Computer

Issue 3 • March 2008

Filter Results

Displaying Results 1 - 25 of 32
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (890 KB)
    Freely Available from IEEE
  • Pace University [advertisement]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (2447 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2008, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (96 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters to the Editor

    Publication Year: 2008, Page(s):5 - 6
    Request permission for commercial reuse | PDF file iconPDF (553 KB) | HTML iconHTML
    Freely Available from IEEE
  • Long John Software and the Digital Jolly Roger

    Publication Year: 2008, Page(s):7 - 9
    Request permission for commercial reuse | PDF file iconPDF (881 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 Years Ago

    Publication Year: 2008, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1976 and 1992. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will IEEE 802.1X Finally Take Off in 2008?

    Publication Year: 2008, Page(s):12 - 15
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2298 KB) | HTML iconHTML

    Security is always a key concern for network operators. They are thus always looking for effective new security tools to work with. Eight years ago, an authentication technology called IEEE 802.1X was supposed to be an important tool for local area networks. 802.1X provides a security framework by letting PCs, Internet phones, and other devices connect to a LAN only if they can authenticate themse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moving the OS to the Web

    Publication Year: 2008, Page(s):16 - 19
    Cited by:  Papers (11)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4597 KB) | HTML iconHTML

    With the increasing use of high-speed Internet technologies, the concept of cloud computing has become more popular. In cloud computing, users work with Web-based, rather than local, storage and software. These applications are accessible via a browser and look and act like desktop programs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2008, Page(s):20 - 22
    Request permission for commercial reuse | PDF file iconPDF (1370 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer Society Information

    Publication Year: 2008, Page(s): 23
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • A Content-Centric Development Process Model

    Publication Year: 2008, Page(s):24 - 30
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1074 KB) | HTML iconHTML

    Working from the belief that when content is king, content experts should lead, a storyboard-driven approach provides a sound methodology for developing educational games that helps ensure that no good storyboard becomes a bad game. The storyboard-driven approach provides a sound methodology for developing games that have as their keystone the final product's content. Adventure games focus on cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Build Your Career [advertisement]

    Publication Year: 2008, Page(s): 31
    Request permission for commercial reuse | PDF file iconPDF (885 KB)
    Freely Available from IEEE
  • Making a Difference in the Software Century

    Publication Year: 2008, Page(s):32 - 38
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1316 KB) | HTML iconHTML

    In the 21st century, software engineers face the often formidable challenges of simultaneously dealing with rapid change, uncertainty and emergence, dependability, diversity, and interdependence, but they also have opportunities to make significant contributions that will make a difference for the better. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determining the Impact of Software Engineering Research on Practice

    Publication Year: 2008, Page(s):39 - 49
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1045 KB) | HTML iconHTML

    The impact project provides a solid and scholarly assessment of the impact software engineering research has had on software engineering practice. The assessment takes the form of a series of studies and briefings, each involving literature searches and, where possible, personal interviews. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The ASC-Alliance Projects: A Case Study of Large-Scale Parallel Scientific Code Development

    Publication Year: 2008, Page(s):50 - 58
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2329 KB) | HTML iconHTML

    Computational scientists face many challenges when developing software that runs on large-scale parallel machines. However, software-engineering researchers haven't studied their software development processes in much detail. To better understand the nature of software development in this context, the authors examined five large-scale computational science software projects operated at the five AS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SSL/TLS Session-Aware User Authentication

    Publication Year: 2008, Page(s):59 - 65
    Cited by:  Papers (17)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1637 KB) | HTML iconHTML

    Overall, transport layer security with session-aware user authentication offers a promising approach to solving man-in-the-middle attack problems by leveraging the legacy authentication mechanisms and systems that the general public has become accustomed to using. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Predictive Feedback Control for QoS Assurance in Webservers

    Publication Year: 2008, Page(s):66 - 72
    Cited by:  Papers (15)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1074 KB) | HTML iconHTML

    The eQoS framework represents a first step in a systematic approach to provisioning user- perceived page-view response time differentiation and assurance. It deploys a model predictive feedback controller approach to adjust the processing rate allocated to each class of requests dynamically in response to measured performance deviation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertiser/Product Index

    Publication Year: 2008, Page(s): 73
    Request permission for commercial reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • Career opportunities

    Publication Year: 2008, Page(s):74 - 78
    Request permission for commercial reuse | PDF file iconPDF (1095 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2008, Page(s): 79
    Request permission for commercial reuse | PDF file iconPDF (141 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer Society Membership Forms

    Publication Year: 2008, Page(s):80 - 82
    Request permission for commercial reuse | PDF file iconPDF (1742 KB)
    Freely Available from IEEE
  • Computer Society Connection [includes Awards]

    Publication Year: 2008, Page(s):83 - 85
    Request permission for commercial reuse | PDF file iconPDF (895 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2008, Page(s):86 - 88
    Request permission for commercial reuse | PDF file iconPDF (518 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org