By Topic

Computer

Issue 2 • Date Feb 2004

Filter Results

Displaying Results 1 - 25 of 27
  • Energy-efficient area monitoring for sensor networks

    Publication Year: 2004, Page(s):40 - 46
    Cited by:  Papers (122)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (539 KB) | HTML iconHTML

    The nodes in sensor networks must self-organize to monitor the target area as long as possible. Researchers at the Fundamental Computer Science Laboratory of Lille are developing strategies for selecting and updating an energy-efficient connected active sensor set that extends the network lifetime. We report on their work to optimize energy consumption in three separate problems: area coverage, re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A copper bullet for software quality improvement

    Publication Year: 2004, Page(s):21 - 25
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Fred Brooks long ago observed that there is no silver bullet to improve software quality. However, there are copper bullets-lesser steps that improve quality over time. One of these is the notion of software engineering, the practice of thinking carefully before immersing yourself in the minutia of coding. We offer a summary of his experience indicating that database reverse engineering offers a q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using plastic to make high-capacity memory

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Researchers are experimenting with a new type of compact, inexpensive, high-capacity electronic memory for small devices that uses a plastic material also sometimes employed as an antistatic coating for computer screens. A team of Princeton University and Hewlett-Packard scientists has used polyethylenedioxythiophene, called Pedot, to develop the memory system for deployment in cameras, MP3 music ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making computer programming fun and accessible

    Publication Year: 2004, Page(s):106 - 108
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Learning to program requires much hard work and dedication. Most students in introductory programming courses struggle to grasp programming concepts in general. Universities in the US, Canada, and elsewhere have reported withdrawal, failure, and D-grade rates approaching 50 percent in introductory computer programming courses. To address these problems, we recently designed and successfully offere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ad hoc networks

    Publication Year: 2004, Page(s):29 - 31
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactivity, interfaces, and smart toys

    Publication Year: 2004, Page(s):98 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    Although computers can represent a medium for children's social and intellectual development, some researchers believe that using computers before age seven subtracts from important developmental tasks and other types of learning. Those opposed to computers believe that computer-based activities are less effective in developing understanding and skills than are artifacts that young children can ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Researchers develop self-assembling chip technique

    Publication Year: 2004
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    IBM has developed prototype silicon-polymer flash-memory chips using a process based on self-assembling nanocrystals. The process uses a technique in which two polymers, when heated, self-organize into patterns that researchers can manipulate to make one of the stencils used to produce the chips. This self-assembly process could enable manufacturers to produce smaller chips and reduce the high cos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agents in wireless devices

    Publication Year: 2004, Page(s):104 - 105
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    The networks that connect handheld wireless devices such as cell phones and PDAs suffer from low bandwidth and a high incidence of network errors. By employing mobile agents, such devices could provide a reliable technology for message transport over wireless links. Mobile agents are inherently distributed software entities that reduce the load on the network when they move. Mobile agents can be e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simplifying public key management

    Publication Year: 2004, Page(s):101 - 103
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Many security protocols in use today were designed under the assumption that some form of global distributed public key infrastructure would eventually emerge to address key management problems. These protocols go back to the early 1990s, when a universal PKI was thought to be just around the corner. Ten years later, it's still just around the corner, and it probably always will be. Consequently, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing neural development mathematically

    Publication Year: 2004, Page(s): 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer lessons from pop songs

    Publication Year: 2004, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1121 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location-aware computing comes of age

    Publication Year: 2004, Page(s):95 - 97
    Cited by:  Papers (81)  |  Patents (74)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    At the core of invisible computing is context awareness, the concept of sensing and reacting to dynamic environments and activities. Location is a crucial component of context, and much research in the past decade has focused on location-sensing technologies, location-aware application support, and location-based applications. With numerous factors driving deployment of sensing technologies, locat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-layering in mobile ad hoc network design

    Publication Year: 2004, Page(s):48 - 51
    Cited by:  Papers (109)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prioritized overlay multicast in mobile ad hoc environments

    Publication Year: 2004, Page(s):67 - 74
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (374 KB) | HTML iconHTML

    Many proposed routing protocols for manets require nodes to maintain and update complicated route information, which incurs significant overhead when groups have different priorities. To address this problem, some researchers have begun focusing on application-layer, or overlay, multicast in which an overlay network forms a virtual network consisting of only member nodes atop the physical infrastr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing and security in mobile ad hoc networks

    Publication Year: 2004, Page(s):61 - 65
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Mobile ad hoc networks remove the dependence on a fixed network infrastructure by treating every available mobile node as an intermediate switch, thereby extending the range of mobile nodes well beyond that of their base transceivers. We present four manet routing algorithms along with a hybrid approach, discuss their advantages and disadvantages, and describe security problems inherent in such ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group communications in mobile ad hoc networks

    Publication Year: 2004, Page(s):52 - 59
    Cited by:  Papers (32)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Efficient support of group communications is critical for most ad hoc network applications. However, manet group communications issues differ from those in wired environments because the wireless communications medium has variable and unpredictable characteristics, and the signal strength and propagation fluctuate with respect to time and environment. We provide an overview of group communications... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative cache-based data access in ad hoc networks

    Publication Year: 2004, Page(s):32 - 39
    Cited by:  Papers (63)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    Cooperative caching, in which multiple nodes share and coordinate cached data, is widely used to improve Web performance in wired networks. However, resource constraints and node mobility have limited the application of these techniques in ad hoc networks. We propose caching techniques that use the underlying routing protocols to overcome these constraints and further improve performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Magazine

    Publication Year: 2004, Page(s): 01
    Request permission for commercial reuse | PDF file iconPDF (755 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):03 - 1
    Request permission for commercial reuse | PDF file iconPDF (1183 KB)
    Freely Available from IEEE
  • [IEEE Computer - Magazine's Staff]

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE names Fellows for 2004

    Publication Year: 2004, Page(s):75 - 77
    Request permission for commercial reuse | PDF file iconPDF (291 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2004, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (290 KB)
    Freely Available from IEEE
  • Letters

    Publication Year: 2004, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (273 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE fellow nominations due 15 march

    Publication Year: 2004, Page(s):78 - 79
    Request permission for commercial reuse | PDF file iconPDF (212 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com