|
Journals in DBLP
IEEE Computer 2006, volume: 39, number: 10
Article Summaries. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:4- [Journal]
Letters. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:6- [Journal]
- David Alan Grier
The Language of Bad Love. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:7-9 [Journal]
32 & 16 Years Ago. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:10-11 [Journal]
- Sixto Ortiz Jr.
Phone Companies Get into the TV Business. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:12-15 [Journal]
- Steven J. Vaughan-Nichols
Will the New Wi-Fi Fly? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:16-18 [Journal]
- Linda Dailey Paulson
News Briefs. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:19-21 [Journal]
- Doris L. Carver, Ronald G. Hoelzeman, James H. Aylor, Michael G. Hinchey
Special Issue Introduction: The IEEE Computer Society's 60th Anniversary. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:22-25 [Journal]
- Judith Bishop, R. Nigel Horspool
Cross-Platform Development: Software that Lasts. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:26-35 [Journal]
- Luciano Baresi, Elisabetta Di Nitto, Carlo Ghezzi
Toward Open-World Software: Issue and Challenges. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:36-43 [Journal]
- Tiziana Margaria, Bernhard Steffen
Service Engineering: Linking Business and IT. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:45-55 [Journal]
- Jim Woodcock
First Steps in the Verified Software Grand Challenge. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:57-64 [Journal]
- Michael Jackson
What Can We Expect from Program Verification? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:65-71 [Journal]
- Manfred Broy
The 'Grand Challenge' in Informatics: Engineering Software-Intensive Systems. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:72-80 [Journal]
- David Gries
What Have We Not Learned about Teaching Programming? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:81-82 [Journal]
Career Opportunities. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:84-91 [Journal]
Bookshelf. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:92- [Journal]
Products. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:93- [Journal]
Call and Calendar. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:97-99 [Journal]
- Laurie J. Patterson
The Technology Underlying Podcasts. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:103-105 [Journal]
- Benjamin Arazi
Enhancing Security with Nanotechnology. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:106-107 [Journal]
- Mor Naaman
Eyes on the World. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:108-111 [Journal]
- Tim Menzies, Julian Richardson
Making Sense of Requirements, Sooner. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:112-114 [Journal]
- Michael R. Macedonia
Moving Beyond HD. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:115-117 [Journal]
- W. Neville Holmes
The Technology of Data Stashing. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:118-120 [Journal]
|