By Topic

Computer

Issue 5 • Date May 2001

Filter Results

Displaying Results 1 - 15 of 15
  • How Internet software companies negotiate quality

    Publication Year: 2001, Page(s):51 - 57
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    In Internet speed development, innovation and time-to-market work against software quality. Browser giants like Microsoft Internet Explorer and Netscape Navigator are openly dealing with quality issues. The practices of application and smaller niche firms are less clear, but there are important trends. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Backbone of computer applications [Books]

    Publication Year: 2001, Page(s): 84
    Request permission for commercial reuse | PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • A formal process for evaluating COTS software products

    Publication Year: 2001, Page(s):58 - 63
    Cited by:  Papers (36)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    A software product evaluation process grounded in mathematics and decision theory can effectively determine product quality and suitability with less risk and at lower cost than conventional methods View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a high-level fault simulation standard

    Publication Year: 2001, Page(s):89 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    Recent developments in deep-submicron technology challenge current integrated circuit testing methods. The increasing complexity of designed systems makes test development more time-consuming. Moreover, nanometer technology introduces new defects or higher data rate errors. To reduce manufacturing costs and time to market, we must develop efficient fault detection and location methods. Using high-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will Carnivore devour online privacy?

    Publication Year: 2001, Page(s):87 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    In February 2001, the Federal Bureau of Investigation (FBI) renamed its controversial Internet surveillance tool, Carnivore, as the innocuous-sounding “DCS1000”. Although the move is sensible from a public relations perspective, more than the system's name must change to protect innocent Internet users' rights. According to the FBI, Carnivore (as everyone outside the Bureau still calls... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering metrics for COTS-based systems

    Publication Year: 2001, Page(s):44 - 50
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    The paradigm shift to commercial off-the-shelf components appears inevitable, necessitating drastic changes to current software development and business practices. Quality and risk concerns currently limit the application of COTS based system design to noncritical applications. New approaches to quality and risk management will be needed to handle the growth of CBSs. Our metrics based approach and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wanted: programmers for handheld devices

    Publication Year: 2001, Page(s):12 - 14
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB) | HTML iconHTML

    The pace of change in computer technology can be breathtaking. Frequently, this makes it difficult for programmers to maintain skills that are in demand. Nowhere is this more apparent than in one of the newest and most dynamic segments of the computer industry: handheld devices and wireless technology. The use of handheld devices is growing rapidly, as is the demand for applications that run on sm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerating development with agent components

    Publication Year: 2001, Page(s):37 - 43
    Cited by:  Papers (49)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    As the demand for more flexible, adaptable, extensible, and robust Web based enterprise application systems accelerates, adopting new software engineering methodologies and development strategies becomes critical. These strategies must support the construction of enterprise software systems that assemble highly flexible software components written at different times by various developers. Traditio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient video-on-demand model

    Publication Year: 2001, Page(s):64 - 70
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    An efficient video-on-demand system uses a practical, technologically sophisticated model to serve the viewing needs of a wide audience, including meeting the peak demand for popular, newly released films View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COTS-based systems top 10 list

    Publication Year: 2001, Page(s):91 - 95
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Presents a COTS-based system (CBS) software defect-reduction list as hypotheses, rather than results, that also serve as software challenges for enhancing our empirical understanding of CBSs. The hypotheses are: (1) more than 99% of all executing computer instructions come from COTS products (each instruction passed a market test for value); (2) more than half the features in large COTS software p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next-generation viruses present new challenges

    Publication Year: 2001, Page(s):16 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    Computer technology has advanced in many ways, but not all of them have been welcome. One of the more undesirable has been the ongoing advance of virus technology. Taking advantage of emerging computer technologies and techniques, virus writers come up with new ways to defeat existing security software, infect computers, cause damage, and spread their malicious creations. This has become evident r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The great term robbery [computer jargon]

    Publication Year: 2001, Page(s):94 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB) | HTML iconHTML

    Although the regimes that George Orwell depicted in his book “1984” have yet to appear in their full glory, at least in the world's advanced nations, Newspeak is with us nevertheless. Orwell's scornful bluntness prompted him to depict a blunt Newspeak, but a subtler version harbors more subtle dangers. The computing profession's subtle Newspeak blurs the distinction between human and m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting privacy in remote-patient monitoring

    Publication Year: 2001, Page(s):24 - 27
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    With ubiquitous Internet accessibility, audio-video-based remote-patient monitoring is becoming a viable option for people who are responsible for providing in-home healthcare management. In Japan's rapidly aging society, many elderly patients who have lost mobility, speech, or memory live with their families. Although they do not necessarily need intense medical care, these patients require const... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering in the academy

    Publication Year: 2001, Page(s):28 - 35
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Institutions that teach software are responsible for producing professionals who will build and maintain systems to the satisfaction of their beneficiaries. The article presents some ideas on how best to honor this responsibility. It presents five goals of a curriculum: principles: lasting concepts that underlie the whole field; practices: problem-solving techniques that good professionals apply c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering on internet time

    Publication Year: 2001, Page(s): 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com