Computer

Issue 8 • Aug. 2002

Filter Results

Displaying Results 1 - 25 of 27
  • Letters - Privacy and freedom of speech

    Publication Year: 2002, Page(s):6 - 9
    Request permission for commercial reuse | PDF file iconPDF (421 KB) | HTML iconHTML
    Freely Available from IEEE
  • Dancing Naked [Book Review]

    Publication Year: 2002, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (257 KB) | HTML iconHTML
    Freely Available from IEEE
  • The O.J. Simpson Trial [Book Review]

    Publication Year: 2002, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (257 KB) | HTML iconHTML
    Freely Available from IEEE
  • What is E.T.'s home phone number? [Book Review]

    Publication Year: 2002, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (265 KB) | HTML iconHTML
    Freely Available from IEEE
  • Traveling the astral plane [Book Review]

    Publication Year: 2002, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (176 KB) | HTML iconHTML
    Freely Available from IEEE
  • Physics of Star Trek [Book Review]

    Publication Year: 2002, Page(s):11 - 12
    Request permission for commercial reuse | PDF file iconPDF (193 KB) | HTML iconHTML
    Freely Available from IEEE
  • Great Mambo Chicken [Book Review]

    Publication Year: 2002, Page(s): 12
    Request permission for commercial reuse | PDF file iconPDF (185 KB) | HTML iconHTML
    Freely Available from IEEE
  • Romanian disaster-response project wins design competition

    Publication Year: 2002, Page(s):13 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Article summaries

    Publication Year: 2002, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (190 KB) | HTML iconHTML
    Freely Available from IEEE
  • High school student from china receives IEEE computer society prize

    Publication Year: 2002, Page(s):64 - 66
    Request permission for commercial reuse | PDF file iconPDF (341 KB)
    Freely Available from IEEE
  • Scientific computing with C++ [Book Review]

    Publication Year: 2002, Page(s): 76
    Request permission for commercial reuse | PDF file iconPDF (214 KB) | HTML iconHTML
    Freely Available from IEEE
  • Startup wants to automate chip design

    Publication Year: 2002, Page(s): 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety through redundancy [Book Review]

    Publication Year: 2002, Page(s): 76
    Request permission for commercial reuse | PDF file iconPDF (214 KB) | HTML iconHTML
    Freely Available from IEEE
  • Building mobile communications [Book Review]

    Publication Year: 2002, Page(s): 76
    Request permission for commercial reuse | PDF file iconPDF (214 KB) | HTML iconHTML
    Freely Available from IEEE
  • GUI testing: pitfalls and process

    Publication Year: 2002, Page(s):87 - 88
    Cited by:  Papers (26)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB)

    Given their increased importance, testing graphical user interfaces (GUI) for correctness can enhance the entire system's safety, robustness, and usability. But GUI remain a neglected test research area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Haptics: gaming's new sensation

    Publication Year: 2002, Page(s):84 - 86
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB)

    Haptics technology can simulate tactile and kinesthetic sensations so that computer interfaces not only look but also feel - in the literal sense of the word - like the interfaces we are accustomed to using in the real world. Although haptics in PC gaming began by focusing on kinesthetics, while haptics in console gaming began by focusing on vibrotactile effects, game players and market pressures ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless beyond 3G: managing services and network resources

    Publication Year: 2002, Page(s):80 - 82
    Cited by:  Papers (8)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB)

    Wireless beyond 3G is a new concept that envisions cellular, BFWA, and DVB systems cooperating in a composite radio infrastructure. In this scheme, instead of rejecting users or degrading their quality of service levels, a network provider can direct them to an alternate radio technology that meets certain environmental, cost, and QoS criteria. To achieve such a system requires upgrading service a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the TCPA specification

    Publication Year: 2002, Page(s):77 - 79
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB)

    The Trusted Computing Platform Alliance (TCPA) specification is a new computing platform for the next century that will provide for improved trust in the PC platform. Improving information security is an important and timely goal, but not at the cost of further weakening fair use doctrine, encouraging anticompetitive behavior, or eliminating privacy. Unfortunately, the current specification does n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lessons in global information technology sourcing

    Publication Year: 2002, Page(s):26 - 33
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Successful information technology sourcing decisions require customers to identify their IT needs, know the sourcing market, and develop significant contract-crafting and relationship management skills. The author gives twelve customer lessons considered to be most important for managing four processes: evaluating market options; assessing the IT portfolio; crafting deals; and managing relationshi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer system, heal thyself

    Publication Year: 2002, Page(s):20 - 22
    Cited by:  Papers (10)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB)

    Researchers are accelerating work on self-monitoring, self-healing systems, which detect problems and continue to operate by fixing or simply bypassing malfunctions without human intervention. Although self-healing technology adds cost, the approach not only reduces potentially catastrophic delays or errors in critical systems but also saves money by reducing the need for IT department interventio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive hacking: a battle for the mind

    Publication Year: 2002, Page(s):50 - 56
    Cited by:  Papers (13)  |  Patents (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    On 25 August 2000, stockholders were stunned by news that server and storage provider Emulex was revising its earnings from a per-share gain to a loss, while lowering its reported net earnings from the previous quarter as well. Within minutes, Emulex shares plummeted. Yet none of this news fostered by a hacker's bogus press release - was true. The Emulex case illustrates the speed, scale, and subt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward adequate online privacy safeguards

    Publication Year: 2002, Page(s):92, 90 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB)

    The author is concerned with the disclosure of information that might make a student vulnerable to everything from simple spam to criminal harassment or worse. Computing professionals working in a university environment have an opportunity to ensure that universities respect the personal privacy of students. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jini home networking: a step toward pervasive computing

    Publication Year: 2002, Page(s):34 - 40
    Cited by:  Papers (23)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    Jini connection technology forms a network of devices on the fly, without manual connection or configuration. It can also complement other technologies that strive for "anytime, anywhere" connectivity. The article looks at lookup and discovery services; reliability and scalability; Jini architectural requirements; service for non-Jini devices; Jini mobile edition for wireless devices; Jini impleme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed storage challenges data glut

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB)

    Several research projects promise improved distributed storage technologies as a way to cope with rapidly growing data volumes and increasingly scattered organizations. The OceanStore Project at the University of California, Berkeley, stores data on servers throughout a network. Other computers will be able to join the network dynamically. OceanStore will function as platform-neutral software that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadcast encryption's bright future

    Publication Year: 2002, Page(s):57 - 63
    Cited by:  Papers (20)  |  Patents (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    As a vehicle for content protection, broadcast encryption promises more flexible and resilient security compared with traditional public key cryptography techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org