Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 3 • Mar 2004

Filter Results

Displaying Results 1 - 25 of 31
  • Best Practices for the Formal Software Testing Process: A Menu of Testing Tasks [Book Review]

    Publication Year: 2004, Page(s): 92
    Request permission for commercial reuse | PDF file iconPDF (251 KB) | HTML iconHTML
    Freely Available from IEEE
  • Languages and the computing profession

    Publication Year: 2004, Page(s):104, 102 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    When involved in a project to develop an intermediary language, translators, interpreters, and linguists will need to work closely together, as grammar and vocabulary are closely interdependent. In this case, both must cope with the translation of many hundreds of wildly different languages. What role would computing professionals play in such a team? Given the project's purpose - to make general ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Applications: Applications with Virtual Inhabited 3D Worlds [Book Review]

    Publication Year: 2004, Page(s): 92
    Request permission for commercial reuse | PDF file iconPDF (251 KB) | HTML iconHTML
    Freely Available from IEEE
  • Billion-transistor architectures: there and back again

    Publication Year: 2004, Page(s):22 - 28
    Cited by:  Papers (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    In September 1997, Computer published a special issue on billion-transistor microprocessor architectures. Comparing that issue's predictions about the trends that would drive architectural development with the factors that subsequently emerged shows a greater-than-predicted emphasis on clock speed and an unforeseen importance of power constraints. Of seven architectural visions proposed in 1997, n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSIDC 2004 attracts hundreds of student teams

    Publication Year: 2004, Page(s):77 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded is the new paradigm(s)

    Publication Year: 2004, Page(s):99 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Embedded computing moved beyond toasters quite some time ago, but there are still misconceptions about what embedded computers do. Some of those misconceptions come from an old-fashioned view of what a computer is. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Research [Book Review]

    Publication Year: 2004, Page(s): 92
    Request permission for commercial reuse | PDF file iconPDF (251 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Computer Society - Information

    Publication Year: 2004, Page(s): 39
    Request permission for commercial reuse | PDF file iconPDF (217 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Products

    Publication Year: 2004, Page(s): 91
    Request permission for commercial reuse | PDF file iconPDF (273 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible computing may improve mobile performance

    Publication Year: 2004
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Researchers are working hard at developing one of the first reversible computers, a machine that promises to reduce energy consumption and thereby enable performance improvements in cellular telephones, laptops, and other battery-operated devices. Reversible computers, also called adiabatic systems, recycle their energy and thus emit very little heat. This lets computing power grow without hitting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice authentication speaks to the marketplace

    Publication Year: 2004, Page(s):13 - 15
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Individuals trying to make a purchase with a credit card, access a protected computer system, or retrieve account information from their bank can speak into a telephone and have their voice identified by a voice-authentication system to verify they are who they claim to be. A growing number of voice-authorization products are appearing, however, concerns in areas such as security and accuracy may ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent hell: a scenario of worst practices

    Publication Year: 2004, Page(s):96 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    To help develop and maintain well-engineered agent systems, we must define good modeling tools and methodologies. Despite the impossibility of controlling both individual agents and environmental dynamism, we need ways to predict interactive behavior among large numbers of agents and to provide some sort of control for easily maintaining them. Systematic development of agent-based systems requires... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making typical silicon matter with Razor

    Publication Year: 2004, Page(s):57 - 65
    Cited by:  Papers (84)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (677 KB) | HTML iconHTML

    Voltage scaling has emerged as a powerful technology for addressing the power challenges that current on-chip densities pose. Razor is a voltage-scaling technology based on dynamic, in-situ detection and correction of circuit-timing errors. Razor permits design optimizations that tune the energy in a microprocessor pipeline to typical circuit-operational levels. This eliminates the voltage margins... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metamorphic programming: unconventional high performance

    Publication Year: 2004, Page(s):30 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    A programming methodology that violates most of the rules of good programming has shown spectacular reductions in simulation times on several benchmarks. Applying this technique in logic-level VLSI circuit simulation also improved simulation performance. For a new VLSI circuit, faster simulation translates into faster time to market, so even the most peculiar programming type is worth exploring if... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Register now for software developer credential

    Publication Year: 2004, Page(s):79 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • We may need a new box

    Publication Year: 2004, Page(s):40 - 41
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Meeting emerging computer design industry challenges requires finding a balance between continuing to apply old technology beyond the point where it is workable and prematurely deploying new technology without knowing its limitations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming with Objects: A Comparative Presentation of Object-Oriented Programming with C++ and Java [Book Review]

    Publication Year: 2004, Page(s): 92
    Request permission for commercial reuse | PDF file iconPDF (251 KB) | HTML iconHTML
    Freely Available from IEEE
  • Displaying data in thin air

    Publication Year: 2004
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    The article looks at two new display technologies: Heliodisplay, which condenses the air above a video projector - the device then projects an image onto the condensed air; and FogScreen, a display surface made out of a cloud of water vapor diffused into the air as a very dry fog - a projector can display images on the FogScreen. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speeding up processing with approximation circuits

    Publication Year: 2004, Page(s):67 - 73
    Cited by:  Papers (64)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Current microprocessors employ a global timing reference to synchronize data transfer. A synchronous system must know the maximum time needed to compute a function, but a circuit usually finishes computation earlier than the worst-case delay. The system nevertheless waits for the maximum time bound to guarantee a correct result. As a first step in achieving variable pipeline delays based on data v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Zen of overclocking

    Publication Year: 2004, Page(s):9 - 12
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB) | HTML iconHTML

    The author spotlights "better-than-worst-case" design. With normal worst-case design, any computing system is a conglomeration of components, operating within frequencies, power supply voltages, and temperature ranges that were set to simultaneously accommodate worst-case values of every single component. These stacked margins result in noticeable headroom under nominal conditions. It is this head... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable and efficient system-on-chip design

    Publication Year: 2004, Page(s):42 - 50
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    To increase processor performance, the microprocessor industry is scaling feature sizes into the deep submicron and sub-100-nanometer regime. The recent emergence of noise and the dramatic increase in process variations have raised serious questions about using nanometer process technologies to design reliable, low-power, high-performance computing systems. The design and electronic design automat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing systems development

    Publication Year: 2004, Page(s):93 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    This article is the first of a two-part series on the unmet promise of IT project management. Here we describe the evolutionary path that has brought us to today's project culture and how successful organizations are managing projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Going beyond worst-case specs with TEAtime

    Publication Year: 2004, Page(s):51 - 56
    Cited by:  Papers (27)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (543 KB) | HTML iconHTML

    Virtually all engineers use worst-case component specifications for new system designs, thereby ensuring that the resulting product will operate under worst-case conditions. However, given that most systems operate under typical operating conditions that rarely approach the demands of worst-case conditions, building such robust systems incurs a significant performance cost. Further, classic worst-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer - Front cover

    Publication Year: 2004, Page(s): 01
    Request permission for commercial reuse | PDF file iconPDF (872 KB)
    Freely Available from IEEE
  • Computer - Table of Contents

    Publication Year: 2004, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (853 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org