By Topic

Computer

Issue 4 • Date March 2002

 This issue contains several parts.Go to:  Part Supplement 

Filter Results

Displaying Results 1 - 19 of 19
  • Article summaries

    Publication Year: 2002, Page(s): 13
    Request permission for commercial reuse | PDF file iconPDF (179 KB) | HTML iconHTML
    Freely Available from IEEE
  • Certification program provides mark of professionalism

    Publication Year: 2002, Page(s):74 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assesing a C# text [Book Review]

    Publication Year: 2002, Page(s):86 - 88
    Request permission for commercial reuse | PDF file iconPDF (352 KB) | HTML iconHTML
    Freely Available from IEEE
  • Optimizing Compilers for Modern Architectures: A Dependence-Based Approach [Book Review]

    Publication Year: 2002, Page(s): 89
    Request permission for commercial reuse | PDF file iconPDF (219 KB) | HTML iconHTML
    Freely Available from IEEE
  • Secure Commuicating Systems: Design, Analysis, and Implementation [Book Review]

    Publication Year: 2002, Page(s): 89
    Request permission for commercial reuse | PDF file iconPDF (219 KB) | HTML iconHTML
    Freely Available from IEEE
  • Mutation Testing for the New Century

    Publication Year: 2002, Page(s): 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Near misses: Murphy's law is wrong [design engineering]

    Publication Year: 2002, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB)

    It has been said that you learn more from your mistakes than from your successes. Best of all is when you can learn from someone else's mistakes. So this article looks at three test cases. (1) What did engineers and computer scientists learn about product development when the Space Shuttle Challenger exploded? (2) What did you resolve to do better after the Hubble Space Telescope error? (3) What d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing software security risks

    Publication Year: 2002, Page(s):99 - 101
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB)

    Most organizations manage computer security risk reactively by investing in technologies designed to protect against known system vulnerabilities and monitor intrusions as they occur. However, firewalls, cryptography, and antivirus protection address the symptoms, not the root cause, of most security problems. Buying and maintaining a firewall, for example, is ineffective if external users can acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical fingerprinting to protect data: a proposal

    Publication Year: 2002, Page(s):23 - 28
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB)

    To counter the increasing problem with optical media piracy, the author proposes Thor, a copy protection mechanism that incorporates both optical fingerprinting and cryptographic techniques to secure disc data. Thor presents a possible new direction in the battle against piracy. Its acceptability, and the consequent realization of this concept, depends on how determined manufacturers are to defeat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Faster RAM tackles data and marketplace bottlenecks

    Publication Year: 2002, Page(s):17 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Random access memory (RAM) has long been considered a low-profile computing technology, lacking the impact of wireless networking and other hot areas of development. RAM's profile dropped even lower after the memory market fell into a severe slump several years ago and vendors started leaving the industry. However, as microprocessors have become much more powerful, RAM has become important again a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GPS: location-tracking technology

    Publication Year: 2002, Page(s):92 - 94
    Cited by:  Papers (46)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Increasing commercial use of the Global Positioning System will soon make it possible to locate anything, anywhere, anytime. The Global Positioning System can provide extremely accurate location information for mobile objects and people which is far superior to earlier tracking techniques. The challenge today is integrating the necessary components into older systems and improving GPS accuracy in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Side effects of digital technology

    Publication Year: 2002, Page(s):104, 102 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB)

    Digital technology tempts with empowering connectivity while it threatens our privacy and leisure time. As digital technology gets more and more personal, so do its personal effects. The obvious personal effect is communication by snapshot, which might or might not banish e-mail fatigue. This trend will certainly bring snapshot marketing to consumers in its wake, particularly with digital speech a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Training for information assurance

    Publication Year: 2002, Page(s):30 - 37
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    In 2001, cadets from three military institutions built networks and defended them against a week of attacks led by the National Security Agency. The trial-by-fire exercise; which repeats in 2002, is a step toward preparing future network designers and administrators to think more strategically View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is speech recognition becoming mainstream?

    Publication Year: 2002, Page(s):38 - 41
    Cited by:  Papers (3)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB)

    The Web's connectivity, wireless technology and handheld devices combined with effective grammar-based speech recognition in a VoiceXML infrastructure may finally bring speech recognition to mass-market prominence View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The end of celluloid: digital cinema emerges

    Publication Year: 2002, Page(s):96 - 98
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB)

    Digital cinema enhances film image quality significantly, but high costs could delay its adoption. Hollywood has begun a major technological transformation, retooling its production and distribution business to exploit computing, broadband networks, and digital displays. Inevitably, digital cinema will reshape the entertainment business and may further blur the lines between the theatrical and hom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated natural spoken dialog

    Publication Year: 2002, Page(s):51 - 56
    Cited by:  Papers (15)  |  Patents (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB)

    The next generation of voice-based interface technology will enable easy-to-use automation of new and existing communication services, making human-machine interaction more natural View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Large-vocabulary speech recognition algorithms

    Publication Year: 2002, Page(s):42 - 50
    Cited by:  Papers (3)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    By making the advances necessary to implement next-generation speech recognition applications, researchers could develop systems within a decade that match human performance levels View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software system engineering: a tutorial

    Publication Year: 2002, Page(s):68 - 73
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Applying system engineering principles specifically to the development of large, complex software systems provides a powerful tool for process and product management. The application of system engineering principles to the development of a computer software system produces activities, tasks, and procedures called software system engineering, or SwSE. Many practitioners consider SwSE to be a specia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From multimedia retrieval to knowledge management

    Publication Year: 2002, Page(s):58 - 66
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB) | HTML iconHTML

    Developments in information retrieval technologies can make multimedia data as pervasive and important as textual sources in knowledge management systems. The authors suggest ways in which speech-based multimedia information retrieval technologies can evolve into full-fledged knowledge management systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com