The Known World - Honor Among Thieves (English)
- New search for: Holmes, Neville
- New search for: Holmes, Neville
In:
Computer
;
42
, 12
; 12-16
;
2009
-
ISSN:
- Article (Journal) / Print
-
Title:The Known World - Honor Among Thieves
-
Contributors:Holmes, Neville ( author )
-
Published in:Computer ; 42, 12 ; 12-16
-
Publisher:
- New search for: IEEE Computer Soc. Publ. Off.
-
Place of publication:Los Alamitos, Calif.
-
Publication date:2009
-
ISSN:
-
ZDBID:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.00 / 54.00
- Further information on Basic classification
- New search for: 770/3155
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 42, Issue 12
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Computer [masthead]| 2009
- 2
-
Table of contents| 2009
- 3
-
[Front cover]| 2009
- 4
-
Computer Highlights Society Magazines| 2009
- 4
-
Elsewhere in the CS| 2009
- 6
-
Letters to the Editor| 2009
- 6
-
Letters| 2009
- 9
-
MEMBERSHIP NEWS - President's Message| 2009
- 9
-
Implementing Organizational Strategies: Progress Made in 2009Land, Susan K. et al. | 2009
- 12
-
The Known World - Honor Among ThievesGrier, David Alan et al. | 2009
- 12
-
Honor Among ThievesGrier, David Alan et al. | 2009
- 16
-
32 & 16 Years Ago - Computer, December 1977 and 1993Nichols, Steven J Vaughan et al. | 2009
- 16
-
32 and 16 Years Ago| 2009
- 18
-
IEEE Group Insurance Program [advertisement]| 2009
- 19
-
NEWS - Technology News - Augmented Reality: No Longer a Novelty?Vaughan-Nichols, Steven J et al. | 2009
- 19
-
Augmented Reality: No Longer a Novelty?Vaughan-Nichols, S.J. et al. | 2009
- 23
-
News BriefsPaulson, Linda Dailey et al. | 2009
- 26
-
GUEST EDITORS' INTRODUCTION - Tools and Environments for Multicore and Many-Core Architectures - Programming for serial computing is already a difficult undertaking that we have yet to master; programming for parallel computing will only exacerbate this difficulty. Fortunately, tools and environments are beginning to emerge that will let us take advantage of multicore and many-core architectures in an easy and productive manner.Feng, Wu-Chun et al. | 2009
- 26
-
Tools and Environments for Multicore and Many-Core ArchitecturesFeng, Wu-chun / Balaji, Pavan et al. | 2009
- 28
-
Programming Multiprocessors with Explicitly Managed Memory Hierarchies - A study of two applications programmed using three models of varying complexity reveals that implicit management of locality can produce code with performance comparable to code generated from explicit management of locality.Schneider, Scott et al. | 2009
- 28
-
Programming Multiprocessors with Explicitly Managed Memory HierarchiesSchneider, S. / Jae-Seung Yeom, / Nikolopoulos, D.S. et al. | 2009
- 35
-
IEEE 125 [advertisement]| 2009
- 36
-
Cetus: A Source-to-Source Compiler Infrastructure for MulticoresDave, C. / Hansang Bae, / Seung-Jai Min, / Seyong Lee, / Eigenmann, R. / Midkiff, S. et al. | 2009
- 36
-
Cetus: A Source-to-Source Compiler Infrastructure for Multicores - The Cetus tool provides an infrastructure for research on multicore compiler optimizations that emphasizes automatic parallelization. The compiler infrastructure, which targets C programs, supports source-to-source transformations, is user-oriented and easy to handle, and provides the most important parallelization passes as well as the underlying enabling techniques.Dave, Chirag et al. | 2009
- 43
-
Computer Society InformationTallent, Nathan R et al. | 2009
- 43
-
[CS Info Page]| 2009
- 44
-
Identifying Performance Bottlenecks in Work-Stealing Computations - Work stealing is an effective load balancing strategy for multithreading, but when computations based on it underperform, traditional tools can't explain why. To resolve a computation's key performance obstacles, tools must pinpoint and quantify parallel idleness and overhead.Kelly, Terence et al. | 2009
- 44
-
Identifying Performance Bottlenecks in Work-Stealing ComputationsTallent, N.R. / Mellor-Crummey, J.M. et al. | 2009
- 51
-
[Advertisement]| 2009
- 52
-
Eliminating Concurrency Bugs with Control Engineering - In the multicore era, concurrency bugs threaten to reduce programmer productivity, impair software safety, and erode end-user value. Control engineering can eliminate concurrency bugs by constraining software behavior, preventing runtime failures, and offloading onerous burdens from human programmers onto automatically synthesized control logic.Kelly, Terence et al. | 2009
- 52
-
Eliminating Concurrency Bugs with Control EngineeringKelly, T. / Yin Wang, / Lafortune, S. / Mahlke, S. et al. | 2009
- 61
-
RESEARCH FEATURE - Embedded Multimedia Processors for Road-Traffic Parameter Estimation - Combining a multimedia RISC processor and an embedded operating system allows implementation of new value-added services in smart environments.| 2009
- 61
-
Embedded Multimedia Processors for Road-Traffic Parameter EstimationToral, S.L. / Vargas, M. / Barrero, F. et al. | 2009
- 61
-
Embedded Multimedia Processors for Road-Traffic Parameter ExtensionToral, S.L. / Vargas, M. / Barrero, F. et al. | 2009
- 69
-
Reisman Voted 2010 Computer Society President-ElectWard, Bob et al. | 2009
- 69
-
Report to Members: Election Results| 2009
- 71
-
IEEE Computer Society Connection| 2009
- 71
-
Miura Wins Cray AwardWard, Bob et al. | 2009
- 74
-
Call and Calendar| 2009
- 75
-
Advertiser/Product Index| 2009
- 76
-
Career opportunities| 2009
- 82
-
Bookshelf| 2009
- 83
-
Computational Epidemiology in a Connected WorldApolloni, A. / Kumar, V.S.A. / Marathe, M.V. / Swarup, S. et al. | 2009
- 83
-
AI Redux - Computational Epidemiology in a Connected WorldLi, Yang et al. | 2009
- 87
-
Invisible Computing - Beyond Pinch and Flick: Enriching Mobile Gesture InteractionLi, Yang et al. | 2009
- 87
-
Beyond Pinch and Flick: Enriching Mobile Gesture InteractionYang Li, et al. | 2009
- 90
-
IEEE 6th World Congress on Services (SERVICES 2010)| 2009
- 91
-
Passive Fingerprinting of Network Reconnaissance ToolsBeecroft, A.J. / Michael, J.B. et al. | 2009
- 91
-
Security - Passive Fingerprinting of Network Reconnaissance ToolsBeecroft, Alexander J et al. | 2009
- 94
-
Education - The Inevitability of Teaching OnlineBroy, Manfred et al. | 2009
- 94
-
The Inevitability of Teaching OnlineHislop, G.W. et al. | 2009
- 97
-
DFRWS [Advertisement]| 2009
- 98
-
Software Technologies - Toward a Holistic and Standardized Automotive Architecture DescriptionBroy, Manfred et al. | 2009
- 98
-
Toward a Holistic and Standardized Automotive Architecture DescriptionBroy, M. / Gleirscher, M. / Merenda, S. / Wild, D. / Kluge, P. / Krenzer, W. et al. | 2009
- 102
-
Simplifying HumansSantini, S. et al. | 2009
- 104
-
The Profession - Simplifying HumansGenerali, Joyce A et al. | 2009
- 992
-
IEEE CS Press [advertisement]| 2009
- 993
-
IEEE Member Digital Library [advertisement]| 2009
- 994
-
Verizon Ad| 2009