By Topic

Computer

Issue 6 • Date June 2007

Filter Results

Displaying Results 1 - 25 of 36
  • [Front cover]

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1875 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2007, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1809 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1112 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2007, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (231 KB) | HTML iconHTML
    Freely Available from IEEE
  • Hot Chips 19 Symposium Advance Program

    Publication Year: 2007, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (842 KB)
    Freely Available from IEEE
  • The Camino Real

    Publication Year: 2007, Page(s):6 - 8
    Request permission for commercial reuse | PDF file iconPDF (647 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 Years Ago

    Publication Year: 2007, Page(s):9 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1975 and 1991. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2007, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Searching the Visual Web

    Publication Year: 2007, Page(s):12 - 14
    Request permission for commercial reuse | PDF file iconPDF (776 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2007, Page(s):15 - 18
    Cited by:  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (1156 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Case for Flexible NIST Security Standards

    Publication Year: 2007, Page(s):19 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (987 KB) | HTML iconHTML

    A public dialogue on the role and reach of National Institute of Standards and Technology (NIST) as a rule maker and as a standards writer for federal cybersecurity is essential to understanding the limits of security rule making in the present federal environment. NIST should delay converting its guidelines into rules until advances in the technology permit such conversion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Best Practices for Automated Traceability

    Publication Year: 2007, Page(s):27 - 35
    Cited by:  Papers (46)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1486 KB) | HTML iconHTML

    Automated traceability applies information-retrieval techniques to generate candidate links, sharply reducing the effort of manual approaches to build and maintain a requirements trace matrix as well as providing after-the-fact traceability in legacy documents.The authors describe nine best practices for implementing effective automated traceability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Featured Title from Wiley and CS Press [advertisement]

    Publication Year: 2007, Page(s): 36
    Request permission for commercial reuse | PDF file iconPDF (295 KB)
    Freely Available from IEEE
  • An Open Source Environment for Cell Broadband Engine System Software

    Publication Year: 2007, Page(s):37 - 47
    Cited by:  Papers (7)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (922 KB) | HTML iconHTML

    The cell broadband engine provides the first implementation of a chip multiprocessor with a significant number of general-purpose programmable cores targeting a broad set of workloads. Open source software played a critical role in the development of the cell software stack. The system includes a power architecture processor and eight attached processor element. The cell team turned to open source... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer and People: Essays from the Profession

    Publication Year: 2007, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (289 KB)
    Freely Available from IEEE
  • Isolation in Commodity Multicore Processors

    Publication Year: 2007, Page(s):49 - 59
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    Resource sharing in modern chip multiprocessors (multicores) provides many cost and performance benefits. However, component sharing also creates drawbacks for fault, performance, and security isolation.Thus, integration of components on a multicore chip should also be accompanied by features that help isolate effects of faults, destructive performance interference, and security breaches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • iMouse: An Integrated Mobile Surveillance and Wireless Sensor System

    Publication Year: 2007, Page(s):60 - 66
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB) | HTML iconHTML

    Incorporating the environment-sensing capability of wireless sensor networks into video- based surveillance systems can provide advanced services at a lower cost than traditional surveillance systems.The integrated mobile surveillance and wireless sensor system (iMouse) uses static and mobile wireless sensors to detect and then analyze unusual events in the environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Distributed Systems Online - Information

    Publication Year: 2007, Page(s): 67
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Password-Based Authentication: Preventing Dictionary Attacks

    Publication Year: 2007, Page(s):68 - 74
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1102 KB) | HTML iconHTML

    Password-based authentication is susceptible to attack if used on insecure communication channels like the Internet. Researchers have engineered several protocols to prevent attacks, but we still need formal models to analyze and aid in the effective design of acceptable password protocols geared to prevent dictionary attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Digital Library Information

    Publication Year: 2007, Page(s): 75
    Request permission for commercial reuse | PDF file iconPDF (246 KB)
    Freely Available from IEEE
  • Career opportunities

    Publication Year: 2007, Page(s):76 - 80
    Request permission for commercial reuse | PDF file iconPDF (728 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2007, Page(s):81 - 83
    Request permission for commercial reuse | PDF file iconPDF (432 KB)
    Freely Available from IEEE
  • Computer Society Connection

    Publication Year: 2007, Page(s):84 - 85
    Request permission for commercial reuse | PDF file iconPDF (456 KB)
    Freely Available from IEEE
  • IEEE Computer Society membership information

    Publication Year: 2007, Page(s): 86
    Request permission for commercial reuse | PDF file iconPDF (389 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com