By Topic

Computer

Issue 11 • Date Nov. 2003

Filter Results

Displaying Results 1 - 17 of 17
  • Uncovering hidden contracts: the .NET example

    Publication Year: 2003, Page(s):48 - 55
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Software contracts take the form of routine preconditions, postconditions, and class invariants written into the program itself. The design by contract methodology uses such contracts for building each software element, an approach that is particularly appropriate for developing safety-critical software and reusable libraries. This methodology is a key design element of some existing libraries, es... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing safety-critical computer systems

    Publication Year: 2003, Page(s):40 - 46
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    The ubiquitous computer is the electronic component of choice for system developers, who increasingly exploit computing's power in safety-critical applications such as steer-by-wire automotive systems and powered prosthetics. However, these computer-based systems raise the ongoing concern that they might fail and cause harm. Exploring the systematic design of safety-critical computer systems helps... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next-generation wearable networks

    Publication Year: 2003, Page(s):31 - 39
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    Increased research in microelectronics, wireless communications, and human-computer interaction, particularly augmented-reality applications, has made a symbiotic system technically feasible. Wearable computing, or wearware, focuses on making this technology useful in everyday life, particularly for integrating contextual data with the Internet to automate mundane tasks. The availability of portab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical language approach translates into success

    Publication Year: 2003, Page(s):14 - 16
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    Machine translation currently translates text from one language into another. However, work is under way on speech-to-speech translation. There are two kinds of machine translation: knowledge-based and statistical. Knowledge-based systems translate documents by converting words and grammar directly from one language into another. Rather than using the knowledge-based system's direct word-by-word t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weblogs: simplifying web publishing

    Publication Year: 2003, Page(s):114 - 116
    Cited by:  Papers (14)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB)

    A weblog - blog, for short - is a Web site that uses a dated log format to publish periodical information. The updates are frequent, usually daily, according to the site owner's editorial purposes - or whims. Blogs contribute to Web content by linking and filtering evolving content in a structured way and by establishing interlinked communities - the blogosphere - connecting people through shared ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling Web services with capacity provision networks

    Publication Year: 2003, Page(s):64 - 72
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    With the increasing proliferation of c-commerce and e-business activities, many service providers are turning to Web caching solutions to move important content and processes closer to end users. Uncertainties in user demand and rapid market changes pose significant impediments to effective cache planning and deployment solutions, however. The authors have developed capacity provision networks to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining for very busy people

    Publication Year: 2003, Page(s):22 - 29
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (553 KB) | HTML iconHTML

    Most modern businesses can access mountains of data electronically; the trick is effectively using that data. In practice, this means summarizing large data sets to find the data that really matters. Most data miners are zealous hunters seeking detailed summaries and generating extensive and lengthy descriptions. The authors take a different approach and assume that busy people don't need, or can'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will fuel cells replace batteries in mobile devices?

    Publication Year: 2003, Page(s):10 - 12
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB)

    No matter how much wireless vendors improve their processors, memory systems, and networks, it does no good if a mobile device's battery dies or has such a short life that users are virtually tethered to an electrical outlet. With this in mind, researchers are seeking to improve portable-power technology, and many are exploring a single alternative: fuel cells. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The information systems research cycle

    Publication Year: 2003, Page(s):111 - 113
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB)

    What distinguishes information systems from closely aligned disciplines such as computer science, organizational science, management science, economics, or systems engineering? How does IS research balance the demands of relevance and rigor to make effective contributions to both theory and practice? As senior researchers in IS, the authors have engaged in many debates on these questions and have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SCTP: a proposed standard for robust Internet data transport

    Publication Year: 2003, Page(s):56 - 63
    Cited by:  Papers (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    The stream control transmission protocol (SCTP) is an evolving general purpose Internet transport protocol designed to bridge the gap between TCP and UDP. SCTP evolved from a telephony signaling protocol for IP networks and is now a proposed standard with the Internet Engineering Task Force. Like TCP, SCTP provides a reliable, full-duplex connection and mechanisms to control network congestion. Ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial intelligence: arrogance or ignorance?

    Publication Year: 2003, Page(s):120, 118 - 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    Whether the computing profession is ill-informed about natural intelligence or not, there are good arguments for dropping the term artificial intelligence as a name for the nifty programming field. The Oxford English Dictionary, second edition (www.oed.com), defines algorist as a descriptor for a nifty programmer, but deems the word obsolete. Here, then, we have a word ripe for reanimation. The de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal methods in embedded design

    Publication Year: 2003, Page(s):104 - 106
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB)

    For more than two decades, applied formal methods have remained the unexplored frontier of embedded system design - just beyond the reach of practice. There have been inroads, certainly, but no sign of a revolution -even a quiet one - in industry. Considering the rapid progress of technology over this time, the dynamic expansion of applications, and the meager investment in formal methods, just ke... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metadata standards for educational resources

    Publication Year: 2003, Page(s):107 - 109
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB)

    In the 1990s, recognition of the potential economies of reusing educational materials spawned the development of metadata standards for sharing and storing learning objects. Metadata is data that describes a physical or electronic resource and can be used to manage collections of documents, images, and other information in a repository such as an archive or museum. Some metadata elements, such as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • At random - How not to teach science

    Publication Year: 2003, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News briefs - Getting in touch with interactive haptic technology

    Publication Year: 2003, Page(s): 18
    Request permission for commercial reuse | PDF file iconPDF (256 KB) | HTML iconHTML
    Freely Available from IEEE
  • News briefs - Finding optical fiber in the deep blue sea

    Publication Year: 2003, Page(s):18 - 19
    Request permission for commercial reuse | PDF file iconPDF (268 KB) | HTML iconHTML
    Freely Available from IEEE
  • News briefs - W3C works on semantic web proposal

    Publication Year: 2003, Page(s): 20
    Request permission for commercial reuse | PDF file iconPDF (215 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com