Computer

Issue 12 • Dec. 2000

Filter Results

Displaying Results 1 - 11 of 11
  • Are we forgetting the risks of information technology?

    Publication Year: 2000, Page(s):43 - 51
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (382 KB)

    The complexity and interconnectedness of information systems is growing. There must be some way to systematically assess the risk to critical infrastructures. Work began two decades ago (1980s) on a comprehensive theoretical framework to model and identify risks to large-scale and complex systems. The framework, hierarchical holographic modeling (HHM) (Y.Y. Haimes, 1981; 1998) is to conventional m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why Johnny can't program [computing professionals]

    Publication Year: 2000, Page(s):160, 158 - 159
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (252 KB)

    Innumerate, illiterate, and overwhelmed, today's computing professionals ('Johnny') are torn between system design and program coding. Computing professionals must know vastly more now than they needed to know 40 years ago (1960s), but even then the field often distinguished between programmers and systems analysts. Meanwhile, Johnny must know too much to be at the same time a skilled programmer a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer games' influence on scientific and information visualization

    Publication Year: 2000, Page(s):154 - 159
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (684 KB)

    The breakneck pace of consumer graphics development has yielded an unexpected dividend: using commodity graphics boards in high-end scientific applications. Historically, the visualization community has been a driving force in high-end computer graphics innovation, fostering technologies that have gradually filtered down to the consumer market. In recent years, however, the financial growth of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Windows of vulnerability: a case study analysis

    Publication Year: 2000, Page(s):52 - 59
    Cited by:  Papers (63)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (492 KB)

    The authors propose a life cycle model for system vulnerabilities, then apply it to three case studies to reveal how systems often remain vulnerable long after security fixes are available. For each case, we provide background information about the vulnerability, such as how attackers exploited it and which systems were affected. We then tie the case to the life-cycle model by identifying the date... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SCSI, the industry workhorse, is still working hard

    Publication Year: 2000, Page(s):152 - 153
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (204 KB)

    Since work first began in 1981 on an I/O technology that was later named the Small Computer System Interface, this set of standard electronic interfaces has evolved to keep pace with a runaway storage industry that demands more performance, manageability, flexibility, and features for high-end desktop connectivity each year. SCSI offers the best performance in applications that require speed such ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The emergence of m-commerce

    Publication Year: 2000, Page(s):148 - 150
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (112 KB)

    Driven by a widespread understanding of the Internet's capabilities, the power of electronic commerce, and advances in wireless technologies and devices, mobile commerce (m-commerce) is rapidly approaching the business forefront. According to independent research findings, m-commerce, the conducting of business and services over portable, wireless devices, will soon be a dominant force in business... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a more reliable theory of software reliability

    Publication Year: 2000, Page(s):36 - 42
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (100 KB)

    The notions of time and the operational profile incorporated into software reliability are incomplete. Reliability should be redefined as a function of application complexity, test effectiveness, and operating environment. We do not yet have a reliability equation that application complexity, test effectiveness, test suite diversity, and a fuller definition of the operational profile. We challenge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reflections on 18 years of change at the computer society

    Publication Year: 2000, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (860 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graphical programming using UML and SDL

    Publication Year: 2000, Page(s):30 - 35
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (348 KB)

    Since its introduction, the Unified Modeling Language (UML) has captured industry-wide attention for its role as a general-purpose language for modeling software systems. Although it does a good job in the early phases of the development process, UML does leave some things to be desired in the systems design and implementation phases because it is lacking in structural and behavioral constructs. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A national-scale authentication infrastructure

    Publication Year: 2000, Page(s):60 - 66
    Cited by:  Papers (109)  |  Patents (35)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (144 KB)

    Participants in virtual organizations commonly need to share resources such as data archives, computer cycles, and networks, resources usually available only with restrictions based on the requested resource's nature and the user's identity. Thus, any sharing mechanism must have the ability to authenticate the user's identity and determine whether the user is authorized to request the resource. Vi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making pointer-based data structures cache conscious

    Publication Year: 2000, Page(s):67 - 74
    Cited by:  Papers (33)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (136 KB)

    To narrow the widening gap between processor and memory performance, the authors propose improving the cache locality of pointer-manipulating programs and bolstering performance by careful placement of structure elements. It is concluded that considering past trends and future technology, it seems clear that the processor-memory performance gap will continue to increase and software will continue ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org