By Topic

Computer

Issue 5 • Date May 2004

Filter Results

Displaying Results 1 - 25 of 34
  • Inventing wellness systems for aging in place

    Page(s): 34 - 41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1037 KB)  

    Unlike "mainframe healthcare," personal wellness technologies can scale with the needs of an aging population. They can also drive a demanding specification for the requirements of ubiquitous, proactive computing in everyday life. Ultimately, aging-in-place research supports a broader vision of "personal wellness systems" that provide highly individualized support for home based healthcare to all age groups. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Chinese University Of Hong Kong

    Page(s): 77
    Save to Project icon | Request Permissions | PDF file iconPDF (215 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Researchers connect at society conferences

    Page(s): 68 - 71
    Save to Project icon | Request Permissions | PDF file iconPDF (395 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • Epidemic information dissemination in distributed systems

    Page(s): 60 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (394 KB)  

    Easy to deploy, robust, and highly resilient to failures, epidemic algorithms are a potentially effective mechanism for propagating information in large peer-to-peer systems deployed on Internet or ad hoc networks. It is possible to adjust the parameters of epidemic algorithm to achieve high reliability despite process crashes and disconnections, packet losses, and a dynamic network topology. Although researchers have used epidemic algorithms in applications such as failure detection, data aggregation, resource discovery and monitoring, and database replication, their general applicability to practical, Internet-wide systems remains open to question. We describe four key problems: membership maintenance, network awareness, buffer management, and message filtering, and suggest some preliminary approaches to address them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems development processes

    Page(s): 84 - 86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (354 KB)  

    Previously, we described the evolutionary history of project management and enumerated certain key factors associated with project success. We now discuss the key organizational processes that must be in place to provide the necessary environment to nurture success for an IT system development project. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using MPLS to unify multiple network types

    Page(s): 15 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (294 KB)  

    There is an increasing push to unify data-, voice-, and other multimedia-based network operations on single IP networks. This approach saves network operators money and simplifies administrative tasks. However, unifying network functions on IP can be complex, particularly for communications that must function across various networking technologies. Users are thus turning to a technology: multiprotocol label switching, that promises to make the task easier and less expensive. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P hacker tool poses escalating threat

    Page(s): 22 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (303 KB)  

    A new hacker tool causing increased concern in the security community uses peer-to-peer technology to let attackers control computers and link them into networks. Hackers can then use these networks to send large volumes of spam, shut down Web sites with denial-of-service assaults, and cause other problems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering a sustainable world

    Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (315 KB)  

    The author argues that the world's problems (environmental issues, medical epidemics, human poverty etc.) can be solved by using technology. He wonders if people have so completely given up on technology-based solutions to the world's problems that some essential connections have been lost. Why should we just accept these problems as chronic, before we've tried actually solving them? What can we do about the situation? He points out that with our computers, software, and the Internet, we have at our disposal the greatest array of intellectual amplification tools humanity has ever amassed. Our general knowledge base has mushroomed, along with our ability to access it any time, anywhere. We must not give up on ourselves. One person can make a difference; there's a place in this world for smart people to think globally and also to act globally. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational challenges of systems biology

    Page(s): 26 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (321 KB)  

    Progress in the study of biological systems such as the heart, brain, and liver will require computer scientists to work closely with life scientists and mathematicians. Computer science will play a key role in shaping the new discipline of systems biology and addressing the significant computational challenges it poses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf - Review

    Page(s): 80
    Save to Project icon | Request Permissions | PDF file iconPDF (243 KB)  
    Freely Available from IEEE
  • Private-to-private communications over the internet

    Page(s): 53 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB)  

    The meet-in-the-middle network provides a simple way to restore end-to-end connectivity between distant hosts located behind network address translators, and does so without reconfiguring the NAT devices that lie on the path between the hosts. The article proposes an internetworking method as part of a broader research project involving remote access to various IP-ready sensors, computers, cameras, and microphones installed in the home environment to monitor the health and safety of bedridden quadriplegic patients. This system configures all its IP devices with private IP addresses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approach gives providers a new way to push content

    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (265 KB)  

    When push technology - in which providers sent content over the Internet to recipients - was introduced, proponents hailed it as a way for users to effortlessly receive material they requested. However, the technology also required recipients to install a huge client and ate up valuable bandwidth at a time when it was a precious commodity. After the hype died down, push technology quietly went away. A few developers held onto the ideal though, and now, RSS-known generally as Really Simple Syndication but also sometimes as Rich Site Summary is becoming a popular way for large and small content providers, from individual bloggers to huge news organizations, to distribute content online. RSS is based on XML, an open standard that enables the definition, transmission, and interpretation of data between applications and across platforms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data and information as property

    Page(s): 92, 90 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (319 KB)  

    Digital technologists concern themselves with data - conventional representations of facts or ideas - and with machines for storing, transforming, and transmitting it. Although computing professionals also concern themselves with digital technology, they focus primarily on people and information-the meaning that people give to data. The use of data to convey information is vitally important to our social systems. This is underlined by recent research showing that dogs are much more able to get meaning from data than chimpanzees, which probably explains why dogs make better pets. The sharing of meaning has been the foundation of social development. The different data technologies have been used both to empower and to constrain members of our society as technology and society have evolved together. Computing professionals should thus always be sensitive to the social uses of data and information. They should also be alert to legal developments related to using data and to digital technology's role in producing data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile supercomputers

    Page(s): 81 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (274 KB)  

    We need mobile supercomputers that provide massive computational performance from the power in a battery. These supercomputers will make our personal devices much easier to use. They will perform real-time speech recognition, video transmission and analysis, and high bandwidth communication. And they will do so without us having to worry about where the next electrical outlet will be. But to achieve this functionality, we must rethink the way we design computers. Rather than worrying solely about performance, with the occasional nod to power consumption and cost, we need to judge computers by their performance-power-cost product. This new way of looking at processors will lead us to new computer architectures and new ways of thinking about computer system design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Staff List

    Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (210 KB)  
    Freely Available from IEEE
  • New technology beefs up BIOS

    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (206 KB)  

    Intel and Microsoft are preparing a major PC technology change by augmenting basic input/output system (BIOS) software with a new hardware-startup approach called the Extensible Firmware Interface. EFI promises benefits such as accelerating the boot-up process; making it easier to both add improvements to PCs and support peripherals; cutting manufacturing and support costs; and improving remote management of PCs, servers, and networked devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless middleware: glue for the mobile infrastructure

    Page(s): 18 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (318 KB)  

    The need for participants to communicate across so many platforms has led to the rise in wireless middleware's importance. Middleware is a software layer that resides between programs, OSs, hardware platforms, and communications protocols. Middleware lets different applications and systems, including clients and servers on different platforms, work together. Wireless middleware eases the transformation of markup languages, the delivery of content and data, protocol and device recognition, the incorporation and routing of business logic through enterprise systems, and the adaptation of data formats for compatibility with multiple databases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Healthwear: medical technology becomes wearable

    Page(s): 42 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1044 KB)  

    Widespread adoption of sensors that monitor the wearer's vital signs and other indicators promises to improve care for the aged and chronically ill while amassing a database that can enhance treatment and reduce medical costs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compiler enhancements - Letters

    Page(s): 6 - 7
    Save to Project icon | Request Permissions | PDF file iconPDF (279 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualizing Web search results in 3D

    Page(s): 87 - 89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (486 KB)  

    The exponential growth in Web sites is making it increasingly difficult to extract useful information on the Internet using existing search engines. Despite a wide range of sophisticated indexing and data retrieval features, search engines often deliver satisfactory results only when users know precisely what they are looking for. Traditional textual interfaces present results as a list of links to Web pages. Because most users are unwilling to explore an extensive list, search engines arbitrarily reduce the number of links returned, aiming also to provide quick response times. Moreover, their proprietary ranking algorithms often do not reflect individual user preferences. Those who need comprehensive general information about a topic or have vague initial requirements instead want a holistic presentation of data related to their queries. To address this need, we have developed Periscope, a 3D search result visualization system that displays all the Web pages found in a synthetic, yet comprehensible format. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society - Information

    Page(s): 25
    Save to Project icon | Request Permissions | PDF file iconPDF (219 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Magazine - May 2004

    Page(s): 01
    Save to Project icon | Request Permissions | PDF file iconPDF (911 KB)  
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes highly acclaimed peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ron Vetter
University of North Carolina
Wilmington