By Topic

Computer

Issue 5 • Date May 2005

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (792 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (831 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2005, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 YEARS AGO

    Publication Year: 2005, Page(s):6 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (50 KB) | HTML iconHTML

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pecking Orders

    Publication Year: 2005, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Why do people seem to naturally want to sort themselves into a pecking order? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chip makers turn to multicore processors

    Publication Year: 2005, Page(s):11 - 13
    Cited by:  Papers (96)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Computer performance has been driven largely by decreasing the size of chips while increasing the number of transistors they contain. In accordance with Moore's law, this has caused chip speeds to rise and prices to drop. This ongoing trend has driven much of the computing industry for years. Manufacturers are building chips with multiple cooler-running, more energy-efficient processing cores inst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will hard drives finally stop shrinking?

    Publication Year: 2005, Page(s):14 - 16
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    There have been explosive growth in the sales of small digital consumer electronic devices such as still and video cameras, TiVo personal video recorders (PVRs), and MP3 players like Apple Computer's iPod. As these devices have gained capabilities, they have needed larger storage capacities in smaller packages, often in the form of hard drives. For handheld and consumer electronic devices, the inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (182 KB) | HTML iconHTML
    Freely Available from IEEE
  • Misleading architecting tradeoffs [DVD hard-disk architecture tradeoff analysis method]

    Publication Year: 2005, Page(s):20 - 26
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    A DVD hard-disk recorder case study shows how system architects can fall prey to ill-founded qualitative reasoning, which can lead them to favor unsupported tradeoffs that are based on incorrect assumptions. A tradeoff assumes that an improvement in one dimension negatively affects others. Sound, valid tradeoffs do exist, but not every decision calls for one. A bold improvement in one dimension ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2005, Page(s): 27
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Resource Virtualization Renaissance

    Publication Year: 2005, Page(s):28 - 31
    Cited by:  Papers (47)  |  Patents (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Virtualization technologies encompass a variety of mechanisms and techniques used to address computer system problems such as security, performance, and reliability by decoupling the architecture and user-perceived behavior of hardware and software resources from their physical implementation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The architecture of virtual machines

    Publication Year: 2005, Page(s):32 - 38
    Cited by:  Papers (152)  |  Patents (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1440 KB) | HTML iconHTML

    A virtual machine can support individual processes or a complete system depending on the abstraction level where virtualization occurs. Some VMs support flexible hardware usage and software isolation, while others translate from one instruction set to another. Virtualizing a system or component -such as a processor, memory, or an I/O device - at a given abstraction level maps its interface and vis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual machine monitors: current technology and future trends

    Publication Year: 2005, Page(s):39 - 47
    Cited by:  Papers (213)  |  Patents (59)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Developed more than 30 years ago to address mainframe computing problems, virtual machine monitors have resurfaced on commodity platforms, offering novel solutions to challenges in security, reliability, and administration. Stanford University researchers began to look at the potential of virtual machines to overcome difficulties that hardware and operating system limitations imposed: This time th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intel virtualization technology

    Publication Year: 2005, Page(s):48 - 56
    Cited by:  Papers (163)  |  Patents (65)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    A virtualized system includes a new layer of software, the virtual machine monitor. The VMM's principal role is to arbitrate accesses to the underlying physical host platform's resources so that multiple operating systems (which are guests of the VMM) can share them. The VMM presents to each guest OS a set of virtual platform interfaces that constitute a virtual machine (VM). Once confined to spec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rethinking the design of virtual machine monitors

    Publication Year: 2005, Page(s):57 - 62
    Cited by:  Papers (7)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    A virtual machine monitor is a software system that partitions a single physical machine into multiple virtual machines. Traditionally, VMMs have created a precise replica of the underlying physical machine. Through faithful emulation, VMMs support the execution of legacy guest operating systems such as Windows or Linux without modifications. However, traditional VMMs suffer from poor scalability ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual distributed environments in a shared infrastructure

    Publication Year: 2005, Page(s):63 - 69
    Cited by:  Papers (53)  |  Patents (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    We have developed a middleware system that integrates and extends virtual machine and virtual network technologies to support mutually isolated virtual distributed environments in shared infrastructures like the grid and the PlanetLab overlay infrastructure. Integrating virtual network and on-demand virtual machine creation and customization technologies makes virtual distributed environments a re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Connection

    Publication Year: 2005, Page(s):74 - 78
    Request permission for commercial reuse | PDF file iconPDF (216 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call and Calendar

    Publication Year: 2005, Page(s):79 - 82
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Products

    Publication Year: 2005, Page(s):83 - 84
    Request permission for commercial reuse | PDF file iconPDF (248 KB) | HTML iconHTML
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2005, Page(s): 85
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • Beyond the relational database model

    Publication Year: 2005, Page(s):89 - 90
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (85 KB) | HTML iconHTML

    The relational model is a set-theoretic model for describing data constructs common in the business environment. Relational databases also minimize data duplication, which ensures data integrity and reduces storage requirements. Further, the relational model provides a way to represent variable-length constructs with fixed-length components. In addition, normalization theory is the basis of hundre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An open question to developers of numerical software

    Publication Year: 2005, Page(s):91 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    IEEE 754 a standard for binary floating-point arithmetic has revolutionized the portability and reliability of programs that use binary floating-point arithmetic. Floating point is almost universally implemented with special-purpose hardware that tucks into a small corner of the CPU chip and runs in the hundreds of Mflops to Gflops range. Single-stepping through today's floating-point software to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The virtual test lab

    Publication Year: 2005, Page(s):95 - 97
    Cited by:  Papers (3)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Systems companies today face increasingly complex and expensive testing challenges that require innovative solutions. One approach to address the problem uses full-system simulation with virtual hardware early on and throughout the development process. Recent technological advances in virtualization now satisfy the demands of software development, enabling the construction of a software model of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revitalizing Computing Science Education

    Publication Year: 2005, Page(s):100 - 99
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    CS departments must fight shrinking enrollments by making their offerings more attractive. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com