By Topic

Computer

Issue 3 • Date March 1996

Filter Results

Displaying Results 1 - 17 of 17
  • Neurocomputing motivation, models, and hybridization

    Publication Year: 1996
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1316 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of standards in technology transition [Standards]

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DSPCard-C31: Development on a budget [Product Reviews]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (240 KB)
    Freely Available from IEEE
  • A new version of an old friend [Product Review Norton Utilities for Windows 95]

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (413 KB)
    Freely Available from IEEE
  • Programming by contract

    Publication Year: 1996, Page(s):109 - 111
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB)

    "Why can't software be more like hardware?" has been the software engineer's lament for nearly as long as there have been large software systems. In particular, why isn't there a software components industry to rival the existing hardware components industry? Hardware components come with the following attributes: an interface that hides detail that would only confuse or at least distract me; an u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference program management using the Internet

    Publication Year: 1996, Page(s):112 - 113
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (385 KB)
    Freely Available from IEEE
  • Practicing "safe" engineering

    Publication Year: 1996, Page(s):114 - 115
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (766 KB)

    When an engineer teaches a computer science class at a university, and one of his students asks him to do some work for a company where he works, could this pose any legal problems? The 10-point IEEE Code of Ethics contained in the IEEE Policy and Procedures Manual outlines proper professional conduct for engineers. With that as a basis, this article presents a relevant case study. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • By popular demand: Software estimating rules of thumb

    Publication Year: 1996
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global optimization for neural network training

    Publication Year: 1996, Page(s):45 - 54
    Cited by:  Papers (70)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4100 KB)

    We propose a novel global minimization method, called NOVEL (Nonlinear Optimization via External Lead), and demonstrate its superior performance on neural network learning problems. The goal is improved learning of application problems that achieves either smaller networks or less error prone networks of the same size. This training method combines global and local searches to find a good local mi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial neural networks: a tutorial

    Publication Year: 1996, Page(s):31 - 44
    Cited by:  Papers (424)  |  Patents (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3136 KB)

    Artificial neural nets (ANNs) are massively parallel systems with large numbers of interconnected simple processors. The article discusses the motivations behind the development of ANNs and describes the basic biological neuron and the artificial computational model. It outlines network architectures and learning processes, and presents some of the most commonly used ANN models. It concludes with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network security under siege: the timing attack

    Publication Year: 1996, Page(s):95 - 97
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    Although most encryption algorithms are theoretically secure and remain impervious to even the most sophisticated cryptanalytic techniques, new attacks like the timing attack exploit the engineering side of network security. A timing attack is basically a way of deciphering a user's private key information by measuring the time it takes to carry out cryptographic operations. Factors such as branch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating artificial neural networks on parallel architectures

    Publication Year: 1996, Page(s):56 - 63
    Cited by:  Papers (29)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2004 KB)

    Parallelization is necessary to cope with the high computational and communication demands of neuroapplications, but general purpose parallel machines soon reach performance limitations. The article explores two approaches: parallel simulation on general purpose computers, and simulation/emulation on neurohardware. Different parallelization methods are discussed, and the most popular techniques ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An artificial neural network that models human decision making

    Publication Year: 1996, Page(s):64 - 70
    Cited by:  Papers (11)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1364 KB)

    The Neural Logic Network (Neulonet) system models a wide range of human decision making behaviors by combining the strengths of rule based expert systems and neural networks. Neulonet differs from other neural networks by having an ordered pair of numbers associated with each node and connection, as shown. Let Q be the output node and P1, P, …, PN, be input nodes. Also... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbolic representation of neural networks

    Publication Year: 1996, Page(s):71 - 77
    Cited by:  Papers (76)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    Neural networks often surpass decision trees in predicting pattern classifications, but their predictions cannot be explained. This algorithm's symbolic representations make each prediction explicit and understandable. Our approach to understanding a neural network uses symbolic rules to represent the network decision process. The algorithm, NeuroRule, extracts these rules from a neural network. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The big software chill

    Publication Year: 1996, Page(s):12 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    If a technology (or idea) does not achieve mainstream status quickly enough, it dies. Video on demand (interactive TV), the information superhighway (ISDN), and massively parallel supercomputing may be examples. These ideas are okay, but they could die for lack of legs. At present, consumers are simply shunning them, illustrating the power of Information Age mainstreaming. A corollary to this law ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spert-II: a vector microprocessor system

    Publication Year: 1996, Page(s):79 - 86
    Cited by:  Papers (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1952 KB)

    The Spert-II fixed point vector microprocessor system performs training and recall faster than commercial workstations for neural networks used in speech recognition research. We have packaged a prototype full custom vector microprocessor, TO, as the Spert-II (Synthetic Perceptron Testbed II) workstation accelerator system. We originally developed Spert-II to accelerate multiparameter neural netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vietnam: information technology for the transition

    Publication Year: 1996, Page(s):88 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2700 KB)

    Can information technology spark socioeconomic progress in a poor and developing country? With its recently approved national IT plan, Vietnam is hoping the answer is yes. One of the first challenges for IT vendors is to provide systematic and integrated solutions for processing the unique national language, whose writing system is based on the Latin script. Solving this problem through localized ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com