Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Spectrum, IEEE

Issue 2 • Date Feb. 1998

Filter Results

Displaying Results 1 - 12 of 12
  • Books

    Publication Year: 1998 , Page(s): 10 - 12
    Save to Project icon | Request Permissions | PDF file iconPDF (535 KB)  
    Freely Available from IEEE
  • Software Reviews

    Publication Year: 1998 , Page(s): 16
    Save to Project icon | Request Permissions | PDF file iconPDF (357 KB)  
    Freely Available from IEEE
  • Technically Speaking

    Publication Year: 1998 , Page(s): 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (181 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EE's tools and toys

    Publication Year: 1998 , Page(s): 67 - 68
    Save to Project icon | Request Permissions | PDF file iconPDF (580 KB)  
    Freely Available from IEEE
  • Thirty years ago

    Publication Year: 1998 , Page(s): 68t2 - 68t5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (466 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Sights

    Publication Year: 1998 , Page(s): 81
    Save to Project icon | Request Permissions | PDF file iconPDF (169 KB)  
    Freely Available from IEEE
  • The practical engineer [IC design, power reduction]

    Publication Year: 1998 , Page(s): 54 - 60
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3688 KB)  

    The need of popular portable electronics for long battery life is placing power reduction at the top of every IC design engineer's to-do list. A new breed of design automation tools is helping them scrimp on power at every step of the VLSI design process. The automation tools can be differentiated, to a first order, by the level of abstraction on which they operate. Lowest of all are the transistor level tools. These possess the best accuracy, but commensurately require the longest run times and have the smallest capacities-the size of the circuit that can be analyzed. While transistor level tools can assist with analyses earlier in the design process, they are typically used to characterize cells and modules for use at the higher abstraction levels. The next level of abstraction embraces the logic-level power analysis tools. The highest abstraction level for which power analysis tools exist today is the architectural level. This type of tool analyzes abstract design representations such as Verilog or VHDL RTL code. The use of these tools in power reduction design is outlined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In virtual fashion

    Publication Year: 1998 , Page(s): 18 - 25
    Cited by:  Papers (6)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1896 KB)  

    Computer graphics and virtual reality are being combined to enable clothes-shoppers to serve as their own clothes models for garments that are digitally fitted and converted into unique 2D patterns. Everything off the rack in effect becomes custom tailoring, choice of fabric and all. The author describes how the virtual reality mannequin is developed from digital images of the body. The virtual design studio is then described. The characteristics of the materials used are incorporated into garment design. The computer modeling of cloth drape is discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The ideal light source for datanets

    Publication Year: 1998 , Page(s): 43 - 53
    Cited by:  Papers (5)  |  Patents (12)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4188 KB)  

    The appetite for ever increasing computing power and interconnection bandwidth could be sated by vertical-cavity, surface-emitting lasers (VCSEL) for optical data communication. Made inexpensively using IC processing techniques, they can be diced in planar or linear arrays, such as in the wavelength-division multiplexer. The author discusses the essentials of semiconductor light sources, epitaxial growth of the surface-emitting laser and its interior design. The characteristics and operation of the VCSEL are described View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The practical engineer [heat sinks design]

    Publication Year: 1998 , Page(s): 61 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2468 KB)  

    Beset by time-to-market pressures, designers often neglect the thermal requirements of their products and then have to resort to costly after-the-fact fixes. From the standpoint of the system as a whole, thermal management or thermal design has to take all of the components and the operating environment as well into account. The author discusses early and effective steps to take for managing thermal design. These are: look at the system as a whole; define heat sink requirements; choosing a heat sink; selecting a thermal interface material; and computer modelling of the system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recycling batteries

    Publication Year: 1998 , Page(s): 35 - 42
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2112 KB)  

    Hundreds of millions of large and billions of small batteries are used up annually in the service of all manner of electronic devices. Until recently, the tons of toxic materials in these batteries would wind up in the garbage, but the systematic collection and recycling of spent batteries is growing. Effective recycling involves changes at all stages of battery life, starting with production. Manufacturers should attempt to use recycled materials themselves, label batteries clearly for easier sorting, and ensure that batteries can be effectively recycled. Consumers need to take part in recycling programs by separating batteries from other wastes-doing so after their disposal in general municipal solid wastes is quite expensive per ton of battery material recovered. Retailers and shippers are needed to collect and return post-consumer batteries to recyclers. Finally, recycling plants and processes are needed for each of the various battery types and materials. The authors discuss materials management, battery design issues, systematic collection, recycling technologies, nickel and cadmium recovery, consumer cell recycling, detoxification costs, and future prospects View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firewalls fend off invasions from the Net

    Publication Year: 1998 , Page(s): 26 - 34
    Cited by:  Papers (5)  |  Patents (27)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1584 KB)  

    Whether a computer is in a corporation, government agency, university, small business, or at home, if it is linked to a network, hackers are a risk. The first line of defense against them is a firewall, provided it is set up correctly. Firewall technology is a set of mechanisms that collectively enforce a security policy on communication traffic entering or leaving a guarded network domain. The security policy is the overall plan for protecting the domain. Embodied in hardware, software, or both, a firewall guards and isolates the domain. Broadly, firewalls attempt to maintain privacy and ensure the authenticity of data communications that pass through their domain's boundaries. Whether data is entering or leaving a domain, it is protected from eavesdropping (passive wiretapping) and change (active wiretapping). But only communication traffic entering or leaving a domain comes under the influence of firewall technology View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Spectrum Magazine, the flagship publication of the IEEE, explores the development, applications and implications of new technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Susan Hassler
IEEE Spectrum Magazine