Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 10 • Oct. 1999

Filter Results

Displaying Results 1 - 16 of 16
  • Domain name solution causes new problems

    Publication Year: 1999, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agreement reached on new I/O architecture

    Publication Year: 1999, Page(s):16 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (474 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unconvering weak links in the readiness chain

    Publication Year: 1999, Page(s): 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer society and ACM approve software engineering code of ethics

    Publication Year: 1999, Page(s):84 - 88
    Cited by:  Papers (12)
    Request permission for commercial reuse | PDF file iconPDF (388 KB)
    Freely Available from IEEE
  • UbiNet: the uniquitous Internet will be wireless

    Publication Year: 1999, Page(s):128 - 127
    Cited by:  Papers (4)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary project management

    Publication Year: 1999, Page(s):49 - 57
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    As a developer of financial software, the author has witnessed various project management strategies. Three years ago, he participated in and managed two nearly identical systems for investment managers, undertaken at two different companies. The first project used conventional project management techniques and failed without delivering a functional product after 21 months. Subsequently, the autho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systematic OO programming with axiomatic design

    Publication Year: 1999, Page(s):121 - 124
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    Axiomatic design offers a systematic and orderly way to proceed through the software development process. The methodology ensures that developers make the best possible design decisions by providing decision-making criteria in the form of two axioms: the independence axiom suggests that the best designs maintain the independence of the functional requirements, ensuring that the design can achieve ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering in the small. Practical software engineering and management

    Publication Year: 1999, Page(s):39 - 40
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Innovations in software development techniques-including improvements to process, method, and management-will distinguish success from failure in the years ahead. The paper considers how some small and midsize software organizations, through innovative software engineering and management practices, have been successful in today's demanding and highly competitive business environment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Network Maturity Model for Internet development

    Publication Year: 1999, Page(s):117 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    The Internet has attracted more than 50 million users during the past four years, and there is every indication that its growth will continue at a similar rapid pace. As use of both enterprise networks and the Internet continues to grow, addressing the need for quality is an increasingly important issue. The paper considers the Network Maturity Model, a process for defining and implementing busine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the development system model

    Publication Year: 1999, Page(s):119 - 120, 124
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The development system is the collection of people, processes, and tools that implements the development sequence. If system development is a series of transformations from goals to requirements to design to code, the development system makes the transformations happen. The development system is an information system that manipulates different descriptions of the system being built. It includes pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embracing change with extreme programming

    Publication Year: 1999, Page(s):70 - 77
    Cited by:  Papers (210)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    Traditional software engineering means have been characterized by a rather predictable process in the past. Users tell once and for all exactly what they want. Programmers design the system that will deliver those features. They code it; test it, and all is well. But all was not always well. The users did not tell once and for all exactly what they wanted. They changed their minds, and the users w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the effectiveness of independent verification and validation

    Publication Year: 1999, Page(s):79 - 83
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    The complexity of today's software systems mandates a structured approach to development and a verification and validation process that ensure that the right product is built and that it is built right. A V&V process is critical for those high-consequence systems in which a software failure can result in injury or death or where live testing is not feasible. NASA Langley Research Center funded... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MEMS: the systems function revolution

    Publication Year: 1999, Page(s):25 - 31
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    Information systems are no longer confined to desktops but are rapidly becoming part of cars, personal digital assistants, and palmtop systems. In this context, systems must be able not only to compute but also to sense their physical environment and respond to it. These requirements move beyond even complex microelectronics, calling for a functionality that combines electrical and mechanical comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Albert Einstein and empirical software engineering

    Publication Year: 1999, Page(s):32 - 38
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    The author believes that scientists apply scientific investigative techniques to gain more understanding of what makes software “good” and how to make software well. Often, they adapt investigative techniques from other disciplines to define measures that make sense in the business, technical, and social contexts people use for decision making. However, the author believes that sometim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process improvement for small organizations

    Publication Year: 1999, Page(s):41 - 47
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Software process improvement has been a hot topic within the software industry for numerous years. Its high profile has been partly due to the introduction and industry acceptance of standard improvement models, most notably the Capability Maturity Model (CMM) developed by the Software Engineering Institute at Carnegie Mellon University. To this end, a small organization must minimize the limitati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software development on Internet time

    Publication Year: 1999, Page(s):60 - 69
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    There is probably little debate that Internet software companies must use more flexible development techniques and introduce new products faster than companies with more stable technology, established customer needs, and longer product cycles. Internet and PC software firms favor a more flexible style. The basic idea is to give programmers the autonomy to evolve designs iteratively but to force te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org