The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 06 - June (vol. 43)
ISSN: 0018-9162
Elsewhere in the CS
The Known World

The Value of a Good Name (Abstract)

David Alan Grier , George Washington University
pp. 7-9
32 and 16 Years Ago

32 and 16 Years Ago (Abstract)

pp. 10-11
News Briefs

News Briefs (PDF)

pp. 18-21
Guest Editors' Introduction

Capturing the World (Abstract)

Oliver Bimber , Johannes Kepler University Linz, Austria
pp. 22-23
Cover Feature

Aerial Computer Vision for a 3D Virtual Habitat (Abstract)

Stefan Kluckner , Graz University of Technology
Franz Leberl , Graz University of Technology
Horst Bischof , Graz University of Technology
Thomas Pock , Graz University of Technology
Arnold Irschara , Graz University of Technology
pp. 24-31

Reconstructing Rome (Abstract)

Richard Szeliski , Microsoft Research
Brian Curless , University of Washington
Steven M. Seitz , University of Washington and Google
Noah Snavely , Cornell University
pp. 40-47

Scene Reconstruction from Community Photo Collections (Abstract)

Michael Goesele , TU Darmstadt
Ronny Klowsky , TU Darmstadt
Jens Ackermann , TU Darmstadt
Martin Ritz , Fraunhofer IGD
Simon Fuhrmann , TU Darmstadt
Fabian Langguth , TU Darmstadt
Patrick Mücke , TU Darmstadt
pp. 48-53
Research Feature

Wireless PKI Security and Mobile Voting (Abstract)

Stanislav Vassiljev , Tallinn University of Technology,
Ilja Tšahhirov , Tallinn University of Technology,
Jaak Tepandi , Tallinn University of Technology,
pp. 54-60

Categorizing the Spectrum of Coordination Technology (Abstract)

André van der Hoek , University of California, Irvine
Anita Sarma , University of Nebraska
David Redmiles , University of California, Irvine
pp. 61-67
Computer Society Connection

Computer Society Announces Award Winners (HTML)

Bob Ward , IEEE Computer Society
pp. 72-73
AI Redux

Visual-Concept Search Solved? (Abstract)

Cees G.M. Snoek , University of Amsterdam
Arnold W.M. Smeulders , University of Amsterdam
pp. 76-78
Security

Adding Attributes to Role-Based Access Control (Abstract)

Timothy R. Weil , Raytheon Polar Services Company
Edward J. Coyne , Science Applications International Corporation
D. Richard Kuhn , National Institute of Standards and Technology
pp. 79-81
Education

Strategy Trumps Money: Recruiting Undergraduate Women into Computing (Abstract)

Lucy Sanders , National Center for Women and Information Technology
Lecia Barker , National Center for Women and Information Technology
Joanne McGrath Cohoon , National Center for Women and Information Technology
pp. 82-85
Invisible Computing

Appropriated Interaction Surfaces (Abstract)

Chris Harrison , Carnegie Mellon University
pp. 86-89
Software Technologies

Simplicity as a Driver for Agile Innovation (Abstract)

Bernhard Steffen , TU Dortmund
Tiziana Margaria , Potsdam University
pp. 90-92
The Profession

Growing Pains with Information Overload (Abstract)

Carol S. Saunders , University of Central Florida
Anne-F. Rutkowski , Tilburg University
pp. 96, 94-95
91 ms
(Ver )