Computer

Issue 10 • Oct. 2000

Filter Results

Displaying Results 1 - 9 of 9
  • To WAP or not to WAP? [Letters]

    Publication Year: 2000, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Business-to-business e-commerce frameworks

    Publication Year: 2000, Page(s):40 - 47
    Cited by:  Papers (47)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Electronic commerce lets people purchase goods and exchange information on business transactions online. Although the Internet's role as a business channel is a fairly recent phenomenon, its impact, financial and otherwise, has been substantially greater than that of other business channels which have been in existence for several decades. The authors believe that e-commerce gives companies improv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile commerce: a new frontier

    Publication Year: 2000, Page(s):32 - 38
    Cited by:  Papers (56)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    Electronic commerce continues to see phenomenal growth, but so far most e-commerce development involves wired infrastructures. The authors believe emerging wireless and mobile networks will provide new avenues for growth, creating new opportunities in mobile commerce. According to the GartnerGroup, a market research firm, by 2004 at least 40 percent of consumer-to-business e-commerce will come fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The future of E-commerce

    Publication Year: 2000, Page(s):30 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parasitic authentication to protect your e-wallet

    Publication Year: 2000, Page(s):54 - 60
    Cited by:  Papers (5)  |  Patents (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    The electronic wallet (e-wallet), a handheld computer that consolidates a user's personal items, stores vital information and facilitates financial transactions, has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary and keys. In fact, Nokia's 9001 Communicator already combines the phone, pager ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical comparison of seven programming languages

    Publication Year: 2000, Page(s):23 - 29
    Cited by:  Papers (73)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB)

    Often heated, debates regarding different programming languages' effectiveness remain inconclusive because of scarce data and a lack of direct comparisons. The author addresses that challenge, comparatively analyzing 80 implementations of the phone-code program in seven different languages (C, C++, Java, Perl, Python, Rexx and Tcl). Further, for each language, the author analyzes several separate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-process design and assurance using model checking

    Publication Year: 2000, Page(s):48 - 53
    Cited by:  Papers (20)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    Trust in e-commerce is difficult to establish and maintain. Almost daily, news headlines cover some incident, causing users to question e-commerce systems' trustworthiness. Strong e-process design and implementation is the first line of defense against errors, fraud and hacking. Minimizing program faults in business operations is critical for an e-business's survival. Carefully designed and implem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In-flight entertainment: the sky's the limit

    Publication Year: 2000, Page(s):98 - 101
    Cited by:  Papers (2)  |  Patents (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (884 KB)

    Microprocessors and miniaturized components, which have filtered into so many aspects of daily life, are now poised to sweep through passenger planes, leaving a plethora of high-tech amenities in their wake. Travelers will soon enjoy audio and video on demand, along with in-seat movies, video games, catalog shopping, phones and faxing, e-mail and Internet access. Airliners will provide a complete ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring the wireless LANscape

    Publication Year: 2000, Page(s):12 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Several trends in the computer industry are rapidly driving the development and adoption of newer wireless networking technologies, which link devices to each other and to corporate LANs, primarily via radio-frequency (RF) technology. To maximize the usefulness of wireless LANs, vendors want technology based on open standards rather than on proprietary technologies, which have been used during the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org