By Topic

IEEE Potentials

Issue 2 • Date April-May 2005

 This issue contains several parts.Go to:  Part Supplement 

Filter Results

Displaying Results 1 - 24 of 24
  • The way ahead [regarding the magazine, IEEE Potentials]

    Publication Year: 2005, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supercomputers and their effect on molecular dynamics

    Publication Year: 2005, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB) | HTML iconHTML

    The latest advances in supercomputing have given us the possibility to perform 70 trillion floating point operations per second, i.e., teraflops. IBM's Blue Gene/L (BG/L) prototype supercomputer is approximately one fiftieth the size and consumes one-fourteenth the power of the Earth Simulator in delivering the same floating-point operations. A field that could greatly benefit from the supercomput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving data quality: eliminating dupes & I-D-ing those spurious links

    Publication Year: 2005, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    Dirty data arise as a result of abbreviations, data entry mistakes, duplicate records, missing fields and so forth. This problem is aggravated when multiple data sources need to be integrated. Data cleaning refers to a series of processes employed to deal with detecting and removing errors and inconsistencies from data. Given the "garbage in, garbage out" principle, clean data is crucial for datab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • StoryGrid [educational computing]

    Publication Year: 2005, Page(s):42 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1596 KB) | HTML iconHTML

    The StoryGrid project undertook studying the role new interface technologies might play in education, particularly at the high school level. Unfortunately, technology often seizes center stage in high school classrooms; i.e., it becomes the topic of instruction. We believe that learning about technology would be most successful when technology is not the topic, but simply a tool used during instru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On science, politics and simulations

    Publication Year: 2005, Page(s):6 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    We live in politically stoked times. From questionable elections to political violence to social problems such as unemployment, there is little chance for anybody not to be concerned about some political topic. However, often, the "solutions" to these problems seem to make matters worse. From a scientist or an engineer's point of view, we may run the risk of being laughed at by some experts and ig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiagent-based security for the wireless LAN

    Publication Year: 2005, Page(s):19 - 22
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (437 KB) | HTML iconHTML

    Wireless local area networks (WLANs) are being deployed in enterprises all over the world. Enterprises recognize the value of wireless networks and arc using this technology to increase workforce productivity and improve customer service. However, WLANs are plagued with security and management vulnerabilities (insertion attacks, interception and monitoring wireless traffic, misconfiguration, jammi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-based storage: pushing more functionality into storage

    Publication Year: 2005, Page(s):31 - 34
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Storage technology has enjoyed considerable growth since the first disk drive was introduced. The stability of these interfaces has allowed for continual advances within both the storage devices and applications, without frequent changes to the standards. Ultimately, however, the interface determines the functionality supported by the devices, and current interfaces are now holding system designer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaos and its computing paradigm

    Publication Year: 2005, Page(s):13 - 15
    Cited by:  Papers (17)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    Recently, there has been interest in so-called alternative computing paradigms that differ from traditional silicon-based computing architectures. One such alternative is chaos computing which exploits the inherent dynamics of chaotic systems. Chaos has three defining characteristics: (i) sensitivity to initial conditions, (ii) aperiodic long-term behavior, (iii) wholly deterministic. Since resear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive anatomy online

    Publication Year: 2005, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1510 KB) | HTML iconHTML

    The scientific community and general public can best take advantage of the benefits of 3D digital reconstructions if they are stored in a Web-accessible, easy-to-access database. We describe MorphologyNet© a Web-based digital library of realistic, 3D interactive and customizable images of anatomy currently in development at the University of Missouri-Rolla. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The conference low-down

    Publication Year: 2005, Page(s):45 - 46
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The agent hell: a scenario of worst-practices in agent-based software engineering

    Publication Year: 2005, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2098 KB) | HTML iconHTML

    Notable advances in miniaturization, communications, artificial intelligence and agent-based computing enable us to imagine a world pervasive with technology. Everything - our cities, our homes, our clothes - will be augmented with a multitude of inter-connected computer-based systems. Each system hosting one or more software agents devoted to monitoring the surrounding world and delegated to auto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing countries and ICTs

    Publication Year: 2005
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (61 KB) | HTML iconHTML

    The rapid advance of Information and Communication Technology (ICT) makes young people the most qualified to propagate it. ICT is also known as telematics (or info-communications). Telematics is a specialized field of engineering that has developed in part from computer science and in part from electronics, particularly telecommunications. ICT has been growing in importance around the world thanks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A radix-4 scalable design

    Publication Year: 2005, Page(s):16 - 18
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Modular arithmetic operations are very important in cryptography. Modular multiplication is the most common arithmetic operation used in many cryptographic algorithms such as the Elliptic Curve Cryptography and the Diffie-Helman key exchange. The Montgomery Modular Multiplication algorithm (MM) has permitted cryptographic algorithms to speed up considerably. Multiplication is implemented by a seri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2005 Student Activities Committee e-mail addresses

    Publication Year: 2005, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating how well agent-based IDS perform

    Publication Year: 2005, Page(s):27 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Intelligent agents - as a modern artificial intelligence concept - are now widely deployed in various software systems. The agent can be defined as a software entity which functions continuously and autonomously in a particular environment, able to carry out activities in a flexible and intelligent manner that is responsive to changes in the environment, and able to learn from its experience. An i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Potentials - April/May 2005

    Publication Year: 2005, Page(s): 0_1
    Request permission for commercial reuse | PDF file iconPDF (1099 KB)
    Freely Available from IEEE
  • Now you can...Xplore - IEEE

    Publication Year: 2005, Page(s): 02
    Request permission for commercial reuse | PDF file iconPDF (714 KB)
    Freely Available from IEEE
  • Table of contents - Vol 24 No 2

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • IEEE Potential's Staff List

    Publication Year: 2005, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Editorial [Tsunami]

    Publication Year: 2005, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Freely Available from IEEE
  • Finding your dream job - IEEE

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (283 KB)
    Freely Available from IEEE
  • Gamesman problems / Gamesman solutions

    Publication Year: 2005, Page(s):48 - 47
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • GOLD - Graduates of the Last Decade - IEEE online

    Publication Year: 2005, Page(s): 03
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Renew your IEEE membership for 2005

    Publication Year: 2005, Page(s): 04
    Request permission for commercial reuse | PDF file iconPDF (746 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com