Advanced Search 
Computer
June 2012 (vol. 45 no. 6)
ISSN: 0018-9162
Table of Contents
News Briefs
Elsewhere in the CS
Computing Conversations
Computing and the Law
Brian M. Gaff, Edwards Wildman Palmer LLP
Gregory J. Ploussios, Edwards Wildman Palmer LLP
pp. 9-11
32 & 16 Years Ago
Technology News
Guest Editors' Introduction
Carl Chang, Iowa State University
Vladimir Getov, University of Westminster, London
Kelvin Sung, University of Washington Bothell
pp. 23-25
Cover Feature
Hong Mei, Peking University, China
Gang Huang, Peking University, China
Tao Xie, Peking University, China
pp. 26-31
Mikio Aoyama, Nanzan University, Japan
pp. 32-37
Lijuan Wang, Microsoft Research Asia, Beijing
Yao Qian, Microsoft Research Asia, Beijing
Matthew Scott, Microsoft Research Asia, Beijing
Gang Chen, Microsoft Research Asia, Beijing
Frank Soong, Microsoft Research Asia, Beijing
pp. 38-47
Chih-Hung Chang, Hsiuping Univ. of Sci. & Technol., Taichung, Taiwan
Chao-Tung Yang, Hsiuping Univ. of Sci. & Technol., Taichung, Taiwan
Chih-Wei Lu, Hsiuping Univ. of Sci. & Technol., Taichung, Taiwan
Juei-Nan Chen, Tunghai Univ., Taiwan
Pao-Ann Hsiung, Nat. Chung Cheng Univ., Chiayi, Taiwan
William Cheng-Chung Chu, Tunghai Univ., Taiwan
Hahn-Ming Lee, Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan
pp. 48-56
Wing-Kin Sung, National University of Singapore
pp. 57-63
Zhenyu Zhang, Institute of Software, Chinese Academy of Sciences, Beijing
W.K. Chan, City University of Hong Kong, Kowloon Tong
T.H. Tse, The University of Hong Kong, Pokfulam
pp. 64-71
Perspectives
Research Feature
Virginia N.L. Franqueira, VF InfoSec Consulting
Roel J. Wieringa, University of Twente, Netherlands
pp. 81-88
Entertainment Computing
Jeff Munson, University of Washington
Phillip Pasqual, University of Washington
pp. 89-91
Software Technologies
Devon M. Simmonds, University of North Carolina Wilmington
pp. 93-95
Education
Invisible Computing
Robert Harle, University of Cambridge
Andy Hopper, University of Cambridge
pp. 98-101
Security
Rolf Oppliger, eSECURITY Technologies
Bruno Wildhaber, Wildhaber Consulting
pp. 102-104
Computer Society Connection
Call and Calendar
Forward Slash
Usage of this product signifies your acceptance of the Terms of Use.