By Topic

Computer

Issue 6 • Date June 2002

Filter Results

Displaying Results 1 - 22 of 22
  • Engineering follies

    Publication Year: 2002, Page(s):10 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Company unveils holographic DVD for 3D storage

    Publication Year: 2002, Page(s): 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (878 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recipes for image analysis [Book Review]

    Publication Year: 2002, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (348 KB) | HTML iconHTML
    Freely Available from IEEE
  • When smaller is better [Book Review]

    Publication Year: 2002, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (348 KB) | HTML iconHTML
    Freely Available from IEEE
  • Handling spatial data [Book Review]

    Publication Year: 2002, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (348 KB) | HTML iconHTML
    Freely Available from IEEE
  • Wireless through a CS lens [Book Review]

    Publication Year: 2002, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (348 KB) | HTML iconHTML
    Freely Available from IEEE
  • Yima: a second-generation continuous media server

    Publication Year: 2002, Page(s):56 - 64
    Cited by:  Papers (14)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1047 KB) | HTML iconHTML

    Continuous media data requires a streaming architecture that can manage real-time delivery constraints and address the large size of CM objects. Although commercial systems ordinarily use proprietary technology and algorithms, making it difficult to compare their products with research prototypes, the authors have designed and developed Yima, a second-generation CM server that demonstrates several... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid services for distributed system integration

    Publication Year: 2002, Page(s):37 - 46
    Cited by:  Papers (564)  |  Patents (52)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB)

    Increasingly, computing addresses collaboration, data sharing, and interaction modes that involve distributed resources, resulting in an increased focus on the interconnection of systems both within and across enterprises. These evolutionary pressures have led to the development of Grid technologies. The authors' work focuses on the nature of the services that respond to protocol messages. Grid pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using computers in our daily life

    Publication Year: 2002, Page(s):104 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    In my native Uruguay, numerous promotional campaigns aim to sell computers to as many people as possible. Yet, for all the energy and financial resources expended in marketing computers, these organizations do not give much attention to how useful a computer might be in the home. We computing professionals must take responsibility for ensuring that computers can be used effectively in everyday lif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moving Java into mobile phones

    Publication Year: 2002, Page(s):17 - 20
    Cited by:  Papers (22)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (558 KB) | HTML iconHTML

    As mobile technology matures, handheld-device vendors are looking for ways to make their products more functional, and Java is one approach they are turning to. This is particularly the case with smart cellular phones, which are using Java to help add new capabilities. In smart phones, Java functions as a layer between the operating system and the hardware, or runs parallel to the OS within a sepa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Certification will do more harm than good

    Publication Year: 2002, Page(s):34 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB)

    Certification is an unnecessary proof that developers have not forgotten the fundamentals they learned in an accredited computer science program View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Free speech online and offline

    Publication Year: 2002, Page(s):28 - 30
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB)

    Esther Dyson famously argued that as the world will never be perfect, whether online or offline, it is foolish to expect higher standards on the Internet than we accept in real life. Legislators are now turning this argument around, arguing that they must restrict traditional offline freedoms to regulate cyberspace. The author asserts that there is much that individual engineers can do to influenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bioinformatics experiences important breakthroughs

    Publication Year: 2002, Page(s):26 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (889 KB)

    Several important recent breakthroughs help accelerate development of the emerging field of bioinformatics. For example, the US Department of Energy is creating a nationwide grid that will let geographically dispersed scientists share computing and data-storage resources for bioinformatics and other types of research involving complex calculations and large datasets View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Home theater: not ready for prime time

    Publication Year: 2002, Page(s):100 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (658 KB)

    The author considers the home theater industry's complexity, emphasis on jargon, and lack of standards, which have resulted in the ongoing war between competing standards. He argues that the industry lacks even a basic understanding of its consumers and their needs. He reached this conclusion after putting together a home theater, including a high-definition TV set, a receiver, and the eight speak... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The agile methods fray

    Publication Year: 2002, Page(s):90 - 92
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB)

    Two of software's leading practitioners debate the particulars of implementing agile methods or extreme programming in software development. Agile means investing heavily in individual skill-building rather than organizational rule sets View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SCinet: Testbed for high-performance networked applications

    Publication Year: 2002, Page(s):47 - 55
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3449 KB) | HTML iconHTML

    The network's use by high-performance applications is difficult to evaluate in the real world. To better understand this interaction, leading experts and organizations in ultra-high-performance networking and computing come together once a year to build an intense, diverse, high-performance network. Almost overnight, the SCinet network comes online as a testbed to show-case state-of-the-art networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient replacement of nonuniform objects in Web caches

    Publication Year: 2002, Page(s):65 - 73
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    Cache performance depends heavily on replacement algorithms, which dynamically select a suitable subset of objects for caching in a finite space. Developing such algorithms for wide-area distributed environments is challenging because, unlike traditional paging systems, retrieval costs and object sizes are not necessarily uniform. In a uniform caching environment, a replacement algorithm generally... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will 10-Gigabit Ethernet have a bright future?

    Publication Year: 2002, Page(s):22 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    Researchers, engineers, and vendors are readying the newest Ethernet standard which promises not only faster speeds than previous versions but also important new features. The proposed 10-Gigabit Ethernet (10 GbE) standard, known as IEEE 802.3ae, would not only provide data rates of 10 Gbits per second but would also work with metropolitan and wide area networks (MANs and WANs), where ATM (asynchr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benefits of certification

    Publication Year: 2002, Page(s):31 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB)

    To inform readers about the IEEE Computer Society's new Certified Software Development Professional credential program, Computer's board invited Leonard Tripp to describe the program and outline its benefits to professional software developers. Likewise, it invited Adam Kolawa to set forth his concerns about the efficacy of certification. Tripp asserts that certification will help in establishing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Whos's liable for insecure networks?

    Publication Year: 2002, Page(s):93 - 95
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    Given computers' integral role in modern life we can no longer tolerate negligent security. We must define standards of care and develop processes for recovering damages from those who fail to act reasonably in securing networked computers. Failure to secure networked computer systems could spawn litigation among software vendors, service providers, online businesses, and users. The paper discusse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Little chips promise big power

    Publication Year: 2002, Page(s): 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    Researchers from Hewlett-Packard and the University of California, Los Angeles, have received a patent for a technology they claim will turn out nanochips that could be used to build very small, very powerful computers. The patent was for an electrochemical process that would let designers divide a nanochip into different sets of subcircuitry, each of which could function independently and conduct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced service discovery in Bluetooth

    Publication Year: 2002, Page(s):96 - 99
    Cited by:  Papers (16)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    The rapid evolution and expansion of wireless-enabled environments have increased the need for sophisticated service discovery protocols (SDPs). Typically, service discovery involves a client, service provider, and lookup or directory server. The paper discusses Bluetooth (http://www.bluetooth.com) short-range wireless technology. The Bluetooth protocol stack includes specifications that define th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com