By Topic

Computer

Issue 2 • Date Feb. 1997

Filter Results

Displaying Results 1 - 14 of 14
  • When Software is Treated Much Too Lightly

    Publication Year: 1997 , Page(s): 8 - 11
    Cited by:  Patents (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (139 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linking computers and consumer electronics

    Publication Year: 1997 , Page(s): 119 - 121
    Cited by:  Patents (21)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (208 KB)  

    The capabilities of our personal computers have increased dramatically over the past 15 years, and so has the number of connectors on the back of our systems. Originally, we needed a serial port for a modem and a parallel port for a printer. Now we also need ports for a mouse, audio input, audio output, video input, video output, Ethernet, and a camera. Enter the IEEE 1394 standard known as Firewi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet in space: problems and solutions

    Publication Year: 1997 , Page(s): 15 - 16
    Cited by:  Patents (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (64 KB)  

    With the advent of direct broadcast satellites and inexpensive minidishes, satellite broadcasters are competing with cable television providers by delivering hundreds of channels of digital video services to millions of customers without a wired infrastructure. Many of these broadcasters also want to compete with Internet service providers by delivering high-speed Internet access to homes and busi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusting mobile user devices and security modules

    Publication Year: 1997 , Page(s): 61 - 68
    Cited by:  Papers (15)  |  Patents (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (164 KB)  

    The market for devices like mobile phones, multifunctional watches, and personal digital assistants is growing rapidly. Most of these mobile user devices need security for their prospective electronic commerce applications. While new technology has simplified many business and personal transactions, it has also opened the door to high-tech crime. We investigate design options for mobile user devic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customizing system software using OO frameworks

    Publication Year: 1997 , Page(s): 69 - 78
    Cited by:  Papers (3)  |  Patents (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (304 KB)  

    Today's applications have exploded in their diversity, but most operating systems are still general-purpose and inefficient. One of the benefits of using an OO approach is the ability to modify very small details of an operating system, which makes it easy to tailor the system to the application. My experience indicates that optimizing an operating system for the general case can result in mediocr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global teleporting with Java: toward ubiquitous personalized computing

    Publication Year: 1997 , Page(s): 53 - 59
    Cited by:  Papers (9)  |  Patents (11)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (252 KB)  

    The essence of mobile computing is having your personal computing environment available wherever you happen to be. Traditionally, this is achieved by physically carrying a computing device (say, a laptop or PDA) which may have some form of intermittent network connectivity, either wireless or tethered. However, at the Olivetti and Oracle Research Laboratory, we have introduced another form of mobi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural and fuzzy methods in handwriting recognition

    Publication Year: 1997 , Page(s): 79 - 86
    Cited by:  Papers (32)  |  Patents (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (208 KB)  

    Handwriting recognition requires tools and techniques that recognize complex character patterns and represent imprecise, common-sense knowledge about the general appearance of characters, words and phrases. Neural networks and fuzzy logic are complementary tools for solving such problems. Neural networks, which are highly nonlinear and highly interconnected for processing imprecise information, ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends in mobile satellite technology

    Publication Year: 1997 , Page(s): 44 - 52
    Cited by:  Papers (17)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (680 KB)  

    Demand for sophisticated personal communication services has changed communications satellite design. Satellites have moved closer to the Earth to improve communication speed and enable personal communication services. However, in so doing, they require more computing resources and more sophisticated protocols to handle intersatellite communications. This article examines the trends in communicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating the influence of formal methods

    Publication Year: 1997 , Page(s): 33 - 43
    Cited by:  Papers (26)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (184 KB)  

    Practitioners and researchers continue to seek methods and tools for improving software development processes and products. Candidate technologies promise increased productivity, better quality, lower cost, or enhanced customer satisfaction. We must test these methods and tools empirically and rigorously to determine any significant, quantifiable improvement. We tend to consider evaluation only af... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The hard road from methods to practice [software engineering]

    Publication Year: 1997 , Page(s): 129 - 130
    Request Permissions | Click to expandAbstract | PDF file iconPDF (44 KB)  

    Software engineering methods-by which the author means any strategic or tactical ideas intended to guide the practice of developing software-are tools. A methodology gap exists whenever a stated method doesn't correspond to effective practice. A methodology gap can manifest in several ways. It could be that a method can't be practised, shouldn't be practised, or simply isn't practised as designed.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Breaking the teraFLOPS barrier

    Publication Year: 1997 , Page(s): 12 - 14
    Cited by:  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (104 KB)  

    Supercomputers can now perform teraFLOPS. The research that led to this breakthrough could lead to even more powerful computers and could also find ways to make other computer systems, including PCs, more powerful View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wearable computing: a first step toward personal imaging

    Publication Year: 1997 , Page(s): 25 - 32
    Cited by:  Papers (70)  |  Patents (40)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (232 KB)  

    Miniaturization of components has enabled systems that are wearable and nearly invisible, so that individuals can move about and interact freely, supported by their personal information domain. To explore such new concepts in imaging and lighting, I designed and built the wearable personal imaging system. My invention differed from present-day laptops and personal digital assistants in that I coul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward synergistic engineering of computer systems

    Publication Year: 1997 , Page(s): 126 - 127
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (48 KB)  

    Our objective is to provide a forum for sharing problems, experiences, and solutions that can help establish bridges among hardware engineers, software engineers, systems engineers, and project managers. We seek to publicize innovative solutions and engineering methodologies that address: complexity, model-based engineering (as exemplified by hardware/software codesign), and process management. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conducting a job search on the Internet

    Publication Year: 1997 , Page(s): 131 - 133
    Cited by:  Patents (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (96 KB)  

    Job hunting is probably one of the best Internet applications to date, since it promises to bring candidates and companies together worldwide. Nevertheless, online career services frustrate many candidates: resume submission processes are complex, and they can't guarantee privacy for someone already employed. However, if you follow certain steps, you can ensure the highest possible visibility whil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com