By Topic

Computer

Issue 9 • Date Sep 2000

Filter Results

Displaying Results 1 - 15 of 15
  • Getting the kinks out of linux [Book Review]

    Publication Year: 2000, Page(s): 87
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Words, words, words [Book Review]

    Publication Year: 2000, Page(s): 87
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Understanding system on a chip [Book Review]

    Publication Year: 2000, Page(s): 87
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • High-level digital receiver techniques [Book Review]

    Publication Year: 2000, Page(s): 87
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Acing your technical presentation [Book Review]

    Publication Year: 2000, Page(s): 87
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • Intelligent behavior-based robotic systems [Book Review]

    Publication Year: 2000, Page(s): 87
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • The challenge of tamperproof Internet computing

    Publication Year: 2000, Page(s):98 - 99, 102-3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    Internet computing, harnessing global communication to increase computational power, is now possible. But will it ever truly be secure? Researchers have proposed various schemes to transform the Internet into the “Interputer”. Several companies are creating applications, tools, and protocols to harvest cycles from idling CPUs around the world, while compensating their obviously industr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selecting and implementing an embedded database system

    Publication Year: 2000, Page(s):27 - 34
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Although embedded systems share many characteristics with their desktop and server counterparts, the unique advantages, limitations, and requirements of the applications they run demand a careful selection process and tailored implementation. The key strategy in choosing database tools for embedded systems is to focus on the application's requirements. Embedded database products vary widely from v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Project termination doesn't equal project failure

    Publication Year: 2000, Page(s):94 - 96
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    One of the most frequently cited software project statistics comes from the Standish Group's 1995 Chaos report (http://www.standishgroup.com/visitor/ chaos.htm): “A staggering 31.1 percent of [software] projects will be canceled before they ever get completed.” The Chaos report, and numerous documents citing it, label these canceled projects as “failed” and imply that all 3... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What's ahead for embedded software?

    Publication Year: 2000, Page(s):18 - 26
    Cited by:  Papers (82)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    Once deemed too small and retro for research, embedded software has grown complex and pervasive enough to attract the attention of computer scientists. There are many research questions, but most center around one issue: how to reconcile a set of domain-specific requirements with the demands of interaction in the physical world. How do you adapt software abstractions designed merely to transform d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Obelix searches Internet using customer data

    Publication Year: 2000, Page(s):104 - 107
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    One major problem with purchasing through the Web is locating reliable suppliers that offer the exact product or service you need. In the usual approach, you access an indexing based search engine, specify keywords for the purchase, and initiate the search. The outcome is typically a list ranked according to keyword matches; useful, but not always helpful. Keyword matches provide only one ingredie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networking home entertainment devices with HAVi

    Publication Year: 2000, Page(s):35 - 43
    Cited by:  Papers (20)  |  Patents (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    The home audio/video interoperability (HAVi) architecture is a set of application programming interfaces (APIs), services, and an on-the-wire protocol specified by an industry initiative. HAVi facilitates multivendor interoperability between consumer electronics devices and computing devices and simplifies the development of distributed applications on home networks. The HAVi architecture strikes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Olympic games reform: a study in system engineering

    Publication Year: 2000, Page(s):91 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The wild world of 3D graphics chips

    Publication Year: 2000, Page(s):12 - 16
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cellular processing tools for high-performance simulation

    Publication Year: 2000, Page(s):44 - 52
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Cellular automata offer a powerful modeling approach for complex systems in which global behavior arises from the collective effect of many locally interacting, simple components. Several tools based on CA are providing meaningful results for real-world applications. Cellular automata represent an efficient paradigm for the computer solution of important problems in science and engineering. Moreov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com