Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Computer

Issue 3 • March 1999

Filter Results

Displaying Results 1 - 19 of 19
  • Alone on the road less traveled [Letters]

    Publication Year: 1999, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • No shortage of qualified faculty [Letters]

    Publication Year: 1999, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • What's new about cots headaches [Letters]

    Publication Year: 1999, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (251 KB)
    Freely Available from IEEE
  • New technologies take the network home

    Publication Year: 1999, Page(s):11 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will 1999 be the year of IP telephony

    Publication Year: 1999, Page(s):15 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Groups duel over new I/O standards

    Publication Year: 1999, Page(s):18 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Society activities attract new members

    Publication Year: 1999, Page(s):80 - 81
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Innovation in the small

    Publication Year: 1999, Page(s):120 - 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reinventing GTE with information technology

    Publication Year: 1999, Page(s):50 - 58
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    In response to shifting business demands, evolving information technologies play a key role in first reengineering and then reinventing GTE (telecommunications company). To illustrate the growing impact of IT within GTE, we chronicle the evolution of GTE's Network Management System (NMS). Although we focus primarily on the NMS, we broadly identify three major phases in the application of IT within... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptography: the importance of not being different

    Publication Year: 1999, Page(s):108 - 109, 112
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    Cryptography is difficult. It combines mathematics, computer science, sometimes electrical engineering, and a twisted mindset that can figure out how to get around rules, break systems, and subvert the designers' intentions. Even very smart, knowledgeable, experienced people invent bad cryptography. In cryptography, there is security in following the crowd. A homegrown algorithm can't possibly be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The changing role of information technology in manufacturing

    Publication Year: 1999, Page(s):42 - 49
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    Although its role in manufacturing has keen move to support processes, IT is evolving to become a catalyst for process and product change. In this case study, an apparel manufacturer used an enterprise modeling framework (EMF) developed by Georgia Tech (USA) to implement multiple IT solutions. It was then able to rapidly shift production resources between two separate product lines View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Have we witnessed a real-life Turing Test?

    Publication Year: 1999, Page(s):27 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    Did Deep Blue ace the Turing Test? Did it do much more? It seems that the IBM creation not only beat the reigning chess World Champion Gary Kasparov, but also took a large step, in some people's eyes, toward true artificial intelligence. For AI professionals, a computer defeating a human in chess is probably neither surprising nor really significant. After all, they contend, chess can be described... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defining stakeholder relationships

    Publication Year: 1999, Page(s):110 - 112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    Jointly developed by the ISO and IEC in 1995, the ISO/IEC 12207 standard, Software Life Cycle Processes, provides specific guidance in defining the roles and responsibilities of various stakeholders in the life cycle of a software project, product, or service. And the software community is beginning to take heed. The standard itself is relatively brief, detailing 17 processes in less than 40 pages... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The BT intranet: information by design

    Publication Year: 1999, Page(s):59 - 66
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    British Telecom's intranet hosts an array of information products that are an integral part of the way its employees do business. The article presents a glimpse of how BT uses concepts like media engineering to develop usable and maintainable information products-information by design. The BT intranet supports several information products that are now an everyday part of business within BT: the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond spreadsheets: tools for building decision support systems

    Publication Year: 1999, Page(s):31 - 39
    Cited by:  Papers (18)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1476 KB)

    The complexity and long development time inherent in building decision support systems has thus far prevented their wide use. A new class of tools, DSS generators, seeks to cut the lead time between development and deployment. DSS generators provide tools that make it easier and faster to develop models, data, and user interfaces that are customized to the application's requirements. Using a DSS g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making RAD work for your project

    Publication Year: 1999, Page(s):113 - 114, 117
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    For several good business reasons, rapid application development has become increasingly popular. In general, RAD gives you earlier product payback and more payback time before the pace of technology makes your product obsolete. For software product sales, RAD also helps you debut a product earlier in a market window, which lets the product capture more market share, revenues, and profits. To gain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making business sense of electronic commerce

    Publication Year: 1999, Page(s):67 - 75
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Although its infrastructure is still very young, e-commerce continues to create new business models and innovative marketing and technology strategies. To avoid unraveling their core processes, organizations considering e-commerce applications must take time out to evaluate the many facets of adoption and integration. Arguments for not investing in e-commerce are rapidly dissolving. It is now wide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transforming business through information technology

    Publication Year: 1999, Page(s):40 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Information technology has made major strides this past decade, improving significantly the process of doing business. These changes have permeated every aspect of our lives from grocery shopping to banking to manufacturing to managing a profitable business. And the trend is expected to accelerate as we move into the new millennium View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scientific components are coming

    Publication Year: 1999, Page(s):115 - 117
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    Reliability is even more of an issue for scientific programmers than it is for other programmers. Since the correctness of a program is relative to its specification, the greatest difficulty of scientific programming is that the specification for a program is almost always an abstract mathematical or physical statement, not something specific. The way scientific programmers most frequently verify ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org