By Topic

Computer

Issue 2 • Date Feb. 1996

Filter Results

Displaying Results 1 - 19 of 19
  • Software engineering pioneer Harlan Mills Dies

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Konrad Zuse, digital computer inventor, dies

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Computer Society presents career achievement awards Hans Karlsson Award: James D. Isaak

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • 1995 Computer Entrepreneur Award: William Hewlett and David Packard

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (536 KB)
    Freely Available from IEEE
  • 1995 W. Wallace McDowell Award: Kenneth W. Kennedy

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (536 KB)
    Freely Available from IEEE
  • 1995 Sidney Fernbach Award: Paul R. Woodward

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (536 KB)
    Freely Available from IEEE
  • 1994 Taylor L. Booth Education Award: David Gries

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (536 KB)
    Freely Available from IEEE
  • ObjectSystems 1.1.0 [Product Reviews]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (1488 KB)
    Freely Available from IEEE
  • V.34 Boca Office Communicator Version 1.0

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (930 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Community nets: The next Generation [Internet Kiosk]

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software change management

    Publication Year: 1996, Page(s):80 - 82
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1580 KB)

    Software projects change rapidly, which makes efficient change management a major challenge for the software industry. This challenge was poorly met for years because of rudimentary tools. The paper considers how modern change management, or configuration control tools must encompass changes affecting every kind of software deliverable and artifact View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logical time: capturing causality in distributed systems

    Publication Year: 1996, Page(s):49 - 56
    Cited by:  Papers (75)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1344 KB)

    Causality is vital in distributed computations. Distributed systems can determine causality using logical clocks. Human beings use the concept of causality to plan, schedule, and execute an enterprise, or to determine a plan's feasibility. In daily life, we use global time to deduce causality from loosely synchronized clocks such as wrist watches and wall clocks. But in distributed computing syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NSK-a Norwegian cryptochip for supersafe communications

    Publication Year: 1996, Page(s):78 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    Norway has developed its own standard cryptosystem and a cryptochip that totally protects communications over telephone lines. Developers say Norwegian cryptochips based on the Norsk Standard Krypto (NSK) system keep phone lines from being wiretapped, even by the government or police. With their own supersafe chip, developed after years of theoretical cryptography work, Norwegian officials will no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated object design: the client-server case

    Publication Year: 1996, Page(s):62 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1492 KB)

    As more enterprises move to client-server environments, object technology is gaining favour as a means of migrating legacy applications. The object paradigm is well suited for modeling real world business processes and has the flexibility to integrate emerging technologies. However, the most difficult aspect of object-oriented applications development is not programming but technical design. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role-based access control models

    Publication Year: 1996, Page(s):38 - 47
    Cited by:  Papers (1777)  |  Patents (115)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2888 KB)

    Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework of four reference models developed to better understand RBAC and categorizes different implementations, and discusses the use of RBAC to manage it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TreadMarks: shared memory computing on networks of workstations

    Publication Year: 1996, Page(s):18 - 28
    Cited by:  Papers (311)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4340 KB)

    Shared memory facilitates the transition from sequential to parallel processing. Since most data structures can be retained, simply adding synchronization achieves correct, efficient programs for many applications. We discuss our experience with parallel computing on networks of workstations using the TreadMarks distributed shared memory system. DSM allows processes to assume a globally shared vir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The reusability challenge

    Publication Year: 1996, Page(s):76 - 78
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    The traditional “reuse or redo” dilemma is unacceptable; we need to reuse what is applicable to our current need and redo the rest. This is where object technology helps. The argument we examine-that object technology promotes reusability-has been one of the central claims of OO proponents since the field's emergence in the mid-1980s. The paper considers the features that make object o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why software jewels are rare

    Publication Year: 1996, Page(s):57 - 60
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    A software jewel is a well structured program written in a consistent style, developed so that each component is simple and organized, and designed so that the product is easy to change. Despite helpful articles and many textbooks on software design, software jewels remain rare. Most of the software we see or buy is ugly, unreliable, hard to change. I discuss why the recipes of the masters have no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving system usability through parallel design

    Publication Year: 1996, Page(s):29 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2556 KB)

    Companies are shortening software project schedules to introduce products more rapidly than competitors. At the same time, customers are demanding higher usability. Unfortunately, the goals of increased usability and decreased development time conflict with traditional usability engineering approaches. The design process always requires several rounds where interfaces confront users' needs and cap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com