By Topic

Computer

Issue 8 • Date Aug. 1997

Filter Results

Displaying Results 1 - 14 of 14
  • Fighting Complexity in Computer Systems

    Publication Year: 1997 , Page(s): 47 - 48
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (247 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Professionals Among IEEE Medal Winners

    Publication Year: 1997 , Page(s): 73 - 75
    Save to Project icon | Request Permissions | PDF file iconPDF (864 KB)  
    Freely Available from IEEE
  • Reuse factors in embedded systems design

    Publication Year: 1997 , Page(s): 93 - 95
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (380 KB)  

    At first glance, embedded systems appear to be poor candidates for incorporating reuse. Many embedded systems actively or passively prevent loss of life, so they usually meet stringent specifications for safety, reliability, and real-time operation. To meet these requirements, the obvious solution is to redesign hardware and software components for each application. At Siemens they have found that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice-based interfaces make PCs better listeners

    Publication Year: 1997 , Page(s): 14 - 16
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (200 KB)  

    Voice-based interfaces let users vocally input commands or data into PCs. Researchers have recently developed interfaces that let users input material with normal, rather than unnaturally slow and careful, speech View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making the PC easier to use

    Publication Year: 1997
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (308 KB)  

    To turn PCs into home appliances that will be accepted by most consumers, vendors believe they have to make the computers as easy to use as other home appliances. Currently, say PC industry vendors, the machines take too long to turn on and off, and it is too much work to add peripherals and connect the computers to other types of electronic devices View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 10 potholes in the road to information quality

    Publication Year: 1997 , Page(s): 38 - 46
    Cited by:  Papers (14)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (504 KB)  

    Poor information quality can create chaos. Unless its root cause is diagnosed, efforts to address it are akin to patching potholes. The article describes ten key causes, warning signs, and typical patches. With this knowledge, organisations can identify and address these problems before they have financial and legal consequences View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering with reflexion models: a case study

    Publication Year: 1997 , Page(s): 29 - 36
    Cited by:  Papers (35)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (740 KB)  

    Reengineering large and complex software systems is often very costly. The article presents a reverse engineering technique and relates how a Microsoft engineer used it to aid an experimental reengineering of Excel-a product that comprises about 1.2 million lines of C code. The reflexion technique is designed to be lightweight and iterative. To use it, the user first defines a high-level structura... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using genetic algorithms to design mesh networks

    Publication Year: 1997 , Page(s): 56 - 61
    Cited by:  Papers (24)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2032 KB)  

    Designs for mesh communication networks must meet conflicting, interdependent requirements. This sets the stage for a complex problem with a solution that targets optimal topological connections, routing, and link capacity assignments. These assignments must minimize cost while satisfying traffic requirements and keeping network delays within permissible values. Since such a problem is NP-complete... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying software product-line architecture

    Publication Year: 1997 , Page(s): 49 - 55
    Cited by:  Papers (17)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1324 KB)  

    Many organizations today are investing in software product-line architecture-for good reason: a well-executed architecture enables organizations to respond quickly to a redefined mission or to new and changing markets. It allows them to accelerate the introduction of new products and improve their quality, to reengineer legacy systems, and to manage and enhance the many product variations needed f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Could LDAP be the next killer DAP?

    Publication Year: 1997 , Page(s): 88 - 89
    Cited by:  Patents (27)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (540 KB)  

    About a year ago, Netscape Communications, with the support of more than 40 other companies, adopted the Lightweight Directory Access Protocol (LDAP). Notably absent from the list of early LDAP supporters, Microsoft came on board eight months later. LDAP is a protocol that allows a program such as a browser or an e-mail package to perform directory lookups across a wide variety of directories, eve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Good enough quality: beyond the buzzword

    Publication Year: 1997 , Page(s): 96 - 98
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (296 KB)  

    The big new force that is propelling the good enough idea is the explosion of market-driven software. With a passion roughly proportional to the price of Microsoft stock, companies are looking for the shortest path to better software, faster, and cheaper. They are willing to take risks, and they have little patience for the traditional moralistic arguments in favor of so-called good practices. Muc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internetworked graphics and the Web

    Publication Year: 1997 , Page(s): 99 - 101
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (360 KB)  

    Although the networking and computer graphics fields are considered to be distinct disciplines, they must begin to converge in order to support collaborative exploration and information visualization on the Internet and the World Wide Web. Telecommunication breakthroughs remove bottlenecks and provide new opportunities for interactive 3D graphics across globally interconnected, dissimilar networks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object structures for real-time systems and simulators

    Publication Year: 1997 , Page(s): 62 - 70
    Cited by:  Papers (98)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3240 KB)  

    The market for real-time applications has grown considerably in years, and in response engineering methods have also improved. Today's techniques, while adequate for building moderately complex embedded applications, are inadequate for building the large, highly reliable, very complex real-time applications that are increasingly in demand. To build such large systems, engineering teams need a more... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The allegory of the humidifier: ROI for systems engineering

    Publication Year: 1997 , Page(s): 104, 102 - 103
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (400 KB)  

    Convincing management of the importance of systems engineering-making time available in the project schedule for systems analysis, generating specifications that define customer needs, and other arguments-always made sense to systems engineers from a risk reduction and cost-avoidance perspective. But as schedule crunches, today's fire drill, and project cost reductions take hold, systems engineeri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com