By Topic

Computer

Issue 9 • Date Sept. 2002

Filter Results

Displaying Results 1 - 19 of 19
  • At random - Employee performance reviews

    Page(s): 12 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (322 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News briefs - Tiny "punch cards" boost storage capacity

    Page(s): 22
    Save to Project icon | Request Permissions | PDF file iconPDF (418 KB)  
    Freely Available from IEEE
  • News briefs - Researchers bring wireless communications to the chip

    Page(s): 23
    Save to Project icon | Request Permissions | PDF file iconPDF (175 KB)  
    Freely Available from IEEE
  • News briefs - New chips will help computers visualize in three dimensions

    Page(s): 24
    Save to Project icon | Request Permissions | PDF file iconPDF (204 KB)  
    Freely Available from IEEE
  • Computer society connection - IEEE president-elect candidates address computer society concerns

    Page(s): 70 - 76
    Save to Project icon | Request Permissions | PDF file iconPDF (271 KB)  
    Freely Available from IEEE
  • Systematic Software Testing [Book Review]

    Page(s): 81
    Save to Project icon | Request Permissions | PDF file iconPDF (212 KB)  
    Freely Available from IEEE
  • Nonuniform Sampling: Theory and Practice [Book Review]

    Page(s): 81
    Save to Project icon | Request Permissions | PDF file iconPDF (212 KB)  
    Freely Available from IEEE
  • Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers [Book Review]

    Page(s): 81
    Save to Project icon | Request Permissions | PDF file iconPDF (212 KB)  
    Freely Available from IEEE
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web services and context horizons

    Page(s): 98 - 100
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (299 KB)  

    Considers how Web services require defining a new meaning for local, in which different kinds of applications operate within different network horizons. Understanding these context horizons, and creating the tools and techniques for managing them, are essential to achieving an Internet-scale operating system. The paper discusses three of the most important: trust horizons, semantic horizons, and coordination horizons. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing the distributed-computing OS

    Page(s): 19 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (281 KB)  

    Researchers are exploring the world of distributed computing, in which users in various locations can work with the same set of geographically dispersed resources. These efforts have led to such high-profile technologies as peer-to-peer (P2P), pervasive, and nomadic computing. A critical part of this research is developing consistent approaches to distributed-computing operating environments, which must work consistently across many platforms and technologies. Major efforts in this area include Globe, Opus, and Project Oxygen. None of the three represents radically new technologies, but instead each applies existing technologies in a novel way. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Merging fossil specimens with computer-generated information

    Page(s): 25 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1186 KB)  

    While dinosaur fossils reveal much, they keep us guessing about the original organisms' color, sound, and behavior. For several years, modern paleontologists have used 3D computer graphics to help reconstruct these pieces of the past. Augmented reality (AR) leverages this technology to provide an interface that enhances the real world with synthetic supplements. Paleontologists can use AR to present virtual data directly within a real, 3D environment rather than on a flat monitor. This technology's immersiveness can give paleontologists new insights into their research and communicate the results to museum visitors in an exciting and effective way. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Whither Warhol's law? [embedded computing]

    Page(s): 96 - 97
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (278 KB)  

    The article discusses a law concocted by the author: "Warhol's Law of Computer Systems Architecture." This law stated that every computer architecture would be the price-performance leader for 15 minutes. The author was thinking mainly of workstation CPUs, but he believed the embedded CPU market would follow suit. Embedded systems provide an ideal forum for CPU competition. A lot of people seemed to want to design CPUs, so the author reasoned that no end of new competitors would appear to introduce new features and drive down prices. It hasn't worked out that way, however. The high-end market has several players, but not the profusion expected a few years go. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mailbox-based scheme for mobile agent communications

    Page(s): 54 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (267 KB)  

    In various situations, mobile agents at different hosts must cooperate with one another by sharing information and making decisions collectively. To ensure effective interagent communication, communication protocols must track target agent locations and deliver messages reliably. Researchers have proposed a wide range of schemes for agent tracking and reliable message delivery. However, each scheme has its own assumptions, design goals, and methodology. As a result, no uniform or structured methods exist for characterizing current protocols, making it difficult to evaluate their relative effectiveness and performance. The authors propose a mailbox-based scheme for designing mobile agent communication protocols. This scheme assigns each agent a mailbox to buffer messages, but decouples the agent and mailbox to let them reside at different hosts and migrate separately. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The importance of branching models in SCM

    Page(s): 31 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (372 KB)  

    To improve software quality, you must first understand your software. If you do not understand your code base, your odds of updating it without breaking something are poor. Often, a fundamental misunderstanding of software configuration management (SCM) as it applies to real-world application development is at fault. Branching is integral to version management, software build correctness, and release management. Good decisions about when and why to branch can make it much easier for developers and release engineers to coordinate software product changes. The right branching strategy makes it easier to deliver the right code, re-create past releases, and-if necessary roll back to a previous release. The authors consider how adopting the right SCM branching model facilitates rapid development, increases overall product quality and process efficiency, reduces the incidence of software failures, and improves organizational performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jobs, trades, skills, and the profession

    Page(s): 104, 102 - 103
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (344 KB)  

    Is the reputed shortage of IT skills a political scam or is the computing profession itself at fault? The author considers IT professional responsibility and training issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart cameras as embedded systems

    Page(s): 48 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (401 KB)  

    Recent technological advances are enabling a new generation of smart cameras that represent a quantum leap in sophistication. While today's digital cameras capture images, smart cameras capture high-level descriptions of the scene and analyze what they see. These devices could support a wide variety of applications including human and animal detection, surveillance, motion analysis, and facial identification. Video processing has an insatiable demand for real-time performance. Smart cameras leverage very large-scale integration to meet this need in a low-cost, low-power system with substantial memory. Moving well beyond pixel processing and compression, these VLSI systems run a wide range of algorithms to extract meaning from streaming video. Recently, Princeton University researchers developed a first-generation smart camera system that can detect people and analyze their movement in real time. Because they push the design space in so many dimensions, these smart cameras are a leading-edge application for embedded system research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PICO: automatically designing custom computers

    Page(s): 39 - 47
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (587 KB)  

    The paper discusses the PICO (program in, chip out) project, a long-range HP Labs research effort that aims to automate the design of optimized, application-specific computing systems - thus enabling the rapid and cost-effective design of custom chips when no adequately specialized, off-the-shelf design is available. PICO research takes a systematic approach to the hierarchical design of complex systems and advances technologies for automatically designing custom nonprogrammable accelerators and VLIW processors. While skeptics often assume that automated design must emulate human designers who invent new solutions to problems, PICO's approach is to automatically pick the most suitable designs from a well-engineered space of designs. Such automation of embedded computer design promises an era of yet more growth in the number and variety of innovative smart products by lowering the barriers of design time, designer availability, and design cost. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An economically scalable Internet

    Page(s): 93 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (276 KB)  

    Over the past decade, many observers have claimed that the Internet brings the information revolution's components together in a way that will rival the industrial revolution's effects on human productivity and quality of life. The paper discusses an economically scalable Internet, including bandwidth resources, quality of service, users' quality of experience, scalability and multicast-enabled distribution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes highly acclaimed peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ron Vetter
University of North Carolina
Wilmington