By Topic

Computer

Issue 2 • Date Feb. 2008

Filter Results

Displaying Results 1 - 25 of 37
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (842 KB)
    Freely Available from IEEE
  • Wiley [advertisement]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (3057 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1830 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2008, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • COOL Chips XI Call for Participation

    Publication Year: 2008, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (257 KB)
    Freely Available from IEEE
  • Letters to the Editor

    Publication Year: 2008, Page(s):6 - 9
    Request permission for commercial reuse | PDF file iconPDF (2249 KB) | HTML iconHTML
    Freely Available from IEEE
  • Derek the Rocket Scientist

    Publication Year: 2008, Page(s):10 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1285 KB) | HTML iconHTML

    Trust is a difficult thing to engineer, as it involves history, character, and an ability to put aside your own goals for the good of the whole. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2008, Page(s):13 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1976 and 1992. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • US Cell Phone Industry Faces an Open Future

    Publication Year: 2008, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1552 KB) | HTML iconHTML

    The US wireless industry appears to be in the midst of a sea change in the way it does business. It is just beginning to move away from the traditional walled-garden approach, in which users can pick their service providers but the carriers determine the phones and applications that customers can use. This gives service providers control of the wireless experience. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information [advertisement]

    Publication Year: 2008, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • A Storm (Worm) Is Brewing

    Publication Year: 2008, Page(s):20 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB) | HTML iconHTML

    Skilled hackers have designed a sophisticated type of malware that blends multiple techniques, hides and changes its code, and employs tricks to entice users to implement and spread it. The malware is generally called the Storm worm. This paper introduces the basic information about Storm worm and how we can combat against this attack. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • National Science Digital Library: Shaping Education's Cyberinfrastructure

    Publication Year: 2008, Page(s):26 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1516 KB) | HTML iconHTML

    As a National Science Foundation (NSF) program, the NSDL is reaching maturity, but the library is already forging a strong link among research projects, which argues compellingly for continued NSF investment, although with new directions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hot Chips 20

    Publication Year: 2008, Page(s): 33
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Wikis: 'From Each According to His Knowledge'

    Publication Year: 2008, Page(s):34 - 41
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2962 KB) | HTML iconHTML

    Wikis offer tremendous potential to capture knowledge from large groups of people, making tacit, hidden content explicit and widely available. They also efficiently connect those with information to those seeking it. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EventWeb: Developing a Human-Centered Computing System

    Publication Year: 2008, Page(s):42 - 50
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1623 KB) | HTML iconHTML

    Dealing with emerging applications of computing requires taking a fresh look at our tools. EventWeb is a human-centered computing system that will give users a compelling experience by combining quality content, carefully planned data organization and access mechanisms, and powerful presentation approaches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPECTS 2008

    Publication Year: 2008, Page(s): 51
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Secure and Easy Internet Voting

    Publication Year: 2008, Page(s):52 - 56
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1652 KB) | HTML iconHTML

    A Swiss e-voting system, operational since December 2004, is based on a service-oriented architecture that lets voters use Internet or mobile phones to cast votes. Two-step encryption and redundant storage systems keep votes authentic and confidential. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wiley and IEEE Computer Society [advertisement]

    Publication Year: 2008, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (498 KB)
    Freely Available from IEEE
  • Turning Teenagers into Stores

    Publication Year: 2008, Page(s):58 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1433 KB) | HTML iconHTML

    Paradiso is a prototype of a system that lets consumers contact content providers to buy songs and videos-and to buy optional content-resale rights. In essence, the scheme would turn customers into content distributors, provide wider reach, and free up content providers' bandwidth. However, such an architecture requires strict security precautions and interoperable digital rights management standa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Build Your Career [advertisement]

    Publication Year: 2008, Page(s): 63
    Request permission for commercial reuse | PDF file iconPDF (885 KB)
    Freely Available from IEEE
  • Authorizing Card Payments with PINs

    Publication Year: 2008, Page(s):64 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1878 KB) | HTML iconHTML

    Chip and PIN technology was introduced as a means of decreasing payment-card fraud. However, according to results of a two-phase experiment, the technology makes it easier for thieves to obtain PINs and more difficult for customers to defend against counterfeiting. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Promise of High-Performance Reconfigurable Computing

    Publication Year: 2008, Page(s):69 - 76
    Cited by:  Papers (75)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1621 KB) | HTML iconHTML

    Several high-performance computers now use field-programmable gate arrays as reconfigurable coprocessors. The authors describe the two major contemporary HPRC architectures and explore the pros and cons of each using representative applications from remote sensing, molecular dynamics, bioinformatics, and cryptanalysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertiser / Product Index

    Publication Year: 2008, Page(s): 77
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Career opportunities

    Publication Year: 2008, Page(s):78 - 80
    Request permission for commercial reuse | PDF file iconPDF (439 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com