Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 6 • June 2003

Filter Results

Displaying Results 1 - 19 of 19
  • IETF will continue using patented technologies in standards

    Publication Year: 2003, Page(s): 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agile software development: it's about feedback and change

    Publication Year: 2003, Page(s):39 - 43
    Cited by:  Papers (75)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2297 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative and incremental developments. a brief history

    Publication Year: 2003, Page(s):47 - 56
    Cited by:  Papers (238)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Although many view iterative and incremental development as a modern practice, its application dates as far back as the mid-1950s. Prominent software-engineering thought leaders from each succeeding decade supported IID practices, and many large projects used them successfully. These practices may have differed in their details, but all had a common theme-to avoid a single-pass sequential, documen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cray, kanai awards recognize achievement in high-performance computing and distributed systems

    Publication Year: 2003, Page(s):89 - 91
    Request permission for commercial reuse | PDF file iconPDF (346 KB)
    Freely Available from IEEE
  • Andhra Pradesh: lessons for global software development

    Publication Year: 2003, Page(s):31 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Although extremely poor economically, the Indian state of Andhra Pradesh has been a supplier of skilled software labor for more than a decade and is one of the most innovative sites in applying IT for social development. Many of AP's e-government programs are just beginning to fully take root, and they should have a significant impact in a relatively short time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing complex projects using XP with extensions

    Publication Year: 2003, Page(s):67 - 73
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Using methodological extensions to adapt extreme programming (XP) for major projects offers a high security and reliability without limiting software development's advantages. The authors describe their use of XP extensions that focus on development's planning and controlling aspects, demonstrating that a suitably adapted agile development process is applicable to long-term, large-system projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using risk to balance agile and plan-driven methods

    Publication Year: 2003, Page(s):57 - 66
    Cited by:  Papers (84)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB)

    Both agile and plan-driven approaches have situation-dependent shortcomings that, if not addressed, can lead to project failure. The challenge is to balance the two approaches to take advantage of their strengths in a given situation while compensating for their weaknesses. The authors present a risk-based approach for structuring projects to incorporate both agile and plan-driven approaches in pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPECs: personal pervasive systems

    Publication Year: 2003, Page(s):109 - 111
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (563 KB)

    We have devised a system of wireless SPECs-small personal everyday computers-that can be worn or attached to a place or thing and, unlike Active Badges, can be networked without a centralized computer. Our approach increases availability on a per-user basis, rather than for an entire community, to create a truly personal pervasive system. Users themselves deploy and maintain these autonomous devic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CARE: an automobile crash data analysis tool

    Publication Year: 2003, Page(s):22 - 30
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1873 KB) | HTML iconHTML

    The Critical Analysis Reporting Environment provides an efficient tool for transportation safer engineers and policymakers to use in analyzing the categorical crash data typically obtained from police reports. CAPE has proven successful in the traffic safety community for two reasons: its simplicity and its efficiency. It is currently being used in several states. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing an agile process to an organization [software development]

    Publication Year: 2003, Page(s):74 - 78
    Cited by:  Papers (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    The transition from a plan-driven to an agile software development process affects not only the development team members, but also other teams, departments, and management. Any new process will likely attract developers excited to try it while repelling those opposed to change. Thus, how an agile process is introduced into an organization significantly affects its ultimate success. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firewalls: an outdated defense

    Publication Year: 2003, Page(s):112 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB)

    Firewalls emerged in the early 1990s as a countermeasure to the surge in malicious Internet activity. Initially they worked well, and they still afford some degree of protection. However, technological changes are quickly undermining the firewall, just as advances in warfare made the moat and drawbridge obsolete. The situation is dire enough that the security community must respond with a revoluti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agility through discipline: a debate

    Publication Year: 2003, Page(s):44 - 46
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB)

    While Beck asserts that agility is only possible through greater discipline on the part of everyone involved, Boehm counters that you don't broaden the definition of "discipline" by rejecting parts of it. Yet, from inside extreme programming, it seems that the only way to achieve the desired results is to view the world in 'both-and" terms instead of "either-or" terms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • That's not computing-this is computing

    Publication Year: 2003, Page(s):6 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    We've all become blase about our computing: computers in our pockets, in our washing machines, controlling our car engines, in our greeting cards, in our ski boots and tennis shoes. The giddy sense of amazement, of possibility, has gradually given way to complacency and a vague sense of unfulfilled entitlement. To see how we got here, and what we now have, we need to step back from today's reality... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Migrating agile methods to standardized development practice

    Publication Year: 2003, Page(s):79 - 85
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Situated process and quality frameworks offer a way to resolve the tensions that arise when introducing agile methods into standardized software development engineering. For these to be successful, however, organizations must grasp the opportunity to reintegrate software development management, theory, and practice. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The problem with Unicode

    Publication Year: 2003, Page(s):116, 114 - 115
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB)

    The author, in his 'Seven Great Blunders of the Computing World' column (Computer, July 2002, p.112, 110-111) claimed that Unicode was a blunder. The author reconsiders this and states that he stands by his claim, but states that this does not mean that he considers it to be a failure. He does however claim that a different approach would have worked much better for encoding text, documents, and w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OSs battle in the smart-phone market

    Publication Year: 2003, Page(s):10 - 12
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB)

    Cellular phones are no longer just for making calls. They also function as PDAs, digital cameras, Internet consoles, and e-mail and instant messaging clients. Because of this, the operating systems used in phones have had to improve. This demand for better mobile OSs has changed the nature of the marketplace. And that marketplace is healthy, despite global economic problems, largely because smart-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The status and future of 802.11-based WLANs

    Publication Year: 2003, Page(s):102 - 105
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB)

    The main attraction of WLANs is their flexibility. They can extend access to local area networks, such as corporate intranets, as well as support broadband access to the Internet - particularly at "hot spots," public venues where people tend to gather. WLANs can provide quick, easy wireless connectivity to computers, machinery, or systems in a local environment where a fixed communications infrast... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary entertainment with intelligent agents

    Publication Year: 2003, Page(s):106 - 108
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB)

    A common limitation of conventional video games is that players learn the positions and behaviour of the computer controlled characters. Software developers preprogram these characteristics so, after playing the game several times, the player comes to know exactly how and when the monsters will act. The game eventually becomes boring because the player need only execute a learned script to defeat ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two technologies vie for recognition in speech market

    Publication Year: 2003, Page(s):13 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (622 KB)

    Improvements to voice-recognition algorithms and greater computing power have changed speech technology from an approach with limited uses to an increasingly important part of many applications. As this process has unfolded, developers have searched for an open standard, rather than proprietary development and runtime environments, that would let them easily and quickly add speech input/output cap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org