Computer

Issue 11 • Nov. 1997

Filter Results

Displaying Results 1 - 13 of 13
  • Keeping Pace with an Information Society

    Publication Year: 1997, Page(s):46 - 57
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building the Vision: Lessons for all Leaders

    Publication Year: 1997, Page(s):135 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual private networks: leveraging the Internet

    Publication Year: 1997, Page(s):18 - 20
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    Proponents say virtual private networks could be the wave of the networking future for one very important reason: VPNs transmit data via the Internet, rather than via expensive traditional private networks. Proponents are quick to mention the significant cost savings organizations can realize by using networks that employ the Internet backbone as a data pipeline rather than networks that rely on l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asynchronous processor survey

    Publication Year: 1997, Page(s):67 - 76
    Cited by:  Papers (19)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    Virtually all computers today are synchronous. As systems grow increasingly large and complex the clock can cause big problems with clock skew, a timing delay that can create havoc with the overall design. It can also increase the circuit silicon and power dissipation, which can affect overheating and power supplies. Computer architecture researchers are actively considering asynchronous processor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-based education experiences

    Publication Year: 1997, Page(s):139 - 143
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    The World Wide Web has the potential to revolutionize instruction and increase educational opportunities across corporate, government and educational sectors. Not only will the Web enable distance learning and peer-to-peer connectivity, but it will also enhance student feedback and let instructors understand whether and how long students have studied a particular lesson. It also has the potential ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agents of change: educating software engineering leaders

    Publication Year: 1997, Page(s):59 - 65
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Most professional degree programs for software engineering focus on solving today's problems with today's technologies. Carnegie Mellon's Master of Software Engineering program takes a different approach, preparing engineers to work with new science and technology throughout their careers and helping them become agents of change in the industry. The approach aims to cultivate future leaders in sof... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The opportunity of a millennium [Year 2000 problem]

    Publication Year: 1997, Page(s):137 - 138
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    The authors discuss the origins of the Year 2000 problem. They consider how the millennium problem goes much deeper than programmers setting two digit date fields. It is related to abstraction, information hiding, modularity, and reuse. In other words, the problem concerns the set of fundamental software engineering issues that object technology addresses. Because the conversion effort is so huge ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In search of real-time Internet service

    Publication Year: 1997, Page(s):14 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    Many organizations would like to use the Internet for applications that require real time service, such as telephony. The Internet has not lent itself to such service in the past, but various products, services, and standards could help solve the Internet's quality-of-service problem View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teaching agents to learn: from user study to implementation

    Publication Year: 1997, Page(s):36 - 44
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    In order to understand how best to create a system that can learn, we conducted an experiment in which users attempt to train an intelligent agent to edit a bibliography. In our experiment, a researcher sat behind a curtain masquerading as the intelligent agent, which we named Turvy. To make the experiment as useful as possible for constructing a real software agent, we set limits on Turvy's abili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicate caching for data-intensive autonomous systems

    Publication Year: 1997, Page(s):77 - 83
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    Predicate caching is a powerful memory caching technique especially suitable for a class of applications called autonomous systems. These systems can act according to presupplied logic that defines predictable, repetitive data access requests. This class includes rule-based systems, expert systems, logic programs, active database systems, database integrity constraints, triggers, alerters, and aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cars, phones, and Tamagotchi tribes

    Publication Year: 1997, Page(s):144, 142 - 143
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    As if life isn't already crowded enough with obligations, “Tamagotchis” (virtual pets) would seem to be at odds with the Information Age, but cars, phones and TV-like appliances will become more like Tamagotchis as the friction-free economy once again expresses itself in tribalism. My premise is simple: the friction-free economy rewards retro-cultures that yearn to return to agrarian t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ISO 14001: the green standard

    Publication Year: 1997, Page(s):133 - 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    ISO 14001 is a comprehensive Environmental Management System (EMS) that, when adopted, enables organizations to formulate corporate objectives in the context of environmentally oriented legislative requirements and general environmental concerns. ISO 14001 helps control the environmental effects of an organization's activities by helping each complying organization clearly define its environmental... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent agents in the nuclear industry

    Publication Year: 1997, Page(s):28 - 31
    Cited by:  Papers (27)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    Looks at how cooperative multiagent systems designed for monitoring and diagnosing real-time nuclear power plant failures can help operators better anticipate operational problems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org