Computer

Issue 1 • Jan. 1990

Filter Results

Displaying Results 1 - 6 of 6
  • The specification and modeling of computer security

    Publication Year: 1990, Page(s):9 - 16
    Cited by:  Papers (42)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (926 KB)

    A description is given of computer security models in general and the model of D. Bell and L. LaPadula (Tech. Rep. MTR-2997, Mitre Corp., 1976) in particular. The Bell and LaPadula (BLP) model is the backbone of the National Computer Security Center's evaluation process for trusted computer systems. Although discretionary access control is briefly addressed, the focus is on mandatory access contro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Education for computing professionals

    Publication Year: 1990, Page(s):17 - 22
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (677 KB)

    The author examines the state of computer science education and discusses the trend whereby computer science graduates are ending up in engineering jobs. He questions whether this back door to engineering is in the best interests of the students, their employers, and society. He argues that computer science programs must return to a classical engineering approach that emphasizes fundamentals.< View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How do we read algorithms? A case study

    Publication Year: 1990, Page(s):25 - 35
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1010 KB)

    The authors report on an experiment that explored the way subjects view an algorithm, written in Pascal, and the graphical representation of its behavior. They designed the experiment to examine the influence of programming experience on how subjects view a short but complex algorithm, and they analyzed the scan patterns of eye movement for subjects at two experience levels. They describe the expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On distributed fault simulation

    Publication Year: 1990, Page(s):40 - 52
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1054 KB)

    The authors examine the computational aspects of fault simulation of digital circuits and address issues related to the efficient partitioning of a fault simulation task to a number of subtasks assignable for execution to the nodes of a distributed system. They review the basic concepts involved in the operation of fault simulation. They describe the implementation of a distributed fault simulatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A taxonomy of reconfiguration techniques for fault-tolerant processor arrays

    Publication Year: 1990, Page(s):55 - 69
    Cited by:  Papers (79)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1909 KB)

    Focuses on the characterization and classification of reconfiguration techniques. The techniques are differentiated according to the type of redundancy (time or hardware), allocation of redundancy (local or global), replacement unit, (processor or a set of processors), switching domain (global or local), and switching implementation (switching element, bus, or network). Typical techniques from fou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standards-a standard environment for software production

    Publication Year: 1990, Page(s):75 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The author reviews what has been accomplished in recent years to develop a standard environment. He examines the current state of affairs to determine why problems in meeting cost, schedule, and technical performance goals persist. He makes some suggestions for dealing with these problems and concludes that a standard for maintainable code and more skilled personnel are needed to deal with them ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org