By Topic

Computer

Issue 10 • Date Oct 1998

Filter Results

Displaying Results 1 - 14 of 14
  • A framework for Good Enough testing

    Publication Year: 1998, Page(s):124 - 126
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    After a year in Sunnyvale, California, doing test management, the author is moving to Virginia, where he's been hired by Reliable Software Technologies, a company known for tools and consulting dedicated to achieving very high quality software. He'll spend most of his time in a consulting role, which is a very different reality from software management. But it will be an interesting one, nonethele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Windows NT kernel architecture

    Publication Year: 1998, Page(s):40 - 47
    Cited by:  Papers (7)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Windows NT 5.0 is a massive release, with significant new operating system and network functionality being added to many areas of the system. It is not, however, a rewrite-many aspects of the kernel system architecture remain the same or are being extended. In other words, the fundamental operating system architecture is not changing in Windows NT 5.0. The article is intended as a brief introducti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Windows NT Clustering Service

    Publication Year: 1998, Page(s):55 - 62
    Cited by:  Papers (5)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    The Windows NT Clustering Service supports high-availability file servers, databases, and generic applications and services. A cluster is a collection of computer nodes-independent, self-contained computer systems-that work together to provide a more reliable and powerful system than a single node. In general, the goal of a cluster is to distribute a computing load over several systems, without us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Media-independent publishing: four myths about XML

    Publication Year: 1998, Page(s):120 - 122
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    Called “the emerging technology of the year” after it was endorsed by the World Wide Web Consortium (W3C), XML burst onto the scene in February. It was called the successor to HTML and, according to some, the future lingua franca for the exchange of structured data. As XML emerged from the obscurity of its W3C beginnings, it was perhaps inevitable that this new data format would begin ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making network interfaces less peripheral

    Publication Year: 1998, Page(s):70 - 76
    Cited by:  Papers (11)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    A barrier to delivering improvements in network bandwidth and latency to users is the network interface (NI), which connects a network to the host computer that runs the network software. An NI includes hardware that exposes an internal interface-such as device registers-to a host processor. A key problem with most current NIs is that their internal interface is similar to that of a disk's interfa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advances in Windows NT storage management

    Publication Year: 1998, Page(s):48 - 54
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Windows NT 5.0 introduces fundamental changes to storage management. The new infrastructure in NT 5.0 can adapt to future changes in storage devices and media, brings a more powerful set of management mechanisms, and supports more base services within the system. Most of the changes are transparent to legacy applications and to users, but software producers who want to deploy advanced functionalit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From busyware to stableware

    Publication Year: 1998, Page(s):117 - 119
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    The integrated engineering of complex systems depends on, among other things, the supply of reliable, cost effective, stable components. However, as pointed out earlier by H.W. Lawson (1998), unnecessary complexity abounds in today's computer and communication structures, including the platforms that host many complex, often critical systems. Thus, even if an organization accurately designs, devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The changing face of freeware

    Publication Year: 1998, Page(s):11 - 13
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Whether it's called freeware or open source software, the popularity of software that is either given away or provided at a nominal price along with its source code is growing rapidly. There are numerous examples of popular open source software, including the Linux operating system and the market leading Apache Web server. With its increasing popularity, freeware is beginning to challenge long hel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A visualization tool for Y2K

    Publication Year: 1998, Page(s):63 - 69
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2632 KB)

    To facilitate Y2K conversions, Bell Laboratories has developed a Y2K visualization tool. The input to the tool is the output of commercially available Cobol parsing tools that identify lines potentially affected by Y2K. While these tools are extremely useful, their output is daunting. Presenting this output visually increases assessment productivity by as much as 80 percent. Visualization also imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nifty technology and nonconformance: the Web in crisis

    Publication Year: 1998, Page(s):115 - 116, 119
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    The near parity between Microsoft's Internet Explorer and Netscape's Navigator is bringing what had been merely a developers' annoyance firmly into the realm of disaster. The problem is a relatively familiar one: nonconformance or incomplete implementation of standards makes building sophisticated Web pages that work across browsers a difficult and expensive job. Because Web developers have to spe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parsec: a parallel simulation environment for complex systems

    Publication Year: 1998, Page(s):77 - 85
    Cited by:  Papers (257)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    Design and development costs for extremely large systems could be significantly reduced if only there were efficient techniques for evaluating design alternatives and predicting their impact on overall system performance metrics. Due to the systems' analytical intractability, simulation is the most common performance evaluation technique for such systems. However, the long execution times needed f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond incremental change

    Publication Year: 1998, Page(s):31 - 39
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    In the next 25 years NASA has ambitious goals: it wants to accurately predict climate and resources over decades, not just days. It wants to detect Earth-sized planets 600 trillion miles away with a telescope powerful enough to determine signs of life. It wants to use the International Space Station as a platform for an astronaut to visit Mars. This is the big vision, and to many it may sound more... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PicoJava: a direct execution engine for Java bytecode

    Publication Year: 1998, Page(s):22 - 30
    Cited by:  Papers (64)  |  Patents (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    Key to the central promise inherent in Java technology-“write once, run anywhere”-is the fact that Java programs run on the Java virtual machine, insulating them from any contact with the underlying hardware. Consequently, Java programs must execute indirectly through a translation layer built into the Java virtual machine. Translation essentially converts Java virtual machine instruct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designers: the browser war casualties

    Publication Year: 1998, Page(s):14 - 16, 21
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    As Microsoft's Internet Explorer and Netscape Navigator battle for dominance of the browser market, each company is adopting different versions of some important technologies: Microsoft and Netscape are innovating along paths that reflect their business goals. In the process though, Web site developers and even Web surfers are paying a price. Microsoft and Netscape disagree over several key Web st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com