Computer

Issue 9 • Sept. 1979

Filter Results

Displaying Results 1 - 25 of 41
  • Computer

    Publication Year: 1979, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1433 KB)
    Freely Available from IEEE
  • "31,000 Student Hours Later, we Still Love Apple Computer."

    Publication Year: 1979, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1504 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1979, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (1070 KB)
    Freely Available from IEEE
  • Special Message

    Publication Year: 1979, Page(s):3 - 5
    Request permission for commercial reuse | PDF file iconPDF (1923 KB)
    Freely Available from IEEE
  • F6800 Series

    Publication Year: 1979, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (1816 KB)
    Freely Available from IEEE
  • Computer Network Protocols: A Hierarchical Viewpoint

    Publication Year: 1979, Page(s):8 - 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4517 KB)

    Progress in network protocol design brings us closer to fully-supported public data networks. These networks will provide message switching and computing services to a national user community. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Another GE Power House...10 Amp Hour Sealed Lead Batteries from General Electric

    Publication Year: 1979, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (1688 KB)
    Freely Available from IEEE
  • Status Report on New Standards for DTE/DCE Interface Protocols

    Publication Year: 1979, Page(s):12 - 19
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10659 KB)

    Activity in a number of organizations and countries is leading to a new generation of interface standards for public data networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Techniques for Protocol Specification and Verification

    Publication Year: 1979, Page(s):20 - 27
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8296 KB)

    Certain formal approaches, such as transition techniques and reachability analysis, show promising results when applied to protocol specification and verification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The QM-1 Emulates Any Computer

    Publication Year: 1979, Page(s): 28
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • The Evolution of Host-to-Host Protocol Technology

    Publication Year: 1979, Page(s):29 - 38
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9000 KB)

    The growth of networking–more and more computers of different makes communicating with each other–will motivate the greater standardization of host-to-host protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Third Annual Symposium on Computer Applications in Medical Care

    Publication Year: 1979, Page(s):39 - 46
    Request permission for commercial reuse | PDF file iconPDF (1630 KB)
    Freely Available from IEEE
  • Resource Sharing Protocols

    Publication Year: 1979, Page(s):47 - 56
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10011 KB)

    This report summarizes recent US and European work on conventions for handling two basic types of remote operations: terminal access to remote hosts and file transfer between hosts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The 1st International Conference on Distributed Computing Systems

    Publication Year: 1979, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (1507 KB)
    Freely Available from IEEE
  • Computer Network Architectures

    Publication Year: 1979, Page(s):58 - 72
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (14891 KB)

    This tutorial analyzes developments in computer network architectures from a top-down design viewpoint—starting with user interface requirements, then developing a structure to realize that interface. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advance Program

    Publication Year: 1979, Page(s):73 - 80
    Request permission for commercial reuse | PDF file iconPDF (7630 KB)
    Freely Available from IEEE
  • Computer Science Conference and SIGCSE Symposium

    Publication Year: 1979, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Special Feature Innovation at Texas Instruments

    Publication Year: 1979, Page(s):82 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9353 KB)

    Perhaps the computer industry's most valuable resource is the creativity of its people. Yet what happens to most innovative ideas? How is creativity managed? How is innovation encouraged? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Siggraph'80 Call For Papers

    Publication Year: 1979, Page(s): 91
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Special Feature the Impact Of Semiconductor Technology on Computer Systems

    Publication Year: 1979, Page(s):92 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3763 KB)

    Semiconductor logic and solid-state memory—the same basic technologies that gave us the calculator revolution—promise to provide the tools for automation in the factory and office. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 1979 International Micro & Mini Computer Conference

    Publication Year: 1979, Page(s): 99
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Special Feature Requirements Anaysis in Clinical Research Information Processing —A Case Study

    Publication Year: 1979, Page(s):100 - 108
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7202 KB)

    System designers often neglect to do a thorough requirements analysis before beginning development. This effort shows how such an analysis can improve the usefulness of a new system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • If you are into Computing you should be in the IEEE Computer Society

    Publication Year: 1979, Page(s):109 - 119
    Request permission for commercial reuse | PDF file iconPDF (8421 KB)
    Freely Available from IEEE
  • Computer Professionals: Can you Afford not to Invest $28 in your Professional Career?

    Publication Year: 1979, Page(s):120 - 121
    Request permission for commercial reuse | PDF file iconPDF (1675 KB)
    Freely Available from IEEE
  • The Open Channel

    Publication Year: 1979, Page(s):122 - 123
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (351 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org