By Topic

IEEE Potentials

Issue 4 • Date Oct.-Nov. 1997

Filter Results

Displaying Results 1 - 16 of 16
  • Editorial

    Publication Year: 1997, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (237 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 1997, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (237 KB)
    Freely Available from IEEE
  • Patents in general

    Publication Year: 1997, Page(s):23 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB)

    One way inventors are credited for their inventions is through patents. Patents are one form of intellectual property; other common forms are trade secrets, trademarks and copyrights. These four basic mechanisms are used for protecting rights in hardware and software development. A patent has both legal and technical meanings. Legally, a patent may be regarded as a contract between the inventor an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global Implications

    Publication Year: 1997, Page(s): 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ergonomics

    Publication Year: 1997, Page(s): 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Circuit Rider

    Publication Year: 1997, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • The brick wall: NP completeness

    Publication Year: 1997, Page(s):37 - 40
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1348 KB)

    For over 40 years, artificial intelligence (AI) has not fulfilled its promise of truly intelligent machines for general use. As early as the 1950s and 1960s, scientists developed computational models of intelligence. They then excitedly coded these models into the best computers of the day. At first the scientists were puzzled by the machines' inability to produce reasoned output. Bewilderment bec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software as math

    Publication Year: 1997, Page(s):5 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    Discrete mathematics and abstract algebra courses are frequently required for computer science and engineering undergraduates. One could say these subjects define the mathematical basis for computing. Unfortunately, interest in the topics discussed in these courses frequently ends with the final exam. This paper presents a reason to continue looking and exploring View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software safety and reliability

    Publication Year: 1997, Page(s):32 - 36
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB)

    Gradually, but surely, our lives are being entrusted to computers and embedded microprocessors. As these systems become more “intelligent” and complex, the possibility for failure either at the hardware or software level increases. Technology from the large scale mainframe computers to small embedded processors that control the timing of a microwave oven or the deployment of automobile... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legal politics

    Publication Year: 1997, Page(s):25 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    General purpose, stored program, electronic computers were invented in the 1940s. But they only began to see widespread commercial usage by the mid to late 1950s. In those days, large mainframe manufacturers often “bundled” application programs or “software” together with the hardware. Dominant hardware manufacturers were not particularly interested in letting others obtain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network servers and Java

    Publication Year: 1997, Page(s):15 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1068 KB)

    Even before the Web, network servers played a central role on the Internet. They facilitated e-mail, GOPHER, telnet, and FTP (file transfer protocol) usage. Additional servers, including those supporting HTTP (Hypertext Transfer Protocol), have been developed to handle Web traffic. HTTP, along with the new computer language called Java, has raised our consciousness about network servers. Many of u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telemedicine

    Publication Year: 1997, Page(s):29 - 31
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    Telemedicine is a rapidly expanding area within medical informatics. Defined as using computer and communication technologies to provide medical expertise and services to distant locations, telemedicine dates back to the 1920s. Then radio linked public health physicians standing watch at shore stations to ships at sea with medical emergencies. Much later in the '70s, the large scale demonstrations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining

    Publication Year: 1997, Page(s):18 - 20
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    Mountainous amounts of data records are now available in science, business, industry and many other areas. Such data can provide a rich resource for knowledge discovery and decision support. Data mining is the process of identifying interesting patterns from large databases. Data mining is the core part of the knowledge discovery in database (KDD) process. The KDD process may consist of the follow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software can be patented

    Publication Year: 1997, Page(s):21 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    Some have argued that it is futile to patent computer software. The software would be outmoded and of no commercial interest before a patent application can be examined and issued (e.g., two years). Of course it all depends upon how the patent claims are drafted-i.e., it depends upon what is patented. As with any technology, invented computer program algorithms can turn out to be basic discoveries... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Codesign [hardware/software partitioning]

    Publication Year: 1997, Page(s):13 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    Hardware/software design is also known as the codesign methodology. This type of design raises some interesting problems since it deals with concurrent hardware and software development. The main issue is implementing a system with a minimal amount of application specific hardware communicating with a standard processor. The paper considers how codesign raises a lot of problems, such as specificat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building blocks and their interactions

    Publication Year: 1997, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2180 KB)

    As the decade of the 1980s began, software came of age and became a topic for management concern. Software has now surpassed hardware as the key to success for many computer-based systems. Object-oriented software development methods, among others, are now recognized as providing significant benefits. Its philosophy and implementation is promising a software development revolution. A number of dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com