Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 4 • April 2004

Filter Results

Displaying Results 1 - 25 of 32
  • Outperforming LRU with an adaptive replacement cache algorithm

    Publication Year: 2004, Page(s):58 - 65
    Cited by:  Papers (67)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    The self-tuning, low-overhead, scan-resistant adaptive replacement cache algorithm outperforms the least-recently-used algorithm by dynamically responding to changing access patterns and continually balancing between workload recency and frequency features. Caching, a fundamental metaphor in modern computing, finds wide application in storage systems, databases, Web servers, middleware, processors... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometrics and the threat to civil liberties

    Publication Year: 2004, Page(s):90 - 92
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Biometrics refers to the automatic identification or verification of living persons using their enduring physical or behavioral characteristics. Biometric systems fall into two categories: authentication and identification, with authentication systems being far more common. We discuss about the Biometric system and its use in authentication and identification. We also discuss about the face recogn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive neural network clustering of Web users

    Publication Year: 2004, Page(s):34 - 40
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    The degree of personalization that a Web site offers in presenting its services to users is an important attribute contributing to the site's popularity. Web server access logs contain substantial data about user access patterns. One way to solve this problem is to group users on the basis of their Web interests and then organize the site's structure according to the needs of different groups. Two... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2004, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (217 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf

    Publication Year: 2004, Page(s):73 - 75
    Request permission for commercial reuse | PDF file iconPDF (319 KB)
    Freely Available from IEEE
  • Hacking the business climate for network security

    Publication Year: 2004, Page(s):87 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    Computer security is at a crossroads. It's failing regularly and with increasingly serious results. CEOs are starting to notice. When they finally get fed up, they'll demand improvements-either that or they'll abandon the Internet, which seems unlikely. Computer security is not a problem that technology can solve. Security solutions have a technological component, but security is fundamentally a b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software infrastructure for authenticated Web metering

    Publication Year: 2004, Page(s):28 - 33
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    As the popularity of the Internet and the number of resources available on it have grown, potential customers are increasingly turning to it for information about products and services. Accordingly, online advertising is gaining a significant portion of the advertising market. The Internet has become a mainstream advertising channel, surpassing traditional media such as newspapers and radio in num... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crime data mining: a general framework and some examples

    Publication Year: 2004, Page(s):50 - 56
    Cited by:  Papers (129)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    A major challenge facing all law-enforcement and intelligence-gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Detecting cybercrime can likewise be difficult because busy network traffic and frequent online transactions generate large amounts of data, only a small portion of which relates to illegal activities. Data mining is a powerful tool that e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending the reach of business processes

    Publication Year: 2004, Page(s):78 - 80
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    A business process is a systematic set of activities by which an enterprise conducts its affairs. Various technologies-including pagers, cell phones, pocket PCs, instant messaging (IM), and the short message service (SMS)-have emerged that people can use to communicate even when they are on the move or far away. Many such devices support synchronous communication as well as proactively "pushing" m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling ubiquitous sensing with RFID

    Publication Year: 2004, Page(s):84 - 86
    Cited by:  Papers (102)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (641 KB) | HTML iconHTML

    Radio frequency identification has attracted considerable press attention in recent years, and for good reasons: RFID not only replaces traditional barcode technology, it also provides additional features and removes boundaries that limited the use of previous alternatives. Printed bar codes are typically read by a laser-based optical scanner that requires a direct line-of-sight to detect and extr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intel develops silicon that switches optical signals

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    Intel researchers have developed a prototype silicon-based modulator that switches light-based signals. This merges lower-priced silicon technology with high-speed, fiber optics. In essence, the technology promises to move photonics to silicon. Optical communications has been limited to specialty markets such as wide area networks and telecommunications because of the manufacturing process's expen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coping with Java threads

    Publication Year: 2004, Page(s):20 - 27
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    A thread is a basic unit of program execution that can share a single address space with other threads - that is, they can read and write the same variables and data structures. Originally, only assembly programmers used threads. A few older programming languages such as PL/I supported thread concurrency, but newer languages such as C and C++ use libraries instead. Only recently have programming l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Brainstorming, influence, and icebergs [project management]

    Publication Year: 2004, Page(s):9 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Brainstorming done right is an exhilarating, exhausting process. The personnel mix in a brainstorming group is crucial. Ideally, the group includes at least one and at most two "idea fountain" types, the kind of people whose brains automatically generate 10 ideas for every one being discussed. The group also should include at least one person who strongly wants useful results out of the session, s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XML-based specification for Web services document security

    Publication Year: 2004, Page(s):41 - 49
    Cited by:  Papers (35)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    The Internet and related technologies have seen tremendous growth in distributed applications such as medicine, education, e-commerce, and digital libraries. As demand increases for online content and integrated, automated services, various applications employ Web services technology for document exchange among data repositories. Web services provide a mechanism to expose data and functionality us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Products

    Publication Year: 2004, Page(s): 77
    Request permission for commercial reuse | PDF file iconPDF (335 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teaching computer science through game design

    Publication Year: 2004, Page(s):81 - 83
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    Playing computer games is a popular recreational activity for young people. Not surprisingly, many of these enthusiasts dream that one day they will develop computer games themselves. Developing computer games involves many aspects of computing, including computer graphics, artificial intelligence, human-computer interaction, security, distributed programming, simulation, and software engineering.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spam hits instant messaging

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Spam, a controversial issue for e-mail, has begun to hit instant messaging (IM) in large quantities, creating a phenomenon called spim. Some industry observers say the crackdown on spam by Internet service providers, lawmakers, and users may have caused marketers to turn to IM. Spim has many of spam's characteristics, including deceptive subject lines and fake sender names. And like spam, many spi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will network processor units live up to their promise?

    Publication Year: 2004, Page(s):13 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    Networking technology has been advancing faster than CPU technology in many ways, and this has created a need for new design approaches for chips used in networking settings. The NPU market started small several years ago with a few start-up companies but has since grown and begun to consolidate around several leading vendors. In addition, the technology has matured in terms of programming tools, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Magazine - April 2004

    Publication Year: 2004, Page(s): 01
    Request permission for commercial reuse | PDF file iconPDF (1097 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):02 - 1
    Request permission for commercial reuse | PDF file iconPDF (922 KB)
    Freely Available from IEEE
  • [IEEE Computer - Magazine's Staff]

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (214 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (194 KB) | HTML iconHTML
    Freely Available from IEEE
  • Announcement

    Publication Year: 2004, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Software quality improvement - Letters

    Publication Year: 2004, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (268 KB) | HTML iconHTML
    Freely Available from IEEE
  • Announcement

    Publication Year: 2004, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org