IEEE Home | Shop IEEE | Join IEEE | myIEEE | Contact IEEE | IEEEXplore
IEEE
IEEE CS logo

IEEE Computer Society
Washington & Northern Virginia Chapter


Main Menu
»
»
»
»
»
»
»
»
»
»

IEEE Computer Society History

"Expand your world and you expand your mind."

Click here to see the old website.


2008
April 27, 2008 IEEE Computer Society W/NV General Elections
March 25, 2008 Applying Agile Techniques to Process Development: Lessons Learned
By: Nelson Perez and Ernest Ambrose

2006
November 2006 Simulation and Virtual Reality for Education and Medical Applications
By: Jim X. Chen, Ph.D.
September 2006 High Performance Distributed Computing Research and Enabling Technologies
by
Dr. Bijan Jabbari, Professor
June 2006 Model Driven Software Development: What It Can and Cannot D
By: Jon Whittle
May 2006 Operational Patterns for Information Sharing
by
Chris Daly
April 2006 Identity Federation in Cancer Biomedical Informatics Grid
By: Kenneth Lin  
March 2006 Grid Computing
By: Jeffrey Hollingsworth
February 2006 Intellectual Property Issues for Companies With U.S. Government Contracts
By: Colin M. Raufer
January 2006 Architecting Software Effectively
by
Suvajit Gupta
 


2005

November 2005 Service Oriented Architecture (SoA)
by Shahid Shah
October 2005 Intellectual Property
by Mr. Russell Harrison, Mr. Stuart Tin Fah Huang, and Dr. Lee Hollarr
September 2005 Preparing for the CISSP
by Dr. Van B. Le, CISSP
June 2005 Ad Hoc Networks: New Applications Bring New Challenges
by Dr. Luiz A DaSilva
May 2005 Securing Computational Grids
by Dr. Steven L. Arementrout
April 2005 Reconfigurable Computing After A Decade: A New Perspective and Challenges for Hardware-Software Co-Design and Development
by Tirumale K Ramesh, Ph.D.

2004

May 2004 Exploiting Software: How to Break Code
by Gary McGraw
March 2004 How to go beyond RUP, XP, and Agile Methods to Create Effective Software
by Suvajit Gupta
February 2004 Network Forensics – What to do after you've been hacked
by Raghu Dev


2003

November 2003 Identity Theft: When Bad Things Happen To Your Good Name
by Jeffrey R. Calcatera
September 2003 How IEEE Project Lifecycle Standards relate to CMM, XP, Agile methodologies
by Tom Starai


2002

October 2002 Genomics and Bioinformatics
by Dr. Mihai Pop
September 2002 Software Patents and Protecting Software Intellectual Property
by Lawrence Scott and Mohammad Rahman
May 2002 Aspect-oriented Programming using AspectJ
by Shahid N. Shah
January 2002 Java Security meets Smart Cards
by Dr. Gary McGraw


2001

November 2001 Building Secure Software: How to Avoid Security Problems the Right Way
by Gary McGraw
June 2001 Extreme Programming Explained
by Shahid Shah
May 2001 Building n-tier Enterprise Application using J2EE Platform
by Ramanand Singh
March 2001 What is mobile VPN and how is it useful for today's users?
by Daniel Park
February 2001 Java Security meets Smart Cards
by Dr. Gary McGraw


2000

November 2000 CORBA: A Brief Overview
by John Masiyowski
October 2000 Building Java Enterprise Systems with J2EE
by Paul J. Perrone
September 2000 Reshaping B2B with Scenario Assembly
by Greg Campbell
May 2000 Emerging Software Business Models
by Grady H. Campbell, Jr.
April 2000 Unified Messaging
by Tom Zinzi and John Chan
March 2000 The Long Road Toward Limited Software Warranties
by Jeffrey Voas
February 2000 IP.com: Protecting and Enforcing Intellectual Property Rights On the Internet
by C. Gregory Gramenopoulos, Esq. and Douglas A. Rettew, Esq.


1999

December 1999 Web Page Engineering
by James D. Isaak
October 1999 Agencies: A New Paradigm for Web-Based Computing
by Assad Moini
September 1999 Moving from Conventional to Automated Testing
by John Paul and Jeff Rashka
July 1999 Third Annual Books & Barbeque
 
June 1999 The Morris Internet Worm, Looking Back a Decade Later
by Hal Feinstein
May 1999 Software and Legal Liability Post Y2K
by Dan Hassett, Ellen L.S. Koplow, Colleen Kotyk Vossler, and Jeffrey M. Voas
April 1999 Designing like Mother Nature: an Introduction to Genetic Algorithms
by Dr. Derek S. Linden
March 1999 Critical Infrastructure Protection and Information Warfare: Reader's Digest Versions of Recent Key Studies and Directives
by Chuck Howell


1998

December 1998 Informal Holiday Dinner at Clydes and Elections
 
October 1998 The ABC's of Patenting Software
by C. Gregory Gramenopoulos, Esq
August 1998 NT vs. Unix - The Battle to be the WAN Server OS of Choice
by Richard Hay and David Storey
July 1998 Second Annual Books & Barbeque
 
June 1998 Reception, "The Coming Convergence: InNoVA/DC /DC /DC tion & Opportunity in a Network-Centric World"
 
May 1998 A Decision Model for Estimating the Productivity and Quality Impacts of Adopting New Software Development Technologies
by Doug Whall
April 1998 Shaping a Commonwealth of Technology
by Jean Diehl Woods
March 1998 Python: A New Object-oriented Scripting Language
by Guido van Rossum
February 1998 Entreprenurial Financing: Factors to Consider When Raising Private Capital
by Joseph E. Statter
January 1998 Data Warehouses, Basements, and Junkyards: Current Trends in Decision Support Systems
by Mark Burger


1997

December 1997 Informal Holiday Dinner at Clydes
 
November 1997 The Seven Habits of Highly Effective Mission Critical Java Applications
by Chuck Howell
October 1997 Building Fences: Protecting and Profiting from Intellectual Property
by Dan Hassett
September 1997 Panel on Software Quality Assurance: Product vs. Process
 
August 1997 Sharks and Piggy Banks: The Legal Risks of the Y2K Problem
by Dan Hassett and Greg Cirillo
July 1997 First Annual Books & Barbeque
 
June 1997 Usability Testing: An Applied Discussion
by Mark Barnes
May 1997 Multilevel Security via Gadgets and Cheap Tricks
by Carl Landwehr
April 1997 Making Business Investments in Software Technology
by Shari Lawrence Pfleeger
March 1997 Why Software Engineering is Hard and How to Fix It
by Brad Cox
February 1997 Java Security: The Realities of Executable Content
by Gary McGraw, Ph.D.
January 1997 Multifaceted Approaches to Building Complex Quality Systems
by Dr. Kenneth Shere


1996

December 1996 Lessons Learned While Working in an Object-Oriented Development Lifecycle
 
November 1996 Information Warfare: Is the Best Offense a Weak Defense?
by Dr. Jeffrey Voas
October 1996 Organizational Meeting
 


IEEE Computer Society W/NV Home   |    IEEE Home   |    Privacy & Security   |    Terms & Conditions