By Topic

Computer

Issue 8 • Date Aug. 2000

Filter Results

Displaying Results 1 - 25 of 25
  • Toward self-healing infrastructure systems

    Publication Year: 2000, Page(s):44 - 53
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB)

    A joint industry-government initiative is developing a mathematical basis and practical tools for improving the security, performance, reliability and robustness of energy, financial, telecommunications and transportation networks. The first challenges are to develop appropriate models for this degree of complexity and to create tools that let components adaptively reconfigure the network as neede... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The comeback kid returns to apple helm [Book Review]

    Publication Year: 2000, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Behavioral patterns: shaping business software [Book Review]

    Publication Year: 2000, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Customizing software development [Book Review]

    Publication Year: 2000, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Working with concurrent programs [Book Review]

    Publication Year: 2000, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Improving algorithms [Book Review]

    Publication Year: 2000, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Gathering and defining software requirements [Book Review]

    Publication Year: 2000, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Softquad's XML content creation tool [Book Review]

    Publication Year: 2000, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Premia's application source code browser for MFC [Book Review]

    Publication Year: 2000, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Rogue wave software's linux middleware framework [Book Review]

    Publication Year: 2000, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • eHelp's help authoring system for server-based applications [Book Review]

    Publication Year: 2000, Page(s):96 - 97
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Bluestone software's total-e-server [Book Review]

    Publication Year: 2000, Page(s): 97
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Networkview software's network mapping utility [Book Review]

    Publication Year: 2000, Page(s):97 - 98
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Poet software's object database [Book Review]

    Publication Year: 2000, Page(s): 98
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Vital's freeBSD editor for programmers [Book Review]

    Publication Year: 2000, Page(s): 98
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Why WAP may never get off the ground

    Publication Year: 2000, Page(s):112 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Windows 2000: a threat to Internet diversity and open standards?

    Publication Year: 2000, Page(s):107 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    Microsoft conceived Windows 2000 as the operating system for the Internet. This gave many people pause for thought, what with Microsoft's less-than-sterling reputation regarding cohabitation of competitors' software on their operating system. The Internet is based on open standards and interworking between different systems from different suppliers. If Windows 2000 compromises the Internet's integ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing POS and ATM interfaces

    Publication Year: 2000, Page(s):102 - 103, 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Carrier-class Internet service providers (ISPs) must choose an appropriate interface for long-distance data transmissions. The two technologies they most often choose are packet-over-Sonet (POS) and asynchronous transfer mode (ATM). Vendor devices implement POS and ATM to transport data over Sonet (Synchronous Optical NETwork)-a standard for sending data over fiber-optic cables-and SDH (Synchronou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The promise of a voice-enabled Web

    Publication Year: 2000, Page(s):104 - 106
    Cited by:  Papers (4)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    Many computing professionals have heard of XML, and some use it to describe text, images and other data with rich structure. The author discusses an innovative use of XML, called VoiceXML, to support human-computer dialogs via spoken input and audio output. VoiceXML defines dialogs between humans and machines in terms of audio files to be played, text-to-speech synthesis and speech recognition cap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The next-generation Internet: unsafe at any speed?

    Publication Year: 2000, Page(s):54 - 60
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    Speed alone will not make future Internet applications secure. I propose a new networking isolation capability, termed a virtual overlay network (VON). Such software-based virtual networks, layered on top of physical networks, may provide the isolation that critical applications need. Although a VON offers a response to the reliability and security needs of critical applications, it would be prohi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed file sharing: barbarians at the gates?

    Publication Year: 2000, Page(s):99 - 101
    Cited by:  Papers (6)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    Will the MP3 format and Napster's distributed file sharing bankrupt music publishers or help them reach even more consumers? Given technology's relentless pace, a Palm X or Nokia 3G phone may become the ultimate MP3 platform of choice. The author is putting his money on a closed, Web-based system, however. Regardless, with AOL/Time Warner - the world's largest media/Internet/cable/browser/e-mail c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive analysis of computer crimes

    Publication Year: 2000, Page(s):69 - 77
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Crime analysis is a critical component of modern policing, and law enforcement agencies are increasingly using computerized analysis tools. A system developed at the University of Virginia, called Recap (REgional Crime Analysis Program), adapts computerized techniques created for analyzing conventional crimes for use by law enforcement agencies in the Internet Age View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The challenge of building survivable information-intensive systems

    Publication Year: 2000, Page(s):39 - 43
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survivable information storage systems

    Publication Year: 2000, Page(s):61 - 68
    Cited by:  Papers (58)  |  Patents (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    As society increasingly relies on digitally stored and accessed information, supporting the availability, integrity and confidentiality of this information is crucial. We need systems in which users can securely store critical information, ensuring that it persists, is continuously accessible, cannot be destroyed and is kept confidential. A survivable storage system would provide these guarantees ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a usage-based software certification process

    Publication Year: 2000, Page(s):32 - 37
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    The author proposes an alternative to process-based methods of assuring software quality: a certification process that will provide product-based and trustworthy quality guarantees for commercial software packages. I call the agencies that perform such certification “software certification laboratories” (SCLs). The beauty of establishing independent SCLs is that they provide a fair pla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com