The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 04 - April (vol. 46)
ISSN: 0018-9162
Elsewhere in the CS
Computing Conversations

Larry Smarr: Building Mosaic (HTML)

Charles Severance , University of Michigan
pp. 6-8
Computing and the Law

Patent Monetization (HTML)

Brian M. Gaff , Edwards Wildman Palmer LLP
Ralph A. Loren , Edwards Wildman Palmer LLP
pp. 9-11
32 & 16 Years Ago
Technology News
News Briefs

News Briefs (HTML)

pp. 18-20
Guest Editors' Introduction

Securing Cyberspace in the 21st Century (HTML)

Sherali Zeadally , Microsoft Research Cambridge, UK
Gregorio Martinez , University of Murcia, Spain
Han-Chieh Chao , National Ilan University, Taiwan
pp. 22-23
Cover Feature

Detecting Influential Spreaders in Complex, Dynamic Networks (Abstract)

Leandros Tassiulas , University of Thessaly, Greece
Dimitrios Katsaros , University of Thessaly, Greece
Pavlos Basaras , University of Thessaly, Greece
pp. 24-29

Wide-Area Situational Awareness for Critical Infrastructure Protection (Abstract)

Javier Lopez , University of Malaga, Spain
Cristina Alcaraz , University of Malaga, Spain
pp. 30-37

Scan detection under sampling: a new perspective (Abstract)

J. Sole-Pareta , Univ. Politec. de Catalunya BarcelonaTech, Barcelona, Spain
P. Barlet-Ros , Univ. Politec. de Catalunya BarcelonaTech, Barcelona, Spain
I. Paredes-Oliva , Univ. Politec. de Catalunya BarcelonaTech, Barcelona, Spain
pp. 38-44

Cyberentity Security in the Internet of Things (Abstract)

Laurence T. Yang , Huazhong University of Science and Technology, China, and St. Francis Xavier University, Canada
Hong Liu , Beihang University, China
Huansheng Ning , Beihang University, China
pp. 46-53

Who Am I? Analyzing Digital Personas in Cybercrime Investigations (Abstract)

Phil Greenwood , Isis Forensics, Lancaster, UK
Corinne May-Chahal , Lancaster University, UK
Paul Rayson , Lancaster University, UK
Alistair Baron , Lancaster University, UK
Awais Rashid , Lancaster University, UK
James Walkerdine , Isis Forensics, Lancaster, UK
pp. 54-61

A Next-Generation Approach to Combating Botnets (Abstract)

Jules Ferdinand Pagna Disso , EADS Innovation Works, Newport, UK
Irfan Awan , University of Bradford, UK
Adeeb Alhomoud , University of Bradford, UK
Muhammad Younas , Oxford Brookes University, UK
pp. 62-66
Perspectives

Global Manhunt Pushes the Limits of Social Mobilization (Abstract)

Matteo Venanzi , University of Southampton, UK
James McInerney , University of Southampton, UK
Victor Naroditskiy , University of Southampton, UK
Alex Rutherford , Masdar Institute of Science & Technology, UAE
Sohan Dsouza , Masdar Institute of Science & Technology, UAE
Iyad Rahwan , Masdar Institute of Science & Technology, UAE
Nicholas R. Jennings , University of Southampton, UK
Manuel Cebrian , National ICT Australia and Massachusetts Institute of Technology
pp. 68-75
Research Feature

Characterizing the Performance and Power Consumption of 3D Mobile Games (Abstract)

Mian Dong , Rice University
Zhigang Deng , University of Houston
Xiaohan Ma , University of Houston
Lin Zhong , Rice University
pp. 76-82
Computing Education

Why Learn a Foreign Language? (Abstract)

Ruth H. Sanders , Miami University of Ohio
pp. 83-85
Discovery Analytics

Ubiquitous Analytics: Interacting with Big Data Anywhere, Anytime (Abstract)

Niklas Elmqvist , Purdue University
Pourang Irani , University of Manitoba
pp. 86-89
Invisible Computing
Security

Enabling an Enterprise-Wide, Data-Centric Operating Environment (Abstract)

David Ferraiolo , National Institute of Standards and Technology
Serban Gavrila , National Institute of Standards and Technology
Wayne Jansen , Booz Allen Hamilton
pp. 94-96
Entertainment Computing

The Ways We Play, Part 2: Mobile Game Changers (Abstract)

Jason Pace , University of Washington Bothell
pp. 97-99
Software Technologies

HCI Practices for Building Usable Software (Abstract)

R. Capilla , Rey Juan Carlos Univ., Mostoles, Spain
Maria-Isabel Sanchez-Segura , Carlos III Univ. of Madrid, Leganes, Spain
A. Seffah , Concordia Univ., Montreal, QC, Canada
A. M. Moreno , Tech. Univ. of Madrid, Madrid, Spain
pp. 100-102
Computer Society Connection

Computer Society Connection (HTML)

pp. 110-113
Call and Calendar

Call and Calendar (HTML)

pp. 114-115
The Errant Hashtag

Equal before the Bar (HTML)

David Alan Grier , George Washington University
pp. 116
272 ms
(Ver 3.1 (10032016))