By Topic

Computer

Issue 4 • Date April 2005

Filter Results

Displaying Results 1 - 23 of 23
  • Table of Contents

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (664 KB)
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2005, Page(s):24 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    Proposed Standard Promises to Enhance Network OperationsThe proposed application service resiliency standard would help telecommunications carriers maintain service continuity for high-priority applications regardless of network failures.Casinos Bet on RFID TechnologyTo improve marketing and stem fraud, casinos around the world are beginning to put radio-frequency identification (RFID) technology ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling network services using programmable network devices

    Publication Year: 2005, Page(s):52 - 60
    Cited by:  Papers (2)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    The NEon system offers an integrated approach to architecting, operating, and managing network services. NEon uses policy rules defining the operation of individual network services and produces a unified set of rules that generic packet-processing engines enforce. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Connection

    Publication Year: 2005, Page(s):76 - 78
    Request permission for commercial reuse | PDF file iconPDF (1704 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Article Summaries

    Publication Year: 2005, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 YEARS AGO

    Publication Year: 2005, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB) | HTML iconHTML

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Point of Highest Leverage

    Publication Year: 2005, Page(s):12 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Whole-project thinking is surprisingly effective, but it's also surprising how few engineers take the initiative to occasionally step outside their box to see if the overall project picture looks right. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will binary XML speed network traffic?

    Publication Year: 2005, Page(s):16 - 18
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    XML has become integral to many critical enterprise technologies because of its ability to enable data interoperability between applications on different platforms. XML use is thus increasing rapidly. XML is so important that the industry is looking for ways to make its data load more manageable. XML currently uses only a plain-text format. The World Wide Web Consortium (W3C), which oversees and m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile phones: the next frontier for hackers?

    Publication Year: 2005, Page(s):20 - 23
    Cited by:  Papers (29)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Security experts are finding a growing number of viruses, worms, and Trojan horses that target cellular phones. Security researchers' attack simulations have shown that before long, hackers could infect mobile phones with malicious software that deletes personal data or runs up a victim's phone bill by making toll calls. The attacks could also degrade or overload mobile networks, eventually causin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Future interconnection environment

    Publication Year: 2005, Page(s):27 - 33
    Cited by:  Papers (51)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    The emergence of the Web provided an unprecedented AI research and application platform. By providing access to human-readable content stored in any computer connected to the Internet, it revolutionized business, scientific research, government, and public information services around the globe. Networks pervade nature, society, and virtual worlds, giving structure and function to a variety of reso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overcoming the Internet impasse through virtualization

    Publication Year: 2005, Page(s):34 - 41
    Cited by:  Papers (315)  |  Patents (59)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    The Internet architecture has proven its worth by the vast array of applications it now supports and the wide variety of network technologies over which it currently runs. Most current Internet research involves either empirical measurement studies or incremental modifications that can be deployed without major architectural changes. Easy access to virtual testbeds could foster a renaissance in ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Emerging grid standards

    Publication Year: 2005, Page(s):43 - 50
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    The Grid can be seen as a framework for "flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources." It allows researchers in different administrative domains to use multiple resources for problem solving and provides an infrastructure for developing larger and more complex applications potentially faster than with existing systems. Indivi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging social networks to fight spam

    Publication Year: 2005, Page(s):61 - 68
    Cited by:  Papers (68)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Social networks are useful for judging the trustworthiness of outsiders. An automated antispam tool exploits the properties of social networks to distinguish between unsolicited commercial e-mail - spam - and messages associated with people the user knows. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf

    Publication Year: 2005, Page(s): 71
    Request permission for commercial reuse | PDF file iconPDF (144 KB) | HTML iconHTML
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2005, Page(s):72 - 74
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Products

    Publication Year: 2005, Page(s): 75
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Game engine virtual reality with CaveUT

    Publication Year: 2005, Page(s):79 - 82
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    CaveUT, an open source freeware project, uses game technology to make projection-based virtual reality affordable and accessible. The CaveUT works well for low-cost displays and supports real-time spatial tracking and stereographic imaging. Computer games with the most advanced simulation and graphics usually employ a game engine, a commercially available software package that handles basic functi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2005, Page(s): 83
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social-mobile applications

    Publication Year: 2005, Page(s):84 - 85
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Mobile communications devices and applications are primarily designed to increase efficiency and productivity for professionals on the go. However, users invariably appropriate such technology to meet their social needs as well. For many people, particularly younger users, BlackBerry devices, Hiptops, and other handhelds primarily have a social function. A few small companies are beginning to expl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In Defense of Spam

    Publication Year: 2005, Page(s):88 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Legislators' well-meaning attempts to eradicate spam are woefully misdirected. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Masthead

    Publication Year: 2005, Page(s): 2
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Letters

    Publication Year: 2005, Page(s):8 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (666 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com