Computer

Issue 12 • Dec. 2001

Filter Results

Displaying Results 1 - 25 of 26
  • W3C proposal ignites standards controversy

    Publication Year: 2001, Page(s): 25
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (65 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intel technology promises 20-GHz chips

    Publication Year: 2001, Page(s):25 - 27
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (136 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet2 upgrades backbone

    Publication Year: 2001, Page(s): 27
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (43 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data warehouses and decision support systems

    Publication Year: 2001, Page(s):38 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (391 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subject index

    Publication Year: 2001, Page(s):94 - 103
    Request permission for commercial reuse | |PDF file iconPDF (799 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s):104 - 107
    Request permission for commercial reuse | |PDF file iconPDF (194 KB)
    Freely Available from IEEE
  • Fighting cyber attacks [Book Review]

    Publication Year: 2001, Page(s): 153
    Request permission for commercial reuse | |PDF file iconPDF (109 KB) | HTML iconHTML
    Freely Available from IEEE
  • Real-time systems resource management [Book Review]

    Publication Year: 2001, Page(s): 153
    Request permission for commercial reuse | |PDF file iconPDF (109 KB) | HTML iconHTML
    Freely Available from IEEE
  • Implementing a reuse standard [Book Review]

    Publication Year: 2001, Page(s): 153
    Request permission for commercial reuse | |PDF file iconPDF (109 KB) | HTML iconHTML
    Freely Available from IEEE
  • Introduction to object-role modeling [Book Review]

    Publication Year: 2001, Page(s): 153
    Request permission for commercial reuse | |PDF file iconPDF (109 KB) | HTML iconHTML
    Freely Available from IEEE
  • Java does data abstraction [Book Review]

    Publication Year: 2001, Page(s): 153
    Request permission for commercial reuse | |PDF file iconPDF (109 KB) | HTML iconHTML
    Freely Available from IEEE
  • Boosting system performance with optimistic distributed protocols

    Publication Year: 2001, Page(s):80 - 86
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (177 KB) | HTML iconHTML

    Optimistic distributed protocols can dramatically improve system performance if the underlying system assumptions are sound and carry a high degree of probability. Optimistic protocols aggressively execute actions based on best-case system assumptions. Using optimistic protocols unquestionably involves tradeoffs, but if a protocol is well designed and the optimistic assumptions hold frequently eno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database technology for decision support systems

    Publication Year: 2001, Page(s):48 - 55
    Cited by:  Papers (33)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (229 KB) | HTML iconHTML

    Decision support systems form the core of business IT infrastructures because they let companies translate business information into tangible and lucrative results. Collecting, maintaining, and analyzing large amounts of data, however, involves expensive technical challenges that require organizational commitment. Many commercial tools are available for each of the three major data warehousing tas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seven steps to optimizing data warehouse performance

    Publication Year: 2001, Page(s):76 - 79
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (174 KB) | HTML iconHTML

    Most operational systems store data in a normalized model in which certain rules eliminate redundancy and simplify data relationships. While beneficial for the online transaction processing workload, this model can inhibit those same OLTP databases from running analytical queries effectively. Because the analytical systems did not need to support the OLTP workload, many developers began preplannin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multidimensional database technology

    Publication Year: 2001, Page(s):40 - 46
    Cited by:  Papers (51)  |  Patents (28)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (362 KB) | HTML iconHTML

    Multidimensional database technology is a key factor in the interactive analysis of large amounts of data for decision making purposes. In contrast to previous technologies, these databases view data as multidimensional cubes that are particularly well suited for data analysis. Multidimensional models categorize data either as facts with associated numerical measures or as textual dimensions that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will vector graphics finally make it on the Web?

    Publication Year: 2001, Page(s):22 - 24
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (175 KB)

    Multimedia technology is an increasingly important part of the Web. Because of this, multimedia vendors are always looking for a competitive edge, as well as a better way to present content. And now, these vendors are looking closely at an important technology: scalable vector graphics (SVG). Currently, the Web mainly runs on bitmap-image formats like GIF (graphics interchange format), PNG (portab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing data warehouses with OO conceptual models

    Publication Year: 2001, Page(s):66 - 75
    Cited by:  Papers (48)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (989 KB) | HTML iconHTML

    The authors propose an approach that provides a theoretical foundation for the use of object-oriented databases and object-relational databases in data warehouse, multidimensional database, and online analytical processing applications. This approach introduces a set of minimal constraints and extensions to the Unified Modeling Language for representing multidimensional modeling properties for the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using open source for a profitable startup

    Publication Year: 2001, Page(s):158 - 160
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (105 KB)

    The viability of open source projects such as Linux and GNU is frequently questioned. This month, the author shows how the use of such software can help a small, underfunded company establish itself in the commercial software arena. It's apparent that from his perspective the viability question has been answered with a resounding yes View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse engineering and the computing profession

    Publication Year: 2001, Page(s):168, 166 - 167
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (103 KB)

    Recent actions against reverse engineering threaten to remove this valuable practice from the computing profession's toolkit. Unless we develop better communication between the legal and computing professions, we will continue to suffer the consequences of legislation such as the USA's Digital Millennium Copyright Act (DMCA). By making the distribution of research results more difficult, such legi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding and reducing Web delays

    Publication Year: 2001, Page(s):30 - 37
    Cited by:  Papers (22)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (482 KB) | HTML iconHTML

    Slow performance costs e-commerce Web sites as much as $4.35 billion annually in lost revenue. Perceived latency-the amount of time between when a user issues a request and receives a response-is a critical issue. Research into improving performance falls into two categories: work on servers and work on networks and protocols. On the server side, previous work has focused on techniques for improvi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Browsing the mobile Internet

    Publication Year: 2001, Page(s):18 - 21
    Cited by:  Papers (3)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (422 KB)

    There has been plenty of hyperbole about the wireless Internet and the possibility that millions of users will soon access e-mail and Web pages on a smart phone, PDA, or pager. However, little attention has been paid to a technology that is key to the wireless Internet's success or failure: the microbrowser. As wireless networking improves and the demand for Internet-enabled handheld devices grows... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Healthcare data warehousing and quality assurance

    Publication Year: 2001, Page(s):56 - 65
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (421 KB) | HTML iconHTML

    Healthcare data warehousing presents unique challenges. The industry is rife with often incompatible medical standards and coding schemes that require careful translation. Healthcare data comes from many sources and is delivered in many forms, including published books, individual spreadsheets, and several tape or data formats. Results derived from a healthcare data warehouse must be delivered in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Function-class decomposition: a hybrid software engineering method

    Publication Year: 2001, Page(s):87 - 93
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (111 KB) | HTML iconHTML

    In addition to offering a simple yet powerful method for decomposing a system, function-class decomposition (FCD) produces an architecture that is more supportive than traditional object-oriented decomposition for several software engineering tasks. A hybrid method that integrates structured analysis with an OO approach, FCD identifies classes in parallel with decomposing the system into a hierarc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust-based security in pervasive computing environments

    Publication Year: 2001, Page(s):154 - 157
    Cited by:  Papers (79)  |  Patents (39)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (257 KB) | HTML iconHTML

    Traditionally, stand-alone computers and small networks rely on user authentication and access control to provide security. These physical methods use system-based controls to verify the identity of a person or process, explicitly enabling or restricting the ability to use, change, or view a computer resource. However, these strategies are inadequate for the increased flexibility that distributed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will Linux be computer games' dark horse OS?

    Publication Year: 2001, Page(s):161 - 162
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (89 KB)

    Although Linux-based PC games have enjoyed only modest sales, one console giant is betting heavily on the open source OS. Although Linux is not ready to be a consumer-level OS, it remains a threat to Microsoft because of its flexibility. The support that companies like IBM, HP, and Red Hat throw at it doesn't hurt either. All three now use Linux in vertical markets and for back-end systems such as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org