COSC3325                 Report - 2                          
            (Computer Applications & Social Implications)    Due: 3/3/2010    
 
A. Requirements:
 
   1. Choose two papers from the listing given below and turn in
      a reading report on both papers.
      This report, of no more than six doubly-spaced pages, should contain the following 
      for each paper, separately and independently (namely, discussion/analysis of the first paper 
      must be finished before that of the second begins):
        a. Summary of the paper.
        b. Relation to other similar systems/ideas/work
        c. Contribution and merits of the papers
        d. Your own criticism and/or assessments and any possible
           improvements for the better readability and understanding.
        e. What you think you really have learned from the paper.
        f. Extent of Engagements in Independent Study.
        g. List of References.
      For your advantage, your paper should have appropriate headings such as
        a. Summary
        b. Contribution and Relations to Similar other work
        c. Criticism and Possible Improvement
        d. Lesson you learned.
        e. Extent of Engagements in Independent Study.
        f. List of References.
   2. Due: By Wednesday, 2/24, you are to give me a notification of your choice of two articles
           in class if you are taking a regular classroom class or by Email if you are enrolled
           in the online class. (Failing to do so will lose some points.)
   3. Either Present both papers to class on the day when the report is due
      or submit (just like you did for Report-1) a powerpoint file with your narrations recorded
      to substitute for a classroom setting presentation we are missing if you are enrolled in
      the online class.
      The following requirement applies only to the regular classroom class (and not to the 
      online class:
      We will use one or two class periods for the presentation starting on the report due
      date.
      After all presentations are made, each of you are requested
      to turn in a note that has your choice of the best two
      presentations (Other than yourself's) along with your objective justifications
      of why you think they are your choices.
 
B. List of journal papers mostly from IEEE Computer Magazine and IEEE Spectrum:   
 
1.  Marco Conti and Mohan Kumar, “Opportunities in Opportunistic Computing,”
IEEE Computer, January 2010, pp 42-50.    
2. Thomas F. Stafford and Robin Poston, “Online Security Threats and Computer User Intentions,” 
  IEEE Computer, January 2010, pp 58-64. 
3. Josep Torrellas, “Architectures for Extreme- Scale Computing,” IEEE Computer, November 2009, 
   pp 28-35.
4. Adolfy Hoisie and Vladimir Getov, “Extreme-Scale Computing – Where ‘Just More of the Same’ 
  Does not Work,” IEEE Computer, November 2009, pp 24-26.
5. Ahmed Abbasi and Hsinchun Chen, “A Comparison of Tools for Detecting Fake Websites,” IEEE 
  Computer, October 2009, pp 78-86.
6. Simon Moncrieff, Svetha Venkatesh and Geoff A. W. West, “Dynamic Privay in Public 
   Surveillance,” IEEE Computer, September 2009, pp 22-28.
7. Sue Black, Paul P. Boca, Jonathan P. Bowen, Jason Gorman and Mike Hinchey, “Formal Versus  
   Agile: Survival of the Fittest?,” IEEE Computer, September 2009, pp 37-45. 
8. Bertrand Meyer, Arno Fiva, Ilinca Ciupa, Andreas Leitner, Yi Wei, and Emmanuel Stapf, 
  “Programs That Test Themselves,” IEEE Computer, September 2009, PP 46-55. 
   9. Mark Turner and others, "Turning up a Software into a Service,"
      IEEE Computer, October 2003, pp. 38-44
  10. Chris Peltz, "Web Services Orchestration and Choreography," same journal
      as above, pp. 46-52.
  11. Philip E. Ross, "Five Commandments," IEEE Spectrum, December 2003, pp. 30-35.
  12. Enrique Castro-Leon, "The Web within the Web," IEEE Spectrum, February 2004,
      pp. 42-46.
  13. Peter M. Mauer, "Metamorphic Programming: Unconventional High Performance,"
      IEEE Computer, March 2004, pp. 30-38
  14. John Voelcker, "Top Ten Tech Cars," IEEE Spectrum, March 2004, pp. 28-35.
  15. Erico Guizzo, "Closing-In on the Perfect Code," same journal as above, pp. 36-42.
  16. Kent Beck, "Embracing Change with Extreme Programming," IEEE
      Computer, October 1999, pp. 70-78.
  17. Mark R. Cutkosky, et al, "MADEFAST: Collaborative Engineering
      over the Internet," CACM, September 1996, pp. 78-87.
  18. Glenn Zorpette, "Making Intelligence Smarter," IEEE Spectrum, Januuuary
      2002, pp. 38-43.
  19. Stephen Cass and Michael Riezenman, "Improving Security, Preserving
      Privacy," IEEE Spectrum, January 2002, pp. 44-49.
  20. Tekla Perry, "Capturing Climate Changes," IEEE spectrum, January 
      2002, pp. 58-65.
  21. Machael Macedonia, "Games Soldiers Play," IEEE Spectrum, March 2002,
      pp. 32-37.
  22. Giselle Weiss, "Welcome to the (Almost) Digital Hospital," March 2002,
      pp. 44-49.
  23. Won Kim, et al, "Chamois Component-Based Knowledge Engineering Framework,"
      IEEE Computer, May 2002, pp. 46-54.
  24. Selim Aissi, et al, "E-Business Process Modeling: The Next Big Step,"
      IEEE Computer, May 2002, pp. 55-62.
  25. Laura Jackson, et al, "Deterministic Preemptive Scheduling of Real-Time
      Tasks," IEEE Computer, May 2002, pp. 72-79.
  26. Mihai Pop, et al, "Genome Sequence Assembly: Algorithms and Issues,"
      IEEE Computer, July 2002, pp. 47-54.
  27. Bernard Moret, et al, "Toward New Software for Computational Phylogenetics,"
      July 2002, pp. 55-64.
  28. Junhyong Kim, "Computers are from Mars, Organisms are from Venus," IEEE
      Computer, July 2002, pp. 25-33.
  29. Rahul Gupta, "Jini Home Networking:A Step toward Pervasive Computing,"
      IEEE Computer, August 2002, pp. 34-40.
  30. George Cybenko, et al, "Cognitive Hacking: A Battle for the Mind,"
      IEEE Computer, August 2002, pp. 50-56.
  31. Jeffrey Lotspiech, et al, "Broadcast Encryption's Bright Future,"
      IEEE Computer, August 2002, pp. 57-63.
  32. Jiannong Cao, et al, "Mailbox-Based Scheme for Mobile Agent Communications,"
      IEEE Computer, September 2002, pp. 54-60.
  33. Bill N. Schilit, et al, "Web Interaction Using Very Small Internet Devices,"
      IEEE Computer, October 2002, pp. 37-45.
  34. Joanna Bryson, et al, "Toward Behavioral Intelligence in the Semantic Web,"
      IEEE Computer, November 2002, pp. 48-55.
  35. Jiawei Han, et al, "Data Mining for Web Intelligence," IEEE Computer, 
      November 2002, pp. 64-71.
  36. Daniel S. Katz, et al, "NASA Advances Robotic Space Exploration," IEEE Computer,
      January 2003, pp. 52-61.
37. Joshua  J. Yi, et al, “The Future of Simulation: A field of Dreams?,”
    IEEE Computer, November 2006, pp. 22-29.
38. Ian Foster, et al, “Scaling System-Level Science: Scientific Exploration 
    and IT Implications,” November 2006, pp. 31-39.
39. Jose Luiz Fiadeiro, “Designing for Software’s Social Complexity,”
    IEEE Computer, January 2007, pp. 34-39.
40. Manoj Parameswaran, et al, “Reengineering the Internet for Better Security,”
    IEEE Computer, January 2007, pp. 40-45.