By Topic

Computer

Issue 6 • Date June 1998

Filter Results

Displaying Results 1 - 13 of 13
  • The Challenges Of Using COTS Software In Component-Based Development

    Publication Year: 1998, Page(s):44 - 45
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Cost of COTS

    Publication Year: 1998, Page(s):46 - 52
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Real Stroustrup Interview

    Publication Year: 1998, Page(s):110 - 114
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Certifying off-the-shelf software components

    Publication Year: 1998, Page(s):53 - 59
    Cited by:  Papers (69)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Software components are often delivered in “black boxes” as executable objects whose licenses forbid decompilation back to source code. Often source code can be licensed, but the cost makes doing so prohibitive. We therefore have developed a methodology for determining the quality of off-the-shelf (OTS) components using a set of black box analyses. This methodology will provide develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building the US workforce, one engineer at a time

    Publication Year: 1998, Page(s):120, 117 - 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    High-tech companies in the USA have hit the annual cap of 65,000 H-1B visas, which allow skilled workers from outside the US to work there. US legislators have been aided and abetted by labor unions and trade associations like IEEE-USA, which argue that immigrant engineers take jobs away from US citizens, increasing unemployment and depressing wages. Which point of view does the data support? For ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Web is not yet suitable for learning

    Publication Year: 1998, Page(s):115 - 116
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Many sites on the Web refer to themselves as courses. Doing so is popular at present, with an ever increasing number of these courses cropping up everywhere. In some universities, administrators pressure the faculty to provide such courses without offering guidelines for how the Internet might best be used for learning. We've looked at many such courses and come away greatly disappointed. Most of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security control for COTS components

    Publication Year: 1998, Page(s):67 - 73
    Cited by:  Papers (8)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    Using COTS components poses serious threats to system security. The authors analyze the risks and describe how their sandbox method can limit the damage potential of COTS components. The sandbox model was originally developed for fault tolerance. Rather than eliminating actual failures, it provides a restricted environment to confine application behavior. The approach confines the damage caused if... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throwing off the shackles of a legacy system

    Publication Year: 1998, Page(s):104 - 106, 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    Network information about cables, wire pairs, digital circuits, fiber, telephone numbers, central office equipment, and so on constitutes the basic building blocks for operating a local telephone company. GTE uses a mainframe system to maintain these information and service provisioning functions. The system, which we refer to as LegacyX, was developed and is owned by a third party vendor. Over th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual memory: issues of implementation

    Publication Year: 1998, Page(s):33 - 43
    Cited by:  Papers (13)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    Virtual memory was developed to automate the movement of program code and data between main memory and secondary storage to give the appearance of a single large store. This technique greatly simplified the programmer's job, particularly when program code and data exceeded the main memory's size. Virtual memory has now become widely used, and most modern processors have hardware to support it. Unf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why does Digital participate in standards?

    Publication Year: 1998, Page(s):95 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    The IT industry spends billions of dollars every year in support of standards. Companies, governments and universities send hundreds, if not thousands, of people to meetings all over the world to develop standards and define specifications for information technology. These people meet, share information, debate, discuss and even argue. Then they write the standards that define many key aspects of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plans, lies, and videotape

    Publication Year: 1998, Page(s):107 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    The authors pose the question: why are smart, skilled, responsible, experienced software people so often mixed up about commitments? They make a list of reasons for why otherwise capable, well intentioned people appear not to meet their commitments: no commitment in the first place; conditional commitments, with conditions unmet; commitment to work toward a goal, rather than achieve it; different ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A map of security risks associated with using COTS

    Publication Year: 1998, Page(s):60 - 66
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Combining Internet connectivity and COTS based systems results in increased threats from both external and internal sources. Traditionally, security design has been a matter of risk avoidance. Now more and more members of the security community realize the impracticality and insufficiency of this doctrine. It turns out that strict development procedures can only reduce the number of flaws in a com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware compilation: translating programs into circuits

    Publication Year: 1998, Page(s):25 - 31
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    Automatically translating a program specified in a programming language into a digital circuit is an idea of long standing interest. Thus far, the concept has appeared to be an uneconomical method of largely academic, but hardly practical interest. It has therefore not been pursued with vigor and consequently has remained an idealist's dream. With the increasing use of hardware description languag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com