By Topic

Computer

Issue 7 • Date July 2006

Filter Results

Displaying Results 1 - 25 of 29
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (657 KB)
    Freely Available from IEEE
  • Computer Masthead

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1485 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2006, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (245 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2006, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (629 KB) | HTML iconHTML
    Freely Available from IEEE
  • Across the great divide [global trading system]

    Publication Year: 2006, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (725 KB) | HTML iconHTML

    Some 30 or 40 years ago, when computers were becoming established in business and government, these new machines drew complaints from people who disliked the standardization that they imposed. Global trade has indeed destroyed local industries but, at the same time, it has generally given the world a higher standard of living. Like the computer age, the era of global trade has come with a new sens... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2006, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (62 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1974 and 1990. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UWB standardization effort ends in controversy

    Publication Year: 2006, Page(s):13 - 16
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4708 KB) | HTML iconHTML

    Ultrawideband technology has been regarded with considerable promise for several years. Vendors want to use the short-range, high-speed wireless UWB for many potentially popular applications, such as home networks, connectivity between PCs and peripherals or monitors, and the transfer of large files between devices. Currently, though, the lack of a unified standard has hurt UWB adoption. There are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How secure is RFID?

    Publication Year: 2006, Page(s):17 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB) | HTML iconHTML

    Radio frequency identification technology is surging in popularity and finding use in a growing number of applications. Despite RFID's growing profile, some researchers worry that potential security problems could cloud the technology's future, particularly as it is used for more critical purposes. There are concerns that hackers could tamper with or steal RFID data, such as product prices or pati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2006, Page(s):20 - 22
    Request permission for commercial reuse | PDF file iconPDF (1095 KB) | HTML iconHTML
    Freely Available from IEEE
  • Componentization: the Visitor example

    Publication Year: 2006, Page(s):23 - 30
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1066 KB) | HTML iconHTML

    Patterns provide a vocabulary and catalog for common design solutions but are not reusable software. Through advanced object-oriented language mechanisms it is possible to simplify the application developer's job by turning certain patterns into fully reusable solutions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three public enemies: cut, copy, and paste

    Publication Year: 2006, Page(s):31 - 35
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (962 KB) | HTML iconHTML

    Many software developers know the feeling of desperately debugging a program only to discover after a sleepless night that the error stemmed from copy-pasted code segments that had become inconsistent in subsequent editing. The problems arising from copied code are not new, and many researchers have investigated how to automatically find copied code segments. Given the extensive use of copy-paste ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Production Pulling Knowledge Work to China? A study of the Notebook PC Industry

    Publication Year: 2006, Page(s):36 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    China is now the world's largest computer hardware producer and, as a study of notebook PC companies reveals, is beginning to pull knowledge work along with production to its key manufacturing centers. This trend has major implications for employment and competition in large-scale industries both in the US and abroad View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can Indian software firms compete with the global giants?

    Publication Year: 2006, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    The Indian IT services industry faces dramatic changes, challenges, and constraints as it uses the global delivery model to transform itself into a knowledge leader competing with established global giants View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the credibility of manet simulations

    Publication Year: 2006, Page(s):48 - 54
    Cited by:  Papers (49)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (615 KB) | HTML iconHTML

    Simulation is useful for evaluating protocol performance and operation. However, the lack of rigor with which it's applied threatens the credibility of the published research within the manet research community. Mobile ad hoc networks (manets) allow rapid deployment because they don't depend on a fixed infrastructure. Manet nodes can participate as the source, the destination, or an intermediate r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless sensor networks for emergency navigation

    Publication Year: 2006, Page(s):55 - 62
    Cited by:  Papers (66)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1095 KB) | HTML iconHTML

    In an emergency, wireless network sensors combined with a navigation algorithm could help safely guide people to a building exit while helping them avoid hazardous areas. We propose a distributed navigation algorithm for emergency situations. At normal time, sensors monitor the environment. When the sensors detect emergency events, our protocol quickly separates hazardous areas from safe areas, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2006, Page(s): 63
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • IEEE Computer Society Membership [advertisement]

    Publication Year: 2006, Page(s): 64
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • 2006 IEEE Computer Society Professional Membership / Subscription Application

    Publication Year: 2006, Page(s):65 - 66
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Computer Society Honors Oklahoma Teen at Intel Science Fair

    Publication Year: 2006, Page(s):67 - 70
    Request permission for commercial reuse | PDF file iconPDF (968 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2006, Page(s):71 - 74
    Request permission for commercial reuse | PDF file iconPDF (479 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2006, Page(s): 75
    Request permission for commercial reuse | PDF file iconPDF (232 KB) | HTML iconHTML
    Freely Available from IEEE
  • Career opportunities

    Publication Year: 2006, Page(s):76 - 80
    Request permission for commercial reuse | PDF file iconPDF (156 KB)
    Freely Available from IEEE
  • Products

    Publication Year: 2006, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (360 KB) | HTML iconHTML
    Freely Available from IEEE
  • Globalization and the future of standardization

    Publication Year: 2006, Page(s):82 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1022 KB) | HTML iconHTML

    As with all other businesses, the Internet and globalization are transforming standards. Intellectual property rights and the shifting business models of not-for-profit organizations are also affecting standardization. Here, the author focus on globalization as it might affect the future of standards View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com