Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/computer/computer45.bht:"
@article{DBLP:journals/computer/Abadi12, author = {Daniel Abadi}, title = {Consistency Tradeoffs in Modern Distributed Database System Design: {CAP} is Only Part of the Story}, journal = {Computer}, volume = {45}, number = {2}, pages = {37--42}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.33}, doi = {10.1109/MC.2012.33}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Abadi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AbdelBakyPKJSSJSPTW12, author = {Moustafa AbdelBaky and Manish Parashar and Hyunjoo Kim and Kirk E. Jordan and Vipin Sachdeva and James C. Sexton and Hani Jamjoom and Zon{-}Yin Shae and Gergina Pencheva and Reza Tavakoli and Mary F. Wheeler}, title = {Enabling High-Performance Computing as a Service}, journal = {Computer}, volume = {45}, number = {10}, pages = {72--80}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.293}, doi = {10.1109/MC.2012.293}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AbdelBakyPKJSSJSPTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AhmedONR12, author = {Irfan Ahmed and Sebastian Obermeier and Martin Naedele and Golden G. Richard III}, title = {{SCADA} Systems: Challenges for Forensic Investigators}, journal = {Computer}, volume = {45}, number = {12}, pages = {44--51}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.325}, doi = {10.1109/MC.2012.325}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/AhmedONR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AksanliVR12, author = {Baris Aksanli and Jagannathan Venkatesh and Tajana Simunic Rosing}, title = {Using Datacenter Simulation to Evaluate Green Energy Integration}, journal = {Computer}, volume = {45}, number = {9}, pages = {56--64}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.249}, doi = {10.1109/MC.2012.249}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AksanliVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AltMS12, author = {Florian Alt and J{\"{o}}rg M{\"{u}}ller and Albrecht Schmidt}, title = {Advertising on Public Display Networks}, journal = {Computer}, volume = {45}, number = {5}, pages = {50--56}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.150}, doi = {10.1109/MC.2012.150}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AltMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AntunesV12, author = {Nuno Antunes and Marco Vieira}, title = {Defending against Web Application Vulnerabilities}, journal = {Computer}, volume = {45}, number = {2}, pages = {66--72}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.259}, doi = {10.1109/MC.2011.259}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AntunesV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Aoyama12, author = {Mikio Aoyama}, title = {Computing for the Next-Generation Automobile}, journal = {Computer}, volume = {45}, number = {6}, pages = {32--37}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.153}, doi = {10.1109/MC.2012.153}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Aoyama12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BaresiGP12, author = {Luciano Baresi and Sam Guinea and Liliana Pasquale}, title = {Service-Oriented Dynamic Software Product Lines}, journal = {Computer}, volume = {45}, number = {10}, pages = {42--48}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.289}, doi = {10.1109/MC.2012.289}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BaresiGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BarryTDT12, author = {Ailsa Barry and Graham A. Thomas and Paul Debenham and Jonathan Trout}, title = {Augmented Reality in a Public Space: The Natural History Museum, London}, journal = {Computer}, volume = {45}, number = {7}, pages = {42--47}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.106}, doi = {10.1109/MC.2012.106}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BarryTDT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BasuK0PRSSS12, author = {Sujoy Basu and Alan H. Karp and Jun Li and James Pruyne and Jerry Rolia and Sharad Singhal and Jaap Suermondt and Ram Swaminathan}, title = {Fusion: Managing Healthcare Records at Cloud Scale}, journal = {Computer}, volume = {45}, number = {11}, pages = {42--49}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.291}, doi = {10.1109/MC.2012.291}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BasuK0PRSSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Beaudouin-LafonHNMPPWCPEGK12, author = {Michel Beaudouin{-}Lafon and St{\'{e}}phane Huot and Mathieu Nancel and Wendy E. Mackay and Emmanuel Pietriga and Romain Primet and Julie Wagner and Olivier Chapuis and Cl{\'{e}}ment Pillias and James Eagan and Tony Gjerlufsen and Clemens Nylandsted Klokmose}, title = {Multisurface Interaction in the {WILD} Room}, journal = {Computer}, volume = {45}, number = {4}, pages = {48--56}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.110}, doi = {10.1109/MC.2012.110}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Beaudouin-LafonHNMPPWCPEGK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BencomoHA12, author = {Nelly Bencomo and Svein O. Hallsteinsen and Eduardo Santana de Almeida}, title = {A View of the Dynamic Software Product Line Landscape}, journal = {Computer}, volume = {45}, number = {10}, pages = {36--41}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.292}, doi = {10.1109/MC.2012.292}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BencomoHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel12, author = {Hal Berghel}, title = {Identity Theft and Financial Fraud: Some Strangeness in the Proportions}, journal = {Computer}, volume = {45}, number = {1}, pages = {86--89}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.16}, doi = {10.1109/MC.2012.16}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel12a, author = {Hal Berghel}, title = {WikiLeaks and the Matter of Private Manning}, journal = {Computer}, volume = {45}, number = {3}, pages = {70--73}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.105}, doi = {10.1109/MC.2012.105}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel12b, author = {Hal Berghel}, title = {Breaking the Fourth Wall of Electronic Crime: Blame It on the Thespians}, journal = {Computer}, volume = {45}, number = {5}, pages = {86--88}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.161}, doi = {10.1109/MC.2012.161}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel12c, author = {Hal Berghel}, title = {The OuijAmazon Desktop Metaphor}, journal = {Computer}, volume = {45}, number = {7}, pages = {80--82}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.246}, doi = {10.1109/MC.2012.246}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel12d, author = {Hal Berghel}, title = {The Dumbing Down of SportPhishing}, journal = {Computer}, volume = {45}, number = {9}, pages = {92--94}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.322}, doi = {10.1109/MC.2012.322}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Berghel12e, author = {Hal Berghel}, title = {Stratfor or Stratagainst}, journal = {Computer}, volume = {45}, number = {11}, pages = {82--85}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.384}, doi = {10.1109/MC.2012.384}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Berghel12e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BertolinoAKP12, author = {Antonia Bertolino and Guglielmo De Angelis and Sampo Kellomaki and Andrea Polini}, title = {Enhancing Service Federation Trustworthiness through Online Testing}, journal = {Computer}, volume = {45}, number = {1}, pages = {66--72}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.227}, doi = {10.1109/MC.2011.227}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BertolinoAKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BiK12, author = {Frank Bi and Joseph A. Konstan}, title = {Customer Service 2.0: Where Social Computing Meets Customer Relations}, journal = {Computer}, volume = {45}, number = {11}, pages = {93--95}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.370}, doi = {10.1109/MC.2012.370}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BianchiOK12, author = {Andrea Bianchi and Ian Oakley and Dong{-}Soo Kwon}, title = {Open Sesame: Design Guidelines for Invisible Passwords}, journal = {Computer}, volume = {45}, number = {4}, pages = {58--65}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.109}, doi = {10.1109/MC.2012.109}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BianchiOK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BillinghurstD12, author = {Mark Billinghurst and Andreas D{\"{u}}nser}, title = {Augmented Reality in the Classroom}, journal = {Computer}, volume = {45}, number = {7}, pages = {56--63}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.111}, doi = {10.1109/MC.2012.111}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BillinghurstD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BirmanFHD12, author = {Kenneth P. Birman and Daniel A. Freedman and Qi Huang and Patrick Dowell}, title = {Overcoming {CAP} with Consistent Soft-State Replication}, journal = {Computer}, volume = {45}, number = {2}, pages = {50--58}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.387}, doi = {10.1109/MC.2011.387}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BirmanFHD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BolandB12, author = {Tim Boland and Paul E. Black}, title = {Juliet 1.1 {C/C++} and Java Test Suite}, journal = {Computer}, volume = {45}, number = {10}, pages = {88--90}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.345}, doi = {10.1109/MC.2012.345}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BolandB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BoothbyHMSW12, author = {William H. Boothby and Wolff Heintschel von Heinegg and James Bret Michael and Michael N. Schmitt and Thomas C. Wingfield}, title = {When Is a Cyberattack a Use of Force or an Armed Attack?}, journal = {Computer}, volume = {45}, number = {8}, pages = {82--84}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.282}, doi = {10.1109/MC.2012.282}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BoothbyHMSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BoschC12, author = {Jan Bosch and Rafael Capilla}, title = {Dynamic Variability in Software-Intensive Embedded System Families}, journal = {Computer}, volume = {45}, number = {10}, pages = {28--35}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.287}, doi = {10.1109/MC.2012.287}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BoschC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BradySLR12, author = {Kevin Brady and Ram D. Sriram and Bettijoyce Lide and Kathleen Roberts}, title = {Testing the Nation's Healthcare Information Infrastructure: {NIST} Perspective}, journal = {Computer}, volume = {45}, number = {11}, pages = {50--57}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.290}, doi = {10.1109/MC.2012.290}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BradySLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Brewer12, author = {Eric A. Brewer}, title = {Pushing the {CAP:} Strategies for Consistency and Availability}, journal = {Computer}, volume = {45}, number = {2}, pages = {23--29}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.37}, doi = {10.1109/MC.2012.37}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Brewer12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Brinkman12, author = {Bo Brinkman}, title = {The Next Step for Ethics Education Is Enforcing the Code}, journal = {Computer}, volume = {45}, number = {2}, pages = {88--90}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.67}, doi = {10.1109/MC.2012.67}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Brinkman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BrownAMS12, author = {Arnold Brown and Benjamin Apple and James Bret Michael and Michael A. Schumann}, title = {Atomic-Level Security for Web Applications in a Cloud Environment}, journal = {Computer}, volume = {45}, number = {12}, pages = {80--83}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.400}, doi = {10.1109/MC.2012.400}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BrownAMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CameronG12, author = {Kirk W. Cameron and Rong Ge}, title = {Generalizing Amdahl's Law for Power and Energy}, journal = {Computer}, volume = {45}, number = {3}, pages = {75--77}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.92}, doi = {10.1109/MC.2012.92}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/CameronG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CampisiRS12, author = {Patrizio Campisi and Daria La Rocca and Gaetano Scarano}, title = {{EEG} for Automatic Person Recognition}, journal = {Computer}, volume = {45}, number = {7}, pages = {87--89}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.233}, doi = {10.1109/MC.2012.233}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CampisiRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChandramohanT12, author = {Mahinthan Chandramohan and Hee Beng Kuan Tan}, title = {Detection of Mobile Malware in the Wild}, journal = {Computer}, volume = {45}, number = {9}, pages = {65--71}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.36}, doi = {10.1109/MC.2012.36}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChandramohanT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChangB12, author = {Kai{-}Hui Chang and Chris Browy}, title = {Parallel Logic Simulation: Myth or Reality?}, journal = {Computer}, volume = {45}, number = {4}, pages = {67--73}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.385}, doi = {10.1109/MC.2011.385}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChangB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChenWW12, author = {Jianyong Chen and Yang Wang and Xiaomin Wang}, title = {On-Demand Security Architecture for Cloud Computing}, journal = {Computer}, volume = {45}, number = {7}, pages = {73--78}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.120}, doi = {10.1109/MC.2012.120}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChenWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChowdhuryCEMG12, author = {Kaushik R. Chowdhury and Dave Cavalcanti and Mostafa El{-}Said and Tommaso Mazza and Chittabrata Ghosh}, title = {Modeling and Simulation of Smart and Green Computing Systems}, journal = {Computer}, volume = {45}, number = {9}, pages = {22--23}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.317}, doi = {10.1109/MC.2012.317}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/ChowdhuryCEMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChuLCCYLH12, author = {William Cheng{-}Chung Chu and Chao{-}Tung Yang and Chih{-}Wei Lu and Chih{-}Hung Chang and Juei{-}Nan Chen and Pao{-}Ann Hsiung and Hahn{-}Ming Lee}, title = {Cloud Computing in Taiwan}, journal = {Computer}, volume = {45}, number = {6}, pages = {48--56}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.188}, doi = {10.1109/MC.2012.188}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/ChuLCCYLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CurryGSD12, author = {Edward Curry and Bill Guyon and Charles Sheridan and Brian Donnellan}, title = {Sustainable {IT:} Challenges, Postures, and Outcomes}, journal = {Computer}, volume = {45}, number = {11}, pages = {79--81}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.385}, doi = {10.1109/MC.2012.385}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CurryGSD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DaviesLJS12, author = {Nigel Davies and Marc Langheinrich and Rui Jos{\'{e}} and Albrecht Schmidt}, title = {Open Display Networks: {A} Communications Medium for the 21st Century}, journal = {Computer}, volume = {45}, number = {5}, pages = {58--64}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.114}, doi = {10.1109/MC.2012.114}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DaviesLJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DaviesSH12, author = {Stephen Davies and Stacey Aylor Seal and Jesse Hatfield}, title = {Cinefile: {A} Category-Based Analytic Browser}, journal = {Computer}, volume = {45}, number = {8}, pages = {62--69}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.39}, doi = {10.1109/MC.2012.39}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DaviesSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DeS12, author = {Swades De and Riya Singhal}, title = {Toward Uninterrupted Operation of Wireless Sensor Networks}, journal = {Computer}, volume = {45}, number = {9}, pages = {24--30}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.253}, doi = {10.1109/MC.2012.253}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DeS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/DedrickTK12, author = {Jason L. Dedrick and Jian Tang and Kenneth L. Kraemer}, title = {China's Indigenous Innovation Policy: Impact on Multi-national R{\&}D}, journal = {Computer}, volume = {45}, number = {11}, pages = {70--78}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.187}, doi = {10.1109/MC.2012.187}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/DedrickTK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ErbesNG12, author = {Jamie Erbes and Hamid R. Motahari Nezhad and Sven Graupner}, title = {The Future of Enterprise {IT} in the Cloud}, journal = {Computer}, volume = {45}, number = {5}, pages = {66--72}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.73}, doi = {10.1109/MC.2012.73}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ErbesNG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ErpLT12, author = {Jan B. F. van Erp and Fabien Lotte and Michael Tangermann}, title = {Brain-Computer Interfaces: Beyond Medical Applications}, journal = {Computer}, volume = {45}, number = {4}, pages = {26--34}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.107}, doi = {10.1109/MC.2012.107}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ErpLT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FaginS12, author = {Barry Fagin and Dale Skrien}, title = {Debugging on the Shoulders of Giants: Von Neumann's Programs 65 Years Later}, journal = {Computer}, volume = {45}, number = {11}, pages = {59--68}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.69}, doi = {10.1109/MC.2012.69}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/FaginS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Fitzgerald12, author = {Brian Fitzgerald}, title = {Software Crisis 2.0}, journal = {Computer}, volume = {45}, number = {4}, pages = {89--91}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.147}, doi = {10.1109/MC.2012.147}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Fitzgerald12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Frachtenberg12, author = {Eitan Frachtenberg}, title = {Holistic Datacenter Design in the Open Compute Project}, journal = {Computer}, volume = {45}, number = {7}, pages = {83--85}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.235}, doi = {10.1109/MC.2012.235}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Frachtenberg12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FranqueiraW12, author = {Virginia N. L. Franqueira and Roel J. Wieringa}, title = {Role-Based Access Control in Retrospect}, journal = {Computer}, volume = {45}, number = {6}, pages = {81--88}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.38}, doi = {10.1109/MC.2012.38}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/FranqueiraW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/FridayDE12, author = {Adrian Friday and Nigel Davies and Christos Efstratiou}, title = {Reflections on Long-Term Experiments with Public Displays}, journal = {Computer}, volume = {45}, number = {5}, pages = {34--41}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.155}, doi = {10.1109/MC.2012.155}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/FridayDE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Fridsma12, author = {Doug B. Fridsma}, title = {Electronic Health Records: The {HHS} Perspective}, journal = {Computer}, volume = {45}, number = {11}, pages = {24--26}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.371}, doi = {10.1109/MC.2012.371}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Fridsma12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffCC12, author = {Brian M. Gaff and Kenneth Choy and Jamie Chan}, title = {Doing Business in China}, journal = {Computer}, volume = {45}, number = {8}, pages = {11--13}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.262}, doi = {10.1109/MC.2012.262}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffDP12, author = {Brian M. Gaff and Timothy P. Van Dyck and Elizabeth A. Peters}, title = {Employment Issues Confronting Start-Up Companies}, journal = {Computer}, volume = {45}, number = {12}, pages = {13--15}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.408}, doi = {10.1109/MC.2012.408}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffDP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffF12, author = {Brian M. Gaff and Karl P. Fryzel}, title = {Starting a Business: Which Entity Structure Is Best for You?}, journal = {Computer}, volume = {45}, number = {10}, pages = {10--12}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.353}, doi = {10.1109/MC.2012.353}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffHC12, author = {Brian M. Gaff and Stephen G. Huggard and Gregory W. Carey}, title = {Do {I} Need {A} Lawyer? If You Have to Ask, You Probably Do}, journal = {Computer}, volume = {45}, number = {5}, pages = {10--12}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.167}, doi = {10.1109/MC.2012.167}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffKH12, author = {Brian M. Gaff and Richard N. Kimball and Jill M. Hanson}, title = {Raising Capital: Where to Find It, How to Secure It, and Tips on What to Avoid}, journal = {Computer}, volume = {45}, number = {7}, pages = {11--13}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.240}, doi = {10.1109/MC.2012.240}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffKH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffLD12, author = {Brian M. Gaff and Ralph A. Loren and Amy M. DeCloux}, title = {A Brief Overview of the America Invents Act}, journal = {Computer}, volume = {45}, number = {11}, pages = {8--10}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.362}, doi = {10.1109/MC.2012.362}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffLD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffLM12, author = {Brian M. Gaff and Ralph A. Loren and Gabriel J. McCool}, title = {Intellectual Property, Part {I}}, journal = {Computer}, volume = {45}, number = {1}, pages = {14--16}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.19}, doi = {10.1109/MC.2012.19}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffLS12, author = {Brian M. Gaff and Ralph A. Loren and Elizabeth A. Spinney}, title = {Intellectual Property, Part {II}}, journal = {Computer}, volume = {45}, number = {2}, pages = {9--11}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.56}, doi = {10.1109/MC.2012.56}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffMC12, author = {Brian M. Gaff and Brian P. Murphy and Peter J. Cuomo}, title = {Defending Against Patent Infringement}, journal = {Computer}, volume = {45}, number = {4}, pages = {9--12}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.130}, doi = {10.1109/MC.2012.130}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffMC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffMLDS12, author = {Brian M. Gaff and Brian P. Murphy and Ralph A. Loren and Christine A. Dudzik and Lisa Swiszcz}, title = {Patent Reform: New Tools for Challenging Patent Validity as of September 2012}, journal = {Computer}, volume = {45}, number = {9}, pages = {9--11}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.319}, doi = {10.1109/MC.2012.319}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffMLDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffP12, author = {Brian M. Gaff and Gregory J. Ploussios}, title = {Open Source Software}, journal = {Computer}, volume = {45}, number = {6}, pages = {9--11}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.213}, doi = {10.1109/MC.2012.213}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GaffSS12, author = {Brian M. Gaff and Thomas J. Smedinghoff and Socheth Sor}, title = {Privacy and Data Security}, journal = {Computer}, volume = {45}, number = {3}, pages = {8--10}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.102}, doi = {10.1109/MC.2012.102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GaffSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gambier12, author = {Jimmy Gambier}, title = {An Independent Social Game Company's Perspective}, journal = {Computer}, volume = {45}, number = {2}, pages = {85--87}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.43}, doi = {10.1109/MC.2012.43}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gambier12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber12, author = {Lee Garber}, title = {The Challenges of Securing the Virtualized Environment}, journal = {Computer}, volume = {45}, number = {1}, pages = {17--20}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.27}, doi = {10.1109/MC.2012.27}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber12a, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {45}, number = {2}, pages = {17--19}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.60}, doi = {10.1109/MC.2012.60}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber12b, author = {Lee Garber}, title = {Wi-Fi Races into a Faster Future}, journal = {Computer}, volume = {45}, number = {3}, pages = {13--16}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.104}, doi = {10.1109/MC.2012.104}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber12c, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {45}, number = {3}, pages = {18--20}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.101}, doi = {10.1109/MC.2012.101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber12d, author = {Lee Garber}, title = {News Briefs}, journal = {Computer}, volume = {45}, number = {5}, pages = {18--20}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.177}, doi = {10.1109/MC.2012.177}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber12e, author = {Lee Garber}, title = {Converged Infrastructure: Addressing the Efficiency Challenge}, journal = {Computer}, volume = {45}, number = {8}, pages = {17--20}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.261}, doi = {10.1109/MC.2012.261}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber12e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber12f, author = {Lee Garber}, title = {Using In-Memory Analytics to Quickly Crunch Big Data}, journal = {Computer}, volume = {45}, number = {10}, pages = {16--18}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.358}, doi = {10.1109/MC.2012.358}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber12f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Garber12g, author = {Lee Garber}, title = {Have Java's Security Issues Gotten out of Hand?}, journal = {Computer}, volume = {45}, number = {12}, pages = {18--21}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.411}, doi = {10.1109/MC.2012.411}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Garber12g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GasterH12, author = {Benedict R. Gaster and Lee W. Howes}, title = {Can {GPGPU} Programming Be Liberated from the Data-Parallel Bottleneck?}, journal = {Computer}, volume = {45}, number = {8}, pages = {42--52}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.257}, doi = {10.1109/MC.2012.257}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GasterH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GellersenB12, author = {Hans Gellersen and Florian Block}, title = {Novel Interactions on the Keyboard}, journal = {Computer}, volume = {45}, number = {4}, pages = {36--40}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.112}, doi = {10.1109/MC.2012.112}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GellersenB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GervautzS12, author = {Michael Gervautz and Dieter Schmalstieg}, title = {Anywhere Interfaces Using Handheld Augmented Reality}, journal = {Computer}, volume = {45}, number = {7}, pages = {26--31}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.72}, doi = {10.1109/MC.2012.72}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GervautzS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GilbertL12, author = {Seth Gilbert and Nancy A. Lynch}, title = {Perspectives on the {CAP} Theorem}, journal = {Computer}, volume = {45}, number = {2}, pages = {30--36}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.389}, doi = {10.1109/MC.2011.389}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/GilbertL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12, author = {David Alan Grier and Erin Dian Dumbacher}, title = {The Common Future}, journal = {Computer}, volume = {45}, number = {1}, pages = {108}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.28}, doi = {10.1109/MC.2012.28}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12a, author = {David Alan Grier and Erin Dian Dumbacher}, title = {The New Internationalists}, journal = {Computer}, volume = {45}, number = {2}, pages = {112}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.66}, doi = {10.1109/MC.2012.66}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12b, author = {David Alan Grier and Erin Dian Dumbacher}, title = {Free Agency}, journal = {Computer}, volume = {45}, number = {3}, pages = {104}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.90}, doi = {10.1109/MC.2012.90}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12c, author = {David Alan Grier and Erin Dian Dumbacher}, title = {Learning from the Best}, journal = {Computer}, volume = {45}, number = {4}, pages = {116}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.140}, doi = {10.1109/MC.2012.140}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12d, author = {David Alan Grier and Erin Dian Dumbacher}, title = {Teaching the Intangible}, journal = {Computer}, volume = {45}, number = {5}, pages = {116}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.180}, doi = {10.1109/MC.2012.180}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12e, author = {David Alan Grier and Erin Dian Dumbacher}, title = {Controlling Share}, journal = {Computer}, volume = {45}, number = {6}, pages = {128}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.204}, doi = {10.1109/MC.2012.204}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12f, author = {David Alan Grier and Erin Dian Dumbacher}, title = {Repurposers}, journal = {Computer}, volume = {45}, number = {7}, pages = {116}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.241}, doi = {10.1109/MC.2012.241}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12g, author = {David Alan Grier and Erin Dian Dumbacher}, title = {The Winner Takes It All}, journal = {Computer}, volume = {45}, number = {8}, pages = {120}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.279}, doi = {10.1109/MC.2012.279}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12h, author = {David Alan Grier and Erin Dian Dumbacher}, title = {It's Complicated}, journal = {Computer}, volume = {45}, number = {9}, pages = {124}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.314}, doi = {10.1109/MC.2012.314}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12i, author = {David Alan Grier and Erin Dian Dumbacher}, title = {The Computer in the Mirror}, journal = {Computer}, volume = {45}, number = {10}, pages = {128}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.356}, doi = {10.1109/MC.2012.356}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GrierD12j, author = {David Alan Grier and Erin Dian Dumbacher}, title = {Work/Play}, journal = {Computer}, volume = {45}, number = {12}, pages = {116}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.423}, doi = {10.1109/MC.2012.423}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GrierD12j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Gruenbaum12, author = {Peter Gruenbaum}, title = {Underrepresented Youth Creating Culturally Relevant Games}, journal = {Computer}, volume = {45}, number = {10}, pages = {91--93}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.357}, doi = {10.1109/MC.2012.357}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Gruenbaum12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HalfakerR12, author = {Aaron Halfaker and John Riedl}, title = {Bots and Cyborgs: Wikipedia's Immune System}, journal = {Computer}, volume = {45}, number = {3}, pages = {79--82}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.82}, doi = {10.1109/MC.2012.82}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HalfakerR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hallisey12, author = {Brad Hallisey}, title = {Building a Virtual World: The Pipeline and Process}, journal = {Computer}, volume = {45}, number = {12}, pages = {90--92}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.402}, doi = {10.1109/MC.2012.402}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Hallisey12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HaricombeEA12, author = {Lorraine J. Haricombe and L. Ada Emmett and Perry Alexander}, title = {Open Access: An Evolving Alternative}, journal = {Computer}, volume = {45}, number = {8}, pages = {70--72}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.274}, doi = {10.1109/MC.2012.274}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HaricombeEA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HarleH12, author = {Robert K. Harle and Andy Hopper}, title = {Sports Sensing: An Olympic Challenge for Computing}, journal = {Computer}, volume = {45}, number = {6}, pages = {98--101}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.216}, doi = {10.1109/MC.2012.216}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HarleH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HedleyZ12, author = {Mark Hedley and Jian (Andrew) Zhang}, title = {Accurate Wireless Localization in Sports}, journal = {Computer}, volume = {45}, number = {10}, pages = {64--70}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.119}, doi = {10.1109/MC.2012.119}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/HedleyZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HeldKMS12, author = {Cornelius Held and Julia Krumm and Petra Markel and Ralf P. Schenke}, title = {Intelligent Video Surveillance}, journal = {Computer}, volume = {45}, number = {3}, pages = {83--84}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.97}, doi = {10.1109/MC.2012.97}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HeldKMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HeyGP12, author = {Tony Hey and Dennis Gannon and Jim Pinkelman}, title = {The Future of Data-Intensive Science}, journal = {Computer}, volume = {45}, number = {5}, pages = {81--82}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.181}, doi = {10.1109/MC.2012.181}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HeyGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HincheyPS12, author = {Mike Hinchey and Sooyong Park and Klaus Schmid}, title = {Building Dynamic Software Product Lines}, journal = {Computer}, volume = {45}, number = {10}, pages = {22--26}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.332}, doi = {10.1109/MC.2012.332}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HincheyPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hodge12, author = {David C. Hodge}, title = {Increasing Tuition's Affordability}, journal = {Computer}, volume = {45}, number = {4}, pages = {86--88}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.136}, doi = {10.1109/MC.2012.136}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Hodge12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hollan12, author = {James D. Hollan}, title = {Activity-Enriched Computing: Capturing and Mining Activity Histories}, journal = {Computer}, volume = {45}, number = {10}, pages = {84--87}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.331}, doi = {10.1109/MC.2012.331}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Hollan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Hsu12, author = {Francis Hsu}, title = {The Impossible and the Possible}, journal = {Computer}, volume = {45}, number = {2}, pages = {91--92}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.65}, doi = {10.1109/MC.2012.65}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Hsu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuntZ12, author = {Ray Hunt and Sherali Zeadally}, title = {Network Forensics: An Analysis of Techniques, Tools, and Trends}, journal = {Computer}, volume = {45}, number = {12}, pages = {36--43}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.252}, doi = {10.1109/MC.2012.252}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuntZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Israel12, author = {Jerome Israel}, title = {Why the {FBI} Can't Build a Case Management System}, journal = {Computer}, volume = {45}, number = {6}, pages = {73--80}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.2}, doi = {10.1109/MC.2012.2}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Israel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/IyengarLXMBSI12, author = {S. Sitharama Iyengar and Xin Li and Huanhuan Xu and Supratik Mukhopadhyay and N. Balakrishnan and Amit Sawant and Puneeth Iyengar}, title = {Toward More Precise Radiotherapy Treatment of Lung Tumors}, journal = {Computer}, volume = {45}, number = {1}, pages = {59--65}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.230}, doi = {10.1109/MC.2011.230}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/IyengarLXMBSI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JainJL12, author = {Anil K. Jain and Rong Jin and Jung{-}Eun Lee}, title = {Tattoo Image Matching and Retrieval}, journal = {Computer}, volume = {45}, number = {5}, pages = {93--96}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.179}, doi = {10.1109/MC.2012.179}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/JainJL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JainN12, author = {Anil K. Jain and Karthik Nandakumar}, title = {Biometric Authentication: System Security and User Privacy}, journal = {Computer}, volume = {45}, number = {11}, pages = {87--92}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.364}, doi = {10.1109/MC.2012.364}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/JainN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JainY12, author = {Anil K. Jain and Soweon Yoon}, title = {Automatic Detection of Altered Fingerprints}, journal = {Computer}, volume = {45}, number = {1}, pages = {79--82}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.6}, doi = {10.1109/MC.2012.6}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/JainY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JeeKHRM12, author = {Justin Jee and Lee Case Klippel and Mahmud Shahriar Hossain and Naren Ramakrishnan and Bud Mishra}, title = {Discovering the Ebb and Flow of Ideas from Text Corpora}, journal = {Computer}, volume = {45}, number = {2}, pages = {73--77}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.52}, doi = {10.1109/MC.2012.52}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/JeeKHRM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KecklerR12, author = {Stephen W. Keckler and Steven K. Reinhardt}, title = {Massively Multithreaded Computing Systems}, journal = {Computer}, volume = {45}, number = {8}, pages = {24--25}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.270}, doi = {10.1109/MC.2012.270}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KecklerR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kessler12, author = {Gary C. Kessler}, title = {Information Security: New Threats or Familiar Problems?}, journal = {Computer}, volume = {45}, number = {2}, pages = {59--65}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.262}, doi = {10.1109/MC.2011.262}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Kessler12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Kessler12a, author = {Gary C. Kessler}, title = {Advancing the Science of Digital Forensics}, journal = {Computer}, volume = {45}, number = {12}, pages = {25--27}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.399}, doi = {10.1109/MC.2012.399}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Kessler12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KocaogluMA12, author = {Murat Kocaoglu and Derya Malak and {\"{O}}zg{\"{u}}r B. Akan}, title = {Fundamentals of Green Communications and Computing: Modeling and Simulation}, journal = {Computer}, volume = {45}, number = {9}, pages = {40--46}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.248}, doi = {10.1109/MC.2012.248}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KocaogluMA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Koyuturk12, author = {Mehmet Koyut{\"{u}}rk}, title = {Using Protein Interaction Networks to Understand Complex Diseases}, journal = {Computer}, volume = {45}, number = {3}, pages = {31--38}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.40}, doi = {10.1109/MC.2012.40}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Koyuturk12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KuhlischKR12, author = {Raik Kuhlisch and Ben Kraufmann and Hannes Restel}, title = {Electronic Case Records in a Box: Integrating Patient Data in Healthcare Networks}, journal = {Computer}, volume = {45}, number = {11}, pages = {34--40}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.294}, doi = {10.1109/MC.2012.294}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KuhlischKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LamR12, author = {Shyong K. Lam and John Riedl}, title = {Are Our Online "Friends" Really Friends?}, journal = {Computer}, volume = {45}, number = {1}, pages = {91--93}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.5}, doi = {10.1109/MC.2012.5}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LamR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LampeE12, author = {Cliff Lampe and Nicole B. Ellison}, title = {Understanding Facebook: Social Computing Isn't 'Just' Social}, journal = {Computer}, volume = {45}, number = {9}, pages = {98--100}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.324}, doi = {10.1109/MC.2012.324}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LampeE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LauMI12, author = {Manfred Lau and Jun Mitani and Takeo Igarashi}, title = {Digital Fabrication}, journal = {Computer}, volume = {45}, number = {12}, pages = {76--79}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.407}, doi = {10.1109/MC.2012.407}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LauMI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Lawton12, author = {George Lawton}, title = {Cloud Streaming Brings Video to Mobile Devices}, journal = {Computer}, volume = {45}, number = {2}, pages = {14--16}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.47}, doi = {10.1109/MC.2012.47}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Lawton12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Leavitt12, author = {Neal Leavitt}, title = {Will Power Problems Curtail Processor Progress?}, journal = {Computer}, volume = {45}, number = {5}, pages = {15--17}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.184}, doi = {10.1109/MC.2012.184}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Leavitt12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Leavitt12a, author = {Neal Leavitt}, title = {Are Mobile Payments Ready to Cash in Yet?}, journal = {Computer}, volume = {45}, number = {9}, pages = {15--18}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.298}, doi = {10.1109/MC.2012.298}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Leavitt12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LeeKR12, author = {Jaejoon Lee and Gerald Kotonya and Daniel Robinson}, title = {Engineering Service-Based Dynamic Software Product Lines}, journal = {Computer}, volume = {45}, number = {10}, pages = {49--55}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.284}, doi = {10.1109/MC.2012.284}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LeeKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Lipton12, author = {Richard J. Lipton}, title = {Might Turing Have Won a Turing Award?}, journal = {Computer}, volume = {45}, number = {6}, pages = {96--97}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.211}, doi = {10.1109/MC.2012.211}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Lipton12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Lyon12, author = {Doug Lyon}, title = {The Java Tree Withers}, journal = {Computer}, volume = {45}, number = {1}, pages = {83--85}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.30}, doi = {10.1109/MC.2012.30}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Lyon12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MadhavanVEJRWM12, author = {Krishna P. C. Madhavan and Mihaela Vorvoreanu and Niklas Elmqvist and Aditya Johri and Naren Ramakrishnan and G. Alan Wang and Ann F. McKenna}, title = {Portfolio Mining}, journal = {Computer}, volume = {45}, number = {10}, pages = {95--99}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.351}, doi = {10.1109/MC.2012.351}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/MadhavanVEJRWM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MaliziaO12, author = {Alessio Malizia and Kai A. Olsen}, title = {Toward a New Search Paradigm-Can We Learn from Ants?}, journal = {Computer}, volume = {45}, number = {5}, pages = {89--91}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.182}, doi = {10.1109/MC.2012.182}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MaliziaO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MarsdenCJNR12, author = {Gary Marsden and Edward Cutrell and Matt Jones and Amit Anil Nanavati and Nitendra Rajput}, title = {Making Technology Invisible in the Developing World}, journal = {Computer}, volume = {45}, number = {4}, pages = {82--85}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.141}, doi = {10.1109/MC.2012.141}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/MarsdenCJNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MayhewGHH12, author = {Michael B. Mayhew and Xin Guo and Steven B. Haase and Alexander J. Hartemink}, title = {Close Encounters of the Collaborative Kind}, journal = {Computer}, volume = {45}, number = {3}, pages = {24--30}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.85}, doi = {10.1109/MC.2012.85}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MayhewGHH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MeiHX12, author = {Hong Mei and Gang Huang and Tao Xie}, title = {Internetware: {A} Software Paradigm for Internet Computing}, journal = {Computer}, volume = {45}, number = {6}, pages = {26--31}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.189}, doi = {10.1109/MC.2012.189}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MeiHX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MelaragnoBWM12, author = {Anthony Patrick Melaragno and Damindra Bandara and Duminda Wijesekera and James Bret Michael}, title = {Securing the ZigBee Protocol in the Smart Grid}, journal = {Computer}, volume = {45}, number = {4}, pages = {92--94}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.146}, doi = {10.1109/MC.2012.146}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MelaragnoBWM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Mens12, author = {Tom Mens}, title = {On the Complexity of Software Systems}, journal = {Computer}, volume = {45}, number = {8}, pages = {79--81}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.273}, doi = {10.1109/MC.2012.273}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Mens12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MilojicicASTT12, author = {Dejan S. Milojicic and Martin F. Arlitt and Dor{\'{e}}e Duncan Seligmann and George K. Thiruvathukal and Christian Timmerer}, title = {Innovation Mashups: Academic Rigor Meets Social Networking Buzz}, journal = {Computer}, volume = {45}, number = {9}, pages = {101--105}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.313}, doi = {10.1109/MC.2012.313}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MilojicicASTT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MineBGRY12, author = {Mark R. Mine and Jeroen van Baar and Anselm Grundh{\"{o}}fer and David Rose and Bei Yang}, title = {Projection-Based Augmented Reality in Disney Theme Parks}, journal = {Computer}, volume = {45}, number = {7}, pages = {32--40}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.154}, doi = {10.1109/MC.2012.154}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MineBGRY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Moreno-VozmedianoML12, author = {Rafael Moreno{-}Vozmediano and Rub{\'{e}}n S. Montero and Ignacio Mart{\'{\i}}n Llorente}, title = {IaaS Cloud Architecture: From Virtualized Datacenters to Federated Cloud Infrastructures}, journal = {Computer}, volume = {45}, number = {12}, pages = {65--72}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.76}, doi = {10.1109/MC.2012.76}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Moreno-VozmedianoML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Muller-TomfeldeF12, author = {Christian M{\"{u}}ller{-}Tomfelde and Morten Fjeld}, title = {Tabletops: Interactive Horizontal Displays for Ubiquitous Computing}, journal = {Computer}, volume = {45}, number = {2}, pages = {78--81}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.64}, doi = {10.1109/MC.2012.64}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Muller-TomfeldeF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/MunsonP12, author = {Jeff Munson and Phillip T. Pasqual}, title = {Using Technology in Autism Research: The Promise and the Perils}, journal = {Computer}, volume = {45}, number = {6}, pages = {89--91}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.220}, doi = {10.1109/MC.2012.220}, timestamp = {Fri, 17 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/MunsonP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Murali12, author = {T. M. Murali}, title = {Guest Editor's Introduction: Computationally Driven Experimental Biology}, journal = {Computer}, volume = {45}, number = {3}, pages = {22--23}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.93}, doi = {10.1109/MC.2012.93}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Murali12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NavabBWOW12, author = {Nassir Navab and Tobias Blum and Lejing Wang and Asli Okur and Thomas Wendler}, title = {First Deployments of Augmented Reality in Operating Rooms}, journal = {Computer}, volume = {45}, number = {7}, pages = {48--55}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.75}, doi = {10.1109/MC.2012.75}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NavabBWOW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NestasH12, author = {Lars Hopland Nest{\aa}s and Kjell J{\o}rgen Hole}, title = {Building and Maintaining Trust in Internet Voting}, journal = {Computer}, volume = {45}, number = {5}, pages = {74--80}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.35}, doi = {10.1109/MC.2012.35}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NestasH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Ng-Thow-HingO12, author = {Victor Ng{-}Thow{-}Hing and Sandra Y. Okita}, title = {Playdates with Robots}, journal = {Computer}, volume = {45}, number = {8}, pages = {73--75}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.275}, doi = {10.1109/MC.2012.275}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Ng-Thow-HingO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NordmanCM12, author = {Bruce Nordman and Ken Christensen and Alan K. Meier}, title = {Think Globally, Distribute Power Locally: The Promise of Nanogrids}, journal = {Computer}, volume = {45}, number = {9}, pages = {89--91}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.323}, doi = {10.1109/MC.2012.323}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NordmanCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OLeary12, author = {Daniel E. O'Leary}, title = {Computer-Based Political Action: The Battle and Internet Blackout over {PIPA}}, journal = {Computer}, volume = {45}, number = {7}, pages = {64--72}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.186}, doi = {10.1109/MC.2012.186}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/OLeary12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OhrtT12, author = {Julian Ohrt and Volker Turau}, title = {Cross-Platform Development Tools for Smartphone Applications}, journal = {Computer}, volume = {45}, number = {9}, pages = {72--79}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.121}, doi = {10.1109/MC.2012.121}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/OhrtT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OjalaKKHLJHKZ12, author = {Timo Ojala and Vassilis Kostakos and Hannu Kukka and Tommi Heikkinen and Tomas Lind{\'{e}}n and Marko Jurmu and Simo Hosio and Fabio Kruger and Daniele Zanni}, title = {Multipurpose Interactive Public Displays in the Wild: Three Years Later}, journal = {Computer}, volume = {45}, number = {5}, pages = {42--49}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.115}, doi = {10.1109/MC.2012.115}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/OjalaKKHLJHKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/OppligerW12, author = {Rolf Oppliger and Bruno Wildhaber}, title = {Common Misconceptions in Computer and Information Security}, journal = {Computer}, volume = {45}, number = {6}, pages = {102--104}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.201}, doi = {10.1109/MC.2012.201}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/OppligerW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Ortiz12, author = {Sixto Ortiz Jr.}, title = {New Approach Keeps Security in Context}, journal = {Computer}, volume = {45}, number = {4}, pages = {15--17}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.144}, doi = {10.1109/MC.2012.144}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Ortiz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Pentland12, author = {Alex Pentland}, title = {Society's Nervous System: Building Effective Government, Energy, and Public Health Systems}, journal = {Computer}, volume = {45}, number = {1}, pages = {31--38}, year = {2012}, url = {http://doi.ieeecomputersociety.org/10.1109/MC.2011.299}, doi = {10.1109/MC.2011.299}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Pentland12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/QuanWDXG12, author = {Xiaojun Quan and Liu Wenyin and Wenyu Dou and Hui Xiong and Yong Ge}, title = {Link Graph Analysis for Business Site Selection}, journal = {Computer}, volume = {45}, number = {3}, pages = {64--69}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.260}, doi = {10.1109/MC.2011.260}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/QuanWDXG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Ramakrishnan12, author = {Raghu Ramakrishnan}, title = {{CAP} and Cloud Data Management}, journal = {Computer}, volume = {45}, number = {2}, pages = {43--49}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.388}, doi = {10.1109/MC.2011.388}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Ramakrishnan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ReedLG12, author = {Daniel A. Reed and James R. Larus and Dennis Gannon}, title = {Imagining the Future: Thoughts on Computing}, journal = {Computer}, volume = {45}, number = {1}, pages = {25--30}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.327}, doi = {10.1109/MC.2011.327}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ReedLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Reinicke12, author = {Bryan Reinicke}, title = {It's 2012, So Why Am {I} Driving a 1972 Bug?}, journal = {Computer}, volume = {45}, number = {10}, pages = {100--103}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.343}, doi = {10.1109/MC.2012.343}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Reinicke12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RicanekB12, author = {Karl Ricanek Jr. and Chris Boehnen}, title = {Facial Analytics: From Big Data to Law Enforcement}, journal = {Computer}, volume = {45}, number = {9}, pages = {95--97}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.308}, doi = {10.1109/MC.2012.308}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RicanekB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Riener12, author = {Andreas Riener}, title = {Gestural Interaction in Vehicular Applications}, journal = {Computer}, volume = {45}, number = {4}, pages = {42--47}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.108}, doi = {10.1109/MC.2012.108}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Riener12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SawyerMDSH12, author = {Pete Sawyer and Ra{\'{u}}l Mazo and Daniel Diaz and Camille Salinesi and Danny Hughes}, title = {Using Constraint Programming to Manage Configurations in Self-Adaptive Systems}, journal = {Computer}, volume = {45}, number = {10}, pages = {56--63}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.286}, doi = {10.1109/MC.2012.286}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/SawyerMDSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SchmidtC12, author = {Albrecht Schmidt and Elizabeth F. Churchill}, title = {Interaction Beyond the Keyboard}, journal = {Computer}, volume = {45}, number = {4}, pages = {21--24}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.137}, doi = {10.1109/MC.2012.137}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SchmidtC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SenorAT12, author = {Inmaculada Carri{\'{o}}n Se{\~{n}}or and Jos{\'{e}} Luis Fern{\'{a}}ndez Alem{\'{a}}n and Ambrosio Toval}, title = {Personal Health Records: New Means to Safely Handle Health Data?}, journal = {Computer}, volume = {45}, number = {11}, pages = {27--33}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.285}, doi = {10.1109/MC.2012.285}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SenorAT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance12, author = {Charles R. Severance}, title = {The Second-Order Effects of Steve Jobs}, journal = {Computer}, volume = {45}, number = {1}, pages = {10--11}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.31}, doi = {10.1109/MC.2012.31}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance12a, author = {Charles R. Severance}, title = {JavaScript: Designing a Language in 10 Days}, journal = {Computer}, volume = {45}, number = {2}, pages = {7--8}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.57}, doi = {10.1109/MC.2012.57}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance12b, author = {Charles R. Severance}, title = {Monash Museum of Computing History}, journal = {Computer}, volume = {45}, number = {3}, pages = {6--7}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.100}, doi = {10.1109/MC.2012.100}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance12c, author = {Charles R. Severance}, title = {Discovering JavaScript Object Notation}, journal = {Computer}, volume = {45}, number = {4}, pages = {6--8}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.132}, doi = {10.1109/MC.2012.132}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance12d, author = {Charles R. Severance}, title = {Van Jacobson: Getting NSFNet off the Ground}, journal = {Computer}, volume = {45}, number = {5}, pages = {6--9}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.183}, doi = {10.1109/MC.2012.183}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance12e, author = {Charles R. Severance}, title = {The Art of Teaching Computer Science: Niklaus Wirth}, journal = {Computer}, volume = {45}, number = {7}, pages = {8--10}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.245}, doi = {10.1109/MC.2012.245}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance12e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance12f, author = {Charles R. Severance}, title = {Teaching the World: Daphne Koller and Coursera}, journal = {Computer}, volume = {45}, number = {8}, pages = {8--9}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.278}, doi = {10.1109/MC.2012.278}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance12f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance12g, author = {Charles R. Severance}, title = {Bertrand Meyer: Software Engineering and the Eiffel Programming Language}, journal = {Computer}, volume = {45}, number = {9}, pages = {6--8}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.299}, doi = {10.1109/MC.2012.299}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance12g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance12h, author = {Charles R. Severance}, title = {The Apache Software Foundation: Brian Behlendorf}, journal = {Computer}, volume = {45}, number = {10}, pages = {8--9}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.355}, doi = {10.1109/MC.2012.355}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance12h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Severance12i, author = {Charles R. Severance}, title = {Vint Cerf: {A} Brief History of Packets}, journal = {Computer}, volume = {45}, number = {12}, pages = {10--12}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.422}, doi = {10.1109/MC.2012.422}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Severance12i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SharT12, author = {Lwin Khin Shar and Hee Beng Kuan Tan}, title = {Defending against Cross-Site Scripting Attacks}, journal = {Computer}, volume = {45}, number = {3}, pages = {55--62}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.261}, doi = {10.1109/MC.2011.261}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SharT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Shim12, author = {Simon S. Y. Shim}, title = {Guest Editor's Introduction: The {CAP} Theorem's Growing Impact}, journal = {Computer}, volume = {45}, number = {2}, pages = {21--22}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.54}, doi = {10.1109/MC.2012.54}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Shim12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Simmonds12, author = {Devon M. Simmonds}, title = {The Programming Paradigm Evolution}, journal = {Computer}, volume = {45}, number = {6}, pages = {93--95}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.219}, doi = {10.1109/MC.2012.219}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Simmonds12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Skiena12, author = {Steven Skiena}, title = {Redesigning Viral Genomes}, journal = {Computer}, volume = {45}, number = {3}, pages = {47--53}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.41}, doi = {10.1109/MC.2012.41}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Skiena12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Sobel12, author = {Ann E. K. Sobel}, title = {Should Everyone Go to College?}, journal = {Computer}, volume = {45}, number = {10}, pages = {82--83}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.352}, doi = {10.1109/MC.2012.352}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Sobel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SongSFS12, author = {Dawn Song and Elaine Shi and Ian Fischer and Umesh Shankar}, title = {Cloud Data Protection for the Masses}, journal = {Computer}, volume = {45}, number = {1}, pages = {39--45}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.1}, doi = {10.1109/MC.2012.1}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SongSFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SpearLD12, author = {Aaron Spear and Markus Levy and Mathieu Desnoyers}, title = {Using Tracing to Solve the Multicore System Debug Problem}, journal = {Computer}, volume = {45}, number = {12}, pages = {60--64}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.191}, doi = {10.1109/MC.2012.191}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SpearLD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StavrouVKQ12, author = {Angelos Stavrou and Jeffrey M. Voas and Tom Karygiannis and Steve Quirolgico}, title = {Building Security into Off-the-Shelf Smartphones}, journal = {Computer}, volume = {45}, number = {2}, pages = {82--84}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.44}, doi = {10.1109/MC.2012.44}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/StavrouVKQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/StrattonRSCALHO12, author = {John A. Stratton and Christopher I. Rodrigues and I{-}Jui Sung and Li{-}Wen Chang and Nasser Anssari and Geng (Daniel) Liu and Wen{-}mei W. Hwu and Nady Obeid}, title = {Algorithm and Data Optimization Techniques for Scaling to Massively Threaded Systems}, journal = {Computer}, volume = {45}, number = {8}, pages = {26--32}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.194}, doi = {10.1109/MC.2012.194}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/StrattonRSCALHO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Stroustrup12, author = {Bjarne Stroustrup}, title = {Software Development for Infrastructure}, journal = {Computer}, volume = {45}, number = {1}, pages = {47--58}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.353}, doi = {10.1109/MC.2011.353}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Stroustrup12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SundaravaradanRH12, author = {Naren Sundaravaradan and Naren Ramakrishnan and David A. Hanauer}, title = {Factorizing Event Sequences}, journal = {Computer}, volume = {45}, number = {12}, pages = {73--75}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.409}, doi = {10.1109/MC.2012.409}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/SundaravaradanRH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Sung12, author = {Wing{-}Kin Sung}, title = {Bioinformatics Applications in Genomics}, journal = {Computer}, volume = {45}, number = {6}, pages = {57--63}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.151}, doi = {10.1109/MC.2012.151}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Sung12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TaylorC12, author = {Nick Taylor and Keith Cheverst}, title = {Supporting Community Awareness with Interactive Displays}, journal = {Computer}, volume = {45}, number = {5}, pages = {26--32}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.113}, doi = {10.1109/MC.2012.113}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TaylorC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TolentinoC12, author = {Matthew E. Tolentino and Kirk W. Cameron}, title = {The Optimist, the Pessimist, and the Global Race to Exascale in 20 Megawatts}, journal = {Computer}, volume = {45}, number = {1}, pages = {95--97}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.34}, doi = {10.1109/MC.2012.34}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/TolentinoC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TsaiS12, author = {Henry Tsai and Kelvin Sung}, title = {Mobile Applications and Museum Visitation}, journal = {Computer}, volume = {45}, number = {4}, pages = {95--98}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.143}, doi = {10.1109/MC.2012.143}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TsaiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TumeoSV12, author = {Antonino Tumeo and Simone Secchi and Oreste Villa}, title = {Designing Next-Generation Massively Multithreaded Architectures for Irregular Applications}, journal = {Computer}, volume = {45}, number = {8}, pages = {53--61}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.193}, doi = {10.1109/MC.2012.193}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TumeoSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/TzengLO12, author = {Stanley Tzeng and Brandon Lloyd and John D. Owens}, title = {A {GPU} Task-Parallel Model with Dependency Resolution}, journal = {Computer}, volume = {45}, number = {8}, pages = {34--41}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.255}, doi = {10.1109/MC.2012.255}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/TzengLO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/UduwageK12, author = {Anuradha Uduwage and Joseph A. Konstan}, title = {The Answer Is Out There: Online Q{\&}A Sites}, journal = {Computer}, volume = {45}, number = {7}, pages = {90--92}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.244}, doi = {10.1109/MC.2012.244}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/UduwageK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VandinUR12, author = {Fabio Vandin and Eli Upfal and Benjamin J. Raphael}, title = {Algorithms and Genome Sequencing: Identifying Driver Pathways in Cancer}, journal = {Computer}, volume = {45}, number = {3}, pages = {39--46}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.71}, doi = {10.1109/MC.2012.71}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VandinUR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VassevH12, author = {Emil Vassev and Mike Hinchey}, title = {Awareness in Software-Intensive Systems}, journal = {Computer}, volume = {45}, number = {12}, pages = {84--87}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.401}, doi = {10.1109/MC.2012.401}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VassevH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/VenkataNPN12, author = {Prabhakar T. Venkata and S. N. Akshay Uttama Nambi and R. Venkatesha Prasad and Ignas G. Niemegeers}, title = {Bond Graph Modeling for Energy-Harvesting Wireless Sensor Networks}, journal = {Computer}, volume = {45}, number = {9}, pages = {31--38}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.250}, doi = {10.1109/MC.2012.250}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/VenkataNPN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Vetter12, author = {Ron Vetter}, title = {Digital Computer: The Next-Generation Flagship Publication}, journal = {Computer}, volume = {45}, number = {1}, pages = {8--9}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.14}, doi = {10.1109/MC.2012.14}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Vetter12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Walz12, author = {John W. Walz}, title = {Creating Our Future}, journal = {Computer}, volume = {45}, number = {1}, pages = {6--7}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.10}, doi = {10.1109/MC.2012.10}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Walz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Walz12a, author = {John W. Walz}, title = {Implementing {SP7:} {A} Review of Progress in 2012}, journal = {Computer}, volume = {45}, number = {12}, pages = {6--9}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.414}, doi = {10.1109/MC.2012.414}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Walz12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WangQSCS12, author = {Lijuan Wang and Yao Qian and Matthew R. Scott and Gang Chen and Frank K. Soong}, title = {Computer-Assisted Audiovisual Language Learning}, journal = {Computer}, volume = {45}, number = {6}, pages = {38--47}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.152}, doi = {10.1109/MC.2012.152}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WangQSCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WangSR12, author = {Yong Wang and Kevin Streff and Sonell Raman}, title = {Smartphone Security Challenges}, journal = {Computer}, volume = {45}, number = {12}, pages = {52--58}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.288}, doi = {10.1109/MC.2012.288}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WangSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WantS12, author = {Roy Want and Bill N. Schilit}, title = {Interactive Digital Signage}, journal = {Computer}, volume = {45}, number = {5}, pages = {21--24}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.169}, doi = {10.1109/MC.2012.169}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WantS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Ward12, author = {Bob Ward}, title = {Computer Society Names Winners of Three Key Awards}, journal = {Computer}, volume = {45}, number = {2}, pages = {93--95}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.50}, doi = {10.1109/MC.2012.50}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Ward12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Ward12a, author = {Bob Ward}, title = {Call and Calendar}, journal = {Computer}, volume = {45}, number = {3}, pages = {88--89}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.83}, doi = {10.1109/MC.2012.83}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Ward12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Xu12, author = {Zhiwei Xu}, title = {Measuring Green {IT} in Society}, journal = {Computer}, volume = {45}, number = {5}, pages = {83--85}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.176}, doi = {10.1109/MC.2012.176}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Xu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YanFH12, author = {Xiaoqi Yan and Chi{-}Wing Fu and Andrew J. Hanson}, title = {Multitouching the Fourth Dimension}, journal = {Computer}, volume = {45}, number = {9}, pages = {80--88}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.77}, doi = {10.1109/MC.2012.77}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/YanFH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YellinYPH12, author = {Daniel M. Yellin and Yifat Yulevich and Alexander Pyasic and Avshalom Houri}, title = {Optimized Interactive Processes}, journal = {Computer}, volume = {45}, number = {4}, pages = {74--81}, year = {2012}, url = {https://doi.org/10.1109/MC.2011.301}, doi = {10.1109/MC.2011.301}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/YellinYPH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YeoL12, author = {Sungkap Yeo and Hsien{-}Hsin S. Lee}, title = {SimWare: {A} Holistic Warehouse-Scale Computer Simulator}, journal = {Computer}, volume = {45}, number = {9}, pages = {48--55}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.251}, doi = {10.1109/MC.2012.251}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/YeoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/YoungFGF12, author = {Joel Young and Kristina Foster and Simson L. Garfinkel and Kevin D. Fairbanks}, title = {Distinct Sector Hashes for Target File Detection}, journal = {Computer}, volume = {45}, number = {12}, pages = {28--35}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.327}, doi = {10.1109/MC.2012.327}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/YoungFGF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Zambonelli12, author = {Franco Zambonelli}, title = {Toward Sociotechnical Urban Superorganisms}, journal = {Computer}, volume = {45}, number = {8}, pages = {76--78}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.280}, doi = {10.1109/MC.2012.280}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Zambonelli12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZhangCT12, author = {Zhenyu Zhang and W. K. Chan and T. H. Tse}, title = {Fault Localization Based Only on Failed Runs}, journal = {Computer}, volume = {45}, number = {6}, pages = {64--71}, year = {2012}, url = {https://doi.org/10.1109/MC.2012.185}, doi = {10.1109/MC.2012.185}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZhangCT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.