By Topic

Computer

Issue 8 • Date Aug. 2004

Filter Results

Displaying Results 1 - 25 of 27
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (753 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (811 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (422 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2004, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (499 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Art of the Possible

    Publication Year: 2004, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    Often, a product prevails because it embodies the best available set of compromises. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Poznan University Team Wins $18,000 at CSIDC 2004

    Publication Year: 2004, Page(s):11 - 15
    Request permission for commercial reuse | PDF file iconPDF (1312 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-micropayments sweat the small stuff

    Publication Year: 2004, Page(s):19 - 22
    Cited by:  Papers (4)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Many people buy books, CDs, clothes, travel, and other products and services over the Internet every day. However, after years of online purchasing, one long-promised aspect of e-commerce has remained largely unfulfilled: electronic micropayments for items that cost $5 or less. There appears to be a growing demand for e-micropayment technologies that enable the purchase of items and services such ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D searching starts to take shape [search engine]

    Publication Year: 2004, Page(s):24 - 26
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    The Internet and corporate data warehouses are full of all types of digital information, from simple text documents to complex applications. One type of information gaining in prominence is the three-dimensional object. From computer-aided design (CAD) drawings of complex engineering parts to digital representations of proteins and complex molecules, an increasing amount of 3D information is makin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Companies develop nanotech RAM chips

    Publication Year: 2004
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Nantero has created NRAM - the "N" stands for both nanotechnology and nonvolatile - a high-density RAM chip that saves its contents when a device is turned off or loses external power. Nantero manufacture its chip with carbon nanotubes, cylindrical structures consisting of hexagonal graphite molecules. Carbon nanotubes are up to 100 times stronger but one-sixth the weight of a steel object the sam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2004, Page(s): 31
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling complex spoken dialog

    Publication Year: 2004, Page(s):32 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    We develop a commercial phone-based SDS (spoken dialog system) that supplies information to employees about their holiday-allowance. Frequently-asked-questions (FAQ) system use of the conceptual dialog language (CDL), a customized language that express patterns specific to the system's dialog model while still providing a clear picture of the dialog model to domain experts and supporting model upd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Overview of Sensor Networks

    Publication Year: 2004, Page(s):41 - 49
    Cited by:  Papers (479)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Wireless sensor networks could advance many scientific pursuits while providing a vehicle for enhancing various forms of productivity, including manufacturing, agriculture, construction, and transportation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environmental sensor networks

    Publication Year: 2004, Page(s):50 - 56
    Cited by:  Papers (109)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    The developments in wireless network technology and miniaturization makes it possible to realistically monitor the natural environment. Within the field of environmental sensor networks, domain knowledge is an essential fourth component. Before designing and installing any system, it is necessary to understand its physical environment and deployment in detail. Sensor networks are designed to trans... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radiation detection with distributed sensor networks

    Publication Year: 2004, Page(s):57 - 59
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (74 KB) | HTML iconHTML

    In any assessment of potential terrorist attacks, the nuclear threat takes center stage. Although weapons-grade nuclear materials arc heavily guarded, a plausible scenario involves terrorists detonating a simple radiological dispersion device (ROD) capable of broadcasting nonfissile but highly radioactive particles over a densely populated area. In most cases, a motor vehicle has to transport the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shooter localization in urban terrain

    Publication Year: 2004, Page(s):60 - 61
    Cited by:  Papers (33)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Detecting and accurately locating snipers has been an elusive goal of the armed forces and law enforcement agencies for a long time. Most successful sniper-detecting systems are based on acoustic measurements. We develop an acoustic system that works well even in complex urban environments. Funded through the Network Embedded Systems Technology program of the US Defense Advanced Research Projects ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WiseNET: an ultralow-power wireless sensor network solution

    Publication Year: 2004, Page(s):62 - 70
    Cited by:  Papers (115)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB) | HTML iconHTML

    A wireless sensor network consists of many energy-autonomous microsensors distributed throughout an area of interest. Each node monitors its local environment, locally processing and storing the collected data so that other nodes can use it. To optimize power consumption, the Swiss Center for Electronics and Microtechnology has developed WiseNET, an ultralow-power platform for the implementation o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The flock: mote sensors sing in undergraduate curriculum

    Publication Year: 2004, Page(s):72 - 78
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB) | HTML iconHTML

    We integrate wireless sensor networks in an undergraduate embedded systems course that exposes students to an important emerging technology in the core of the computer-engineering curriculum. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Connection

    Publication Year: 2004, Page(s):80 - 83
    Request permission for commercial reuse | PDF file iconPDF (776 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call and Calendar

    Publication Year: 2004, Page(s):84 - 85
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2004, Page(s): 88
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • Products

    Publication Year: 2004, Page(s):89 - 90
    Request permission for commercial reuse | PDF file iconPDF (432 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power management in networked devices

    Publication Year: 2004, Page(s):91 - 93
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Networks are one of the most significant developments in computing and a hallmark of modern society. However, along with increasing efficiency and productivity, both at home and in the workplace, networks have costs. One cost is the additional energy that electronic devices consume when attached to networks. Power management, a standard feature of modern PCs, was primarily developed to increase ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Patch on demand" saves even more time? [network security]

    Publication Year: 2004, Page(s):94 - 96
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    Zero-day attacks are those for which users receive no prior warning and thus have no preventive measures in place. We integrate the vulnerability discovery, patch generation, and patch application cycles into a system that automatically detects a new attack, analyzes its modus operandi, determines the best software patch, and applies it at the desired level of granularity LAN, enterprise, or Inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-aware trails [mobile computing]

    Publication Year: 2004, Page(s):97 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    The emergence of converged mobile devices with a wide range of computing, communications, entertainment, and sensing capabilities represents a major step in the evolution of wireless computing. Such devices increasingly shift the decision-making power from the user to the machine, which has the capacity to be better informed about the current environment and can respond more quickly. A trail is a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com