Computer

Issue 3 • March 2002

Filter Results

Displaying Results 1 - 21 of 21
  • Engineering, science, and quantum mechanics

    Publication Year: 2002, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key snooping technology causes controversy

    Publication Year: 2002, Page(s): 27
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developments could boost optical networks

    Publication Year: 2002, Page(s):28 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adding a third dimension to chips

    Publication Year: 2002, Page(s): 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing a generic augmented-reality interface

    Publication Year: 2002, Page(s):44 - 50
    Cited by:  Papers (41)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1139 KB)

    We seek to design an AR interface that provides users with interactivity so rich it would merge the physical space in which we live and work with the virtual space in which we store and interact with digital information. In this single augmented space, computer-generated entities would become first-class citizens of the physical environment. We would use these entities just as we use physical obje... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beating hackers at their own game [Book Review]

    Publication Year: 2002, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (210 KB) | HTML iconHTML
    Freely Available from IEEE
  • Closing security loopholes early [Book Review]

    Publication Year: 2002, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (210 KB) | HTML iconHTML
    Freely Available from IEEE
  • Inforwar survival guide [Book Review]

    Publication Year: 2002, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (210 KB) | HTML iconHTML
    Freely Available from IEEE
  • Practical guides to popular languages [Book Review]

    Publication Year: 2002, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (210 KB) | HTML iconHTML
    Freely Available from IEEE
  • Open source security: opportunity or oxymoron?

    Publication Year: 2002, Page(s):18 - 21
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB)

    As the computer industry focuses on system and network security, a growing number of users are taking a closer look at open source software in order to gauge whether its potential advantages outweigh its possible disadvantages. Although open source security has been around for years, it has never been as widely used as open source products like the Linux OS or Apache Web server have been. John Pes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From e-sex to e-commerce: Web search changes

    Publication Year: 2002, Page(s):107 - 109
    Cited by:  Papers (181)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    The Web has become a worldwide source of information and a mainstream business tool. Are human information needs and searching behaviors evolving along with Web content? As part of a body of research studying this question, we have analyzed three data sets culled from more than one million queries submitted by more than 200,000 users of the Excite Web search engine, collected in September 1997, De... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-organization and identification of Web communities

    Publication Year: 2002, Page(s):66 - 70
    Cited by:  Papers (388)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    The vast improvement in information access is not the only advantage resulting from the increasing percentage of hyperlinked human knowledge available on the Web. Additionally, much potential exists for analyzing interests and relationships within science and society. However, the Web's decentralized and unorganized nature hampers content analysis. Millions of individuals operating independently a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking pitches for broadcast television

    Publication Year: 2002, Page(s):38 - 43
    Cited by:  Papers (32)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (665 KB) | HTML iconHTML

    During a baseball game, dramatic changes in lighting conditions and the movement of objects and players can result in a shifting pattern of light and color that makes it especially difficult to track a pitched ball. Further, several ballparks have a net in place behind home plate, which contributes further to the visual clutter that the image processing system must filter out when tracking the bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Realizing the benefits of virtual teams

    Publication Year: 2002, Page(s):104 - 106
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB)

    Looks at how virtual group collaboration, properly managed and supported by the right technology, offers considerable payoffs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electrophysiologically interactive computer systems

    Publication Year: 2002, Page(s):60 - 65
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    Combining computing with physiological sensing technologies will transform human-machine interaction and usher in a wide range of new applications. electrophysiologically interactive computer systems (EpICS) combine physiological sensing technologies with interactive computer applications. These systems support a diverse range of monitoring and training disciplines. EpICS provide interesting usabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile processors begin to grow up

    Publication Year: 2002, Page(s):22 - 25
    Cited by:  Papers (9)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB)

    As the chips have improved, the mobile-processor marketplace has begun to change. many mobile-device users now want and will pay for advanced features like wireless Web access and location-oriented services, such as finding a nearby restaurant. This requires more processor power than basic cell phones or simple information management PDAs have. Higher chip performance is thus becoming increasingly... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Coplink to analyze criminal-justice data

    Publication Year: 2002, Page(s):30 - 37
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (707 KB) | HTML iconHTML

    The paper discusses the Coplink system. The system applies a concept space-a statistics-based, algorithmic technique that identifies relationships between suspects, victims, and other pertinent data-to accelerate criminal investigations and enhance law enforcement efforts. The Coplink concept space application, which began as a research project, has evolved into a real-time system being used in ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computers, programming and people

    Publication Year: 2002, Page(s):112, 110 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB)

    Now part of consumer society and marketed globally, computers are designed to be sold rather than used. Software marketers, e-businesses, and their technicians consider having an understanding of how the underlying machinery works to be utterly irrelevant. For them, the most important skills are marketing, management, and graphical expertise. The profession should strive to make it easy for people... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Planning and executing time-bound projects

    Publication Year: 2002, Page(s):73 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Looks at how the SPID (statistically planned incremental deliveries) approach combines critical chain planning with incremental development and rate monitoring to help software developers meet project deadlines. SPID focuses on how best to organize a project to guarantee delivery of at least a working product with an agreed subset of the total functionality by the required date View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design chain for embedded systems

    Publication Year: 2002, Page(s):100 - 103
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1412 KB)

    Today's embedded systems design culture produces custom products from scratch. However, as electronic products become more complex and global competition demands shorter time to market, the industry is moving toward a design process that integrates commodity system-on-chip (SoC) platforms. The article looks at how we go about developing such integration-oriented SoC design flows and evolving a new... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A lightweight framework for cross-application user monitoring

    Publication Year: 2002, Page(s):51 - 59
    Cited by:  Papers (12)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB)

    The human-computer interaction community has often focused on the face applications present to the user. The authors present a new framework that monitors higher-level events to learn how people access, create, and modify information rather than how they use applications. By associating information sources with tasks and processes and monitoring user actions, the system can offer task-specific hel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org