By Topic

Computer

Issue 5 • Date May 2004

Filter Results

Displaying Results 1 - 25 of 34
  • Private-to-private communications over the internet

    Publication Year: 2004, Page(s):53 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    The meet-in-the-middle network provides a simple way to restore end-to-end connectivity between distant hosts located behind network address translators, and does so without reconfiguring the NAT devices that lie on the path between the hosts. The article proposes an internetworking method as part of a broader research project involving remote access to various IP-ready sensors, computers, cameras... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational challenges of systems biology

    Publication Year: 2004, Page(s):26 - 33
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    Progress in the study of biological systems such as the heart, brain, and liver will require computer scientists to work closely with life scientists and mathematicians. Computer science will play a key role in shaping the new discipline of systems biology and addressing the significant computational challenges it poses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer society editors in chief return for second terms

    Publication Year: 2004, Page(s): 71
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf - Review

    Publication Year: 2004, Page(s): 80
    Request permission for commercial reuse | PDF file iconPDF (243 KB) | HTML iconHTML
    Freely Available from IEEE
  • Approach gives providers a new way to push content

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    When push technology - in which providers sent content over the Internet to recipients - was introduced, proponents hailed it as a way for users to effortlessly receive material they requested. However, the technology also required recipients to install a huge client and ate up valuable bandwidth at a time when it was a precious commodity. After the hype died down, push technology quietly went awa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data and information as property

    Publication Year: 2004, Page(s):92, 90 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    Digital technologists concern themselves with data - conventional representations of facts or ideas - and with machines for storing, transforming, and transmitting it. Although computing professionals also concern themselves with digital technology, they focus primarily on people and information-the meaning that people give to data. The use of data to convey information is vitally important to our... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using MPLS to unify multiple network types

    Publication Year: 2004, Page(s):15 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    There is an increasing push to unify data-, voice-, and other multimedia-based network operations on single IP networks. This approach saves network operators money and simplifies administrative tasks. However, unifying network functions on IP can be complex, particularly for communications that must function across various networking technologies. Users are thus turning to a technology: multiprot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Researchers connect at society conferences

    Publication Year: 2004, Page(s):68 - 71
    Request permission for commercial reuse | PDF file iconPDF (395 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inventing wellness systems for aging in place

    Publication Year: 2004, Page(s):34 - 41
    Cited by:  Papers (109)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1037 KB) | HTML iconHTML

    Unlike "mainframe healthcare," personal wellness technologies can scale with the needs of an aging population. They can also drive a demanding specification for the requirements of ubiquitous, proactive computing in everyday life. Ultimately, aging-in-place research supports a broader vision of "personal wellness systems" that provide highly individualized support for home based healthcare to all ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New technology beefs up BIOS

    Publication Year: 2004
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Intel and Microsoft are preparing a major PC technology change by augmenting basic input/output system (BIOS) software with a new hardware-startup approach called the Extensible Firmware Interface. EFI promises benefits such as accelerating the boot-up process; making it easier to both add improvements to PCs and support peripherals; cutting manufacturing and support costs; and improving remote ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Chinese University Of Hong Kong

    Publication Year: 2004, Page(s): 77
    Request permission for commercial reuse | PDF file iconPDF (215 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Epidemic information dissemination in distributed systems

    Publication Year: 2004, Page(s):60 - 67
    Cited by:  Papers (184)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Easy to deploy, robust, and highly resilient to failures, epidemic algorithms are a potentially effective mechanism for propagating information in large peer-to-peer systems deployed on Internet or ad hoc networks. It is possible to adjust the parameters of epidemic algorithm to achieve high reliability despite process crashes and disconnections, packet losses, and a dynamic network topology. Alth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P hacker tool poses escalating threat

    Publication Year: 2004, Page(s):22 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    A new hacker tool causing increased concern in the security community uses peer-to-peer technology to let attackers control computers and link them into networks. Hackers can then use these networks to send large volumes of spam, shut down Web sites with denial-of-service assaults, and cause other problems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Staff List

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (210 KB)
    Freely Available from IEEE
  • Wireless middleware: glue for the mobile infrastructure

    Publication Year: 2004, Page(s):18 - 20
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    The need for participants to communicate across so many platforms has led to the rise in wireless middleware's importance. Middleware is a software layer that resides between programs, OSs, hardware platforms, and communications protocols. Middleware lets different applications and systems, including clients and servers on different platforms, work together. Wireless middleware eases the transform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile supercomputers

    Publication Year: 2004, Page(s):81 - 83
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    We need mobile supercomputers that provide massive computational performance from the power in a battery. These supercomputers will make our personal devices much easier to use. They will perform real-time speech recognition, video transmission and analysis, and high bandwidth communication. And they will do so without us having to worry about where the next electrical outlet will be. But to achie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society - Information

    Publication Year: 2004, Page(s): 25
    Request permission for commercial reuse | PDF file iconPDF (219 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems development processes

    Publication Year: 2004, Page(s):84 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Previously, we described the evolutionary history of project management and enumerated certain key factors associated with project success. We now discuss the key organizational processes that must be in place to provide the necessary environment to nurture success for an IT system development project. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Healthwear: medical technology becomes wearable

    Publication Year: 2004, Page(s):42 - 49
    Cited by:  Papers (71)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1044 KB) | HTML iconHTML

    Widespread adoption of sensors that monitor the wearer's vital signs and other indicators promises to improve care for the aged and chronically ill while amassing a database that can enhance treatment and reduce medical costs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualizing Web search results in 3D

    Publication Year: 2004, Page(s):87 - 89
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    The exponential growth in Web sites is making it increasingly difficult to extract useful information on the Internet using existing search engines. Despite a wide range of sophisticated indexing and data retrieval features, search engines often deliver satisfactory results only when users know precisely what they are looking for. Traditional textual interfaces present results as a list of links t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering a sustainable world

    Publication Year: 2004, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    The author argues that the world's problems (environmental issues, medical epidemics, human poverty etc.) can be solved by using technology. He wonders if people have so completely given up on technology-based solutions to the world's problems that some essential connections have been lost. Why should we just accept these problems as chronic, before we've tried actually solving them? What can we d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Magazine - May 2004

    Publication Year: 2004, Page(s): 01
    Request permission for commercial reuse | PDF file iconPDF (911 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):03 - 1
    Request permission for commercial reuse | PDF file iconPDF (1019 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (194 KB) | HTML iconHTML
    Freely Available from IEEE
  • Language Translation - Letters

    Publication Year: 2004, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (248 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com