By Topic

Computer

Issue 6 • Date June 2004

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (627 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (726 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Freely Available from IEEE
  • Let's hear from those in the back

    Publication Year: 2004, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    The heroes and the winners will always be there for us to study and find inspiration from. We're in no danger of forgetting them or overlooking what they accomplish. But we can learn lessons from the other end of human existence, too. It was an easy extrapolation to determine when the VAX performance curve would cross with the minicomputer curve. We resolved then and there to switch back to microp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Announcement

    Publication Year: 2004, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Is broadband over power lines about to take off?

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Companies are beginning to roll out broadband Internet services accessible over power lines, a technology that has been available for years but not released because of technical and other obstacles. Broadband-over-power-line service promises competitive prices and the convenience of letting users plug low-cost BPL modems into any standard electrical outlet. Power lines represent an attractive broa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 2004, Page(s): 21
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • A roadmap for enterprise system implementation

    Publication Year: 2004, Page(s):22 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Enterprise systems are complex and expensive and create dramatic organizational change. Implementing an enterprise system can be the "corporate equivalent of a root canal," a meaningful analogy given that an ES with its single database replaces myriad special-purpose legacy systems that once operated in isolation. An ES, or enterprise resource planning system, has the Herculean task of seamlessly ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Securing the High-Speed Internet

    Publication Year: 2004, Page(s):33 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (359 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer security in the real world

    Publication Year: 2004, Page(s):37 - 46
    Cited by:  Papers (34)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Most computers today are insecure because security is costly in terms of user inconvenience and foregone features, and people are unwilling to pay the price. Real-world security depends more on punishment than on locks, but it's hard to even find network attackers, much less punish them. The basic elements of security are authentication, authorization, and auditing: the gold standard. The idea of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Worm epidemics in high-speed networks

    Publication Year: 2004, Page(s):48 - 53
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Future worm epidemics might spread at unprecedented rates in high-speed networks. A comprehensive automated defense system will be the only way to contain new threats but could be too risky to implement without more reliable detection accuracy and better real-time traffic analysis. Although researchers continue to work on improving worm detection accuracy and real-time traffic analysis, a practica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making the gigabit IPsec VPN architecture secure

    Publication Year: 2004, Page(s):54 - 60
    Cited by:  Papers (2)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    By placing the security processors directly in the data path to secure traffic without the aid of additional outside devices or software, the flow-through security device creates a virtual private network that maximizes network processing unit host offload with minimal system integration effort. A virtual private network uses the Internet protocol security (IPsec) framework to provide confidential... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A quantitative study of firewall configuration errors

    Publication Year: 2004, Page(s):62 - 67
    Cited by:  Papers (115)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    The protection that firewalls provide is only as good as the policy they are configured to implement. Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines. Firewalls are the cornerstone of corporate intranet security. Once a company acquires a firewall, a systems administrator must configure and manage it ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Connection

    Publication Year: 2004, Page(s):68 - 70
    Request permission for commercial reuse | PDF file iconPDF (360 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call and Calendar

    Publication Year: 2004, Page(s):71 - 72
    Request permission for commercial reuse | PDF file iconPDF (816 KB)
    Freely Available from IEEE
  • Products

    Publication Year: 2004, Page(s): 73
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf

    Publication Year: 2004, Page(s): 74
    Request permission for commercial reuse | PDF file iconPDF (120 KB) | HTML iconHTML
    Freely Available from IEEE
  • Enhancing personal communications with multimedia

    Publication Year: 2004, Page(s):79 - 81
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Despite recent technical advances in traditional, wireless, and Internet-based communications systems, current technology does not yet efficiently support multimedia features such as real-time streaming video and video-clip swapping. In addition, existing systems do not effectively incorporate the abstractions and emotions that characterize everyday, natural interactions. To address these deficien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A patch in nine saves time?

    Publication Year: 2004, Page(s):82 - 83
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    A fundamental fact in computer and network security is the impossibility of 100 percent assurance that a computer system is trusted. By trusted, we mean that the system always operates as expected by design and policy. For more than 25 years, the security community has focused on technology to solve these problems, yet information systems remain as vulnerable. Given the difficulties of developing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Imperceptible sensory channels

    Publication Year: 2004, Page(s):84 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    System designers can use imperceptible sensory channels to create smarter, safer, and more secure environments. Beyond their diverse applications, imperceptible sensory channels suggest a new approach to the problem of machine perception. In adapting a video camera a device designed to capture human-readable images for use by the PDP-6, Minsky and Papert had to match perceptual algorithms to the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diagnosing attention disorders in a virtual classroom

    Publication Year: 2004, Page(s):87 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    The virtual classroom provides an efficient and scalable tool for conducting attention testing. The University of Southern California integrated media systems center and digital media works have partnered to develop virtual reality technology applications for the study, assessment, and rehabilitation of cognitive and functional processes. This work primarily focuses on the development of systems t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The economics of international conferences

    Publication Year: 2004, Page(s):92, 90 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Ideally, an international conference provides a meeting place where the participants can present and discuss new ideas, research topics, and results. Exposure to state-of-the-art work should help to identify interesting research tracks for today and define new directions for the future. While attendees should get an introduction to high-quality research, conferences should give presenters the oppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com