By Topic

Computer

Issue 5 • Date May 2001

Filter Results

Displaying Results 1 - 15 of 15
  • How Internet software companies negotiate quality

    Page(s): 51 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (258 KB)  

    In Internet speed development, innovation and time-to-market work against software quality. Browser giants like Microsoft Internet Explorer and Netscape Navigator are openly dealing with quality issues. The practices of application and smaller niche firms are less clear, but there are important trends. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Backbone of computer applications [Books]

    Page(s): 84
    Save to Project icon | Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • The great term robbery [computer jargon]

    Page(s): 94 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB)  

    Although the regimes that George Orwell depicted in his book “1984” have yet to appear in their full glory, at least in the world's advanced nations, Newspeak is with us nevertheless. Orwell's scornful bluntness prompted him to depict a blunt Newspeak, but a subtler version harbors more subtle dangers. The computing profession's subtle Newspeak blurs the distinction between human and machine View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal process for evaluating COTS software products

    Page(s): 58 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB)  

    A software product evaluation process grounded in mathematics and decision theory can effectively determine product quality and suitability with less risk and at lower cost than conventional methods View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering metrics for COTS-based systems

    Page(s): 44 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (196 KB)  

    The paradigm shift to commercial off-the-shelf components appears inevitable, necessitating drastic changes to current software development and business practices. Quality and risk concerns currently limit the application of COTS based system design to noncritical applications. New approaches to quality and risk management will be needed to handle the growth of CBSs. Our metrics based approach and software engineering metrics can aid developers and managers in analyzing the return on investment in quality improvement initiatives for CBSs. These metrics also facilitate the modeling of cost and quality, although we need more complex models to capture the intricate relationships between cost and quality metrics in a CBS View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering in the academy

    Page(s): 28 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (420 KB)  

    Institutions that teach software are responsible for producing professionals who will build and maintain systems to the satisfaction of their beneficiaries. The article presents some ideas on how best to honor this responsibility. It presents five goals of a curriculum: principles: lasting concepts that underlie the whole field; practices: problem-solving techniques that good professionals apply consciously and regularly; applications: areas of expertise in which the principles and practices find their best expression; tools: state-of-the-art products that facilitate the application of these principles and practices; mathematics: the formal basis that makes it possible to understand everything else View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a high-level fault simulation standard

    Page(s): 89 - 90
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (120 KB)  

    Recent developments in deep-submicron technology challenge current integrated circuit testing methods. The increasing complexity of designed systems makes test development more time-consuming. Moreover, nanometer technology introduces new defects or higher data rate errors. To reduce manufacturing costs and time to market, we must develop efficient fault detection and location methods. Using high-level fault simulation stimulates the development of new, fast test-generation algorithms that take into consideration functional features of the system under test or its components. Moreover, all synthesis tools migrate to higher levels, and we believe that this will improve ATPG tools as well View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting privacy in remote-patient monitoring

    Page(s): 24 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (580 KB)  

    With ubiquitous Internet accessibility, audio-video-based remote-patient monitoring is becoming a viable option for people who are responsible for providing in-home healthcare management. In Japan's rapidly aging society, many elderly patients who have lost mobility, speech, or memory live with their families. Although they do not necessarily need intense medical care, these patients require constant attention to ensure their safety. Broadband audio and video introduce a novel possibility for applying remote-monitoring technology to home healthcare. For example, various MPEG compression technologies can transmit high-quality audio-video via the Internet so that a family member can use an office PC or wireless mobile terminal to monitor a bedridden patient's image and vital signs while a caregiver runs errands. Using live audio and video streaming in this manner, however, raises privacy concerns. Transmitting unprotected audio-visual signals, compressed in a standard format, over the Internet carries the risk that someone can monitor these transmissions, whether accidentally or intentionally View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COTS-based systems top 10 list

    Page(s): 91 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (96 KB)  

    Presents a COTS-based system (CBS) software defect-reduction list as hypotheses, rather than results, that also serve as software challenges for enhancing our empirical understanding of CBSs. The hypotheses are: (1) more than 99% of all executing computer instructions come from COTS products (each instruction passed a market test for value); (2) more than half the features in large COTS software products go unused; (3) the average COTS software product undergoes a new release every 8-9 months, with active vendor support for only its latest three releases; (4) CBS development and post-deployment efforts can scale as high as the square of the number of independently developed COTS products targeted for integration; (5) CBS post-deployment costs exceed CBS development costs; (6) although glue-code development usually accounts for less than half the total CBS software development effort, the effort per line of glue code averages about three times the effort per line of developed applications code; (7) non-development costs, such as licensing fees, are significant, and projects must plan for and optimize them; (8) CBS assessment and tailoring efforts vary significantly by COTS product class (operating system, database management system, user interface, device driver, etc.); (9) personnel capability and experience remain the dominant factors influencing CBS development productivity; and (10) CBS is currently a high-risk activity, with effort and schedule overruns exceeding non-CBS software overruns, yet many systems have used COTS successfully for cost reduction and early delivery View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next-generation viruses present new challenges

    Page(s): 16 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (88 KB)  

    Computer technology has advanced in many ways, but not all of them have been welcome. One of the more undesirable has been the ongoing advance of virus technology. Taking advantage of emerging computer technologies and techniques, virus writers come up with new ways to defeat existing security software, infect computers, cause damage, and spread their malicious creations. This has become evident recently with the emergence of several innovative and potentially harmful viruses, e.g., remote control viruses, peer-to-peer viruses, and open source viruses View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerating development with agent components

    Page(s): 37 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (184 KB)  

    As the demand for more flexible, adaptable, extensible, and robust Web based enterprise application systems accelerates, adopting new software engineering methodologies and development strategies becomes critical. These strategies must support the construction of enterprise software systems that assemble highly flexible software components written at different times by various developers. Traditional software development strategies and engineering methodologies, which require development of software systems from scratch, fall short in this regard. Component based software engineering offers an attractive alternative for building Web based enterprise application systems. CBSE works by developing and evolving software from selected reusable software components, then assembling them within appropriate software architectures. By promoting the use of software components that commercial vendors or in-house developers build, the component based software development approach promises large scale software reuse View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wanted: programmers for handheld devices

    Page(s): 12 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (84 KB)  

    The pace of change in computer technology can be breathtaking. Frequently, this makes it difficult for programmers to maintain skills that are in demand. Nowhere is this more apparent than in one of the newest and most dynamic segments of the computer industry: handheld devices and wireless technology. The use of handheld devices is growing rapidly, as is the demand for applications that run on smart phones and personal digital assistants. However, programming for these devices, which have limited processing power and memory, as well as tiny screens, is different than developing applications for PCs or servers. Very few programmers have much experience with these devices, particularly in the US, where handheld technology adoption has been slower than in Europe. This is creating a challenge for vendors looking for developers to write mobile applications. Companies must work hard and be creative to find programmers who can become productive quickly in the handheld environment. And in some cases, developers are carefully selecting projects to most efficiently allocate their limited programming resources View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will Carnivore devour online privacy?

    Page(s): 87 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (84 KB)  

    In February 2001, the Federal Bureau of Investigation (FBI) renamed its controversial Internet surveillance tool, Carnivore, as the innocuous-sounding “DCS1000”. Although the move is sensible from a public relations perspective, more than the system's name must change to protect innocent Internet users' rights. According to the FBI, Carnivore (as everyone outside the Bureau still calls it) allows law enforcement agents to intercept and collect e-mail and other electronic communications only when authorized by a court order. What is so controversial about Carnivore, and why has it provoked strong negative reactions from privacy advocates, editorial boards and members of the US Congress? The answers lie in how the system works and who controls it View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient video-on-demand model

    Page(s): 64 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (120 KB)  

    An efficient video-on-demand system uses a practical, technologically sophisticated model to serve the viewing needs of a wide audience, including meeting the peak demand for popular, newly released films View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes highly acclaimed peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ron Vetter
University of North Carolina
Wilmington