By Topic

Computer

Issue 11 • Date Nov. 2001

Filter Results

Displaying Results 1 - 16 of 16
  • Breakthrough promises cheaper, faster chips

    Publication Year: 2001 , Page(s): 21 - 24
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (521 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet-driven telecommunications [New Books]

    Publication Year: 2001 , Page(s): 127
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Terrorism, technology, and the profession

    Publication Year: 2001 , Page(s): 136 - 135
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (111 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual design of multiengineering electronics systems

    Publication Year: 2001 , Page(s): 71 - 79
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (548 KB) |  | HTML iconHTML  

    The authors describe a virtual reality prototyping (VRP) and virtual product design approach that uses a modeling strategy to design, test, and evaluate concepts and products in advance-before creating any physical design models. Their design decisions reflect solutions and practices derived from systems engineering and software engineering research. Close competition has forced companies to focus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing vulnerabilities in networked systems

    Publication Year: 2001 , Page(s): 32 - 38
    Cited by:  Papers (13)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (123 KB) |  | HTML iconHTML  

    Most organizations recognize the importance of cyber security and are implementing various forms of protection. However, many are failing to find and fix known security problems in the software packages they use as the building blocks of their networks and systems, a vulnerability that a hacker can exploit to bypass all other efforts to secure the enterprise. The Common Vulnerabilities and Exposur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring embedded-systems architectures with Artemis

    Publication Year: 2001 , Page(s): 57 - 63
    Cited by:  Papers (52)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (136 KB) |  | HTML iconHTML  

    Because embedded systems mostly target mass production and often run on batteries, they should be cheap to realize and power efficient. In addition, they require a high degree of programmability to provide real-time performance for multiple applications and standards. However, performance requirements as well as cost and power-consumption constraints demand that substantial parts of these systems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agile software development, the people factor

    Publication Year: 2001 , Page(s): 131 - 133
    Cited by:  Papers (74)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (92 KB) |  | HTML iconHTML  

    In a previous article (2001), we introduced agile software development through the problem it addresses and the way in which it addresses the problem. Here, we describe the effects of working in an agile style View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Terrorism, technology and the profession

    Publication Year: 2001 , Page(s): 136, 134 - 135
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (81 KB)  

    Technology made the scale of the September 11 terrorist tragedy possible: it built both the towers and the planes that destroyed them, and it produced the funds and provided the communications the terrorists used to implement their plan. Much of this technology is digital. The authorities had technology in place to predict and prevent terrorist acts such as this and, because of September 11's even... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering computer-based systems: meeting the challenge

    Publication Year: 2001 , Page(s): 39 - 43
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (117 KB)  

    Embedded computers in system products have become pervasive. As Engineering of Computer-Based Systems (ECBS) assumes a greater role in computing-product development, engineers face increasing pressure to resolve the challenges of disparate architectures, long interdisciplinary system life cycles, method and tool incompatibility, and spiraling complexity View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rosetta: semantic support for model-centered systems-level design

    Publication Year: 2001 , Page(s): 64 - 70
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (183 KB) |  | HTML iconHTML  

    With the advent of system-on-chip (SoC) technology, the design of small electrical systems has become a systems engineering task. Such tasks require working at high levels of abstraction to build systems by either integrating information from various design domains or modeling different aspects of the same component. Designers of traditional computer-based systems usually rely on component-based t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded OSs gain the inside track

    Publication Year: 2001 , Page(s): 14 - 16
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (88 KB)  

    Almost every automated system has an embedded OS, and so there is an increasing demand for embedded OS. No single vendor dominates the marketplace. A growing number of companies have released open-source embedded OS, primarily those based on BSD Unix and Linux. These OS have the same appeal that open-source software has in other markets: they are relatively inexpensive and users have access to and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexibility as a design driver [systems analysis]

    Publication Year: 2001 , Page(s): 52 - 56
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (109 KB) |  | HTML iconHTML  

    Ambiguous requirements and those that emerge late in the design cycle often complicate development and throw off established schedules. The authors describe how reformulating information missing at the design stage into a flexibility requirement can turn the absent data into a design driver. Designers constantly run into issues that have yet to be understood through specification, system design, o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated debugging: are we close?

    Publication Year: 2001 , Page(s): 26 - 31
    Cited by:  Papers (6)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (364 KB) |  | HTML iconHTML  

    Although software engineers have enjoyed tremendous productivity increases as more of their tasks have become automated, debugging remains as labor-intensive and painful as it. was 50 years ago. An engineer or programmer must still set up hypotheses to use in identifying and correcting a failure's root cause. The author describes a new algorithm that promises to relieve programmers of the hit-or-m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Composing domain-specific design environments

    Publication Year: 2001 , Page(s): 44 - 51
    Cited by:  Papers (254)  |  Patents (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (491 KB) |  | HTML iconHTML  

    Domain-specific integrated development environments can help capture specifications in the form of domain models. These tools support the design process by automating analysis and simulating essential system behavior. In addition, they can automatically generate, configure, and integrate target application components. The high cost of developing domain-specific, integrated modeling, analysis, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D technology, ready for the PC?

    Publication Year: 2001 , Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (515 KB)  

    3D graphics software is computationally intensive, but the hardware is getting cheaper. Suitable motherboard-bus and graphics card developments are discussed, as are ways of overcoming network-bandwidth limitations. The article then considers applications-games and entertainment, design, presentations, and virtual shopping; one can even make a virtual representation of oneself to try on virtual cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The evolution of Web-caching markets

    Publication Year: 2001 , Page(s): 128 - 130
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (295 KB)  

    Internet businesses lose billions of dollars each year because of slow and failed Web services, and new companies and coalitions have rushed to provide the worldwide content caching that can help recapture this lost revenue. Although the media has often characterized these companies as trailblazers in the e-commerce revolution, they are merely exploiting a temporary niche along the path to Interne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com