Pages: pp. 4-5
The IEEE Computer Society offers a lineup of 12 peer-reviewed technical magazines that cover cutting-edge topics in computing including scientific applications, design and test, security, Internet computing, machine intelligence, digital graphics, and computer history. Select articles from recent issues of Computer Society magazines are highlighted below.
A central task in software design is deciding what artifact will best satisfy the client's needs, including whether to create a new artifact or choose one from existing alternatives. A design space makes it possible to identify and organize such decisions, thereby providing a framework for creating and comparing artifacts. In "The Role of Design Spaces," in the January/February issue of Software, author Mary Shaw describes a case study involving a traffic signal simulator that illustrates the benefits of considering the design space and the risks of failing to do so.
With growing emphasis on personalization, personal recommendation systems, and social networking, interest in personal and social behavior patterns is increasing. In the November/December 2011 issue of IS, "Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)" explores a "what if" scenario. History has shown that whenever something exhibits a tangible value, someone will try to steal it for profit. Examining current trends in the data ecosystem, coupled with the emergence of advanced tools for social and behavioral pattern detection and inference, the authors consider the blurring intersection of criminality and data science.
In the January/February issue of CG&A, the guest editors introduce a special issue on visualization applications and design studies. The articles cover both traditional application domains such as visualization of scientific simulations and emerging ones such as visualization of text streams, image collections, trajectories, and political phenomena.
Large science datasets typically require the ability to allow remote users to access the data without downloading the entire repository. Scientists, particularly in the earth sciences and other fields that routinely apply intensive image analysis, use the Interactive Data Language, or IDL, to interactively analyze data ad hoc and write end-user applications for more guided analysis. The Data Access Protocol makes remote data accessible to clients, including Web browsers. In the January/February issue of CiSE, "Using the Data Access Protocol with IDL" describes the process of accessing remote data using DAP, discusses various useful libraries, and shows a technique for processing data on a DAP server before transferring results to a client.
S&P's November/December special issue on cyberwarfare addresses the challenges of living with insecurity. All computers today operate in a hostile environment. The only difference between large enterprises, small businesses, governments, and home users is the degree of hostility faced and the attackers' goals. How users deal with these threats and what scientists do to improve the situation are vitally important to the future of digital systems. The November/December 2011 issue of IEEE Security & Privacy looks at how users often create insecurity problems for themselves and discusses methods they can use to mitigate threats.
The October-December 2011 issue of IEEE Pervasive Computing focuses on large-scale opportunistic sensing. This topic is particularly relevant today, with intense interest among the pervasive computing community as well as across a wide range of other disciplines that are beginning to appreciate the power of pervasive sensing to inform their own research. Three regular articles and five departments cover recent conferences, initiatives in pervasive education and wearable computing, Android platform developments, and innovations in the pervasive computing product space.
IC's November/December 2011 issue launches a new column, "Linked Data," that will look at the technologies and standards for applying Semantic Web techniques, standards, and practices to connect related data on the Web. The first contribution, "Linked Data—Welcome to the Data Network," presents the technical basis and potential advantages of such a network. "Using HTTP for data retrieval enables almost universal access," writes author Tom Heath of Talis Research, "while the combination of URIs and RDF provides a generic, nonproprietary infrastructure for distributed data management." Heath describes consumer advantages in linked data's discoverability, mergeability, and traceability and outlines open research questions.
"Low-power, high-speed chips encompass a broad range of architectures, applications, methodologies, and usage models," write the guest editors in their introduction to IEEE Micro's November/December 2011 special theme issue on cool chips. Reconfigurability was a major topic at the 2011 Cool Chips XIV conference, and to explore this trend in computing platform design, the University of Tokyo's Makoto Ikeda and Fumio Arakawa of Renasas Electronics solicited articles that expanded on the themes of four presentations from that conference and one from the previous year's event.
The wide availability of 3D display devices is not matched by a wealth of 3D content. An article in IEEE MultiMedia's October-December 2011 issue describes some common 3D content-creation processes and the key elements that affect quality. In "Converting 2D Video to 3D: An Efficient Path to a 3D Experience," researchers from Tsinghua University, the University of Texas at Austin, and Polytechnic Institute of New York University present a novel approach for converting some of the enormous amount of existing high-quality 2D video into 3D.
The theme of IT Pro's November/December 2011 issue is "IT Education for Practitioners." Guest editors Jay Liebowitz of the University of Maryland's University College and William W. Agresti of Johns Hopkins University introduce four articles that provide perspectives from industry, government, and academia on how to educate IT professionals to meet a demand that's projected to increase by 53 percent in the US between 2008 and 2018—more than double the expected number of computing graduates over this period. "Certain trends seem apparent," they write, citing e-learning, social media engagement, and capstone projects.
Two articles in Annals' October-December 2011 issue contribute to the historical study of cybernetics. In "Cybernetics, Automata Studies, and the Dartmouth Summer Research Project on Artificial Intelligence," Ronald R. Cline of Cornell University focuses on unpublished archives from the 1956 Dartmouth conference, regarded as AI's official birthplace. In "The Distinctiveness of a Unifying Science: Cybernetics' Way to West Germany," Philipp Aumann of the University of Tübingen examines the evolution of cybernetics in former West Germany and the way that extrascientific political, social, and cultural factors influenced its development.