By Topic

Computer

Issue 8 • Date Aug. 2000

Filter Results

Displaying Results 1 - 25 of 25
  • Toward self-healing infrastructure systems

    Page(s): 44 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (274 KB)  

    A joint industry-government initiative is developing a mathematical basis and practical tools for improving the security, performance, reliability and robustness of energy, financial, telecommunications and transportation networks. The first challenges are to develop appropriate models for this degree of complexity and to create tools that let components adaptively reconfigure the network as needed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The comeback kid returns to apple helm [Book Review]

    Page(s): 95
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Behavioral patterns: shaping business software [Book Review]

    Page(s): 95
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Customizing software development [Book Review]

    Page(s): 95
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Working with concurrent programs [Book Review]

    Page(s): 95
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Improving algorithms [Book Review]

    Page(s): 95
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Gathering and defining software requirements [Book Review]

    Page(s): 95
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Softquad's XML content creation tool [Book Review]

    Page(s): 96
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Premia's application source code browser for MFC [Book Review]

    Page(s): 96
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Rogue wave software's linux middleware framework [Book Review]

    Page(s): 96
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • eHelp's help authoring system for server-based applications [Book Review]

    Page(s): 96 - 97
    Save to Project icon | Request Permissions | PDF file iconPDF (78 KB)  
    Freely Available from IEEE
  • Bluestone software's total-e-server [Book Review]

    Page(s): 97
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • Networkview software's network mapping utility [Book Review]

    Page(s): 97 - 98
    Save to Project icon | Request Permissions | PDF file iconPDF (80 KB)  
    Freely Available from IEEE
  • Poet software's object database [Book Review]

    Page(s): 98
    Save to Project icon | Request Permissions | PDF file iconPDF (54 KB)  
    Freely Available from IEEE
  • Vital's freeBSD editor for programmers [Book Review]

    Page(s): 98
    Save to Project icon | Request Permissions | PDF file iconPDF (54 KB)  
    Freely Available from IEEE
  • Why WAP may never get off the ground

    Page(s): 112 - 111
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (160 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed file sharing: barbarians at the gates?

    Page(s): 99 - 101
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB)  

    Will the MP3 format and Napster's distributed file sharing bankrupt music publishers or help them reach even more consumers? Given technology's relentless pace, a Palm X or Nokia 3G phone may become the ultimate MP3 platform of choice. The author is putting his money on a closed, Web-based system, however. Regardless, with AOL/Time Warner - the world's largest media/Internet/cable/browser/e-mail company - in this race, we should be guaranteed an exciting ride View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survivable information storage systems

    Page(s): 61 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (192 KB)  

    As society increasingly relies on digitally stored and accessed information, supporting the availability, integrity and confidentiality of this information is crucial. We need systems in which users can securely store critical information, ensuring that it persists, is continuously accessible, cannot be destroyed and is kept confidential. A survivable storage system would provide these guarantees over time and despite malicious compromises of storage node subsets. The PASIS architecture flexibly and efficiently combines proven technologies (decentralized storage system technologies, data redundancy and encoding, and dynamic self-maintenance) for constructing information storage systems whose availability, confidentiality and integrity policies can survive component failures and malicious attacks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing POS and ATM interfaces

    Page(s): 102 - 103, 106
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (76 KB)  

    Carrier-class Internet service providers (ISPs) must choose an appropriate interface for long-distance data transmissions. The two technologies they most often choose are packet-over-Sonet (POS) and asynchronous transfer mode (ATM). Vendor devices implement POS and ATM to transport data over Sonet (Synchronous Optical NETwork)-a standard for sending data over fiber-optic cables-and SDH (Synchronous Digital Hierarchy), which is Sonet's international equivalent View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive analysis of computer crimes

    Page(s): 69 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (156 KB)  

    Crime analysis is a critical component of modern policing, and law enforcement agencies are increasingly using computerized analysis tools. A system developed at the University of Virginia, called Recap (REgional Crime Analysis Program), adapts computerized techniques created for analyzing conventional crimes for use by law enforcement agencies in the Internet Age View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Windows 2000: a threat to Internet diversity and open standards?

    Page(s): 107 - 109
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (120 KB)  

    Microsoft conceived Windows 2000 as the operating system for the Internet. This gave many people pause for thought, what with Microsoft's less-than-sterling reputation regarding cohabitation of competitors' software on their operating system. The Internet is based on open standards and interworking between different systems from different suppliers. If Windows 2000 compromises the Internet's integrity and ubiquity-two of its primary hallmarks-will it really be the best operating system to base your Internet services on? Some of the new additions to Windows 2000 show that, although Microsoft pays lip-service to the Internet's sacred tenets of openness and support for standards, it has actually (and sometimes only subtly) removed or subverted these tenets. The Windows 2000 changes appear to subtly exclude technologies from other vendors and make interworking more difficult View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a usage-based software certification process

    Page(s): 32 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (124 KB)  

    The author proposes an alternative to process-based methods of assuring software quality: a certification process that will provide product-based and trustworthy quality guarantees for commercial software packages. I call the agencies that perform such certification “software certification laboratories” (SCLs). The beauty of establishing independent SCLs is that they provide a fair playing field for each publisher, assuming that each product under review receives equal treatment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The next-generation Internet: unsafe at any speed?

    Page(s): 54 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (124 KB)  

    Speed alone will not make future Internet applications secure. I propose a new networking isolation capability, termed a virtual overlay network (VON). Such software-based virtual networks, layered on top of physical networks, may provide the isolation that critical applications need. Although a VON offers a response to the reliability and security needs of critical applications, it would be prohibitively costly to implement using contemporary technologies. Extending an existing router feature and coupling it with well-understood group communication techniques, however, could support VONs at low cost, with good scalability View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The promise of a voice-enabled Web

    Page(s): 104 - 106
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (108 KB)  

    Many computing professionals have heard of XML, and some use it to describe text, images and other data with rich structure. The author discusses an innovative use of XML, called VoiceXML, to support human-computer dialogs via spoken input and audio output. VoiceXML defines dialogs between humans and machines in terms of audio files to be played, text-to-speech synthesis and speech recognition capabilities, and touch-tone input. The author reviews the existing architectures for World Wide Web and telephone services, describes how VoiceXML enables consolidation of service logic for Web and phone, and summarizes the features of the VoiceXML 1.0 specification. Implementation of VoiceXML clients and VoiceXML services has begun in many of the VoiceXML Forum's member companies and will soon be available in the marketplace. The World Wide Web Voice Browser working group has adopted VoiceXML 1.0 as the basis for the dialog markup language that is part of its speech user interface framework View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes highly acclaimed peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ron Vetter
University of North Carolina
Wilmington