By Topic

Computer

Issue 7 • Date July 2000

Filter Results

Displaying Results 1 - 11 of 11
  • How perspective-based reading can improve requirements inspections

    Publication Year: 2000, Page(s):73 - 79
    Cited by:  Papers (60)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB)

    Because defects constitute an unavoidable aspect of software development, discovering and removing them early is crucial. Overlooked defects (like faults in the software system requirements, design, or code) propagate to subsequent development phases where detecting and correcting them becomes more difficult. At best, developers will eventually catch the defects, but at the expense of schedule del... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Obelix searches internet using customer data

    Publication Year: 2000, Page(s):104 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing system and active-content integrity

    Publication Year: 2000, Page(s):108 - 110
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    In a shared, multiuser environment, protecting data from damage or misappropriation by unauthorized users is a major concern. The widespread use of active (executable) content such as Microsoft ActiveX controls and Javascripts has given rise to a dangerous, common practice: executing unknown, untrusted code. Security-minded users typically address this problem by executing only signed content that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPEC CPU2000: measuring CPU performance in the New Millennium

    Publication Year: 2000, Page(s):28 - 35
    Cited by:  Papers (287)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    As computers and software have become more powerful, it seems almost human nature to want the biggest and fastest toy you can afford. But how do you know if your toy is tops? Even if your application never does any I/O, it's not just the speed of the CPU that dictates performance. Cache, main memory, and compilers also play a role. Software applications also have differing performance requirements... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using paths to measure, explain, and enhance program behavior

    Publication Year: 2000, Page(s):57 - 65
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    What happens when a computer program runs? The answer can be frustratingly elusive, as anyone who has debugged or tuned a program knows. As it runs, a program overwrites its previous state, which might have provided a clue as to how the program got to the point at which it computed the wrong answer or otherwise failed. This all-too-common experience is symptomatic of a more general problem: the di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A staged model for the software life cycle

    Publication Year: 2000, Page(s):66 - 71
    Cited by:  Papers (83)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Software engineers have traditionally considered any work after initial delivery as simply software maintenance. Some researchers have divided this work into various tasks, including making changes to functionality (perfective), changing the environment (adaptive), correcting errors (corrective), and making improvements to avoid future problems (preventive). However, many have considered maintenan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fashioning a foundation for the computing profession

    Publication Year: 2000, Page(s):97 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Members of a true computing profession must look beyond the problems they are paid to solve, paying heed to how their profession and the world at large affect each other. The body of knowledge and skill that defines the profession to which the IEEE Computer Society's members belong is suggested by the technical articles that appear in the Society's publications. The computing profession is relativ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The wireless Internet: promises and challenges

    Publication Year: 2000, Page(s):36 - 41
    Cited by:  Papers (30)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    In the 1980s, the PC migrated from the hobbyist's den to the corporate desktop, a huge development in information technology. Ten years later, that honor fell to the Internet and wireless telephones, which until now have followed separate paths. The author predicts that this decade will see the convergence of wireless communications and the Internet. Although the commercial impact of wireless comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements that handle IKIWISI, COTS, and rapid change

    Publication Year: 2000, Page(s):99 - 102
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    In the good old days, dealing with software requirements was relatively easy. Software requirements were the first order of business and took place before design, cost estimation, planning, or programming. Of course, it wasn't simple. Certain straightforward criteria required satisfaction: completeness; consistency; traceability; and testability. The recent developments of IKIWISI (I'll know it wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PicoRadio supports ad hoc ultra-low power wireless networking

    Publication Year: 2000, Page(s):42 - 48
    Cited by:  Papers (456)  |  Patents (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Technology advances have made it conceivable to build and deploy dense wireless networks of heterogeneous nodes collecting and disseminating wide ranges of environmental data. Applications of such sensor and monitoring networks include smart homes equipped with security, identification, and personalization systems; intelligent assembly systems; warehouse inventory control; interactive learning toy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability and survivability of wireless and mobile networks

    Publication Year: 2000, Page(s):49 - 55
    Cited by:  Papers (66)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    The world is becoming more dependent on wireless and mobile services, but the ability of wireless network infrastructures to handle the growing demand is questionable. As wireless and mobile services grow, weaknesses in network infrastructures become clearer. Failures not only affect current voice and data use but could also limit emerging wireless applications such as e-commerce and high-bandwidt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com