Computer

Issue 8 • Aug. 2003

Filter Results

Displaying Results 1 - 21 of 21
  • Engineering decisions

    Publication Year: 2003, Page(s):9 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tablet-PC classroom system wins design competition

    Publication Year: 2003, Page(s):15 - 18
    Cited by:  Patents (54)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (355 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seeking better web search technologies

    Publication Year: 2003, Page(s):19 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software radios add flexibility to wireless technology

    Publication Year: 2003, Page(s):23 - 25
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spammers begin sending viruses with their junk mail

    Publication Year: 2003, Page(s): 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Ballistic" technique boosts storage capacity

    Publication Year: 2003, Page(s):26 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FAST approach could accelerate internet downloads

    Publication Year: 2003, Page(s):27 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lean software development: an agile toolkit [Book Review]

    Publication Year: 2003, Page(s): 89
    Request permission for commercial reuse | PDF file iconPDF (236 KB) | HTML iconHTML
    Freely Available from IEEE
  • C opyrights and copywrongs: the rise of intellectual property and how it threatens creativity [Book Reviews]

    Publication Year: 2003, Page(s): 89
    Request permission for commercial reuse | PDF file iconPDF (236 KB) | HTML iconHTML
    Freely Available from IEEE
  • Web design with scalable vector graphics [Book Reviews]

    Publication Year: 2003, Page(s): 89
    Request permission for commercial reuse | PDF file iconPDF (236 KB) | HTML iconHTML
    Freely Available from IEEE
  • Wireless security is different

    Publication Year: 2003, Page(s):99 - 101
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB)

    Wireless security requires slightly different thinking from wired security because it gives potential attackers easy transport medium access. This access significantly increases the threat that any security architecture must address. Wireless networking broadcast nature makes traditional link-layer attacks readily available to anyone. Wireless network security based on the IEEE 802.11 standard has... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Penny tag technologies for removable data storage

    Publication Year: 2003, Page(s):70 - 76
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (711 KB) | HTML iconHTML

    Low-cost authentication and identification methods for removable data storage cartridges are the focus of ongoing research. Manufacturers commonly use tags or markers to authenticate and identify commercial products. However, the authentication and identification of removable data storage cartridges must be automated at a very low cost. The varying requirements of specific systems have driven the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges in computer architecture evaluation

    Publication Year: 2003, Page(s):30 - 36
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    We focus on problems suited to the current evaluation infrastructure. The current limitation and trends in evaluation techniques are troublesome and could noticeably slow the rate of computer system innovation. New research has been recommended to help and make quantitative evaluations of computer systems manageable. We support research in the areas of simulation frameworks, benchmarking methodolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shaping an entertaining future at Carnegie Mellon

    Publication Year: 2003, Page(s):96 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB)

    Carnegie Mellon established the Entertainment Technology Center. The ETC uses interdisciplinary cooperation to advance the boundaries of digital technology. The ETC strives to prepare students for careers involving digital media in the entertainment industry. The idea is to prepare students for real-world time constraints and deadlines. The ETC's interactive animatronics initiative seeks to create... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-level language abstraction for reconfigurable computing

    Publication Year: 2003, Page(s):63 - 69
    Cited by:  Papers (34)  |  Patents (49)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    RC systems typically consist of an array of configurable computing elements. The computational granularity of these elements ranges from simple gates - as abstracted by FPGA lookup tables - to complete arithmetic-logic units with or without registers. A rich programmable interconnect completes the array. RC system developer manually partitions an application into two segments: a hardware component... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bringing copyright into the information age

    Publication Year: 2003, Page(s):102 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB)

    Reviewing current literature about the Internet reveals broad interest in copyright enforcement techniques. It appears to be concentrated in software and music. Current copyright statutes promote an outdated, industrial-age approach to intellectual property. We still need copyright to protect creative efforts. Structural changes in the premises underpinning industrial cultural, such as those exemp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reliability from the customer view

    Publication Year: 2003, Page(s):37 - 42
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    We augment our defect-prevention activities with analyses of what our customers experience - software failures. NED provides a suite of hardware and software products for business-critical applications, including the operating system, database management system, communication protocols, transaction monitors, and application-development tools. We update this suite quarterly in a release version upd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless community networks

    Publication Year: 2003, Page(s):90 - 92
    Cited by:  Papers (7)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB)

    An open standard IEEE 802.11 wireless local area networking technology provides an inexpensive and easy way to share bandwidth among multiple users. Such technology makes it possible to implement ad hoc wireless community networks using fixed wireless nodes rather than conventional base. A rural ad hoc network forwards packets from one wireless node to another to route data to a limited number of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The future of nanocomputing

    Publication Year: 2003, Page(s):44 - 53
    Cited by:  Papers (53)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (622 KB) | HTML iconHTML

    We are aware that the semiconductor industry had already entered the nanotechnology world. The working group proposed a hierarchy consisting of four levels: devices, architecture, state variables and data representation. We review on 3D heterogeneous integration, quantum cellular automata, defect-tolerant architecture, quantum computing, nano devices and other novel devices. This experience sugges... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design patterns for ubiquitous computing

    Publication Year: 2003, Page(s):93 - 95
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    Design patterns offer a solution to the difficult problem of reusing prior design knowledge. We propose that such patterns also offer an effective way to communicate solutions to ubiquitous computing design problems. Some of the ubicomp design patterns include context-sensitive I/O, physical-virtual associations, global data, proxies for devices, follow-me display, appropriate levels of attention,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programmable stream processors

    Publication Year: 2003, Page(s):54 - 62
    Cited by:  Papers (115)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    The demand for flexibility in media processing motivates the use of programmable processors. Stream processing bridges the gap between inflexible special-purpose solutions and current programmable architectures that cannot meet the computational demands of media-processing applications. The central idea behind stream processing is to organize an application into streams and kernels to expose the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org