By Topic

Computer

Issue 10 • Date Oct. 2005

Filter Results

Displaying Results 1 - 25 of 27
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (454 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (788 KB)  
    Freely Available from IEEE
  • Masthead

    Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • Article summaries

    Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (48 KB)  
    Freely Available from IEEE
  • 32 & 16 Years Ago

    Page(s): 6 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (49 KB)  

    The more we know about yesterday, the better we will be able to deal with today. Computer offers this column providing excerpts from past issues to serve as a memory jogger for older members and as a perspective creator for newer members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Letters

    Page(s): 8
    Save to Project icon | Request Permissions | PDF file iconPDF (128 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity in Design

    Page(s): 10 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (160 KB)  

    How well you handle your design comes down to how well you handle complexity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building rich web applications with Ajax

    Page(s): 14 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (176 KB)  

    Looks at how developers are going back to the future by building Web applications using Ajax (Asynchronous JavaScript and XML), a set of technologies mostly developed in the 1990s. A key advantage of Ajax applications is that they look and act more like desktop applications. Proponents argue that Ajax applications perform better than traditional Web programs. As an example, Ajax applications can add or retrieve new data for a page it is working with and the page will update immediately without reloading. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical machine translation gains respect

    Page(s): 18 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (192 KB)  

    Relatively few researchers have worked on approaches that compare and analyze documents and their already-available translations to determine statistically, without prior linguistic knowledge, the likely meanings of phrases. These statistical systems use this information to translate new documents. For years, because processors were not fast enough to handle the extensive computation these systems require, many experts considered statistical systems inferior to rule-based systems. However, when the Speech Group of the US National Institute of Standards and Technology's Information Access Division tested 20 machine translation technologies, a statistical system developed by Google finished in first place. The NIST test results' significance is that Google and other organizations will invest more time, money, and talent into researching this approach. Meanwhile, faster processors and other advances are making statistical translation technology more accurate and thus more useful. However, the approach must still clear several hurdles - such as still inadequate accuracy and problems recognizing idioms - before it can be useful for mission-critical tasks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Save to Project icon | Request Permissions | PDF file iconPDF (116 KB)  
    Freely Available from IEEE
  • Computer Society Information

    Page(s): 25
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frontiers of search

    Page(s): 26 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (232 KB)  

    This look at current trends affords the opportunity to study how next-generation Web search engines will impact our future online experience. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spam: it's not just for inboxes anymore

    Page(s): 28 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (144 KB)  

    E-mail spam is a nuisance that every user has come to expect. But Web spammers prey on unsuspecting users and undermine search engines by subverting search results to increase the visibility of their pages. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Web search engines to find and refind information

    Page(s): 36 - 42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (248 KB)  

    To inform the design of next-generation Web search tools, researchers must better understand how users find, manage, and refind online information. Synthesizing results from one of their studies with related work, the authors propose a search engine use model based on prior task frequency and familiarity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent search agents using web-driven natural-language explanatory dialogs

    Page(s): 44 - 52
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (670 KB)  

    A computational linguistics approach for Web-based cooperative dialogs focuses on the user's requests by automatically generating language. driven interactions that take into account the context, user feedback, and the initial search's results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching association networks for nurturers

    Page(s): 54 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (208 KB)  

    Studying the evolution of association networks offers insights that researchers can use to develop new forms of Web information retrieval and improve searches. In addition to finding nurturers, this work can be applied to targeted recommendations, human resource management, and social network analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search on the Semantic Web

    Page(s): 62 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (304 KB)  

    To help human users and software agents find relevant knowledge on the Semantic Web, the Swoogle search engine discovers, indexes, and analyzes the ontologies and facts that are encoded in Semantic Web documents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CPE: a parallel library for financial engineering applications

    Page(s): 70 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (208 KB)  

    The Clustertech parallel environment is an object-oriented C++ library that uses abstractions to simplify parallel programming for financial engineering applications. The message passing interface ensures CPE's portability and performance over a wide range of parallel cluster and symmetric multiprocessing machines. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Awards Top Achievers

    Page(s): 91 - 94
    Save to Project icon | Request Permissions | PDF file iconPDF (1435 KB)  
    Freely Available from IEEE
  • Call and Calendar

    Page(s): 95 - 98
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Products

    Page(s): 99
    Save to Project icon | Request Permissions | PDF file iconPDF (120 KB)  
    Freely Available from IEEE
  • Bookshelf

    Page(s): 100
    Save to Project icon | Request Permissions | PDF file iconPDF (112 KB)  
    Freely Available from IEEE
  • Physical fitness in virtual worlds

    Page(s): 101 - 103
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (216 KB)  

    Academic studies and news reports have suggested that the increasing number of obese youth derive at least partially from television viewing and video game use. In particular, the couch potato hypothesis suggests that watching television and playing video games consume time that could be spent engaging in physical activities. This hypothesis assumes that video gamers pursue their hobby by pressing buttons and moving joysticks while occupying comfortable chairs placed in front of large video screens. An accurate stereotype until recently, this form of gaming is being supplanted by a new generation of games and controllers that entice players to become more physically active. Low-cost cameras and advanced video processing algorithms let video games be controlled by bodily movements, while touch-sensitive floor sensors let players dance in virtual spaces. The article looks briefly at some of these new generation games including: Dance Dance Revolution; and GameBike. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2006 IEEE Computer Society Professional Membership / Subscription Application

    Page(s): 105 - 106
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB)  
    Freely Available from IEEE
  • Can Web services scale up?

    Page(s): 107 - 110
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (328 KB)  

    In the past, only major Internet players such as Amazon, eBay, and Google were interested in deploying large-scale Web services. However, this is changing rapidly as all sorts of companies and governmental organizations are suddenly looking toward Web services as a platform that might support a wide range of demanding applications. This emerging trend presents developers with a new challenge: building Web services solutions that scale. In a nutshell, a scalable system is one that can flexibly accommodate growth in its client base. Such systems typically run on a clustered computer or in a large data center and must be able to handle high loads or sudden demand bursts and a vast number of users. They must reliably respond even in the event of failures or reconfiguration. Ideally, they're self-managed and automate as many routine services such as backups and component upgrades as possible. Many settings also require security against attempted intrusions and distributed denial-of-service (DDoS) attacks. At a glance, today's Web services standards seem to answer these needs. However, a more probing analysis reveals many critical limitations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes highly acclaimed peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ron Vetter
University of North Carolina
Wilmington