Journals in DBLP
IEEE Computer 2002, volume: 35, number: 10
Article Summaries. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:6- [Journal ] Content Protection Alternatives. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:8-10 [Journal ] Robert P. Colwell The Power of the Most Likely. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:12-14 [Journal ] David Clark Do Web Standards and Patents Mix? [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:19-22 [Journal ] Neal Leavitt Let's Hear It for Audio Mining. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:23-25 [Journal ] Linda Dailey Paulson News Briefs Topics include: Project Promises Accessible Technology for the Disabled / Two Efforts Aim to Upgrade Mobile Memory / Prime Breakthrough May Improve Encryption. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:26-28 [Journal ] Ravi Kalakota , Pavan Gundepudi , Jonathan Wareham , Arun Rai , Richard J. Welke The Economics of DSL Regulation. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:29-36 [Journal ] Bill N. Schilit , Jonathan Trevor , David M. Hilbert , Tzu Khiau Koh Web Interaction Using Very Small Internet Devices. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:37-45 [Journal ] Suman Banerjee , Sulabh Agarwal , Kevin Kamel , Andrzej Kochut , Christopher Kommareddy , Tamer Nadeem , Pankaj Thakkar , Bao Trinh , Adel M. Youssef , Moustafa Youssef , Ronald L. Larsen , A. Udaya Shankar , Ashok K. Agrawala Rover: Scalable Location-Aware Computing. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:46-53 [Journal ] Anthony D. Wood , John A. Stankovic Denial of Service in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:54-62 [Journal ] Samitha Samaranayake , Nodari Sitchinava , Rohit Kapur , Minesh B. Amin , Thomas W. Williams Dynamic Scan: Driving Down the Cost of Test. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:63-68 [Journal ] Products. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:70-71 [Journal ] The XML Culture Clash. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:72- [Journal ] Computer Society Connection. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:74-77 [Journal ] Call and Calendar. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:78-81 [Journal ] Career Opportunities. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:82-95 [Journal ] Michael R. Macedonia The Computer Graphics Wars Heat Up. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:97-99 [Journal ] Josef F. Huber Toward the Mobile Internet. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:100-102 [Journal ] Andrew Huang The Trusted PC: Skin-Deep Security. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:103-105 [Journal ] Laura K. Briggs , Kari Boyd McBride Rethinking the Digital Divide. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:10, pp:106-108 [Journal ]