Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 11 • Nov 1996

Filter Results

Displaying Results 1 - 12 of 12
  • Predicting software reliability

    Publication Year: 1996, Page(s):69 - 77
    Cited by:  Papers (128)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    Critical business applications require reliable software, but developing reliable software is one of the most difficult problems facing the software industry. After the software is shipped, software vendors receive customer feedback about software reliability. However, by then it is too late; software vendors need to know whether their products are reliable before they are delivered to customers. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Waiting for the Telecommunications Act to deliver

    Publication Year: 1996, Page(s):16 - 18, 20-2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    When President Clinton signed the Telecommunications Act of 1996 into law on February 8 1996, it was heralded as the dawning of a new age that would bring innovative technology, more and better services, and lower prices. Ten months later, however, this new age has not even begun to dawn, and it may not do so for quite a while. In fact, it is unclear what the Telecommunications Act's long term eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patent protection for software in Israel

    Publication Year: 1996, Page(s):90 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    At first glance, US and Israeli law would appear to permit patent protection for all inventions that involve processes, including those involving software. Certainly, other technical processes or procedures, such as chemical or mechanical processes, have been eligible for patent protection in the US and Israel. US patent law states that whoever invents or discovers any new and useful process, mach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reliability-engineered testing

    Publication Year: 1996, Page(s):61 - 68
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1704 KB)

    Software testing often results in delays to market and high cost without assuring product reliability. Software reliability engineered testing (SRET), an AT&T best practice, carefully engineers testing to overcome these weaknesses. The article describes SRET in the context of an actual project at AT&T, which is called Fone Follower. The author selected this example because of its simplicit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiprocessor validation of the Pentium Pro

    Publication Year: 1996, Page(s):47 - 53
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    In the past, multiprocessor systems have taken a year longer than uniprocessor systems to introduce because of the need to develop and validate the additional functionality required for multiprocessor systems. Manufacturers, however, don't want to wait this long to release products using the latest multiprocessor systems. Our challenge in designing Intel's newest microprocessor, the Pentium Pro pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Netstorms: the crash of '96

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Bob Metcalfe, inventor of Ethernet, founder of 3Com, and now a journalist for Infoworld, has added to his reputation by predicting doom in cyberspace. He went public with predictions of an Internet disaster some months ago, and now there are even conferences on the subject. He claims that too many people are riding the Internet and it simply cannot carry them all. Metcalfe has plenty of empirical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring software quality: a case study

    Publication Year: 1996, Page(s):78 - 87
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1328 KB)

    The National Security Agency's (NSA) mission is to provide support for the security of the United States. Over the years, the Agency has become extremely dependent on the software that makes up its information technology infrastructure. NSA has come to view software as a critical resource upon which much of the world's security, prosperity, and economic competitiveness increasingly rests. To ensur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing ICs: getting to the core of the problem

    Publication Year: 1996, Page(s):32 - 38
    Cited by:  Papers (55)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1220 KB)

    The article examines the market and technology trends affecting the testing of integrated circuits, with emphasis on the role of predesigned components-cores-and built in self test. We explain manufacturing testing, as opposed to design testing, which happens before manufacturing, and online testing, which happens after View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case study of a commercial standard

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    There are several forms of digital currency and electronic charges that will begin to allow micropayments for Internet site access. Once there is a convenient way to collect micropayments, the number of quality sites will increase dramatically and attract a wide range of Internet users. Digital currency schemes, including CyberCash, First Virtual, DigiCash, and CheckFree, have been around for some... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety-critical systems built with COTS

    Publication Year: 1996, Page(s):54 - 60
    Cited by:  Papers (15)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1072 KB)

    In the rail transportation industry competitive pressure has led to the increased use of COTS (commercial off-the-shelf equipment in safety critical systems), making it imperative that we extend proven safety techniques to COTS based systems as well. To this end, we have developed the Vital Framework (V-Frame), which is used to develop a safety critical platform from COTS hardware and software. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Built-in self-test: assuring system integrity

    Publication Year: 1996, Page(s):39 - 45
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1368 KB)

    Today's complex electronic products are harder to test using traditional external methods. Built in self test can frequently be used without significantly increasing a product's size, cost and production time View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modal testing strategies for OO software

    Publication Year: 1996, Page(s):97 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    The essential challenge in testing object-oriented software is to craft a practical test suite that exercises enough combinations of message sequence and state interactions to provide sufficient confidence. These interactions are often subtle and complex and therefore error-prone. If all classes were alike, it might be enough to devise tests based either on message sequence or state. Sometimes thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org