Computer

Issue 4 • Apr 1999

Filter Results

Displaying Results 1 - 9 of 9
  • Surviving information warfare attacks

    Publication Year: 1999, Page(s):57 - 63
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    The past few years have seen governmental, military, and commercial organizations widely adopt Web-based commercial technologies because of their convenience, ease of use, and ability to take advantage of rapid advances in the commercial market. With this increasing reliance on internetworked computer resources comes an increasing vulnerability to information warfare. In today's heavily networked ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joust: a platform for liquid software

    Publication Year: 1999, Page(s):50 - 56
    Cited by:  Papers (22)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    The authors describe a Java-based platform for liquid software, called Joust, that is specifically designed to support low-level, communication-oriented systems and to avoid the limitations of general-purpose OSs. The authors contrast the platform requirements for communication-oriented liquid software with those of computation-oriented software, identify the limitations of current platforms, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ANTS: network services without the red tape

    Publication Year: 1999, Page(s):42 - 48
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    How well distributed computing systems perform depends a great deal on the network services used to move information among their machines. Yet despite this close correspondence, network services have evolved much more slowly than any other part of the distributed system environment. It is not that the networking community lacks innovative ideas: Internet Protocol version 6, Mobile IP, IP Multicast... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Activating networks: a progress report

    Publication Year: 1999, Page(s):32 - 41
    Cited by:  Papers (44)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Active networks-networks you can add programs to or customize to particular applications-are probably most familiar as Web proxy caches and firewalls. In their more sophisticated form, however, they have become customized infrastructures that let designers program control planes-the control software and network hardware used to manipulate the transport system's behavior. Programming mechanisms suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web-based financial trading system

    Publication Year: 1999, Page(s):64 - 70
    Cited by:  Papers (22)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    A new electronic financial market is fast emerging. Connected by highspeed networks, buyers and sellers are gathering in virtual marketplaces and revolutionizing the way business is conducted. The financial services industry, among the most innovative and aggressive in its use of IT, has created an entirely new online brokerage industry in just a few years. The principal functions of financial mar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping the Internet

    Publication Year: 1999, Page(s):97 - 98, 102
    Cited by:  Papers (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    How can you determine what the Internet or even an intranet looks like? The answer is, of course, to draw it on screen. Once you can see the data succinctly, it becomes much easier to understand. The drawing itself can help locate bottlenecks and possible points of failure. Where is that newly acquired subsidiary connected? Which business units have connections to business partners? More important... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated, computer-aided order fulfillment

    Publication Year: 1999, Page(s):99 - 102
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    The process for producing bank checks is well established, and semi automated systems for doing so have been in place for several years. However, these legacy systems are now having difficulty meeting new customer demands. To support greater product variability and responsiveness to new customer requirements, our company (Deluxe Corp.) decided to reexamine its current process with an eye to increa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software assurance for security

    Publication Year: 1999, Page(s):103 - 105
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    The article discusses an approach to security analysis that we have applied successfully over the past several years (to 1999) at Reliable Software Technologies. Our approach is no magic bullet, but it offers a reasoned methodology that has proven to be useful in the trenches. Our methodology, like many useful things, is a mix of art and engineering. The idea is straightforward: design a system wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The age of software patents

    Publication Year: 1999, Page(s):25 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    Current law treats software as just another invention. It is not. Software is a new kind of entity, with the ability to transform all other technologies, including the creative arts, politics, and economics. It therefore requires separate treatment. In less than two decades, software development has evolved from being a legally defenseless enterprise to one in which almost every innovation is a ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org