By Topic

Computer

Issue 4 • Date Apr 1998

Filter Results

Displaying Results 1 - 12 of 12
  • Computer engineering 30 years after the IBM Model 91

    Publication Year: 1998, Page(s):27 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    Often in our hurry to create the future in computer engineering, we ignore lessons from past projects. One project that offers interesting insights, the IBM System/360 Model 91, has celebrated the 30th anniversary of its first shipment. The largest member of the series based on IBM's most enduring and influential computer architecture, this machine owed much to its predecessors. Together, these ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A revisionist account of early language development

    Publication Year: 1998, Page(s):22 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    The author discusses how the practicality of Fortran and the elegance of Algol defined a fault line running through programming language study that we are just now beginning to bridge. He considers Algol's block structure and some alternatives to this structure View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ganging up on information overload

    Publication Year: 1998, Page(s):106 - 108
    Cited by:  Papers (24)  |  Patents (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    When information is abundant, the knowledge of which information is useful and valuable matters most. We all use our network of family, friends, and colleagues to recommend movies, books, cars, and news articles. Collaborative filtering technology automates the process of sharing opinions on the relevance and duality of information. Collaborative filtering is one technique among many information f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Paving the information superhighway's last mile

    Publication Year: 1998, Page(s):10 - 12, 14
    Cited by:  Papers (2)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    Internet access speeds have increased dramatically. Carriers have been upgrading the Internet backbone so it can handle Gbits-per-second data transmission rates, and users have seen their computer processing speeds grow exponentially. However, the process of paving the information superhighway's last mile, between the ISP and the home or office, has proceeded much more slowly. The author considers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key applications for high-assurance systems

    Publication Year: 1998, Page(s):35 - 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    The paper consists of project summaries concerning high-assurance systems. Those who are grappling with practical high-assurance design issues report their strategies, the problems they solved, and the challenges that remain. The six summaries represent a cross-section of projects and domains with some strikingly similar challenges. Although they address diverse domains, these reports reveal a set... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and assurance strategy for the NRL Pump

    Publication Year: 1998, Page(s):56 - 64
    Cited by:  Papers (7)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    The NRL Pump forwards messages from a low level system to a high level system and monitors the timing of acknowledgments from the high level system to minimize leaks. It is the keystone to a proposed architecture that uses specialized high assurance devices to separate data at different security levels. We describe the software design and assurance argument strategy for this device, the Network NR... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gray rebuts Bach: no cowboy programmers!

    Publication Year: 1998, Page(s):102 - 103, 105
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The author presents a response to an article by James Bach (“Microdynamics of Process Evolution”, Computer, p. 111-13, Feb. 1998). The author considers the importance of checklists in software project planning and the use of process standards View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward integrated methods for high-assurance systems

    Publication Year: 1998, Page(s):32 - 34
    Cited by:  Papers (67)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Computers have become indispensable, largely because they automate and control most systems we interact with. Even though computing technology is constantly improving, relying on computers to this degree fosters an urgent need for high-assurance systems. Among the typical applications of high-assurance systems, high-consequence systems are the most critical. The unsafe failure of these systems can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why software developers refuse to improve

    Publication Year: 1998, Page(s):112, 110 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Many developers fail to acknowledge that there are more productive environments. When a software organization loses a bidding contest, the losers roll their eyes heavenward and tell each other, “Better luck next time”. Well, this is the reality: There are software development organizations that are more productive than others. “Luck” is not the whole story; you need to look... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification and analysis of intercomponent communication

    Publication Year: 1998, Page(s):47 - 54
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    The correctness, safety and robustness of the specification of a critical system are assessed through a combination of rigorous specification capture and inspection, formal analysis of the specification, and execution and simulation of the specification. Any integrated approach to specifying critical systems should support all three activities. Embedded systems pose special challenges to the speci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using process history to predict software quality

    Publication Year: 1998, Page(s):66 - 72
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Many software quality models use only software product metrics to predict module reliability. For evolving systems, however, software process measures are also important. In this case study, the authors use module history data to predict module reliability in a subsystem of JStars, a real time military system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating CAD tools for MEMS design

    Publication Year: 1998, Page(s):99 - 101
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    Microelectromechanical systems, or MEMS, is the generic name for a new class of microsystems. Typically, MEMS are: micron- to millimeter-scale devices with moving parts or containing fluids; parts that are batch fabricated using techniques derived from the semiconductor industry; used as sensors or actuators; and are often directly connected or integrated with ICs. The first MEMS design system, ME... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com