Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 12:00 PM ET (12:00 - 16:00 UTC). We apologize for the inconvenience.
By Topic

Computer

Issue 5 • Date May 2003

Filter Results

Displaying Results 1 - 14 of 14
  • News briefs - Vendors support new fixed wireless broadband technology

    Publication Year: 2003 , Page(s): 22
    Save to Project icon | Request Permissions | PDF file iconPDF (232 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Researchers improve parallel processing

    Publication Year: 2003 , Page(s): 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating mobile IP with ad hoc networks

    Publication Year: 2003 , Page(s): 48 - 55
    Cited by:  Papers (40)  |  Patents (11)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (601 KB) |  | HTML iconHTML  

    Extending traditional IEEE 802.11-based access points to incorporate the flexibility of mobile ad hoc networks would help make the dream of ubiquitous broadband wireless access a reality. The authors discuss several issues related to integrating the mobile Internet protocol with Manets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT systems perspective - The business rule approach

    Publication Year: 2003 , Page(s): 85 - 87
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (262 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedde computing - Toward IP-based system-level soc design

    Publication Year: 2003 , Page(s): 88 - 89
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The profession - The computing profession at a crossroads

    Publication Year: 2003 , Page(s): 92 - 91
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (233 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leave Bernoulli out of this [airplane flight]

    Publication Year: 2003 , Page(s): 10 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (309 KB)  

    Bernoulli discovered that as the velocity of a fluid increases, its pressure decreases. Concerning flight, Bernoulli's principle applies to the shape of an airplane wing. Air travels across the top and bottom of the wing at the same time, traveling faster on top (creating less pressure) because the wing is curved and slower on the bottom (creating more pressure) because it is flat. The trouble is that successive generations of young students are convinced that this is all there is to it. The author looks at this problem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Federated approach expands database-access technology

    Publication Year: 2003 , Page(s): 18 - 20
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (319 KB)  

    Searching multiple data sources for specific information is complex and time-consuming, largely because a user query traditionally accesses only one data source at a time. In response to this problem, a number of vendors have developed federated database-access technology products that let users query multiple, heterogeneous data sources simultaneously. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial intelligence: hype or reality?

    Publication Year: 2003 , Page(s): 24 - 28
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1158 KB) |  | HTML iconHTML  

    Artificial intelligence is not just hype, as many working applications use AI techniques. However, we have yet to develop a system that spans the full spectrum of intelligent behavior. For example, building a system that an make sensible decisions about unfamiliar situations in everyday, nonspecialist domains remains difficult. Nevertheless, it seems likely that applications like distributed blackboards will continue apace in specialist domains. This quiet revolution can make a significant contribution to our lives. Meanwhile, we can also expect progress toward the popular idea of AI manifested in human-like robots as we progress in simulating vision, language, common sense, and adaptability behaviors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless advertising's challenges and opportunities

    Publication Year: 2003 , Page(s): 30 - 37
    Cited by:  Papers (29)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2688 KB) |  | HTML iconHTML  

    Rapidly developing wireless net-working technology and the growing mobile-device user base have fueled interest in activities that deliver advertisements to mobile devices over a wireless network. Studies by wireless media research companies indicate that delivering permission-based alerts to wireless phones captures consumers' attention, drives response actions, and builds brand awareness. Wireless devices are accessible, personal, and location aware. These characteristics allow for highly targeted, flexible, and dynamic wireless advertisements. Yet the target audience is vast, and users must be able to search for information, issue inquiries, and make purchases at any mobile location. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ten reasons to use divisible load theory

    Publication Year: 2003 , Page(s): 63 - 68
    Cited by:  Papers (88)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (244 KB)  

    During the past decade, divisible load theory has become a powerful tool for modeling data-intensive computational problems. DLT emerged from a desire to create intelligent sensor networks, but most recent applications involve parallel and distributed computing. Like other linear mathematical models such as Markovian queuing theory and electric resistive circuit theory, DLT offers easy computation, a schematic language, and equivalent network element modeling. While it can incorporate stochastic features, the basic model does not make statistical assumptions, which can be the Achilles' heel of a performance evaluation model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML raises concerns as it gains prominence

    Publication Year: 2003 , Page(s): 14 - 16
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (293 KB)  

    XML's growing implementation has raised several key concerns. First, because they provide considerable information about a document's content, XML files include much more data than HTML files. This can burden a company's network, processor, and storage infrastructures. In addition to extensively describing a document's contents, XML files typically appear in plain text. These factors create security concerns. And many developers may not be cooperating with the effort to transition the Web from HTML to XML via XHTML (Extensible HTML). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Internet distributed computing

    Publication Year: 2003 , Page(s): 38 - 46
    Cited by:  Papers (12)  |  Patents (14)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (376 KB) |  | HTML iconHTML  

    Emerging Internet uses-including peer-to-peer and grid computing-provide both a glimpse of and the impetus for evolving the Internet into a distributed computing, platform of unprecedented scale. Taking a longer view, the authors consider what would be needed to make the Internet an application-hosting platform: a networked, distributed counterpart of the hosting environment traditional operating systems provide to applications within a single node. The foundation of their proposed approach is to disaggregate and virtualize individual system resources as services that can be described, discovered, and dynamically configured at runtime to execute an application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of three vertical search spiders

    Publication Year: 2003 , Page(s): 56 - 62
    Cited by:  Papers (16)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (252 KB)  

    The Web's dynamic, unstructured nature makes locating resources difficult. Vertical search engines solve part of the problem by keeping indexes only in specific domains. They also offer more opportunity to apply domain knowledge in the spider applications that collect content for their databases. The authors used three approaches to investigate algorithms for improving the performance of vertical search engine spiders: a breadth-first graph-traversal algorithm with no heuristics to refine the search process, a best-first traversal algorithm that uses a hyperlink-analysis heuristic, and a spreading-activation algorithm based on modeling the Web as a neural network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes highly acclaimed peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com