By Topic

Computer

Issue 5 • Date May 2006

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (814 KB)
    Freely Available from IEEE
  • Networking with Wiley and the IEEE Computer Society Press [advertisement]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (259 KB)
    Freely Available from IEEE
  • Computer Masthead

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1872 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2006, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (176 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2006, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (328 KB) | HTML iconHTML
    Freely Available from IEEE
  • A winter of hope and a spring of despair [computer technology in politics]

    Publication Year: 2006, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    In examining the role of computers in politics, it is all too easy to focus on the newest and most sophisticated technologies, such as the blogs and Web pages. Yet, in spite of all the claims that computing technology is changing politics and governance, we find that computing technology has been associated with government since the days of Hollerith. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2006, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (55 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1974 and 1990. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommendation technology: will it boost e-commerce?

    Publication Year: 2006, Page(s):13 - 16
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB) | HTML iconHTML

    Recommendation engines are becoming a critical part of many e-commerce sites. The approach uses complex algorithms to analyze large volumes of data and determine what products that potential consumers might want to buy based on their stated preferences, online shopping choices, and the purchases of people with similar tastes or demographics. Recommendation technology must also be able to reach out... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hackers get to the root of the problem

    Publication Year: 2006, Page(s):17 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    One of the greatest threats computer and network users face today is a hacker gaining root-level access to a system. This, in essence, gives the intruder administrative control over the machine and thus a golden opportunity to cause problems. With this in mind, attackers are increasingly using rootkits, a collection of tools they can install on a victim's computer to gain administrative access. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Brief

    Publication Year: 2006, Page(s):20 - 22
    Request permission for commercial reuse | PDF file iconPDF (752 KB) | HTML iconHTML
    Freely Available from IEEE
  • Web services interoperability specifications

    Publication Year: 2006, Page(s):24 - 32
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    A proposed conceptual framework for analyzing Web services interoperability issues provides a context for studying existing standards and specifications and for identifying new opportunities to provide automated support, for this technology. Web services are becoming the technology of choice for realizing service-oriented architectures (SOAs). Web services simplify interoperability and, therefore,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The problem with threads

    Publication Year: 2006, Page(s):33 - 42
    Cited by:  Papers (195)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB) | HTML iconHTML

    For concurrent programming to become mainstream, we must discard threads as a programming model. Nondeterminism should be judiciously and carefully introduced where needed, and it should be explicit in programs. In general-purpose software engineering practice, we have reached a point where one approach to concurrent programming dominates all others namely, threads, sequential processes that share... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2006, Page(s): 43
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Can we make operating systems reliable and secure?

    Publication Year: 2006, Page(s):44 - 51
    Cited by:  Papers (36)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    Microkernels long discarded as unacceptable because of their lower performance compared with monolithic kernels might be making a comeback in operating systems due to their potentially higher reliability, which many researchers now regard as more important than performance. Each of the four different attempts to improve operating system reliability focuses on preventing buggy device drivers from c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Call for Award Nominations

    Publication Year: 2006, Page(s): 52
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • IEEE Computer Society Call for Award Nominations: Technology of the Decade Award

    Publication Year: 2006, Page(s): 53
    Request permission for commercial reuse | PDF file iconPDF (237 KB)
    Freely Available from IEEE
  • Achieving scalability in real-time systems

    Publication Year: 2006, Page(s):54 - 59
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Running real-time applications with a variable-speed processor can result in scheduling anomalies and permanent overloads. A proposed computational model varies task response times continuously with processor speed, enabling the system to predictably scale its performance during voltage changes. Mutually exclusive resources and nonpreemptive code can generate scheduling anomalies in a processor wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Celebrates Two 60-Year Anniversaries

    Publication Year: 2006, Page(s): 60
    Request permission for commercial reuse | PDF file iconPDF (282 KB)
    Freely Available from IEEE
  • Fault evaluation for security-critical communication devices

    Publication Year: 2006, Page(s):61 - 68
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1160 KB) | HTML iconHTML

    Communications devices for government or military applications must keep data secure, even when their electronic components fail. Combining information flow and risk analyses could make fault-mode evaluations for such devices more efficient and cost-effective. Conducting high-grade information security evaluations for computer communications devices is intellectually challenging, time-consuming, c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Announces Summer and Fall Conferences

    Publication Year: 2006, Page(s):69 - 73
    Request permission for commercial reuse | PDF file iconPDF (688 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2006, Page(s):74 - 76
    Request permission for commercial reuse | PDF file iconPDF (476 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2006, Page(s): 77
    Request permission for commercial reuse | PDF file iconPDF (208 KB) | HTML iconHTML
    Freely Available from IEEE
  • Career opportunities

    Publication Year: 2006, Page(s):78 - 82
    Request permission for commercial reuse | PDF file iconPDF (250 KB)
    Freely Available from IEEE
  • Debunking the nerd stereotype with pair programming

    Publication Year: 2006, Page(s):83 - 85
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Our studies show that using pair programming as a structure for incorporating collaboration in the classroom helps increase and broaden participation in computing fields and helps debunk the myth that programmers work alone all the time. It's also a way for students to get a better view of and feel more confident in their preparation for working in the real world. The face of the IT workforce is c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com