By Topic

Computer

Issue 12 • Date Dec. 2002

Filter Results

Displaying Results 1 - 23 of 23
  • Year in review

    Publication Year: 2002 , Page(s): 10 - 11
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • It has been a great ride!

    Publication Year: 2002 , Page(s): 12
    Save to Project icon | Request Permissions | PDF file iconPDF (211 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Researchers upgrade smart card technology

    Publication Year: 2002 , Page(s): 25
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (190 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New optical clock could synchronize chips

    Publication Year: 2002 , Page(s): 26
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind, deaf engineer develops computerized braille machine

    Publication Year: 2002 , Page(s): 27
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (314 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chang chosen IEEE computer society president-elect

    Publication Year: 2002 , Page(s): 73 - 74
    Save to Project icon | Request Permissions | PDF file iconPDF (247 KB)  
    Freely Available from IEEE
  • Reviewers contribute to Computer's success

    Publication Year: 2002 , Page(s): 75 - 76
    Save to Project icon | Request Permissions | PDF file iconPDF (189 KB)  
    Freely Available from IEEE
  • Annual Index Computer Volume 35, 2002

    Publication Year: 2002 , Page(s): 80 - 91
    Save to Project icon | Request Permissions | PDF file iconPDF (987 KB)  
    Freely Available from IEEE
  • 2002 Index IEEE Computer Vol. 35

    Publication Year: 2002 , Page(s): 131 - 134
    Save to Project icon | Request Permissions | PDF file iconPDF (197 KB)  
    Freely Available from IEEE
  • Subject index

    Publication Year: 2002 , Page(s): 134 - 144
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | PDF file iconPDF (232 KB)  
    Freely Available from IEEE
  • A survey of storage options

    Publication Year: 2002 , Page(s): 42 - 46
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (270 KB) |  | HTML iconHTML  

    Over the past 50 years, technological innovations have continually driven down computer storage costs while dramatically increasing performance and value-and the trend shows no signs of slowing. The article considers various forms of storage including: random access memory; asynchronous and synchronous DRAM; RDRAM; SDRAM; flash memory; tape; RAID storage; hard disk; floppy drives; and CDs and DVDs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virus wars: fewer attacks, new threats

    Publication Year: 2002 , Page(s): 22 - 24
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (285 KB)  

    Security professionals have fought an ongoing battle with malicious-code writers since the development of the first major Internet worm in 1988. However, the battle recently took an interesting turn: The number of reported attacks, as well as the losses they caused, dropped for the first time. The bad news is that malware writers have developed some new, significant, and hard-to-defeat techniques ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Surveying today's most popular storage interfaces

    Publication Year: 2002 , Page(s): 48 - 55
    Cited by:  Papers (1)  |  Patents (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (260 KB) |  | HTML iconHTML  

    Today's storage interface arena consists of diverse industry standards combined with R&D investments from major industry players who continue to aid in the evolution of these numerous technologies. Although SCSI-the Small Computer System Interface-is probably the most pivotal standard in use today, other crucial storage protocols include Fibre Channel, IEEE 1394, Serial ATA, and iSCSI. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing SoC simulation and development time

    Publication Year: 2002 , Page(s): 29 - 34
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (310 KB) |  | HTML iconHTML  

    Looks at how, by using extensible processors, designers can develop and verify task engines for many embedded system-on-chip tasks more quickly than by using the traditional RTL-defined hardware design approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending cyberspace

    Publication Year: 2002 , Page(s): 125 - 127
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (221 KB)  

    Professionals for Cyber Defense (PCD) recommends that President Bush promptly initiates a scientific process to assess the scale and gravity of the strategic threat of cyber warfare against the US. We expect it will confirm repeated warnings from the technical community. Assuming that such a process affirms a serious national threat, we urge the federal government to: assume a strong defensive rol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OFDM: back to the wireless future

    Publication Year: 2002 , Page(s): 19 - 21
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (286 KB)  

    The key limitation for wireless technologies has been slow transmission rates that didn't come close to providing the capabilities of wireline services. This left the technologies unable to offer fast downloads or handle multimedia and other desirable applications. Now, however, wireless approaches that use orthogonal frequency division multiplexing (OFDM)-a modulation technique for transmitting l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storage topologies

    Publication Year: 2002 , Page(s): 56 - 63
    Cited by:  Papers (2)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (260 KB)  

    With information growing at exponential rates, understanding how to cost. effectively deploy storage devices is becoming increasingly important. Not all computer storage designs or deployments are topologies. Declaring a networked storage environment to be a storage area network topology is misleading because a SAN-defined as a network whose primary purpose is the transfer of data between computer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The evolution of information assurance

    Publication Year: 2002 , Page(s): 65 - 72
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (512 KB)  

    The explosive growth in the amount of electronic information that organizations generate, and the increasing importance of that information, make protecting it with assurance processes a top priority. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying mixed reality to entertainment

    Publication Year: 2002 , Page(s): 122 - 124
    Cited by:  Papers (9)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (246 KB)  

    The lack of compelling content has relegated many promising entertainment technologies to laboratory curiosities. Although mixed-reality techniques show great potential, the entertainment business is not about technology. To penetrate these huge markets, MR technology must become transparent for the content to have full effect. To achieve this goal, we have devised a framework that lets us integra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward the age of smarter storage

    Publication Year: 2002 , Page(s): 35 - 41
    Cited by:  Patents (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (359 KB) |  | HTML iconHTML  

    Looks at how adding intelligence to standard devices and interfaces has produced major improvements in storage capacity intelligence, making storage easier to manage and safeguard. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Science-philosophy celebrity death match

    Publication Year: 2002 , Page(s): 13 - 15
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (274 KB)  

    Two conflicting ideas can appear to be mutually exclusive, yet each of then seems plausible when considered in isolation. It can take real mental energy to keep both prospects alive in one's head instead of yielding to the cognitive dissonance, choosing one and spending the rest of the time convincing oneself the other one was not as plausible as it seemed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using language more responsibly

    Publication Year: 2002
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (320 KB)  

    For the past three centuries, scientists have understood that their discipline's practitioners should have a broad cultural background, which would partly manifest in the words they coin. Words like electron, from the Greek elektra, show a certain proclivity for the classics and a gusto for the creation of beautiful terms. The computing profession, at least in the US, seems an exception to the rul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile payments

    Publication Year: 2002 , Page(s): 120 - 121
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (244 KB)  

    The increasing deployment of wireless networks and the widespread popularity of handheld devices have led to numerous applications ranging from mobile banking to location-based tracking to mobile advertising. With nearly 300 million mobile users worldwide expected to be purchasing content on wireless devices by 2005, many of these emerging services would greatly benefit from infrastructure support... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com