By Topic

Computer

Issue 9 • Date Sept. 1986

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 1986, Page(s):c1 - c2
    Request permission for commercial reuse | PDF file iconPDF (2508 KB)
    Freely Available from IEEE
  • Advertisement

    Publication Year: 1986, Page(s):1 - nil2
    Request permission for commercial reuse | PDF file iconPDF (7808 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1986, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1983 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1986, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (391 KB)
    Freely Available from IEEE
  • From the president

    Publication Year: 1986, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (1131 KB)
    Freely Available from IEEE
  • Peak vs. Sustained Performance in Highly Concurrent Vector Machines

    Publication Year: 1986, Page(s):11 - 19
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6586 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference on Software Maintenance-1987

    Publication Year: 1986, Page(s): 20
    Request permission for commercial reuse | PDF file iconPDF (1062 KB)
    Freely Available from IEEE
  • A Proposed Standard Format for RSA Cryptosystems

    Publication Year: 1986, Page(s):21 - 34
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3388 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal Databases

    Publication Year: 1986, Page(s):35 - 42
    Cited by:  Papers (60)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2518 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advance Program Computer Society of the IEEE 1986 International Conference on Computer Languages

    Publication Year: 1986, Page(s):43 - 45
    Request permission for commercial reuse | PDF file iconPDF (2920 KB)
    Freely Available from IEEE
  • 1987 IEEE Symposium on Security and Privacy

    Publication Year: 1986, Page(s): 46
    Request permission for commercial reuse | PDF file iconPDF (850 KB)
    Freely Available from IEEE
  • Performance of a Message-Based Multiprocessor

    Publication Year: 1986, Page(s):47 - 55
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9746 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Fifteenth Workshop on Applied Imagery Pattern Recognition

    Publication Year: 1986, Page(s): 56
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • A Complete and Efficient Implementation of Covered Windows

    Publication Year: 1986, Page(s):57 - 67
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4861 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE International Conference On Computer-Aided Design

    Publication Year: 1986, Page(s):68 - 69
    Request permission for commercial reuse | PDF file iconPDF (2043 KB)
    Freely Available from IEEE
  • Imbalance Between Growth and Funding in Academic Computer Science: Two Trends Colliding

    Publication Year: 1986, Page(s):70 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6619 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fall Joint Computer Conference

    Publication Year: 1986, Page(s):77 - 85
    Request permission for commercial reuse | PDF file iconPDF (10697 KB)
    Freely Available from IEEE
  • The Seventeenth International Symposium on Fault-Tolerant Computing

    Publication Year: 1986, Page(s): 86
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • IEEE Computer Society Election

    Publication Year: 1986, Page(s):87 - 94
    Request permission for commercial reuse | PDF file iconPDF (10883 KB)
    Freely Available from IEEE
  • 1987 International Symposium on Multiple-Valued Logic

    Publication Year: 1986, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • New products

    Publication Year: 1986, Page(s):96 - 97
    Request permission for commercial reuse | PDF file iconPDF (456 KB)
    Freely Available from IEEE
  • New Literature

    Publication Year: 1986, Page(s): 97
    Request permission for commercial reuse | PDF file iconPDF (244 KB)
    Freely Available from IEEE
  • Recent Microsystem Announcements

    Publication Year: 1986, Page(s): 98
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Recent IC Announcements

    Publication Year: 1986, Page(s): 99
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Career opportunities

    Publication Year: 1986, Page(s):100 - 102
    Request permission for commercial reuse | PDF file iconPDF (802 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com