Computer

Issue 12 • Dec 1998

Filter Results

Displaying Results 1 - 8 of 8
  • Avionics integration for CNS/ATM

    Publication Year: 1998, Page(s):124 - 126
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    Commercial aviation is changing around the globe. As the number of travelers increases, parts of the system experience severe congestion. Airports, air traffic controllers, communication networks, and the airspace itself (governed by laws stipulating minimum vertical, lateral, and head-to-tail separation of aircraft) are near their capacity during peak times. The ramifications of this congestion a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual modeling for agent-based applications

    Publication Year: 1998, Page(s):31 - 38
    Cited by:  Papers (10)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1824 KB)

    The authors describe a tool that lets nonprogrammers create mobile agents and distributed itineraries using a small set of generic icons. In preliminary experiments, users were able to generate even complex agents in three to four minutes View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hypertext: the next maintenance mountain

    Publication Year: 1998, Page(s):49 - 55
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    Hypertext documents are quickly becoming large, complex, and unwieldy. The paper considers whether lessons learned from software maintenance can be applied to the problem. Since software maintenance is a major problem and since hypertext documents share many of the characteristics of software: structure, development process, and economic value, maintaining hypertext documents is also likely to bec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-analysis: stripping away the hype

    Publication Year: 1998, Page(s):130 - 132
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Web sites provide a tremendous opportunity to learn more about the interests of customers, whether those customers are potential buyers visiting a commercial site, students browsing a university's Web page, or citizens logging onto a city's home page. In conjunction with cookie, registration, platform, and access information, we can learn a great deal about users by tracking their item-by-item cli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating security into the curriculum

    Publication Year: 1998, Page(s):25 - 30
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    Computer security can be used as a vehicle to achieve accreditation goals for computer science and engineering programs, while at the same time engaging students with relevant, exciting topics. The authors' approach, based on educational outcomes, illustrates that security topics can contribute to an engineering program by fostering all skills required to produce graduates capable of critical thin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Of crazy numbers and release criteria

    Publication Year: 1998, Page(s):127 - 128
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The author discusses the use of release criteria to decide when a project has a shippable product. He considers his experiences when working as a project manager for a small middleware applications group View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent communication languages: rethinking the principles

    Publication Year: 1998, Page(s):40 - 47
    Cited by:  Papers (98)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    Agent communication languages have been used for years in proprietary multiagent systems. Yet agents from different vendors-or even different research projects-cannot communicate with each other. The author looks at the underlying reasons and proposes a conceptual shift from individual agent representations to social interaction View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of government in IT standards

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    Government involvement in the IT standards process often includes funding, regulatory, and legislative mandates; trade and procurement policies; and sometimes outright control. Examples of all these exist in various countries, jurisdictions, and technical areas around the world. However, governments also play a major role as IT consumers. The specifications adopted by a government as a consumer fa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org