Computer

Issue 2 • Feb. 2007

Filter Results

Displaying Results 1 - 25 of 39
  • [Front cover]

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1487 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2007, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (773 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (516 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (15698 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2007, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Masthead

    Publication Year: 2007, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Dirty electricity

    Publication Year: 2007, Page(s):6 - 8
    Request permission for commercial reuse | PDF file iconPDF (159 KB) | HTML iconHTML
    Freely Available from IEEE
  • 60th Anniversary Award

    Publication Year: 2007, Page(s): 9
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE
  • 32 & 16 Years Ago

    Publication Year: 2007, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (59 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1975 and 1991. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developers shift to dynamic programming languages

    Publication Year: 2007, Page(s):12 - 15
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    Software developers are always looking for ways to boost their effectiveness and productivity and perform complex jobs more quickly and easily, particularly as projects have become increasingly large and complex. Programmers want to shed unneeded complexity and outdated methodologies and move to approaches that focus on making programming simpler and faster. With this in mind, many developers are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Powering Down the Computing Infrastructure

    Publication Year: 2007, Page(s):16 - 19
    Cited by:  Papers (8)
    Request permission for commercial reuse | PDF file iconPDF (540 KB) | HTML iconHTML
    Freely Available from IEEE
  • News briefs

    Publication Year: 2007, Page(s):20 - 22
    Request permission for commercial reuse | PDF file iconPDF (556 KB) | HTML iconHTML
    Freely Available from IEEE
  • HOT Chips 19: Call for Papers

    Publication Year: 2007, Page(s): 23
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Challenges in securing networked J2ME applications

    Publication Year: 2007, Page(s):24 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (633 KB) | HTML iconHTML

    An increasing number of smart phones support Java 2, Micro Edition. Mobile application developers must deal with J2ME's inherent security weaknesses as well as bugs in implementations on real devices. The new Security and Trust Services API for J2ME addresses some of these challenges, although it too has shortcomings View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing E-Mail Overload: Solutions and Future Challenges

    Publication Year: 2007, Page(s):31 - 36
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1963 KB) | HTML iconHTML

    Effective e-mail management tools must treat messages as useful information, not simply as data congesting the network, the hard disk, or a user's inbox. Solutions that economize on scarce cognitive resources at the expense of the relatively cheap additional CPU power, disk capacity, or network bandwidth will ultimately prevail over those that pursue the opposite strategy. With proper application ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VIS 07: Call for Participation

    Publication Year: 2007, Page(s): 37
    Request permission for commercial reuse | PDF file iconPDF (399 KB)
    Freely Available from IEEE
  • Cryptography on a Speck of Dust

    Publication Year: 2007, Page(s):38 - 44
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    As tiny wireless sensors and RFID tags become ubiquitous, they impact privacy, trust, and control. Protecting data on these devices requires new algorithms suitable for ultralow-power implementations. This paper presents a survey of cryptographic algorithms. It also discusses the design recommendations for new algorithms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust Management in Distributed Systems

    Publication Year: 2007, Page(s):45 - 53
    Cited by:  Papers (83)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1982 KB) | HTML iconHTML

    Distributed systems such as the Internet, peer-to-peer networks, and mobile ad hoc networks involve numerous entities, many of which haven't previously interacted. Trust management can help minimize risk and ensure the network activity of benign entities in distributed systems. This article presents different trust models. It also discusses trust management in P2P system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Marking Technique to Isolate Boundary Router and Attacker

    Publication Year: 2007, Page(s):54 - 58
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    A new method for identifying denial-of-service attacks uses the attacker's media access control address for identification and traceback. The technique pinpoints the boundary router the attacker is connected to, allows identification after the attack, and imposes minimal extra load on the network View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive QoS for mobile Web services through cross-layer communication

    Publication Year: 2007, Page(s):59 - 63
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Web services providers can use the WS-QoS framework to achieve QoS differentiation by integrating various aspects of distinct communication layers. An architecture based on the framework supports resource-constrained mobile devices, which will generate a large percentage of Web service requests in the future View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Accurately Do Engineers Predict Software Maintenance Tasks?

    Publication Year: 2007, Page(s):64 - 69
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    Research shows considerable overlap among perfective, corrective, and adaptive maintenance tasks in software development projects. A case study involving two recent products provides further empirical evidence of this distribution and sheds light on how well programmers estimate both the type of maintenance necessary and the duration with some significant surprises View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Membership [advertisement]

    Publication Year: 2007, Page(s): 70
    Request permission for commercial reuse | PDF file iconPDF (360 KB)
    Freely Available from IEEE
  • IEEE Computer Society Membership [advertisement]

    Publication Year: 2007, Page(s):71 - 72
    Request permission for commercial reuse | PDF file iconPDF (2990 KB)
    Freely Available from IEEE
  • Hosaka and Spielberg Named Winners of 2006 Computer Pioneer Award

    Publication Year: 2007, Page(s):73 - 77
    Request permission for commercial reuse | PDF file iconPDF (245 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2007, Page(s):78 - 80
    Request permission for commercial reuse | PDF file iconPDF (190 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org