AUTHOR INDEX

A

Ahn, Gahng-Seop, see Campbell, Andrew T.

Al-Masri, Eyhab, and Qusay H. Mahmoud, "Discovering Web Services in Search Engines," May/June, pp. 74–77.

Andersson, Loa, and Stewart Bryant, "The IETF Multiprotocol Label Switching Standard: The MPLS Transport Profile Case," July/Aug., pp. 69–73.

Arenas, Alvaro, Michael Wilson, Shirley Crompton, Dana Cojocarasu, Tobias Mahler, and Lutz Schubert, "Bridging the Gap between Legal and Technical Contracts," Mar./Apr., pp. 13–19.

Ayers, Danny, "Graph Farming," Jan./Feb., pp. 80–83.

B

Babin, Gilbert, see Tutsch, Dietmar.

Bahuman, Anil, see Ramamritham, Krithi.

Bahuman, Chaitra, see Ramamritham, Krithi.

Bai, Yijian, Hetal Thakkar, Haixun Wang, and Carlo Zaniolo, "Time-Stamp Management and Query Execution in Data Stream Management Systems," Nov./Dec., pp. 13–21.

Balazinska, Magdalena, see Letchner, Julie.

Baru, Malathy, see Ramamritham, Krithi.

Beatty, Patricia, Scott Dick, and James Miller, "Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards," Mar./Apr., pp. 76–80.

Bechhofer, Sean, Yeliz Yesilada, Robert Stevens, Simon Jupp, and Bernard Horan, "Using Ontologies and Vocabularies for Dynamic Linking," May/June, pp. 32–39.

Benatallah, Boualem, see Yu, Jin.

Benslimane, Djamal, Schahram Dustdar, and Amit Sheth, "Services Mashups: The New Generation of Web Applications," Sep./Oct., pp. 13–15.

Bertino, Elisa, see Samuel, Arjmand.

Bertino, Elisa, see Bhatti, Rafae.

Bettis, David W., see Bhatti, Rafae.

Beznosov, Konstantin, see Hawkey, Kirstie.

Bhatti, Rafae, Maria Luisa Damiani, David W. Bettis, and Elisa Bertino, "Policy Mapper: Administering Location-Based Access-Control Policies," Mar./Apr., pp. 38–45.

Blake, M. Brian, and Michael F. Nowlan, "Taming Web Services from the Wild," Sep./Oct., pp. 62–69.

Blake, M. Brian, and Michael N. Huhns, "Web-Scale Workflow: Integrating Distributed Services," Jan./Feb., pp. 55–59.

Braga, Daniele, Stefano Ceri, Florian Daniel, and Davide Martinenghi, "Mashing Up Search Services," Sep./Oct., pp. 16–23.

Bryant, Stewart, see Andersson, Loa.

Bukhari, Amina, see Wan, Yun.

Bury, Sara, see Ishmael, Johnathan.

Bussler, Christoph, "Is Semantic Web Technology Taking the Wrong Turn?," Jan./Feb., pp. 75–79.

Bussler, Christoph, see Petrie, Charles.

C

Calabrese, Michael, "Broadcast to Broadband: Unlicensed Access to Unused TV Channels?," Mar./Apr., pp. 71–75.

Campbell, Andrew T., Shane B. Eisenman, Nicholas D. Lane, Emiliano Miluzzo, Ronald A. Peterson, Hong Lu, Xiao Zheng, Mirco Musolesi, Krist�f Fodor, and Gahng-Seop Ahn, "The Rise of People-Centric Sensing," July/Aug., pp. 12–21.

Casati, Fabio, see Yu, Jin.

Catarci, Tiziana, Massimiliano de Leoni, Andrea Marrella, Massimo Mecella, Berardino Salvatore, Guido Vetere, Schahram Dustdar, Lukasz Juszczyk, Atif Manzoor, and Hong-Linh Truong, "Pervasive Software Environments for Supporting Disaster Responses," Jan./Feb., pp. 26–37.

Ceri, Stefano, see Braga, Daniele.

Chakravarty, Payal, and Munindar P. Singh, "Incorporating Events into Cross-Organizational Business Processes," Mar./Apr., pp. 46–53.

Chandran, Arun, see Ramamritham, Krithi.

Chang, Elizabeth, see Hecker, Michael.

Chaudhry, Imran, see Ruth, Stephen.

Chitumalla, Pavan Kumar, Douglas Harris, Bhavani Thuraisingham, and Latifur Khan, "Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing," Jan./Feb., pp. 38–44.

Churchill, Elizabeth, Les Nelson, and Diana K. Smetters, "Useful Computer Security," May/June, pp. 10–12.

Cojocarasu, Dana, see Arenas, Alvaro.

Contreras, Jorge, and Russ Housley, "IP Squared: Internet Standards and Intellectual Property," Nov./Dec., pp. 83–86.

Coppola, Massimo, Yvon J�gou, Brian Matthews, Christine Morin, Luis Pablo Prieto, �scar David S�nchezErica Y. Yang, and Haiyan Yu, "Virtual Organization Support within a Grid-Wide Operating System," Mar./Apr., pp. 20–28.

Crompton, Shirley, see Arenas, Alvaro.

Culler, David E., see Hui, Jonathan W.

Curbera, Francisco, see Rosenberg, Florian.

D

Damiani, Maria Luisa, see Bhatti, Rafae.

Daniel, Florian, see Braga, Daniele.

Daniel, Florian, see Yu, Jin.

Dick, Scott, see Beatty, Patricia.

Dillon, Tharam S., see Hecker, Michael.

Ding, Bolin, see Gao, Jing.

Douglis, Fred, "The Eye of the Beholder: Whence IC?," May/June, pp. 3–5.

Douglis, Fred, "Full Stream Ahead," Nov./Dec., pp. 3–5.

Douglis, Fred, "Ideas Ahead of Their Time," Sep./Oct., pp. 4–6.

Douglis, Fred, "Not-so-Secret Identities," Mar./Apr., pp. 4–6.

Douglis, Fred, "On Social Networking and Communication Paradigms," Jan./Feb., pp. 4–6.

Dubitzky, Werner, see Stankovski, Vlado.

Duftler, Matthew J., see Rosenberg, Florian.

Dugan, Christopher J., see Kopena, Joseph B.

Dumas, Marlon, see Ouyang, Chun.

Dustdar, Schahram, see Catarci, Tiziana.

Dustdar, Schahram, see Benslimane, Djamal.

Dustdar, Schahram, see Schall, Daniel.

E

Edwards, W. Keith, see Payne, Bryan D.

Eisenman, Shane B., see Campbell, Andrew T.

Eno, Josh, and Craig W. Thompson, "Generating Synthetic Data to Match Data Mining Patterns," May/June, pp. 78–82.

F

Fan, Wei, see Gao, Jing.

Farrell, Stephen, "Password Policy Purgatory," Sep./Oct., pp. 84–87.

Farrell, Stephen, "Portable Storage and Data Loss," May/June, pp. 90–93.

Farrell, Stephen, "Security Boundaries," Jan./Feb., pp. 93–96.

Fodor, Krist�f, see Campbell, Andrew T.

Foster, Ian, see Tan, Wei.

Foster, Ian, see Qi, Li.

Franke, J�rgen, see Stankovski, Vlado.

G

Gao, Jing, Bolin Ding, Wei Fan, Jiawei Han, and Philip S. Yu, "Classifying Data Streams with Skewed Class Distributions and Concept Drifts," Nov./Dec., pp. 37–49.

Gawor, Jarek, see Qi, Li.

Ghafoor, Arif, see Samuel, Arjmand.

Glass, Steve, Marius Portmann, and Vallipuram Muthukkumarasamy, "Securing Wireless Mesh Networks," July/Aug., pp. 30–36.

Gomadam, Karthik, see Maximilien, E. Michael.

Goth, Greg, "Accessibility Advances Could Portend New Mass Technologies," July/Aug., pp. 6–8.

Goth, Greg, "ICANN's TLD Plans Are Defined, Not Yet Refined," Sep./Oct., pp. 10–12.

Goth, Greg, "The Net's Going Green: Multipronged Approach Might Save Costs, Energy — and the Climate," Jan./Feb., pp. 7–9.

Goth, Greg, "Redefining the Server as Home Networks Emerge," Mar./Apr., pp. 7–9.

Goth, Greg, "Should We Stop Trusting Trust?," May/June, pp. 6–9.

Goth, Greg, "Traffic Management Becoming High-Priority Problem," Nov./Dec., pp. 6–8.

Gruenwald, Le, see Olken, Frank.

Gr�goire, Jean-Charles, see Khlifi, Hechmi.

H

Hagstrom, Fran, see Thompson, Craig W.

Han, Jiawei, see Gao, Jing.

Harris, Douglas, see Chitumalla, Pavan Kumar.

Hawkey, Kirstie, Kasia Muldner, and Konstantin Beznosov, "Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs," May/June, pp. 22–30.

Heath, Tom, "How Will We Interact with the Web of Data?," Sep./Oct., pp. 88–91.

Hecker, Michael, Tharam S. Dillon, and Elizabeth Chang, "Privacy Ontology Support for E-Commerce," Mar./Apr., pp. 54–61.

Hendaoui, Adel, Moez Limayem, and Craig W. Thompson, "3D Social Virtual Worlds: Research Issues and Challenges," Jan./Feb., pp. 88–92.

Henson, Cory, see Sahoo, Satya S.

Henson, Cory, see Sheth, Amit.

Hewitt, Carl, "ORGs for Scalable, Robust, Privacy-Friendly Client Cloud Computing," Sep./Oct., pp. 96–99.

Hofmann, Paul, "ERP is Dead, Long Live ERP," July/Aug., pp. 84–88.

Horan, Bernard, see Bechhofer, Sean.

Housley, Russ, see Contreras, Jorge.

Huhns, Michael N., see Blake, M. Brian.

Hui, Jonathan W., and David E. Culler, "Extending IP to Low-Power, Wireless Personal Area Networks," July/Aug., pp. 37–45.

I

Ishmael, Johnathan, Sara Bury, Dimitrios Pezaros, and Nicholas Race, "Deploying Rural Community Wireless Mesh Networks," July/Aug., pp. 22–29.

J

Jin, Hai, see Qi, Li.

Joshi, Manjiri, see Ramamritham, Krithi.

Joyce, Robert A., "Pornography and the Internet," July/Aug., pp. 74–77.

Jupp, Simon, see Bechhofer, Sean.

Juszczyk, Lukasz, see Catarci, Tiziana.

J�gou, Yvon, see Coppola, Massimo.

K

Karlapalem, Kamalakar, see Krishna, P. Radha.

Kelley, Michael R., "The Spectrum Auction: Big Money and Lots of Unanswered Questions," Jan./Feb., pp. 66–70.

Khalaf, Rania, see Rosenberg, Florian.

Khan, Latifur, see Chitumalla, Pavan Kumar.

Khlifi, Hechmi, and Jean-Charles Gr�goire, "IMS Application Servers: Roles, Requirements, and Implementation Technologies," May/June, pp. 40–51.

Kopena, Joseph B., Evan A. Sultanik, Robert N. Lass, Duc N. Nguyen, Christopher J. Dugan, Pragnesh J. Modi, and William C. Regli, "Distributed Coordination of First Responders," Jan./Feb., pp. 45–47.

Kravtsov, Valentin, see Stankovski, Vlado.

Krishna, P. Radha, and Kamalakar Karlapalem, "Electronic Contracts," July/Aug., pp. 60–68.

Kropf, Peter, see Tutsch, Dietmar.

Kumar, Vaishali, see Wan, Yun.

L

La, Rosa, Marcello, see Ouyang, Chun.

Lai, Yuan-Cheng, "DCCP: Transport Protocol with Congestion Control and Unreliability," Sep./Oct., pp. 78–83.

Lakshmanan, Geetika T., Ying Li, and Rob Strom, "Placement Strategies for Internet-Scale Data Stream Systems," Nov./Dec., pp. 50–60.

Lane, Nicholas D., see Campbell, Andrew T.

Lass, Robert N., see Kopena, Joseph B.

Leff, Avraham, and James T. Rayfield, "WebRB: A Different Way to Write Web Applications," May/June, pp. 52–61.

Leiba, Barry, "An Introduction to Internet Standards," Jan./Feb., pp. 71–74.

Leoni, Massimiliano de, see Catarci, Tiziana.

Letchner, Julie, Christopher R�, Magdalena Balazinska, and Matthai Philipose, "Challenges for Event Queries over Markovian Streams," Nov./Dec., pp. 30–36.

Levis, Philip, see Madden, Samuel.

Li, Jin, Kristin Tufte, David Maier, and Vassilis Papadimos, "AdaptWID: An Adaptive, Memory-Efficient Window Aggregation Implementation," Nov./Dec., pp. 22–29.

Li, Ying, see Lakshmanan, Geetika T.

Limayem, Moez, see Hendaoui, Adel.

Lin, Kwei-Jay, "E-Commerce Technology: Back to a Prominent Future," Jan./Feb., pp. 60–65.

Lin, Kwei-Jay, see Wang, Yan.

Lin, Yi-Bing, see Sung, Ya-Chin.

Lu, Hong, see Campbell, Andrew T.

M

Madden, Samuel, and Philip Levis, "Mesh Networking Research and Technology for Multihop Wireless Networks," July/Aug., pp. 9–11.

Madduri, Ravi, see Tan, Wei.

Mahler, Tobias, see Arenas, Alvaro.

Mahmoud, Qusay H., see Al-Masri, Eyhab.

Maier, David, see Li, Jin.

Manz, Paul C., see Maym�, Fernando.

Manzoor, Atif, see Catarci, Tiziana.

Marrella, Andrea, see Catarci, Tiziana.

Martinenghi, Davide, see Braga, Daniele.

Matthews, Brian, see Coppola, Massimo.

Maximilien, E. Michael, Ajith Ranabahu, and Karthik Gomadam, "An Online Platform for Web APIs and Service Mashups," Sep./Oct., pp. 32–43.

May, Michael, see Stankovski, Vlado.

Maym�, Fernando, Manuel Rodr�guez-Mart�nezYi Qian, and Paul C. Manz, "Ancile: Pervasively Shared Situational Awareness," Jan./Feb., pp. 48–50.

Mecella, Massimo, see Catarci, Tiziana.

Mehrotra, Sharad, Taieb Znati, and Craig W. Thompson, "Crisis Management," Jan./Feb., pp. 14–17.

Miller, James, see Beatty, Patricia.

Miller, Jim, "Is Anybody Home?," Mar./Apr., pp. 91–93.

Miller, Jim, "Who Are You, Part II: More on the Trade-Off between Information Utility and Privacy," Nov./Dec., pp. 91–93.

Miller, Jim, "Who Are You? The Trade-Off between Information Utility and Privacy," July/Aug., pp. 93–96.

Milojicic, Dejan, "Cloud Computing: Interview with Russ Daniels and Franco Travostino," Sep./Oct., pp. 7–9.

Milojicic, Dejan, "Computing Now: Peer-Review Rigor Meets Social Networks," July/Aug., pp. 3–5.

Milojicic, Dejan, "Interview with Rich Friedrich, Dave Cohen, and Alex Dreiling," Jan./Feb., pp. 10–13.

Miluzzo, Emiliano, see Campbell, Andrew T.

Modi, Pragnesh J., see Kopena, Joseph B.

Morin, Christine, see Coppola, Massimo.

Muldner, Kasia, see Hawkey, Kirstie.

Musolesi, Mirco, see Campbell, Andrew T.

Muthukkumarasamy, Vallipuram, see Glass, Steve.

N

Nelson, Les, see Churchill, Elizabeth.

Nguyen, Duc N., see Kopena, Joseph B.

Niessen, Thomas, see Stankovski, Vlado.

Nowlan, Michael F., see Blake, M. Brian.

O

Olken, Frank, and Le Gruenwald, "Data Stream Management: Aggregation, Classification, Modeling, and Operator Placement," Nov./Dec., pp. 9–12.

Ouyang, Chun, Marcello La Rosa, Arthur H.M. ter Hofstede, Marlon Dumas, and Katherine Shortland, "Toward Web-Scale Workflows for Film Production," Sep./Oct., pp. 53–61.

P

Papadimos, Vassilis, see Li, Jin.

Payne, Bryan D., and W. Keith Edwards, "A Brief Introduction to Usable Security," May/June, pp. 13–21.

Perry, Matthew, see Sheth, Amit.

Peterson, Ronald A., see Campbell, Andrew T.

Petrie, Charles, "Collective Work," Mar./Apr., pp. 96,94–95.

Petrie, Charles, and Christoph Bussler, "The Myth of Open Web Services: The Rise of the Service Parks," May/June, pp. 96, 94–95.

Pezaros, Dimitrios, see Ishmael, Johnathan.

Philipose, Matthai, see Letchner, Julie.

Pirzada, Asad Amir, see Portmann, Marius.

Portmann, Marius, see Glass, Steve.

Portmann, Marius, and Asad Amir Pirzada, "Wireless Mesh Networks for Public Safety and Crisis Management Applications," Jan./Feb., pp. 18–25.

Prieto, Luis Pablo, see Coppola, Massimo.

Q

Qi, Li, Hai Jin, Ian Foster, and Jarek Gawor, "Provisioning for Dynamic Instantiation of Community Services," Mar./Apr., pp. 29–36.

Qian, Yi, see Maym�, Fernando.

R

Race, Nicholas, see Ishmael, Johnathan.

Ramamritham, Krithi, Anil Bahuman, Saurabh Sahni, Malathy Baru, Chaitra Bahuman, Arun Chandran, and Manjiri Joshi, "The aAQUA Approach: Innovative Web 2.0 Tools for Developing Countries," Mar./Apr., pp. 62–70.

Ranabahu, Ajith, see Maximilien, E. Michael.

Rayfield, James T., see Leff, Avraham.

Regli, William C., see Kopena, Joseph B.

Ripeanu, Matei, Munindar P. Singh, and Sudharshan S. Vazhkudai, "Virtual Organizations," Mar./Apr., pp. 10–12.

Rodr�guez-Mart�nez, Manuel, see Maym�, Fernando.

Rosenberg, Florian, Francisco Curbera, Matthew J. Duftler, and Rania Khalaf, "Composing RESTful Services and Collaborative Workflows: A Lightweight Approach," Sep./Oct., pp. 24–31.

Ruth, Stephen, and Imran Chaudhry, "Telework: A Productivity Paradox?," Nov./Dec., pp. 87–90.

R�, Christopher, see Letchner, Julie.

R�hm, Matthias, see Stankovski, Vlado.

S

Sahni, Saurabh, see Ramamritham, Krithi.

Sahoo, Satya S., Amit Sheth, and Cory Henson, "Semantic Provenance for eScience: Managing the Deluge of Scientific Data," July/Aug., pp. 46–54.

Sahoo, Satya S., see Sheth, Amit.

Salvatore, Berardino, see Catarci, Tiziana.

Samuel, Arjmand, Arif Ghafoor, and Elisa Bertino, "Context-Aware Adaptation of Access-Control Policies," Jan./Feb., pp. 51–54.

Schall, Daniel, Hong-Linh Truong, and Schahram Dustdar, "Unifying Human and Software Services in Web-Scale Collaborations," May/June, pp. 62–68.

Schubert, Lutz, see Arenas, Alvaro.

Schuster, Assaf, see Stankovski, Vlado.

Sheth, Amit, see Sahoo, Satya S.

Sheth, Amit, Cory Henson, and Satya S. Sahoo, "Semantic Sensor Web," July/Aug., pp. 78–83.

Sheth, Amit, see Benslimane, Djamal.

Sheth, Amit, and Matthew Perry, "Traveling the Semantic Web through Space, Time, and Theme," Mar./Apr., pp. 81–86.

Shortland, Katherine, see Ouyang, Chun.

Singh, Munindar P., see Chakravarty, Payal.

Singh, Munindar P., see Ripeanu, Matei.

Smetters, Diana K., see Churchill, Elizabeth.

Stankovski, Vlado, Martin Swain, Valentin Kravtsov, Thomas Niessen, Dennis Wegener, Matthias R�hm, Jernej Trnkoczy, Michael May, J�rgen Franke, Assaf Schuster, and Werner Dubitzky, "Digging Deep into the Data Mine with DataMiningGrid," Nov./Dec., pp. 69–76.

Stevens, Robert, see Bechhofer, Sean.

Strom, Rob, see Lakshmanan, Geetika T.

Sultanik, Evan A., see Kopena, Joseph B.

Sung, Ya-Chin, and Yi-Bing Lin, "IPsec-Based VoIP Performance in WLAN Environments," Nov./Dec., pp. 77–82.

Swain, Martin, see Stankovski, Vlado.

S�nchez, �scar David, see Coppola, Massimo.

T

Tan, Wei, Ian Foster, and Ravi Madduri, "Combining the Power of Taverna and caGrid: Scientific Workflows that Enable Web-Scale Collaboration," Nov./Dec., pp. 61–68.

ter, Hofstede, Arthur H.M., see Ouyang, Chun.

Thakkar, Hetal, see Bai, Yijian.

Thompson, Craig W., see Hendaoui, Adel.

Thompson, Craig W., see Mehrotra, Sharad.

Thompson, Craig W., see Eno, Josh.

Thompson, Craig W., and Fran Hagstrom, "Modeling Healthcare Logistics in a Virtual World," Sep./Oct., pp. 100–104.

Thuraisingham, Bhavani, see Chitumalla, Pavan Kumar.

Trnkoczy, Jernej, see Stankovski, Vlado.

Truong, Hong-Linh, see Catarci, Tiziana.

Truong, Hong-Linh, see Schall, Daniel.

Tufte, Kristin, see Li, Jin.

Tutsch, Dietmar, Gilbert Babin, and Peter Kropf, "Application-Layer Traffic Analysis of a Peer-to-Peer System," Sep./Oct., pp. 70–77.

V

Vazhkudai, Sudharshan S., see Ripeanu, Matei.

Vetere, Guido, see Catarci, Tiziana.

Vinoski, Steve, "Convenience Over Correctness," July/Aug., pp. 89–92.

Vinoski, Steve, "Demystifying RESTful Data Coupling," Mar./Apr., pp. 87–90.

Vinoski, Steve, "Multilanguage Programming," May/June, pp. 83–85.

Vinoski, Steve, "RESTful Web Services Development Checklist," Nov./Dec., pp. 96, 94–95.

Vinoski, Steve, "RPC and REST: Dilemma, Disruption, and Displacement," Sep./Oct., pp. 92–95.

Vinoski, Steve, "Serendipitous Reuse," Jan./Feb., pp. 84–87.

W

Wan, Yun, Vaishali Kumar, and Amina Bukhari, "Will the Overseas Expansion of Facebook Succeed?," May/June, pp. 69–73.

Wang, Haixun, see Bai, Yijian.

Wang, Yan, and Kwei-Jay Lin, "Reputation-Oriented Trustworthy Computing in E-Commerce Environments," July/Aug., pp. 55–59.

Wegener, Dennis, see Stankovski, Vlado.

Weitzner, Daniel J., "Net Neutrality... Seriously this Time," May/June, pp. 86–89.

Wilson, Michael, see Arenas, Alvaro.

Y

Yang, Erica Y., see Coppola, Massimo.

Yesilada, Yeliz, see Bechhofer, Sean.

Yu, Haiyan, see Coppola, Massimo.

Yu, Jin, Boualem Benatallah, Fabio Casati, and Florian Daniel, "Understanding Mashup Development," Sep./Oct., pp. 44–52.

Yu, Philip S., see Gao, Jing.

Z

Zaniolo, Carlo, see Bai, Yijian.

Zheng, Xiao, see Campbell, Andrew T.

Znati, Taieb, see Mehrotra, Sharad.

Subject Index

A

Access Control

"Policy Mapper: Administering Location-Based Access-Control Policies," Rafae Bhatti, Maria Luisa Damiani, David W. Bettis, and Elisa Bertino, Mar./Apr., pp. 38–45.

All Systems Go

"Computing Now: Peer-Review Rigor Meets Social Networks," Dejan Milojicic, July/Aug., pp. 3–5.

"The Eye of the Beholder: Whence IC?," Fred Douglis, May/June, pp. 3–5.

"Full Stream Ahead," Fred Douglis, Nov./Dec., pp. 3–5.

"Ideas Ahead of Their Time," Fred Douglis, Sep./Oct., pp. 4–6.

"Not-so-Secret Identities," Fred Douglis, Mar./Apr., pp. 4–6.

"On Social Networking and Communication Paradigms," Fred Douglis, Jan./Feb., pp. 4–6.

Architectural Perspectives

"3D Social Virtual Worlds: Research Issues and Challenges," Adel Hendaoui, Moez Limayem, and Craig W. Thompson, Jan./Feb., pp. 88–92.

"Generating Synthetic Data to Match Data Mining Patterns," Josh Eno, and Craig W. Thompson, May/June, pp. 78–82.

"Modeling Healthcare Logistics in a Virtual World," Craig W. Thompson, and Fran Hagstrom, Sep./Oct., pp. 100–104.

C

Crisis Management

"Ancile: Pervasively Shared Situational Awareness," Fernando Maym�, Manuel Rodr�guez-Mart�nezYi Qian, and Paul C. Manz, Jan./Feb., pp. 48–50.

"Context-Aware Adaptation of Access-Control Policies," Arjmand Samuel, Arif Ghafoor, and Elisa Bertino, Jan./Feb., pp. 51–54.

"Distributed Coordination of First Responders," Joseph B. Kopena, Evan A. Sultanik, Robert N. Lass, Duc N. Nguyen, Christopher J. Dugan, Pragnesh J. Modi, and William C. Regli, Jan./Feb., pp. 45–47.

"Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing," Pavan Kumar Chitumalla, Douglas Harris, Bhavani Thuraisingham, and Latifur Khan, Jan./Feb., pp. 38–44.

"Pervasive Software Environments for Supporting Disaster Responses," Tiziana Catarci, Massimiliano de Leoni, Andrea Marrella, Massimo Mecella, Berardino Salvatore, Guido Vetere, Schahram Dustdar, Lukasz Juszczyk, Atif Manzoor, and Hong-Linh Truong, Jan./Feb., pp. 26–37.

"Wireless Mesh Networks for Public Safety and Crisis Management Applications," Marius Portmann, and Asad Amir Pirzada, Jan./Feb., pp. 18–25.

D

Data Stream Management

"AdaptWID: An Adaptive, Memory-Efficient Window Aggregation Implementation," Jin Li, Kristin Tufte, David Maier, and Vassilis Papadimos, Nov./Dec., pp. 22–29.

"Challenges for Event Queries over Markovian Streams," Julie Letchner, Christopher R�, Magdalena Balazinska, and Matthai Philipose, Nov./Dec., pp. 30–36.

"Classifying Data Streams with Skewed Class Distributions and Concept Drifts," Jing Gao, Bolin Ding, Wei Fan, Jiawei Han, and Philip S. Yu, Nov./Dec., pp. 37–49.

"Placement Strategies for Internet-Scale Data Stream Systems," Geetika T. Lakshmanan, Ying Li, and Rob Strom, Nov./Dec., pp. 50–60.

"Time-Stamp Management and Query Execution in Data Stream Management Systems," Yijian Bai, Hetal Thakkar, Haixun Wang, and Carlo Zaniolo, Nov./Dec., pp. 13–21.

E

E-Commerce Track

"E-Commerce Technology: Back to a Prominent Future," Kwei-Jay Lin, Jan./Feb., pp. 60–65.

"Privacy Ontology Support for E-Commerce," Michael Hecker, Tharam S. Dillon, and Elizabeth Chang, Mar./Apr., pp. 54–61.

"Reputation-Oriented Trustworthy Computing in E-Commerce Environments," Yan Wang, and Kwei-Jay Lin, July/Aug., pp. 55–59.

"Will the Overseas Expansion of Facebook Succeed?," Yun Wan, Vaishali Kumar, and Amina Bukhari, May/June, pp. 69–73.

G

Grid Computing

"Digging Deep into the Data Mine with DataMiningGrid," Vlado Stankovski, Martin Swain, Valentin Kravtsov, Thomas Niessen, Dennis Wegener, Matthias R�hm, Jernej Trnkoczy, Michael May, J�rgen Franke, Assaf Schuster, and Werner Dubitzky, Nov./Dec., pp. 69–76.

Guest Editors' Introduction

"Crisis Management," Sharad Mehrotra, Taieb Znati, and Craig W. Thompson, Jan./Feb., pp. 14–17.

"Data Stream Management: Aggregation, Classification, Modeling, and Operator Placement," Frank Olken, and Le Gruenwald, Nov./Dec., pp. 9–12.

"Mesh Networking Research and Technology for Multihop Wireless Networks," Samuel Madden, and Philip Levis, July/Aug., pp. 9–11.

"Services Mashups: The New Generation of Web Applications," Djamal Benslimane, Schahram Dustdar, and Amit Sheth, Sep./Oct., pp. 13–15.

"Useful Computer Security," Elizabeth Churchill, Les Nelson, and Diana K. Smetters, May/June, pp. 10–12.

"Virtual Organizations," Matei Ripeanu, Munindar P. Singh, and Sudharshan S. Vazhkudai, Mar./Apr., pp. 10–12.

I

Internet Experience

"Is Anybody Home?," Jim Miller, Mar./Apr., pp. 91–93.

"Who Are You, Part II: More on the Trade-Off between Information Utility and Privacy," Jim Miller, Nov./Dec., pp. 91–93.

"Who Are You? The Trade-Off between Information Utility and Privacy," Jim Miller, July/Aug., pp. 93–96.

M

Mesh Networking

"Deploying Rural Community Wireless Mesh Networks," Johnathan Ishmael, Sara Bury, Dimitrios Pezaros, and Nicholas Race, July/Aug., pp. 22–29.

"Extending IP to Low-Power, Wireless Personal Area Networks," Jonathan W. Hui, and David E. Culler, July/Aug., pp. 37–45.

"The Rise of People-Centric Sensing," Andrew T. Campbell, Shane B. Eisenman, Nicholas D. Lane, Emiliano Miluzzo, Ronald A. Peterson, Hong Lu, Xiao Zheng, Mirco Musolesi, Krist�f Fodor, and Gahng-Seop Ahn, July/Aug., pp. 12–21.

"Securing Wireless Mesh Networks," Steve Glass, Marius Portmann, and Vallipuram Muthukkumarasamy, July/Aug., pp. 30–36.

Multimedia System Architectures

"IMS Application Servers: Roles, Requirements, and Implementation Technologies," Hechmi Khlifi, and Jean-Charles Gr�goire, May/June, pp. 40–51.

N

News & Trends

"Redefining the Server as Home Networks Emerge," Greg Goth, Mar./Apr., pp. 7–9.

"Accessibility Advances Could Portend New Mass Technologies," Greg Goth, July/Aug., pp. 6–8.

"ICANN's TLD Plans Are Defined, Not Yet Refined," Greg Goth, Sep./Oct., pp. 10–12.

"The Net's Going Green: Multipronged Approach Might Save Costs, Energy — and the Climate," Greg Goth, Jan./Feb., pp. 7–9.

"Should We Stop Trusting Trust?," Greg Goth, May/June, pp. 6–9.

"Traffic Management Becoming High-Priority Problem," Greg Goth, Nov./Dec., pp. 6–8.

P

Peer-to-Peer

"Application-Layer Traffic Analysis of a Peer-to-Peer System," Dietmar Tutsch, Gilbert Babin, and Peter Kropf, Sep./Oct., pp. 70–77.

Peering

"Collective Work," Charles Petrie, Mar./Apr., pp. 96,94–95.

"ERP is Dead, Long Live ERP," Paul Hofmann, July/Aug., pp. 84–88.

"Is Semantic Web Technology Taking the Wrong Turn?," Christoph Bussler, Jan./Feb., pp. 75–79.

"The Myth of Open Web Services: The Rise of the Service Parks," Charles Petrie, and Christoph Bussler, May/June, pp. 96, 94–95.

"ORGs for Scalable, Robust, Privacy-Friendly Client Cloud Computing," Carl Hewitt, Sep./Oct., pp. 96–99.

Practical Security

"Password Policy Purgatory," Stephen Farrell, Sep./Oct., pp. 84–87.

"Portable Storage and Data Loss," Stephen Farrell, May/June, pp. 90–93.

"Security Boundaries," Stephen Farrell, Jan./Feb., pp. 93–96.

Public Policy

"Broadcast to Broadband: Unlicensed Access to Unused TV Channels?," Michael Calabrese, Mar./Apr., pp. 71–75.

"Pornography and the Internet," Robert A. Joyce, July/Aug., pp. 74–77.

"The Spectrum Auction: Big Money and Lots of Unanswered Questions," Michael R. Kelley, Jan./Feb., pp. 66–70.

"Telework: A Productivity Paradox?," Stephen Ruth, and Imran Chaudhry, Nov./Dec., pp. 87–90.

S

Semantics & Services

"Traveling the Semantic Web through Space, Time, and Theme," Amit Sheth, and Matthew Perry, Mar./Apr., pp. 81–86.

"Semantic Sensor Web," Amit Sheth, Cory Henson, and Satya S. Sahoo, July/Aug., pp. 78–83.

Service Mashups

"An Online Platform for Web APIs and Service Mashups," E. Michael Maximilien, Ajith Ranabahu, and Karthik Gomadam, Sep./Oct., pp. 32–43.

"Composing RESTful Services and Collaborative Workflows: A Lightweight Approach," Florian Rosenberg, Francisco Curbera, Matthew J. Duftler, and Rania Khalaf, Sep./Oct., pp. 24–31.

"Mashing Up Search Services," Daniele Braga, Stefano Ceri, Florian Daniel, and Davide Martinenghi, Sep./Oct., pp. 16–23.

"Understanding Mashup Development," Jin Yu, Boualem Benatallah, Fabio Casati, and Florian Daniel, Sep./Oct., pp. 44–52.

Spotlight

"The aAQUA Approach: Innovative Web 2.0 Tools for Developing Countries," Krithi Ramamritham, Anil Bahuman, Saurabh Sahni, Malathy Baru, Chaitra Bahuman, Arun Chandran, and Manjiri Joshi, Mar./Apr., pp. 62–70.

"Electronic Contracts," P. Radha Krishna, and Kamalakar Karlapalem, July/Aug., pp. 60–68.

Standards

"An Introduction to Internet Standards," Barry Leiba, Jan./Feb., pp. 71–74.

"DCCP: Transport Protocol with Congestion Control and Unreliability," Yuan-Cheng Lai, Sep./Oct., pp. 78–83.

"Discovering Web Services in Search Engines," Eyhab Al-Masri, and Qusay H. Mahmoud, May/June, pp. 74–77.

"The IETF Multiprotocol Label Switching Standard: The MPLS Transport Profile Case," Loa Andersson, and Stewart Bryant, July/Aug., pp. 69–73.

"IP Squared: Internet Standards and Intellectual Property," Jorge Contreras, and Russ Housley, Nov./Dec., pp. 83–86.

"Is HTML in a Race to the Bottom? A Large-Scale Survey and Analysis of Conformance to W3C Standards," Patricia Beatty, Scott Dick, and James Miller, Mar./Apr., pp. 76–80.

T

Technology & Society

"Net Neutrality... Seriously this Time," Daniel J. Weitzner, May/June, pp. 86–89.

Toward Integration

"Convenience Over Correctness," Steve Vinoski, July/Aug., pp. 89–92.

"Demystifying RESTful Data Coupling," Steve Vinoski, Mar./Apr., pp. 87–90.

"Multilanguage Programming," Steve Vinoski, May/June, pp. 83–85.

"RESTful Web Services Development Checklist," Steve Vinoski, Nov./Dec., pp. 96, 94–95.

"RPC and REST: Dilemma, Disruption, and Displacement," Steve Vinoski, Sep./Oct., pp. 92–95.

"Serendipitous Reuse," Steve Vinoski, Jan./Feb., pp. 84–87.

Trend Wars

"Cloud Computing: Interview with Russ Daniels and Franco Travostino," Dejan Milojicic, Sep./Oct., pp. 7–9.

"Interview with Rich Friedrich, Dave Cohen, and Alex Dreiling," Dejan Milojicic, Jan./Feb., pp. 10–13.

U

Useful Computer Security

"A Brief Introduction to Usable Security," Bryan D. Payne, and W. Keith Edwards, May/June, pp. 13–21.

"Searching for the Right Fit: Balancing IT Security Management Model Trade-Offs," Kirstie Hawkey, Kasia Muldner, and Konstantin Beznosov, May/June, pp. 22–30.

V

Virtual Organizations

"Bridging the Gap between Legal and Technical Contracts," Alvaro Arenas, Michael Wilson, Shirley Crompton, Dana Cojocarasu, Tobias Mahler, and Lutz Schubert, Mar./Apr., pp. 13–19.

"Provisioning for Dynamic Instantiation of Community Services," Li Qi, Hai Jin, Ian Foster, and Jarek Gawor, Mar./Apr., pp. 29–36.

"Virtual Organization Support within a Grid-Wide Operating System," Massimo Coppola, Yvon J�gou, Brian Matthews, Christine Morin, Luis Pablo Prieto, �scar David S�nchezErica Y. Yang, and Haiyan Yu, Mar./Apr., pp. 20–28.

Voice over IP

"IPsec-Based VoIP Performance in WLAN Environments," Ya-Chin Sung, and Yi-Bing Lin, Nov./Dec., pp. 77–82.

W

Web Application Development

"WebRB: A Different Way to Write Web Applications," Avraham Leff, and James T. Rayfield, May/June, pp. 52–61.

Web Ontologies

"Using Ontologies and Vocabularies for Dynamic Linking," Sean Bechhofer, Yeliz Yesilada, Robert Stevens, Simon Jupp, and Bernard Horan, May/June, pp. 32–39.

Web Service Discovery

"Taming Web Services from the Wild," M. Brian Blake, and Michael F. Nowlan, Sep./Oct., pp. 62–69.

Web-Scale Workflow Track

"Combining the Power of Taverna and caGrid: Scientific Workflows that Enable Web-Scale Collaboration," Wei Tan, Ian Foster, and Ravi Madduri, Nov./Dec., pp. 61–68.

"Incorporating Events into Cross-Organizational Business Processes," Payal Chakravarty, and Munindar P. Singh, Mar./Apr., pp. 46–53.

"Semantic Provenance for eScience: Managing the Deluge of Scientific Data," Satya S. Sahoo, Amit Sheth, and Cory Henson, July/Aug., pp. 46–54.

"Toward Web-Scale Workflows for Film Production," Chun Ouyang, Marcello La Rosa, Arthur H.M. ter Hofstede, Marlon Dumas, and Katherine Shortland, Sep./Oct., pp. 53–61.

"Unifying Human and Software Services in Web-Scale Collaborations," Daniel Schall, Hong-Linh Truong, and Schahram Dustdar, May/June, pp. 62–68.

"Web-Scale Workflow: Integrating Distributed Services," M. Brian Blake, and Michael N. Huhns, Jan./Feb., pp. 55–59.

Webscience

"Graph Farming," Danny Ayers, Jan./Feb., pp. 80–83.

"How Will We Interact with the Web of Data?," Tom Heath, Sep./Oct., pp. 88–91.