By Topic

Potentials, IEEE

Issue 5 • Date Dec. 2002-Jan. 2003

Filter Results

Displaying Results 1 - 9 of 9
  • Optimal window design

    Page(s): 39 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1758 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum computers

    Page(s): 6 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (496 KB) |  | HTML iconHTML  

    Using atoms as digital bits will start a completely new era in computer design. Atoms cannot be simply manipulated and used like the bits built with transistors. The behavior of matter on the atomic scale follows the rules of modern physics. This behavior cannot be understood in terms of our classical description of the world (i. e. Newtonian mechanics or Maxwell's equations in electromagnetics). The physical theory dealing with such behavior is called quantum mechanics. Its use in the computer industry will most probably cause a revolution in the way we use and understand computers. The author describes how such a quantum computer-a computer based on the rules of quantum mechanics-may work, and how it is going to give incredible speed and problem-solving power. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Public-key cryptography extensions into Kerberos

    Page(s): 30 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (243 KB) |  | HTML iconHTML  

    How can and why should the Kerberos authentication standard (RFC1510) be extended to support public-key cryptography? These are the questions that we explore in this article. Integrating public-key cryptography (PKC) within Kerberos shares the leading edge of proposed enhancements to the traditional Kerberos standard with initiatives like IPv6 support and hardware authentication via smart-cards. The benefits of PKC will improve scalability and security throughout the Kerberos framework. Although this enhancement has not yet completed the Internet Standards Process (RFC 2026), it has already been adopted by some companies in their products. We begin with overviews of PKC, and then discuss what improvements PKC can offer to Kerberos. After summarizing three different protocols for public-key enhanced Kerberos, we explain the performance penalties associated with PKC and reference qualitative results from other research which compares the response-time performance of the two fundamental approaches we describe for public-key based authentication. Finally, we look at some of the security issues associated with including public-key support in the traditional Kerberos framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet sniffing: a brief introduction

    Page(s): 17 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1395 KB) |  | HTML iconHTML  

    Packet sniffing is a method of tapping each packet as it flows across the network; i.e., it is a technique in which a user sniffs data belonging to other users of the network. Packet sniffers can operate as an administrative tool or for malicious purposes. It depends on the user's intent. Network administrators use them for monitoring and validating network traffic. Packet sniffers are basically applications. They are programs used to read packets that travel across the network layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) layer. (Basically, the packets are retrieved from the network layer and the data is interpreted.) Packet sniffers are utilities that can be efficiently used for network administration. At the same time, it can also be used for nefarious activities. However, a user can employ a number of techniques to detect sniffers on the network and protect the data from sniffers. The technique behind packet sniffing on shared bus broadcast LANs is explained. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Single-phase insulator transformers

    Page(s): 35 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1097 KB) |  | HTML iconHTML  

    To show that voltage surges are effectively transmitted between the windings of insulator transformers, a relatively simple and functional test was prepared. The test applied differential-mode voltage surges with small amplitudes to the primary winding of three different types of single-phase no-load insulator transformers. The differential-mode was selected based on the fact that this mode is much more frequent than the common-mode. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Written in the stars [biodiversity-cosmology analogy]

    Page(s): 4 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1595 KB) |  | HTML iconHTML  

    This paper argues that most of the atoms in the human body were originally formed in the nuclear furnace of a burning star, and that, as a race, we are literally made of stardust. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trade agreements

    Page(s): 19 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4832 KB)  

    Trade is good. As a business, the more people you can sell your product to the better. As an individual consumer, the more product choices you have, the better. Of course, the key to all this buying and selling is access and price. Also, access to a certain extent controls price. World trade allows what economists call economies of scale. As a result, the customers pay less, and the companies can earn more profits, which creates more jobs and propels incomes higher. This paper details how free trade among countries gives us both. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ballistic MOSFETs, the ultra scaled transistors

    Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (377 KB) |  | HTML iconHTML  

    As the MOSFET dimensions are reduced further in the sub 50nm regime; ballistic transport would become a very important factor in governing the current characteristics. The maximum current a MOSFET can physically carry and the fastest it can operate is governed by the ballistic transport of the carriers in the channel. Therefore, we should fully understand this phenomenon, by the use of physical models, device simulations and if possible actual fabrication of devices. Also, the present gap between the results predicted by analytical models and rigorous simulations has to be bridged. To realize a device with 100% ballistic transport, efforts have to be directed to address the issues that impede the ballistic transport, like reducing the channel scattering, improving the Si-SiO2 interface and use of double gate structures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thinking about energy matters

    Page(s): 10 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (441 KB) |  | HTML iconHTML  

    We give a short explanation about a new way to examine force of gravity in Nature. With this summary of the general theory, we claim that the right way to achieve this goal is to assume that the world is a chaos of energy constantly flowing in space and creating concentrations in semi-random points in space. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David Tian
Carnegie Mellon University
david.tian@ieee.org