By Topic

Computer

Issue 3 • Date March 2003

Filter Results

Displaying Results 1 - 19 of 19
  • Ground bounce

    Publication Year: 2003, Page(s):11 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How trustworthy is trusted computing?

    Publication Year: 2003, Page(s):18 - 20
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    One of the biggest issues facing computer technology today is data security. The problem has gotten worse because users are working with sensitive information more often, while the number of threats is growing and hackers are developing new types of attacks. Because of this, many technology experts advocate development of trusted computing (TC) systems that integrate data security into their core ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IBM seeks to unify data-access approaches

    Publication Year: 2003, Page(s): 22
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Researcher puts the network to music

    Publication Year: 2003, Page(s):23 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DARPA creating self-aware computing

    Publication Year: 2003, Page(s): 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing business components [Book Review]

    Publication Year: 2003, Page(s): 79
    Request permission for commercial reuse | PDF file iconPDF (210 KB) | HTML iconHTML
    Freely Available from IEEE
  • A pyramid scheme for computer graphics [Book Review]

    Publication Year: 2003, Page(s): 79
    Request permission for commercial reuse | PDF file iconPDF (210 KB) | HTML iconHTML
    Freely Available from IEEE
  • Drafting requirements that work [Book Review]

    Publication Year: 2003, Page(s): 79
    Request permission for commercial reuse | PDF file iconPDF (210 KB) | HTML iconHTML
    Freely Available from IEEE
  • How many system architectures?

    Publication Year: 2003, Page(s):93 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Developers often call an embedded system's hardware architecture a platform. The idea is that you select a hardware platform, then write software to fit onto it. Matters are, however, more complicated. The platform provides the computing resources required to run the embedded application, and the decisions about what hardware should go into the platform often depend on what sort of software you wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ANTS framework for cooperative work environments

    Publication Year: 2003, Page(s):56 - 62
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    Designed to facilitate computer-supported cooperative work, ANTS overcomes the major deficiencies found in earlier groupware toolkits at the conceptual, architectural, and technological levels. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pervasive computing: a paradigm for the 21st century

    Publication Year: 2003, Page(s):25 - 31
    Cited by:  Papers (139)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    Pervasive computing promises to make life simpler via digital environments that sense, adapt, and respond to human needs. Yet we still view computers as machines that run programs in a virtual environment. Pervasive computing presumes a different vision. A device can be a portal into an application-data space, not just a repository of custom software a user must manage. An application is a means b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will distance learning create a global university?

    Publication Year: 2003, Page(s):100, 98 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB)

    It is predicted that the development whereby universities have campuses connected to the central site by telecom links will continue until there are very few universities in the world, and perhaps only one. An exception is that some countries may try to maintain national universities for certain areas of study. The article discusses the possible consequences of such a development and the likelihoo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Value-based software engineering: a case study

    Publication Year: 2003, Page(s):33 - 41
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    The information technology field's accelerating rate of change makes feedback control essential for organizations to sense, evaluate, and adapt to changing value propositions in their competitive marketplace. Although traditional project feedback control mechanisms can manage the development efficiency of stable projects in well-established value situations, they do little to address the project's... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • X-VRML for advanced virtual reality applications

    Publication Year: 2003, Page(s):89 - 92
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB)

    Market acceptance of new personal computing products and services strongly depends on the quality of their user interfaces. Virtual reality is an emerging technology that promises significant advances in this area. The term itself is broad, ranging from simple 3D animation programs with no user interaction to systems with head-mounted displays, 3D manipulators, and other specialized hardware to im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rigorous evaluation of COTS middleware technology

    Publication Year: 2003, Page(s):50 - 55
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    The adoption of commercial off-the-shelf middleware products across the software industry has gathered significant momentum. While COTS middleware products demonstrably solve many problems, their adoption and use are by no means straightforward. Competition among products that apparently offer identical services complicates the COTS middleware selection process, especially when competing products ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A popularity-based prediction model for Web prefetching

    Publication Year: 2003, Page(s):63 - 70
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB) | HTML iconHTML

    The diverse server, client, and unique file object types used today slow Web performance. Caching alone offers limited performance relief because it cannot handle many different file types easily. One solution combines caching with Web prefetching: obtaining the Web data a client might need from data about that client's past surfing activity. The prediction by partial match model, for example, mak... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing IT with systems thinking

    Publication Year: 2003, Page(s):96 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB)

    Technological systems do not exist in a vacuum, but are an integral part of an organizational setting. With information systems now permeating almost every aspect of our environment, systems thinking has never been more relevant to engineers and managers. Information systems essentially store, process, and distribute organizational information. As the capacity to accomplish these tasks has grown b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The art of requirements triage

    Publication Year: 2003, Page(s):42 - 49
    Cited by:  Papers (40)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Driven by an increasingly competitive market, companies add features and compress schedules for the delivery of every product, often creating a complete mismatch of requirements and resources that results in products failing to satisfy customer needs. Triage is the process of determining which requirements a product should satisfy given the time and resources available. The author presents three p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instant messaging puts on a business suit

    Publication Year: 2003, Page(s):14 - 16
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Despite the many users, the three big consumer instant messaging (IM) companies don't make money directly from instant messaging because the service is free. They have thus been looking for a way to sell enhanced IM services to companies. Businesses want more from IM than they get from the consumer versions they've been using. For example, consumer systems typically don't offer security, message a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com