By Topic

Computing & Control Engineering Journal

Issue 3 • Date June 2000

Filter Results

Displaying Results 1 - 8 of 8
  • E-commerce-an introduction

    Publication Year: 2000 , Page(s): 107 - 108
    Cited by:  Patents (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (182 KB)  

    The e-enablement of business is simply a logical step in a progression which has taken business from the model of the privately owned, self-contained trading unit through to a publicly owned and traded enterprise, integrated into its markets, supply chains and culture. The technology of e-commerce provides businesses with an unprecedented ability to communicate directly with their market. At the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The relevance of e-commerce to UK business: development and survival in a changing business environment

    Publication Year: 2000 , Page(s): 109 - 110
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (176 KB)  

    When historians look back at the opening years of the 21st century, they may well conclude that the introduction of e-business techniques represented change on a scale directly comparable to the introduction of electrical power at the end of the 19th. Over the past 12 months (1999-2000), awareness of the potential importance of e-business has risen dramatically in the UK, both in business-to-busin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legal aspects of e-commerce

    Publication Year: 2000 , Page(s): 111 - 114
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (362 KB)  

    In principle, a Web site owner or e-commerce trader might inadvertently breach any law in any part of the world, with potentially infinite liability. The issues discussed, as they apply to commercial business over the Internet, include the legal protection of valuable but intangible assets of data and information. Certain information is formally regulated. Legal risk management is effected through... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-commerce security

    Publication Year: 2000 , Page(s): 115 - 118
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (432 KB)  

    The past few years have seen the explosive growth of the Internet and of all kinds of Internet services, taking the Internet out of the academic community and firmly into the realm of commerce. To summarise the task of e-commerce security, its primary purpose is not to protect the messages exchanged during business transactions, but to protect the parties involved in those transactions. To be prec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML: what is it good for?

    Publication Year: 2000 , Page(s): 119 - 124
    Cited by:  Patents (4)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (415 KB)  

    XML is fundamental to intelligent data interchange between organisations via the Internet. The key ingredient is standardisation within and across industries. The engineering industry must consider what standards would help it communicate with customers and suppliers and others and develop standards accordingly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms for industrial model predictive control

    Publication Year: 2000 , Page(s): 125 - 134
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (717 KB)  

    The article is concerned with control methods that have been embedded in an industrial model predictive control software package and that have been applied to a wide variety of industrial processes. Three methods are described and the various features are evaluated by considering a constrained multivariable simulation. One method has been in use since 1988 and is widely exploited in industry. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a Java microprocessor core using FPGA technology

    Publication Year: 2000 , Page(s): 135 - 141
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (553 KB)  

    Ever since its introduction from Sun Microsystems four years ago (1996), Java has been widely accepted in the computing and Internet industry. However, the runtime performance is still not good enough for Java to become a general-purpose programming language. The article shows how to implement a Java microprocessor core in silicon to speed up the execution of Java. For a reconfigurable and flexibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Z39.50 information retrieval standard

    Publication Year: 2000 , Page(s): 143 - 151
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (700 KB)  

    Although the Z39.50 standard is not being widely adopted by the Internet community, it is a mature standard which represents over two decades of collaboration between experts in the information retrieval community. The rapid growth in networked computers has motivated the development of this standard from its origins in the bibliographic domain to becoming a general-purpose information retrieval s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Published from 2003-2007, Computing and Control Engineering was concerned with computing, communications, control and instrumentation.

Full Aims & Scope