Issue No. 09 - September (2013 vol. 46)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2013.304
The IEEE Computer Society’s lineup of 12 peer-reviewed technical magazines cover cutting-edge topics in computing, including scientific applications, Internet computing, machine intelligence, pervasive computing, security and privacy, digital graphics, and computer history. Select articles from recent issues of other Computer Society magazines are highlighted below.
Changing market conditions following a release require ongoing attention to production costs. Thus, a product life-cycle plan is essential to maintain competitive pricing. In “Sustainable Embedded Software Life-Cycle Planning,” from Software’s July/August 2013 issue, Dong-Hyun Lee, Hoh Peter In, Keun Lee, Sooyong Park, and Mike Hinchey present a dynamic strategy for selecting product life-cycle design alternatives and generating a profit-maximizing transition plan that covers the entire life cycle of software-intensive embedded systems.
In their feature article “Garment Personalization via Identity Transfer” from CG&A’s July/August 2013 issue, Roy Shilkrot, Daniel Cohen-Or, Ariel Shamir, and Ligang Liu present a new system that creates a virtual experience akin to trying on clothing physically. The process clones the user’s photographic image into a catalog of images of models wearing the desired garments while taking into account the user’s skin color and body dimensions.
With data management replacing data acquisition as the bottleneck for scientific discovery, scientists must rethink conventional database applications. To assist with the challenges, researchers from the University of Washington’s eScience Institute and the Armbrust Lab have developed SQLShare, a Web-based application for collaborative data analysis. It emphasizes a simple upload-query-share protocol over conventional database design and ad hoc interactive query over general-purpose programming. In “Collaborative Science Workflows in SQL,” from CiSE’s May/June 2013 issue, Bill Howe and his colleagues from the University of Washington present a case study examining the use of SQLShare as an alternative to script-based scientific workflows for a project in observational biological oceanography.
Cloud computing will play a major role in the future Internet of Services, enabling on-demand provisioning of applications, platforms, and computing infrastructures. In IC’s July/August 2013 article, “Key Challenges in Cloud Computing: Enabling the Future Internet of Services,” researchers from the Complutense University of Madrid discuss how the cloud community must address several technological challenges before turning this vision into reality. Specific issues relate to efficiently managing scalable and elastic service platforms, developing technologies that enable provider collaboration and interoperability, and improving cloud infrastructure security, reliability, and energy efficiency.
Web science emerged in 2006 as an interdisciplinary area to study the evolution of the Web and understand how it informs, shapes, and is shaped by human activity. To keep pace with the Web’s growing scale and scope, Web science research demands new theories, relevant data, scalable analytic methods, and considerable computational infrastructure. In “The Web Science Observatory,” from the March/April 2013 issue of IS, researchers from the University of Southampton, Oxford University, Northwestern University, and Rensselaer Polytechnic Institute describe the motivation behind the Web Observatory, a global project that will enable the next generation of interdisciplinary research of the Web, helping address grand societal challenges at scale across space and time.
In “A Secret Sociotechnical System,” from IT Pro’s July/August 2013 “IT Ethics” department, Keith W. Miller at the University of Missouri-St. Louis ponders the furor surrounding recent revelations regarding IT surveillance techniques by the US government and comes to the conclusion that, while security concerns are real and serious, “we shouldn’t always assume that any advantage for security (no matter how slight) should automatically trump all privacy concerns.” Indeed, he claims, IT professionals face ethical questions that “transcend legality.”
Shrinking circuit feature size poses a higher risk of multibit upsets and increased vulnerability of combinational logic, requiring more sophisticated soft-error protection techniques. In “Evaluating Overheads of Multibit Soft-Error Protection in the Processor Core,” from IEEE Micro’s July/August 2013 issue, Lukasz G. Szafaryn and Kevin Skadron from the University of Virginia and Brett H. Meyer from McGill University offer a new framework called Svalinn that provides analysis of multibit error protection overheads to facilitate better architecture-level design choices.
Detecting near duplicates among the overwhelming number of multimedia audiovisual files increasingly streaming over the Internet poses significant challenges in terms of content analysis for copyright infringement searches, advertisement tracking, and forensic monitoring. In Multimedia’s July-September 2013 special issue “Web-Scale Near-Duplicate Search: Techniques and Applications,” guest editors Chong-Wah Ngo, Changsheng Xu, Wessel Kraaij, and Abdulmotaleb El Saddik present five articles addressing fundamental issues—including feature representation, matching, and indexing—and current technologies for mobile media search and photo archaeology mining.
Serious gaming strives to change targeted behavior to improve everyday living. In “Serious Gaming for Behavior Change: The State of Play,” from Pervasive’s July-September 2013 issue, researchers present a survey of the field of serious games, focusing on affective analysis—the recognition and analysis of players’ emotions. After presenting two case studies—one game aims to improve the social behavior of autistic children, and one strives to help migrants interact with locals—the researchers consider how to exploit mobile computing for automatic, multimodal analysis of human behavior.
Security & Privacy
Aggressive US government surveillance of reporters’ emails and telephone calls and equally aggressive pursuit of informants and whistleblowers continue unabated under the current administration. As former military intelligence case officer Jeff Stein writes in “The End of National Security Reporting?”—from S&P’s July/August 2013 “In Focus” department—these policies have an increasing chilling effect on freedom of the press and the public dissemination of information.
In the April-June 2013 issue of Annals, which focuses on the explosive growth of four pioneering relational database management systems companies (IBM, Oracle, Informix, and Sybase), Rick Bennett, Oracle’s one-man advertising agency from 1984 to 1990, chronicles the company’s growth from $15 million to $1 billion in sales, looks at a few of its more successful and controversial ads, and describes some of his experiences working personally with Larry Ellison in “Oracle Marketing: Killer Ads.”
CS president emeritus Sorel Reisman’s new blog on computer science education topics, “Musings from the Ivory Tower,” is now online at www.computer.org/portal/web/computingnow/Musings-from-the-Ivory-Tower. The blog is featured on the new Computing Now Education page ( www.computer.org/portal/web/computingnow/education). Also included here are a range of instructional materials on a growing set of technical topics drawn from CS conference tutorials, extracts from CS e-Learning courses, book reviews, audio/video presentations, and interviews with leading computer science experts and technology innovators.