the Mobile Computing Chasm: Platforms and Runtimes," Apr., pp. 22-28.

Tehranipoor, M., H. Salmani, X. Zhang, X. Wang, R. Karri, J. Rajendran, and K. Rosenfeld, "Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges," July, pp. 66-74.

Thiagarajan, G., V. Sarangan, R. Suriyanarayanan, P. Sethuraman, A. Sivasubramaniam, and A. Yegyanarayanan, "Automating a Building's Carbon Management," Jan., pp. 24-30.

Toffetti, G., see Rochwerger, B., Mar. pp. 44-51.

Tomko, K., see Sur, S., Nov. pp. 31-36.

Tomlinson, B., M..S. Silberman, and J. White, "Can More Efficient IT Be Worse for the Environment?," Jan., pp. 87-89.

Toppin, C.J., see Gaff, B.M., July pp. 11-12.

Toppin, C.J., see Gaff, B.M., Sept. pp. 11-13.

Toppin, C.J., see Gaff, B.M., Aug. pp. 11-12.

Tordsson, J., see Rochwerger, B., Mar. pp. 44-51.

Trefethen, A., see Chen, M., Oct. pp. 84-87.

Treleaven, P., see Nuti, G., Nov. pp. 61-69.

Tscheligi, M., A. Meschtscherjakov, and D. Wilfinger, "Interactive Computing on Wheels," Aug., pp. 100-102.

Turpeinen, M., see Kuikkaniemi, K., June pp. 40-47.

Tyszer, J., see Mukherjee, N., June pp. 64-71.

V

Vandierendonck, H., and T. Mens, "Averting the Next Software Crisis," Apr., pp. 88-90.

Vasan, R., "A Venture Perspective on Cloud Computing," Mar., pp. 60-62.

Vassev, E., and M. Hinchey, "Knowledge Representation and Reasoning for Intelligent Software Systems," Aug., pp. 96-99.

Vaughan-Nichols, S.J., "OpenFlow: The Next Generation of the Network?," Aug., pp. 13-15.

Veitch, A., see Banerjee, P., Mar. pp. 36-43.

Versace, M., see Snider, G., Feb. pp. 21-28.

Vetter, R., "Print, Mobile, and Online," Jan., pp. 9-11.

Villari, M., see Rochwerger, B., Mar. pp. 44-51.

Vishnu, A., see Kerbyson, D., Nov. pp. 37-43.

Voas, J., see Laplante, P., Feb. pp. 79-81.

W

Walsh, S., see Miller III, T., Apr. pp. 38-46.

Wang, X., see Tehranipoor, M., July pp. 66-74.

Ward, B., "Call and Calendar," May, pp. 86-87.

Ward, B., "Chen, Hescott Win Society Education Awards," Mar., pp. 71-73.

Ward, B., "Kuck Receives Computer Pioneer Award," June, pp. 89-91.

Ward, B., "Akyildiz Wins W. Wallace McDowell Award," Apr., pp. 71-73.

Ward, B., "Call and Calendar," June, pp. 92-93.

Ward, B., "Computer Highlights Society Magazines," July, pp. 4-5.

Ward, B., "Grid Pioneer Foster Named 2011 Kanai Award Winner," May, pp. 83-85.

Ward, B., "Tom Williams Wins TTTC Award," Feb., pp. 74-76.

Wasserman, H.J., see Getov, V., Nov. pp. 19-21.

Wei, Y., see Leyvand, T., Apr. pp. 94-96.

Weiss, D.M., see Chang, C.K., Oct. pp. 17-18.

Welke, R., R. Hirschheim, and A. Schwarz, "Service-Oriented Architecture Maturity," Feb., pp. 61-67.

White, J., see Tomlinson, B., Jan. pp. 87-89.

Wilfinger, D., see Tscheligi, M., Aug. pp. 100-102.

Wolski, R., see Milojicic, D., Apr. pp. 102-104.

World, L., "Forecasting in Geologic Time: The Tohoku Quake and Tsunami," May, pp. 11-13.

Wu, T., see Ye, J., Apr. pp. 99-101.

Wypych, T., see Petrovic, V., July pp. 56-60.

Y

Yamaoka, S., L. Manovich, J. Douglass, and F. Kuester, "Cultural Analytics in Large-Scale Visualization Environments," Dec., pp. 39-48.

Yan, J., and A.S. El Ahmad, "Captcha Robustness: A Security Engineering Perspective," Feb., pp. 54-60.

Yang, C., see Rao, W., Feb. pp. 46-53.

Yau, S., and H. An, "Software Engineering Meets Services and Cloud Computing," Oct., pp. 47-53.

Ye, J., T. Wu, J. Li, and K. Chen, "Machine Learning Approaches for the Neuroimaging Study of Alzheimer's Disease," Apr., pp. 99-101.

Yegyanarayanan, A., see Thiagarajan, G., Jan. pp. 24-30.

Yeo, S., and H. Lee, "Using Mathematical Modeling in Provisioning a Heterogeneous Cloud Computing Environment," Aug., pp. 55-62.

Yingsaeree, C., see Nuti, G., Nov. pp. 61-69.

Yu, Z., see Zhang, D., July pp. 21-28.

Z

Zha, H., see Li, R., July pp. 62-65.

Zhang, D., B. Guo, and Z. Yu, "The Emergence of Social and Community Intelligence," July, pp. 21-28.

Zhang, X., see Tehranipoor, M., July pp. 66-74.

Zilli, A., see Kerschbaum, F., Sept. pp. 38-43.

Subject Index

3D

3D Digitization

"Computer-Assisted Archaeological Line Drawing," R. Li, T. Luo, H. Zha, and W. Lu, July, pp. 62-65.

3D Display

"3D Displays without Glasses: Coming to a Screen near You," G. Lawton, Jan., pp. 17-19.

3D Silicon Interposers

"Bridging the Interconnection Density Gap for Exascale Computation," D.S. Stevenson, and R.O. Conn, Jan., pp. 49-57.

A

Algorithms

"Algorithmic Trading," G. Nuti, M. Mirghaemi, P. Treleaven, and C. Yingsaeree, Nov., pp. 61-69.

C

Cloud Computing

"Architecting a Cloud-Scale Identity Fabric," E. Olden, Mar., pp. 52-59.

"Building a Cloud Computing Platform for New Possibilities," Y. Khalidi, Mar., pp. 29-34.

"Eucalyptus: Delivering a Private Cloud," D. Milojicic, and R. Wolski, Apr., pp. 102-104.

"Everything as a Service: Powering the New Information Economy," P. Banerjee, R. Friedrich, C. Bash, P. Goldsack, B. Huberman, J. Manley, C. Patel, P. Ranganathan, and A. Veitch, Mar., pp. 36-43.

"The Final Frontier: Confidentiality and Privacy in the Cloud," F. Rocha, S. Abreu, and M. Correia, Sept., pp. 44-50.

"Navigating the Cloud Computing Landscape - Technologies, Services, and Adopters," S. Srinivasan, and V. Getov, Mar., pp. 22-23.

"The Problem with Cloud-Computing Standardization," S. Ortiz Jr., July, pp. 13-16.

"Reservoir - When One Cloud Is Not Enough," B. Rochwerger, D. Breitgand, A. Epstein, D. Hadas, I. Loy, K. Nagin, J. Tordsson, C. Ragusa, M. Villari, S. Clayman, E. Levy, A. Maraschini, P. Massonet, H. Munoz, and G. Toffetti, Mar., pp. 44-51.

"State of Cloud Applications and Platforms: The Cloud Adopters' View," B. Narasimhan, and R. Nichols, Mar., pp. 24-28.

"Using Mathematical Modeling in Provisioning a Heterogeneous Cloud Computing Environment," S. Yeo, and H. Lee, Aug., pp. 55-62.

"A Venture Perspective on Cloud Computing," R. Vasan, Mar., pp. 60-62.

Codesign

"Codesign for InfiniBand Clusters," S. Sur, S. Potluri, K.C. Kandalla, H. Subramoni, D.K. Panda, and K. Tomko, Nov., pp. 31-36.

"Codesign for Systems and Applications: Charting the Path to Exascale Computing," V. Getov, A. Hoisie, and H.J. Wasserman, Nov., pp. 19-21.

Computational Archaeology

"3D Models for Cultural Heritage: Beyond Plain Visualization," R. Scopigno, M. Callieri, P. Cignoni, M. Corsini, M. Dellepiane, F. Ponchio, and G. Ranzuglia, July, pp. 48-55.

"Computational Archaeology: Reviving the Past with Present-Day Tools," O. Bimber, and C.K. Chang, July, pp. 30-31.

"From Sites to Landscapes: How Computing Technology Is Shaping Archaeological Practice," E. Ch'ng, H. Chapman, V. Gaffney, P. Murgatroyd, C. Gaffney, and W. Neubauer, July, pp. 40-46.

"Using Computation to Decode the First Known Computer," M. Edmunds, and T. Freeth, July, pp. 32-39.

Computational Intelligence

"The Emergence of Social and Community Intelligence," D. Zhang, B. Guo, and Z. Yu, July, pp. 21-28.

"From Synapses to Circuitry: Using Memristive Memory to Explore the Electronic Brain," G. Snider, R. Amerson, D. Carter, H. Abdalla, M.S. Qureshi, J. Leveille, M. Versace, H. Ames, S. Patrick, B. Chandler, A. Gorchetchnikov, and E. Mingolla, Feb., pp. 21-28.

Computer Security

"Captcha Robustness: A Security Engineering Perspective," J. Yan, and A.S. El Ahmad, Feb., pp. 54-60.

"Defending against Buffer-Overflow Vulnerabilities," B. Padmanabhuni, and H.B.K. Tan, Nov., pp. 53-60.

"Secure Collaborative Supply-Chain Management," F. Kerschbaum, A. Schroepfer, A. Zilli, R. Pibernik, O. Catrina, S. de Hoogh, B. Schoenmakers, S. Cimato, and E. Damiani, Sept., pp. 38-43.

"Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges," M. Tehranipoor, H. Salmani, X. Zhang, X. Wang, R. Karri, J. Rajendran, and K. Rosenfeld, July, pp. 66-74.

Computers and Society

"Leisure Science," D. Alan Grier, Sept., pp. 6-8.

"Automated Personal Assistants," K.A. Olsen, and A. Malizia, Nov., pp. 112, 110-111.

"Computers and Their Users," N. Holmes, Jan., pp. 100, 98-99.

"Computing Professionals," R. Fabian, Feb., pp. 96, 94-95.

"The Habit of Change," D. Alan Grier, Oct., pp. 6-8.

"The Honest Give-and-Take," D. Alan Grier, Nov., pp. 6-8.

"Uncharted Territory," D. Alan Grier, Dec., pp. 12-14.

Computing and the Arts

"Adapting a Virtual World for Theatrical Performance," J. Geigel, M. Schweppe, D. Huynh, and B. Johnstone, Dec., pp. 33-38.

"Cultural Analytics in Large-Scale Visualization Environments," S. Yamaoka, L. Manovich, J. Douglass, and F. Kuester, Dec., pp. 39-48.

"Two Approaches to Interdisciplinary Computing+Music Courses," J. Heines, G. Greher, S. Ruthmann, and B. Reilly, Dec., pp. 25-32.

Computing and the Law

"If Anything in This Life Is Certain, It's That You Can Kill Any ISA," S. Mukherjee, Nov., pp. 87-88.

"Ten Things to Know When Your Patent Application Is Allowed," B.M. Gaff, and C.J. Toppin, Sept., pp. 11-13.

Computing Profession

"Aspects of Data Obesity," N. Holmes, May, pp. 104, 102-103.

"The Chicken Bus," D. Alan Grier, Aug., pp. 6-8.

"Computer Science: An Interview," P.J. Denning, and N. Holmes, Mar., pp. 96, 94-95.

"Computing and the Step Function," N. Holmes, June, pp. 112, 110-111.

"The Cultural Potential of Keyboards," N. Holmes, Aug., pp. 112, 110-111.

"Democracy and Technology," C. Morris, and K.A. Olsen, Apr., pp. 108, 106-107.

"Digital Machinery and Analog Brains," N. Holmes, Oct., pp. 100, 98-99.

"Dumb Grids and Smart Markets," D. Alan Grier, June, pp. 6-8.

"Experienced Hands," D. Alan Grier, July, pp. 6-8.

"Has Everything Been Invented? On Software Development and the Future of Apps," A. Malizia, and K.A. Olsen, Sept., pp. 112, 110-111.

"The Migration to the Middle," D. Alan Grier, Jan., pp. 12-14.

"Not for All Markets," D. Alan Grier, May, pp. 6-8.

"The Profession and Digital Technology," N. Holmes, Dec., pp. 116, 114-115.

"Programmed Politeness," K.A. Olsen, July, pp. 108, 106-107.

"Ten Things to Know When Applying for a Patent," B.M. Gaff, and C.J. Toppin, July, pp. 11-12.

"Ten Things to Know When Your Patent Application Is Pending," B.M. Gaff, and C.J. Toppin, Aug., pp. 11-12.

"A Very Bad Idea," D. Alan Grier, Feb., pp. 6-8.

"The Voice of Wisdom," D. Alan Grier, Mar., pp. 8-10.

"Where Are You From?," D. Alan Grier, and E.D. Dumbacher, Apr., pp. 8-10.

Cyberphysical Spaces

"The Three Rs of Cyberphysical Spaces," V. Menon, B. Jayaraman, and V. Govindaraju, Sept., pp. 73-79.

D

Discovery Analytics

"21st-Century Data Miners Meet 19th-Century Electrical Cables," C. Rudin, R.J. Passonneau, A. Radeva, S. Ierome, and D.F. Isaac, June, pp. 103-105.

"Twitter Mood as a Stock Market Predictor," J. Bollen, and H. Mao, Oct., pp. 91-94.

"Using Data Mining to Help Design Sustainable Products," M. Marwah, A. Shah, C. Bash, C. Patel, and N. Ramakrishnan, Aug., pp. 103-106.

"Using Process Mining to Bridge the Gap between BI and BPM," W.v.d. Aalst, Dec., pp. 77-80.

E

Education

"Academic Misconduct in the Early 21st Century," A.E.K. Sobel, Feb., pp. 89-90.

"Engineering Education Activities in Electric Energy Systems," J.J. Sluss Jr., Apr., pp. 97-98.

"Is Computer Science a Relevant Academic Discipline for the 21st Century?," D. Baldwin, Dec., pp. 81-83.

"Learning How to Prepare Computer Science High School Teachers," M. Guzdial, Oct., pp. 95-97.

"Toward Developing an Education App Store," C. Severance, Aug., pp. 107-109.

"Transforming Computer Science Education in High Schools," J. Cuny, June, pp. 107-109.

Emerging Technologies

"Apoptotic Computing: Programmed Death by Default for Computer-Based Systems," R. Sterritt, Jan., pp. 59-65.

Energy Awareness

"Display Power Management That Detects User Intent," J.M. Kim, M. Kim, J. Kong, H.B. Jang, and S.W. Chung, Oct., pp. 60-66.

"Eco-Feedback on the Go: Motivating Energy Awareness," A. Spagnolli, N. Corradi, L. Gamberini, E. Hoggan, G. Jacucci, C. Katzeff, L. Broms, and L. Jonsson, May, pp. 38-45.

"Trends in Server Energy Proportionality," F. Ryckbosch, S. Polfliet, and L. Eeckhout, Sept., pp. 69-72.

Engineering Entrepreneurship

"Cultivating Entrepreneurial Thinking through IEEE-CS Student Chapters," A. Gates, R. Romero, M. Alonso Jr., F. Klett, J..F. Romero, and D. Requena, Apr., pp. 48-55.

"Engineering and Innovation: An Immersive Start-up Experience," T. Miller III, S. Walsh, S. Hollar, E. Rideout, and B. Pittman, Apr., pp. 38-46.

"Entrepreneurial Innovation at Google," A. Savoia, and P. Copeland, Apr., pp. 56-61.

Entertainment Computing

"The Kinect Digital Out-of-Box Experience," J. Solaro, June, pp. 97-99.

"Kinect Identity: Technology and Experience," T. Leyvand, C. Meekhof, Y. Wei, J. Sun, and B. Guo, Apr., pp. 94-96.

"Museums at Your Fingertips," A. Hills, Dec., pp. 87-89.

"Object Digitization for Everyone," J. Clark, Oct., pp. 81-83.

"Recent Videogame Console Technologies," K. Sung, Feb., pp. 91-93.

"Stereoscopic Technologies and Effects," J. Bryant, and J. Bay, Aug., pp. 93-95.

G

Green IT

"Can More Efficient IT Be Worse for the Environment?," B. Tomlinson, M..S. Silberman, and J. White, Jan., pp. 87-89.

"Computing's Role in Resource Accounting," K.W. Cameron, Mar., pp. 91-92.

"Consumption-Based Metrics: From Autos to IT," R.P. Larrick, and K.W. Cameron, July, pp. 97-99.

"End-to-End Energy Management," Y. Lu, Q. Qiu, A.R. Butt, and K.W. Cameron, Nov., pp. 75-77.

"Saving the World, One Server at a Time, Together," P. Ranganathan, and J. Chang, May, pp. 91-93.

"Software Bloat and Wasted Joules: Is Modularity a Hurdle to Green Software?," S. Bhattacharya, K. Gopinath, K. Rajamani, and M. Gupta, Sept., pp. 97-101.

H

Harmonization of Models and Standards

"Harmonizing Quality Assurance Processes and Product Characteristics," C. Pardo, F.J. Pino, F. Garcia, and M. Piattini, June, pp. 94-96.

High-Performance Computing

"Codesign Challenges for Exascale Systems: Performance, Power, and Reliability," D. Kerbyson, A. Vishnu, K. Barker, and A. Hoisie, Nov., pp. 37-43.

"The iPlant Collaborative: Cyberinfrastructure to Feed the World," D. Stanzione, Nov., pp. 44-52.

"Rethinking Hardware-Software Codesign for Exascale Systems," J. Shalf, D. Quinlan, and C. Janssen, Nov., pp. 22-30.

History of Computing

"A Personal History of the IBM PC," D. Bradley, Aug., pp. 19-25.

"IBM PC Retrospective: There Was Enough Right to Make It Work," G. Goth, Aug., pp. 26-33.

"The IBM PC: The Silicon Story," G. Singh, Aug., pp. 40-45.

I

Identity Sciences

"Dissecting the Human Identity," K. Ricanek Jr., Jan., pp. 96-97.

"Human Ear Recognition," A. Ross, and A. Abaza, Nov., pp. 79-81.

"Improving Face Recognition Technology," P..J. Phillips, Mar., pp. 84-86.

"Matching Forensic Sketches and Mug Shots to Apprehend Criminals," A.K. Jain, and B. Klare, May, pp. 94-96.

"What Are Soft Biometrics and How Can They Be Used?," K.R. Ricanek Jr., and B. Barbour, Sept., pp. 106-108.

"What Surprises Do Identical Twins Have for Identity Science?," K.W. Bowyer, July, pp. 100-102.

IEEE Computer Society

"Akyildiz Wins W. Wallace McDowell Award," B. Ward, Apr., pp. 71-73.

"Chen, Hescott Win Society Education Awards," B. Ward, Mar., pp. 71-73.

"From the Presidents of the IEEE Computer Society and ACM," A. Chesnais, and S. Reisman, Aug., pp. 63-64.

"Grid Pioneer Foster Named 2011 Kanai Award Winner," B. Ward, May, pp. 83-85.

"Kuck Receives Computer Pioneer Award," B. Ward, June, pp. 89-91.

"Looking Back, Looking Forward," S. Reisman, Dec., pp. 8-10.

"Planning for an Inevitable Future," S. Reisman, Jan., pp. 6-8.

"Print, Mobile, and Online," R. Vetter, Jan., pp. 9-11.

"Special Technical Communities," D. Milojicic, and P. Laplante, June, pp. 84-88.

"Tom Williams Wins TTTC Award," B. Ward, Feb., pp. 74-76.

Industry Perspective

"Achieving Synergy in the Industry-Academia Relationship," N. Ferguson, Jan., pp. 90-92.

Internet Applications

"Browsing the Internet of Things with Sentient Visors," J..A. Garcia Macias, J. Alvarez-Lozano, P. Estrada-Martinez, and E. Aviles Lopez, May, pp. 46-52.

"Securing the Internet of Things," R. Roman, P. Najera, and J. Lopez, Sept., pp. 51-58.

"Toward an Equal Opportunity Web: Applications, Standards, and Tools that Increase Accessibility," L. Moreno, P. Martinez, B. Ruiz, and A. Iglesias, May, pp. 18-26.

Invisible Computing

"From Data Analysis and Visualization to Causality Discovery," M. Chen, A. Trefethen, R. Banares-Alcantara, M. Jirotka, B. Coecke, T. Ertl, and A. Schmidt, Oct., pp. 84-87.

"How Computing Will Change the Face of Retail," A. Kruger, J. Schoning, and P. Olivier, Apr., pp. 84-87.

"Interactive Computing on Wheels," M. Tscheligi, A. Meschtscherjakov, and D. Wilfinger, Aug., pp. 100-102.

"Morphing Smartphones into Automotive Application Platforms," R. Bose, J. Brakensiek, K. Park, and J. Lester, May, pp. 53-61.

"PossessedHand: Controlling Hand Movements with Computer Output," E. Tamaki, and J. Rekimoto, Dec., pp. 84-86.

IT

"Automating a Building's Carbon Management," G. Thiagarajan, V. Sarangan, R. Suriyanarayanan, P. Sethuraman, A. Sivasubramaniam, and A. Yegyanarayanan, Jan., pp. 24-30.

"Computing Performance: Game Over or Next Level?," S.H. Fuller, and L.I. Millett, Jan., pp. 31-38.

"From Microprocessors to Nanostores: Rethinking Data-Centric Systems," P. Ranganathan, Jan., pp. 39-48.

"Rural Outsourcing: Delivering ITO and BPO Services from Remote Domestic Locations," M. Lacity, E. Carmel, and J. Rottman, Dec., pp. 55-62.

L

Linear Feedback Shift Registers

"Ring Generator: An Ultimate Linear Feedback Shift Register," N. Mukherjee, J. Rajski, G. Mrugalski, A. Pogiel, and J. Tyszer, June, pp. 64-71.

Lithography

"Crystals and Snowflakes: Building Computation from Nanowire Crossbars," A. DeHon, and B. Gojman, Feb., pp. 37-45.

M

Machine Learning Techniques

"Machine Learning Approaches for the Neuroimaging Study of Alzheimer's Disease," J. Ye, T. Wu, J. Li, and K. Chen, Apr., pp. 99-101.

Microcomputers

"The IBM Personal Computer: A Software-Driven Market," E. Bride, Aug., pp. 34-39.

"Toward Future Systems with Nanoscale Devices: Overcoming the Reliability Challenge," W. Rao, C. Yang, R. Karri, and A. Orailoglu, Feb., pp. 46-53.

"Transitioning from Microelectronics to Nanoelectronics," S. Das, Feb., pp. 18-19.

Middleware

"Arching over the Mobile Computing Chasm: Platforms and Runtimes," S. Tarkoma, and E. Lagerspetz, Apr., pp. 22-28.

Mobile Computing

"Bringing 3D to the Small Screen," S. Ortiz Jr., Oct., pp. 11-13.

"Mobile Computing: Looking to the Future," B.N. Schilit, May, pp. 28-29.

"Mobile Security: Finally a Serious Problem?," N. Leavitt, June, pp. 11-14.

"Opportunities in the Mobile Search Market," J.L. Gomez-Barroso, C. Feijoo, and R. Compano, Nov., pp. 83-85.

"Remote Display Solutions for Mobile Cloud Computing," P. Simoens, F. De Turck, B. Dhoedt, and P. Demeester, Aug., pp. 46-53.

"Reports of the Web's Death Are Greatly Exaggerated," T. Mikkonen, and A. Taivalsaari, May, pp. 30-36.

Modeling and Simulation

"Dealing with Archaeology's Data Avalanche," V. Petrovic, A. Gidding, T. Wypych, F. Kuester, T. DeFanti, and T. Levy, July, pp. 56-60.

"Discovering City Dynamics through Sports Tracking Applications," L. Ferrari, and m. mamei, Dec., pp. 63-68.

"Forecasting in Geologic Time: The Tohoku Quake and Tsunami," L. World, May, pp. 11-13.

N

News

"4G: Engineering versus Marketing," G. Lawton, Mar., pp. 14-16.

"Accessing the Internet via Overhead Lights," L.D. Paulson, Mar., pp. 18-21.

"Chipmakers ARM for Battle in Traditional Computing Market," S. Ortiz Jr., Apr., pp. 14-17.

"IBM Project Proposes Using Light to Make Chips Faster," L.D. Paulson, Feb., pp. 14-17.

"Internet Security under Attack: The Undermining of Digital Certificates," N. Leavitt, Dec., pp. 17-20.

"IPv6: Any Closer to Adoption?," N. Leavitt, Sept., pp. 14-16.

"Is Peer-to-Peer on the Decline?," S. Ortiz Jr., Feb., pp. 11-13.

"OpenFlow: The Next Generation of the Network?," S.J. Vaughan-Nichols, Aug., pp. 13-15.

"Scanning the Future with New Barcodes," L.D. Paulson, Jan., pp. 20-23.

"Some Users Find the Speed of Light Too Slow for Their Networks," L.D. Paulson, Apr., pp. 18-21.

O

Open Source Software

"Controlling and Steering Open Source Projects," D. Riehle, July, pp. 93-96.

"Open Source Software: Lessons from and for Software Engineering," B. Fitzgerald, Oct., pp. 25-30.

Operating Systems

"Commercial Antivirus Software Effectiveness: An Empirical Study," O. Sukwong, H. Kim, and J. Hoe, Mar., pp. 63-70.

P

Processor Architectures

"Back to Thin-Core Massively Parallel Processors," A. Marowka, Dec., pp. 49-54.

S

Security

"Are Password Requirements too Difficult?," K. Schaffer, Dec., pp. 90-92.

"Call and Calendar," B. Ward, May, pp. 86-87.

"Certainty through Uncertainty?," P. Laplante, G. Hurlburt, K. Miller, and J. Voas, Feb., pp. 79-81.

"Lessons from Stuxnet," T.M. Chen, and S. Abu-Nimeh, Apr., pp. 91-93.

"Malicious and Spam Posts in Online Social Networks," S. Abu-Nimeh, T. Chen, and O. Alzubi, Sept., pp. 23-28.

"Security and Privacy in an Online World," R. Oppliger, Sept., pp. 21-22.

"Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives," H. Saiedian, and D. Broyles, Sept., pp. 29-36.

"Sticky Policies: An Approach for Managing Privacy across Multiple Parties," S. Pearson, and M. Mont, Sept., pp. 60-68.

"Ubiquitous Data Collection: Rethinking Privacy Debates," D. Breznitz, M. Murphree, and S. Goodman, June, pp. 100-102.

Service-Oriented Architecture

"Service-Oriented Architecture Maturity," R. Welke, R. Hirschheim, and A. Schwarz, Feb., pp. 61-67.

Smart Cities

"Building an Integrated Service Management Platform for Ubiquitous Cities," J. Lee, S. Baik, and C. Lee, June, pp. 56-63.

"From Space to Stage: How Interactive Screens Will Change Urban Life," K. Kuikkaniemi, G. Jacucci, M. Turpeinen, E. Hoggan, and J. Muller, June, pp. 40-47.

"IT Footprinting - Groundwork for Future Smart Cities," S. Helal, June, pp. 30-31.

"Smarter Cities and Their Innovation Challenges," M. Naphade, G. Banavar, C. Harrison, J. Paraszczak, and R. Morris, June, pp. 32-39.

Social Computing

"The Promise and Peril of Social Computing," J. Riedl, Jan., pp. 93-95.

"Crowdsourcing Maps," M. Masli, Nov., pp. 90-93.

"Expressing My Inner Gnome: Appearance and Behavior in Virtual Worlds," S.(.K. Lam, and J. Riedl, July, pp. 103-105.

"Folksonomy Formation," S. Sen, and J. Riedl, May, pp. 97-101.

"Let's Gang Up on Cyberbullying," H. Lieberman, K. Dinakar, and B. Jones, Sept., pp. 93-96.

"The Past, Present, and Future of Wikipedia," S.(.K. Lam, and J. Riedl, Mar., pp. 87-90.

"Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks," A. Squicciarini, S.D. Rajasekaran, and M.C. Mont, Jan., pp. 66-73.

Software Technologies

"Averting the Next Software Crisis," H. Vandierendonck, and T. Mens, Apr., pp. 88-90.

"Can Practitioners Neglect Theory and Theoreticians Neglect Practice?," M. Broy, Oct., pp. 19-24.

"Engineering Heterogeneous Robotics Systems: A Software Architecture-Based Approach," N. Medvidovic, H. Tajalli, J. Garcia, I. Krka, Y. Brun, and G. Edwards, May, pp. 62-71.

"Guidelines for Software Development Effort Estimation," D. Basten, and A. Sunyaev, Oct., pp. 88-90.

"Formal Methods in Software Product Line Engineering," I. Schaefer, and R. Hahnle, Feb., pp. 82-85.

"Knowledge Representation and Reasoning for Intelligent Software Systems," E. Vassev, and M. Hinchey, Aug., pp. 96-99.

"Onshore Mobile App Development: Successes and Challenges," C.L. Huntley, Sept., pp. 102-104.

"The Promise and Challenge of Runtime Variability," R. Capilla, and J. Bosch, Dec., pp. 93-95.

"Software Engineering - Missing in Action: A Personal Perspective," D. Parnas, Oct., pp. 54-58.

"Software Engineering for Space Exploration," R. Lutz, Oct., pp. 41-46.

"Software Engineering Meets Evolutionary Computation," M. Harman, Oct., pp. 31-39.

"Software Engineering Meets Services and Cloud Computing," S. Yau, and H. An, Oct., pp. 47-53.

"Where Software Engineering Meets ...," C.K. Chang, D.M. Weiss, and M. Hinchey, Oct., pp. 17-18.

Systems Development

"Comodeling: From Requirements to an Integrated Software/Hardware Model," T. Myers, R..G. Dromey, and P. Fritzson, Apr., pp. 62-70.

"The Developer's Perspective," C.L. Huntley, May, pp. 88-90.

T

Technology Transfer

"Technology Development as an Alternative to Traditional Technology Transfer Models," S. Fontana, Apr., pp. 30-36.

U

Ubiquitous Computing

"Experiences inside the Ubiquitous Oulu Smart City," F. Gil-Castineira, E. Costa-Montenegro, F. Gonzalez-Castano, C. Lopez-Bravo, T. Ojala, and R. Bose, June, pp. 48-55.

"Perception beyond the Here and Now," A. Schmidt, M. Langheinrich, and K. Kersting, Feb., pp. 86-88.

"Understanding and Using Rendezvous to Enhance Mobile Crowdsourcing Applications," R. Honicky, June, pp. 22-28.

Unified Memory

"Computing with Novel Floating-Gate Devices," D. Schinke, N. Di Spigna, M. Shiveshwarkar, and P. Franzon, Feb., pp. 29-36.