Computer

Issue 7 • July 2004

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (464 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (415 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2004, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (98 KB) | HTML iconHTML
    Freely Available from IEEE
  • Travel Stories

    Publication Year: 2004, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Engineering is the name they give to the act of constantly being transported from one geographic location to another. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2004, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (83 KB) | HTML iconHTML

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this bimonthly column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open source databases move into the marketplace

    Publication Year: 2004, Page(s):13 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    A growing number of small and midsize organizations are using databases for relatively simple functions not requiring the complex, expensive software that vendors typically sell to large companies and government agencies. The smaller organizations are thus increasingly turning to open source databases, which tend to cost less than their proprietary counterparts, such as those sold by IBM, Microsof... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2004, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is MIMO the future of wireless communications?

    Publication Year: 2004, Page(s):20 - 22
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Wireless-system designers are faced with numerous challenges, including limited availability of radio-frequency spectrum and transmission problems caused by such factors as fading and multipath distortion. Meanwhile, there is increasing demand for higher data rates, better-quality service, fewer dropped calls, and higher network capacity. Meeting these needs requires new techniques that improve sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The new dope on semiconductor doping

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    A University of California, Berkeley, researcher has developed a way to apply semiconductor dopants at the atomic level. Controlling the amount of dopant applied is increasingly important as the size of wires, diodes, transistors, switches, and other semiconductor elements approaches molecular scale. During semiconductor fabrication, manufacturers typically add dopants to semiconductor materials, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Who is liable for insecure systems?

    Publication Year: 2004, Page(s):27 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    A survey of security-related liability issues shows that as data crime increases and the costs of hacking and other malicious behavior soar, vendors must make their software more secure or suffer market and legal consequences. The notion of liability for insecure computer systems has shifted. We have seen both the enactment of legislation affecting liability and the appearance of actual liability ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in high-speed Internet security

    Publication Year: 2004, Page(s):36 - 42
    Cited by:  Papers (11)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB) | HTML iconHTML

    With global Internet access, people and organizations can share information instantly. Unfortunately, such access also leaves the Internet vulnerable to malicious actions that can cripple computers, businesses, governments, and lives on a scale never before possible. Hackers, worms, and viruses can unleash attacks with electronic as well as physical, economic, and safety ramifications. Over the pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling to the end of silicon with EDGE architectures

    Publication Year: 2004, Page(s):44 - 55
    Cited by:  Papers (133)  |  Patents (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Microprocessor designs are on the verge of a post-RISC era in which companies must introduce new ISAs to address the challenges that modern CMOS technologies pose while also exploiting the massive levels of integration now possible. To meet these challenges, we have developed a new class of ISAs, called explicit data graph execution (EDGE), that will match the characteristics of semiconductor tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Composing adaptive software

    Publication Year: 2004, Page(s):56 - 64
    Cited by:  Papers (222)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Interest in adaptive computing systems has increased dramatically in the past few years, and a variety of techniques now allow software to adapt dynamically to its environment. Compositional adaptation enables software to modify its structure and behavior dynamically in response to change in its execution environment. A review of current technology compares how, when, and where recomposition occur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seamless mobile computing on fixed infrastructure

    Publication Year: 2004, Page(s):65 - 72
    Cited by:  Papers (14)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    The term mobile computing typically evokes images of a laptop, handheld, or wearable computer. However, the plummeting cost of hardware suggests that pervasive computing infrastructure could minimize the need to carry such devices in the near future. Personal computing will be available anywhere on demand, like light at the flip of a switch. Only when a user starts to use a computer will it acquir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy-based dynamic reconfiguration of mobile-code applications

    Publication Year: 2004, Page(s):73 - 80
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Global wireless networks have opened the way to a ubiquitous Internet computing environment in which a variety of portable devices remain connected to the Internet fabric - even as their locations change continuously - and access to data and services is independent of both device type and location. In this environment, applications must be able to change the location of their execution. In additio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call and Calendar

    Publication Year: 2004, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2004, Page(s): 82
    Request permission for commercial reuse | PDF file iconPDF (112 KB) | HTML iconHTML
    Freely Available from IEEE
  • Products

    Publication Year: 2004, Page(s): 83
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer Society Connection

    Publication Year: 2004, Page(s):84 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    The Fifth Annual Computer Society International Design Competition features the work of teams from all areas of the world, including Brazil, Nepal, South Africa, and the US. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A critical look at open source

    Publication Year: 2004, Page(s):92 - 94
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    In recent years, open source software - more properly, free and open source software - has emerged as one popular solution to the so-called "software crisis". Advocates regard F/OSS as an agile, practice-led initiative that addresses three key issues namely cost, time scale and quality. F/OSS products are usually freely available for public download. The collaborative, parallel efforts of globally... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded system security

    Publication Year: 2004, Page(s):95 - 97
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    From cars to cell phones, video equipment to MP3 players, and dishwashers to home thermostats - embedded computers increasingly permeate our lives. But security for these systems is an open question and could prove a more difficult long-term problem than security does today for desktop and enterprise computing. Security issues are nothing new for embedded systems. However, as more embedded systems... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In defense of PowerPoint

    Publication Year: 2004, Page(s):100, 98 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Some minor computing issues become major when repeatedly made public. The denigration of PowerPoint is such an issue, one that, like influenza, seems to come in seasonal waves. PowerPoint is no more responsible for bad presentations. Computing professionals who blame their machinery for their failures set a bad example for computer users already prone to using the computer as a scapegoat. Professi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org