Computer

Issue 10 • Oct. 2004

Filter Results

Displaying Results 1 - 25 of 26
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1305 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (595 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (46 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2004, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (112 KB) | HTML iconHTML
    Freely Available from IEEE
  • Trusting a Chaotic Future

    Publication Year: 2004, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    If dangerous technologies were an ethical problem several years ago, they're an even bigger one now. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Report to Members

    Publication Year: 2004, Page(s):15 - 19
    Request permission for commercial reuse | PDF file iconPDF (1240 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will gesture recognition technology point the way?

    Publication Year: 2004, Page(s):20 - 23
    Cited by:  Papers (4)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    When playing most video games, speed is of the essence. Manipulating a joystick, mouse, or other input device slows a player's reaction time. Players prefer to control game activities by movements or gestures. Gesture-recognition systems identify human gestures and use them to convey information such as input data or to control devices and applications such as computers, games, PDAs, browsers, cel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The lowdown on high-rise chips

    Publication Year: 2004, Page(s):24 - 27
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    As today's silicon technology reaches its technical limits in many areas, developers are looking for new ways to design better chips. Typically, they look for ways to make chips faster, more energy efficient, and cost-effective, while still using current fabrication techniques and materials. In light of this, companies are working on high-rise, multilayer chips. Instead of laying out the vast majo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New chips stop buffer overflow attacks

    Publication Year: 2004
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Chip makers are designing a new generation of microprocessors to stop buffer overflow assaults, exploits that hackers often use to attack and extract data from PCs or servers. AMD's Athlon-64 chips for notebook and desktop computers and its Opteron processors for servers include features that provide buffer-overflow protection. Intel offers buffer-overflow protection in its Itanium chips for serve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fighting Internet auction fraud: an assessment and proposal

    Publication Year: 2004, Page(s):31 - 37
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Online auctions constitute one of the most successful Internet business models. However, auction fraud has become far and away the largest component of all Internet fraud, posing a threat to the model's future. Traditional government organizations such as the Federal Trade Commission and the Secret Service in the US, as well as new agencies such as Internet Fraud Watch and the Internet Fraud Compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spam and the social-technical gap

    Publication Year: 2004, Page(s):38 - 45
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    The runaway increase in spam cannot be stemmed by technical change alone. Spam currently constitutes up to 30 percent of all in-box messages. In these spam wars, as filters become more intelligent so do spammers' countermeasures. The continued growth of spam suggests the need for a new approach. Although most see spam as a personal problem, we suggest it is a social problem that needs a social res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rainbow: architecture-based self-adaptation with reusable infrastructure

    Publication Year: 2004, Page(s):46 - 54
    Cited by:  Papers (387)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    While attractive in principle, architecture-based self-adaptation raises a number of research and engineering challenges. First, the ability to handle a wide variety of systems must be addressed. Second, the need to reduce costs in adding external control to a system must be addressed. Our rainbow framework attempts to address both problems. By adopting an architecture-based approach, it provides ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using UML-based rate monotonic analysis to predict schedulability

    Publication Year: 2004, Page(s):56 - 63
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Timeliness is essential in real-time systems, in which a late response is sometimes worse than no response at all because the violation of a single deadline could lead to loss of life or property. System analysts use an appropriate scheduling algorithm to ensure the predictability of such a system. The Object Management Group's adoption of the UML profile for schedulability, performance, and timel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meaningful modeling: what's the semantics of "semantics"?

    Publication Year: 2004, Page(s):64 - 72
    Cited by:  Papers (126)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    The Unified Modeling Language (UML) is a complex collection of mostly diagrammatic notations for software modeling, and its standardization has prompted an animated discussion about UML's semantics and how to represent it. We have thus set out to clarify some of the notions involved in defining modeling languages, with an eye toward the particular difficulties arising in defining UML. We are prima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ActiveCampus: experiments in community-oriented ubiquitous computing

    Publication Year: 2004, Page(s):73 - 81
    Cited by:  Papers (68)  |  Patents (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    The continuing proliferation of handheld computing devices offers a new platform for mobile computing applications that could enrich our experience of the world around us. Yet many questions about realizing this vision remain open. We have been investigating these questions at the University of California, San Diego, through the ActiveCampus Project. ActiveCampus explores technologies that can enr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Connection

    Publication Year: 2004, Page(s):82 - 85
    Request permission for commercial reuse | PDF file iconPDF (240 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call and Calendar

    Publication Year: 2004, Page(s):86 - 88
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Computer Society Information

    Publication Year: 2004, Page(s): 90
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf

    Publication Year: 2004, Page(s): 104
    Request permission for commercial reuse | PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • Products

    Publication Year: 2004, Page(s): 105
    Request permission for commercial reuse | PDF file iconPDF (208 KB) | HTML iconHTML
    Freely Available from IEEE
  • Magic boxes and boots: security in hardware

    Publication Year: 2004, Page(s):106 - 109
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    Computer users tend to think of computation - even the globally distributed computation that constitutes the Internet - in terms of what we see: the browser user interface, the text editor, the Gnome or OS X or Windows desktop. Similarly, we tend to think of computer security problems solely in terms of what users see: the application software, perhaps the OS underneath it, or perhaps even the "en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-centered location awareness

    Publication Year: 2004, Page(s):110 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Mobile computing and communication devices now provide access to information from nearly anywhere, and many of these devices know where they are. Much current research focuses on using location awareness to provide information about a user's surroundings. We believe that geographic information can be personalized based on its relevance to the user, with appropriate descriptions or granularity to d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Panda3D graphics engine

    Publication Year: 2004, Page(s):112 - 114
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Disney's VR Studio developed Panda3D, a graphics engine and programming environment, to be flexible enough to support everything from real-time graphics applications to the development of high-end virtual reality theme park attractions or video games. The acronym itself lists Panda's primary features as platform-agnostic, networked, display architecture. As a result of its powerful and flexible de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A taxonomy of network computing systems

    Publication Year: 2004, Page(s):115 - 119
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Rapid advances in networking and microprocessor technologies have led to the emergence of Internet-wide distributed computing systems ranging from simple LAN-based clusters to planetary-scale networks. As these network computing systems evolve by combining the best features of existing systems, differences among NCs are blurring. To address this problem, researchers have proposed formal taxonomies... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org