Computer

Issue 1 • Jan. 1997

Filter Results

Displaying Results 1 - 15 of 15
  • Taking a high-tech approach to standards [IETF]

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    The Internet Engineering Task Force-the primary organization for Internet standards-is experiencing phenomenal growth, which implies a vote of confidence in its approach to standards-making. IETF is similar to the IEEE in that both organizations focus on participation by individual engineers rather than by organizations. Moreover, both organizations strive to ensure that their standards are develo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 1996 Gordon Bell Prize Winners

    Publication Year: 1997, Page(s):80 - 85
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • CS Update Awards at Supercomputing Recognize Professional Achievements

    Publication Year: 1997, Page(s): 86
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Gate-Array IC Design Tools

    Publication Year: 1997, Page(s):117 - 122
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The case for inductive programming

    Publication Year: 1997, Page(s):36 - 41
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    The science of creating software is based on deductive methods, but induction-deduction's ignored sibling-could have a profound effect on the future development of computer science theory and practice. Inductive reasoning can solve problems outside the realm of machine learning. Formal methods to underpin inductive techniques are emerging, but they have yet to be viewed, accepted and developed as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Switching to a faster Internet

    Publication Year: 1997, Page(s):31 - 32
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    It is not uncommon to find people complaining about how slow the Internet is becoming now that more people are using it, particularly to transmit large and complex files, such as multimedia. There have even been predictions of an Internet meltdown due to overuse. Although data indicates that Net traffic generally moves at a good clip, it is clear that many people want faster data transmission spee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design by contract: the lessons of Ariane

    Publication Year: 1997, Page(s):129 - 130
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Design by contract is the principle that the interfaces between modules of a software system-especially a mission-critical one-should be governed by precise specifications. The contracts cover mutual obligations (pre-conditions), benefits (post-conditions), and consistency constraints (invariants). Together, these properties are known as assertions, and are directly supported in some design and pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unpredictable certainty: the Internet and the information infrastructure

    Publication Year: 1997, Page(s):50 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    The Internet's future will reflect its own evolution and its interaction with other elements of the information infrastructure. That interaction will hinge more on business factors than on technology. Although it is clear that the Internet will have substantial influence in the larger information infrastructure by the turn of the century, it is unclear how the Internet will realize that influence.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HP's International Cryptography Framework: compromise or threat?

    Publication Year: 1997, Page(s):28 - 30
    Cited by:  Papers (1)  |  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Hewlett-Packard (HP) has developed the International Cryptography Framework (ICF), the strongest encryption system approved for export by the US government to date. The hardware-software system provides various levels of encryption strength, depending on government regulations in the USA and importing countries. In some cases, ICF will allow US manufacturers to export stronger encryption products ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motivating and keeping software developers

    Publication Year: 1997, Page(s):126 - 128
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Addresses the needs of those who are responsible for managing or leading computing professionals. This article is about motivating and rewarding software developers. This is especially difficult in a competitive job market that emphasizes high salaries and multiple opportunities for each software developer. Two important issues you need to handle are: making certain that developers understand thei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer reminders and alerts

    Publication Year: 1997, Page(s):42 - 49
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    With busy users relying increasingly on computers to provide reminders and alerts, the enabling technology is rapidly gaining importance. Surprisingly, many issues have not yet been thoroughly explored. The state of the art is characterized by after-the-fact application patches, plug-ins and custom-designed reminder methods. This hodgepodge of approaches is likely to change. Recent trends indicate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting mobility with wireless ATM

    Publication Year: 1997, Page(s):131 - 133
    Cited by:  Papers (8)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    An implicit assumption underlying most networking research has been that two Internet users would be connected only by fixed links (wire lines). Increased use of portable computers, wireless networks and satellites has generated interest in supporting “computing on the move”, or mobile computing. Instead of maintaining a fixed position in a network, users in this environment are free t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a more secure Internet

    Publication Year: 1997, Page(s):57 - 61
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Lack of widely available Internet security has discouraged some commercial users. The author describes efforts to make cryptographic security more widely available and looks at efforts to secure the Internet infrastructure. Security capabilities must continue to evolve to meet increasingly sophisticated threats. The Internet community is now more aware of the importance of security. This awareness... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward support for hypermedia on the World Wide Web

    Publication Year: 1997, Page(s):62 - 70
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    As organizations rush to embrace the World Wide Web as their primary application infrastructure, they should not bypass the benefit of hypermedia support. The Web's infrastructure can serve as an interface to all interactive applications and, over time, will become the graphical user interface model for new applications. Ubiquitous hypermedia support should become the jewel of the Web environment.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet, intranets, and the AI renaissance

    Publication Year: 1997, Page(s):71 - 78
    Cited by:  Papers (20)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Virtually cost-free publication on the World Wide Web has led to information overload. Artificial intelligence (AI), with its roots in knowledge representation, is experiencing a renaissance as new tools emerge to make the Web more tractable. Why do these Internet-based applications herald an AI renaissance? AI has come to play a crucial role in Information Age retrieval strategies. Internet-based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org