Issue No. 10 - Oct. (2012 vol. 45)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2012.337
The IEEE Computer Society offers a lineup of 12 peer-reviewed technical magazines that cover cutting-edge topics in computing, including scientific applications, Internet computing, machine intelligence, pervasive computing, security and privacy, digital graphics, and computing history. Select articles from recent issues of Computer Society magazines are highlighted below.
In "The Software behind the Higgs Boson Discovery" in Software's September/October issue, David Rousseau describes the enormous software development effort associated with teasing out evidence for the elusive Higgs boson, a cornerstone of the standard model of particle physics. In keeping with software described in previous Impact columns, everything about this project is huge, but the application is unique.
In their introduction to IC's September/October issue focusing on crowdsourcing titled "Leveraging Online Populations for Crowdsourcing," guest editors Ed H. Chi from Google and Michael S. Bernstein from Stanford University briefly survey the history and applications of this concept and introduce six feature articles that focus on its use in Internet computing research.
In CG&A's September/October special issue on "Biomedical Applications: From Data Capture to Modeling," guest editors Cindy Grimm of Oregon State University and G. Elisabeta Marai of the University of Pittsburg introduce five feature articles highlighting the contributions of computer graphics and visualization techniques to tracking and modeling complex biological processes. The issue also includes a theme tutorial, "Mesh Processing in Medical-Image Analysis."
The destructive earthquakes that have reaped havoc across the world over the past few years have forced researchers to rethink traditional approaches to earthquake prediction. CiSE's September/October special issue on computational earthquake science presents some cutting-edge approaches to earthquake modeling and prediction. Guest editors John Rundle of the University of California, Davis, and Geoffrey Fox of Indiana University Bloomington introduce four articles representing a cross-section of research from Asia-Pacific Cooperation of Earthquake Simulation (ACES) symposia and workgroups.
In "Sustainable ICT in Agricultural Value Chains" in IT Pro's July/August issue, Joerg Doerflinger from SAP Research and Tom Gross from the University of Bamberg, Germany, present the Sustainable Bottom Billion Architecture, a generic architecture for developing sustainable information and communication technology projects in developing economies. They also describe successful SBBA implementations in three African countries. The article is part of the issue's special theme, "IT in Emerging Markets."
In the July/August issue of IS, Vanderbilt University's Douglas Fisher initiates a new department, AI and Sustainability, by surveying the papers presented in the Computational Sustainability track at the Association for the Advancement of Artificial Intelligence's 25th Conference (AAAI 2011). Ranging from natural resource management to building and transportation applications, using both model-based and data-supported inferences, the papers collectively show the promise of environmentally minded cognitive agents with competencies in sensing, reasoning, decision making, and actuation.
"There's no free lunch anymore," writes guest editor David I. August from Princeton University in his introduction to Micro's July/August special issue on parallelizing sequential code. Only programs with sufficient parallelism benefit from each new hardware generation. Automatically parallelizing sequential code is one way to reduce the expense of parallel programming. August introduces five feature articles reflecting recent advances in this area: three articles focus on the automatic extraction of parallel threads from general-purpose sequential programs, and two suggest new avenues for progress.
Security & Privacy
In S&P's July/August issue, guest editors Jose Nazario from Arbor Networks and John Kristoff from Team Cymru introduce five articles discussing the issue theme: "Internet Infrastructure Security." Two articles examine IPv6 from a security perspective as the transition from IPv6 is finally under way, two describe the challenges of implementing Internet-scale security in multinational policy, and one discusses recent attacks on IEEE 802.11 wireless standards, including the Wi-Fi Protected Access Protocol.
In "Monitoring Vaccine Cold Chains in Developing Countries," a feature article in PvC's July-September special issue, "Information and Communication Technologies for Social and Economic Development," Rohit Chaudhri, Gaetano Borriello, and Richard Anderson from the University of Washington describe FoneAstra, a low-cost, mobile-phone-based sensing system for monitoring the temperature-controlled storage of vaccines for national distribution in Albania. The authors worked in collaboration with the Albanian Ministry of Health, the United Nations World Health Organization, and the Seattle-based international nonprofit Program for Appropriate Technology in Health to deploy the pilot system, which successfully identified and diagnosed problems in the distribution chain.
The National University of Singapore and Tsinghua University established the NUS-Tsinghua Center for Extreme Search (NExT) Center to study the challenges of analyzing and organization dynamic user-generated content (UGC). In MM's July-September issue, NExt Center researchers summarize their initial work on live monitoring of raw user-generated content and events as they unfold. The center focuses on crawling and mining UGC in Singapore and Beijing with the long-term goal of generating social graphs of topics, activities, and concerns of people in these areas.
"US Government Computer Penetration Programs and the Implications for Cyberwar" is the lead article in Annals' July-September issue. Edward Hunt, a doctoral student in American Studies at the College of William & Mary, reviews early US Department of Defense efforts, beginning in the 1960s, to develop computer penetration methodologies. Under the aegis of testing the nation's time-sharing computer systems, this work transitioned to the development of offensive cyberweapons, such as the Stuxnet worm that attacked Iran's nuclear enrichment program in 2011.