Scheduled Maintenance on March 25th, 2017:
Single article purchases and IEEE account management will be unavailable from 4:00 AM until 6:30 PM (ET). We apologize for the inconvenience.
By Topic

Computer

Issue 8 • Aug. 1998

Filter Results

Displaying Results 1 - 14 of 14
  • Biometrics: A new era in security

    Publication Year: 1998, Page(s):16 - 18
    Cited by:  Papers (5)  |  Patents (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active networks: the programmable pipeline

    Publication Year: 1998, Page(s):19 - 21
    Cited by:  Papers (1)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing productivity at Saturn

    Publication Year: 1998, Page(s):35 - 43
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (541 KB)

    To remain competitive, manufacturing enterprises must increase and simultaneously reduce costs. This requires daily and long term examination and analysis of a plant's functions and operations. Using this data, an enterprise can identify production flow bottlenecks and analyze capacity and other factors, which in turn helps identify improvement opportunities. While such information is critical, it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information visualization for collaborative computing

    Publication Year: 1998, Page(s):75 - 82
    Cited by:  Papers (22)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Information technology continues to generate increasing amounts of data, most of which is useless without scalable methods to collect, analyze, process, and understand it. Visualization is a promising approach to such systemization because it lets users see underlying processes and guide process simulations interactively. However, visualization must be combined with some way to make repositories o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends in embedded-microprocessor design

    Publication Year: 1998, Page(s):44 - 49
    Cited by:  Papers (46)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    When discussing microprocessors, we tend to think of the Intel x86 architecture and its competitors. Doing so, however, ignores the growing market for embedded microprocessors and controllers, in particular the growing 32 bit embedded processor market. This movement toward longer instruction length may seem strange to developers of brake control systems or washing machines-and, indeed, forecasters... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiprocessors should support simple memory consistency models

    Publication Year: 1998, Page(s):28 - 34
    Cited by:  Papers (44)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    In the future, many computers will contain multiple processors, in part because the marginal cost of adding a few additional processors is so low that only minimal performance gain is needed to make the additional processors cost effective. Intel, for example, now makes cards containing four Pentium Pro processors that can easily be incorporated into a system. Multiple processor cards like Intel's... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart cards: integrating for portable complexity

    Publication Year: 1998, Page(s):110 - 112, 115
    Cited by:  Papers (2)  |  Patents (61)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    The decreasing cost of embedded chips is one of many factors that have spurred growing interest in smart cards. Today, typical markets for smart cards fall into three broad areas: electronic currency, an application in which smart cards replace cash or traditional credit cards in pay phone, transit, and toll collection systems; electronic identification, which permits controlled access to building... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DSP processors hit the mainstream

    Publication Year: 1998, Page(s):51 - 59
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    These days, the once obscure engineering term “DSP” (digital signal processing) is working its way into common use. It has begun to crop up on the labels of an ever wider range of products, from home audio components to answering machines. This is not merely a reflection of a new marketing strategy, however; there truly is more digital signal processing inside today's products than eve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The highs and lows of change control

    Publication Year: 1998, Page(s):113 - 115
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    The process of change control in software project management is vital. But the forces that make it necessary also make it annoying. We worry about change because a tiny perturbation in the code can create a big failure in the product. But it can also fix a big failure or enable wonderful new capabilities. We worry about change because a single rogue developer could sink the project; yet brilliant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based codesign

    Publication Year: 1998, Page(s):60 - 67
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    Hardware-software codesign has been a research topic since the beginning of this decade (1990s), but only now are structured methods emerging that focus on automating design. Unfortunately, to date most codesign approaches leverage performance from individual hardware and software tools, rather than enforcing a structured integration of hardware and software systems simultaneously. A few framework... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IETF: laying the Net's asphalt

    Publication Year: 1998, Page(s):116 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    Since its inception in 1986, the Internet Engineering Task Force (IETF) has helped drive Internet standards. Its guiding principle of “rough consensus and working code” has produced standards like TCP (Transmission Control Protocol), IP (Internet Protocol), and HTTP (Hypertext Transport Protocol). Companies widely adhere to these standards, yet the IETF has no authority to enforce them... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward automatic detection of software failures

    Publication Year: 1998, Page(s):68 - 74
    Cited by:  Papers (10)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    To date, no method has explicitly and cost effectively dealt with failure detection in software systems whose specifications are nondeterministic. In such systems, the specification permits multiple outputs for the same input sequence and system state. Nondeterminism in specifications is advantageous because the specification writer can avoid stating irrelevant behavior as mandatory, freeing the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded-system design plays catch-up

    Publication Year: 1998, Page(s):120 - 118-19
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Embedded systems are becoming more prevalent, controlling systems from microwave ovens to the Mars Rover. They are also more complex, in part because of the availability of low-cost 32- and 64-bit processors. Companies sold 180 million 32- and 64-bit embedded processors in 1997-a 50% increase over the number sold in 1996. Embedded processors outsold general-purpose processors (the type in PCs) by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward decent text encoding

    Publication Year: 1998, Page(s):108 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    Text is composed of characters; we get different kinds of text from different kinds of characters. So character sets are very important. And if there are contending views about whether we are well served by our character set standards, these views should be exposed and discussed. It's strange that the computing industry has for so long stuck to poor and impoverished character sets for text encodin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@computer.org