Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 7 • July 2008

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1901 KB)
    Freely Available from IEEE
  • Microsoft Research [advertisement]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (14029 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (2908 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2008, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • Harry and Georgie

    Publication Year: 2008, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1705 KB) | HTML iconHTML

    Hacking might occupy a special position-that gray area between the darkness and the light-because it touches not only on ethical issues but also on the very nature of computing itself. Beyond the topics under discussion, all of which concerned how to exploit the flaws of commercial software, the conference strayed from its more conventional cousins in the exhibits room. The hacking community, for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2008, Page(s):9 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1976 and 1992. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Awareness Makes Storage More Useful

    Publication Year: 2008, Page(s):11 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2650 KB) | HTML iconHTML

    Application-aware storage offers a technology that can respond intelligently and quickly enough for organizations to meet the demands of their different users and programs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Wireless Industry Begins to Embrace Femtocells

    Publication Year: 2008, Page(s):14 - 17
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1820 KB) | HTML iconHTML

    Femtocells help eliminate spotty mobile phone reception indoors by connecting users to the wireless network via broadband Internet links, not the telephony infrastructure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2008, Page(s):18 - 20
    Request permission for commercial reuse | PDF file iconPDF (1414 KB) | HTML iconHTML
    Freely Available from IEEE
  • [CS Info Page]

    Publication Year: 2008, Page(s): 21
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • In Praise of Scripting: Real Programming Pragmatism

    Publication Year: 2008, Page(s):22 - 26
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2078 KB) | HTML iconHTML

    The academic programming language community continues to reject the change in programming practices brought about by scripting. We need a programming language pragmatics to go past the analysis of syntax and semantics in the same way that linguistics studies perlocution and illocution. Pragmatic questions are not the easiest for mathematically inclined computer scientists to address. They refer by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Embedded Computing

    Publication Year: 2008, Page(s):27 - 32
    Cited by:  Papers (65)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2631 KB) | HTML iconHTML

    Hardwired ASICs - 50X more efficient than programmable processors - sacrifice programmability to meet the efficiency requirements of demanding embedded systems. Programmable processors use energy mostly to supply instructions and data to the arithmetic units, and several techniques can reduce instruction- and data-supply energy costs. Using these techniques in the Stanford ELM processor closes the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Amdahl's Law in the Multicore Era

    Publication Year: 2008, Page(s):33 - 38
    Cited by:  Papers (381)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1354 KB) | HTML iconHTML

    Augmenting Amdahl's law with a corollary for multicore hardware makes it relevant to future generations of chips with multiple processor cores. Obtaining optimal multicore performance will require further research in both extracting more parallelism and making sequential cores faster. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Now [advertisement]

    Publication Year: 2008, Page(s): 39
    Request permission for commercial reuse | PDF file iconPDF (1743 KB)
    Freely Available from IEEE
  • Warp Processing: Dynamic Translation of Binaries to FPGA Circuits

    Publication Year: 2008, Page(s):40 - 46
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1344 KB) | HTML iconHTML

    Warp processing dynamically and transparently transforms an executing microprocessor's binary kernels into customized field-programmable gate array (FPGA) circuits, commonly resulting in 2X to 100X speedup over executing on microprocessors. A new architecture and set of dynamic CAD tools demonstrate warp processing's potential. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automating Postsilicon Debugging and Repair

    Publication Year: 2008, Page(s):47 - 54
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2470 KB) | HTML iconHTML

    Due to increasing semiconductor design complexity, more errors are escaping presilicon verification and being discovered only after manufacturing. As an alternative to traditional manual chip repair, the authors propose the FogClear methodology, which automates the postsilicon debugging process and thereby reduces IC development time and costs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSDL [advertisement]

    Publication Year: 2008, Page(s): 55
    Request permission for commercial reuse | PDF file iconPDF (844 KB)
    Freely Available from IEEE
  • SIISAM: A Model for Secure Inhomogeneous Information Systems

    Publication Year: 2008, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (17191 KB) | HTML iconHTML

    SIISAM is a multilayered, Web-service-based architecture model designed to guide construction of a secure, interoperable, and extensible information system that allows smooth interoperation of legacy applications. A pilot e-government system in China built using the model has achieved its targets in both functionality and performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career opportunities

    Publication Year: 2008, Page(s):62 - 64
    Request permission for commercial reuse | PDF file iconPDF (742 KB)
    Freely Available from IEEE
  • Computer Society Connection

    Publication Year: 2008, Page(s):65 - 71
    Request permission for commercial reuse | PDF file iconPDF (2481 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2008, Page(s):72 - 75
    Request permission for commercial reuse | PDF file iconPDF (1164 KB)
    Freely Available from IEEE
  • CS membership forms

    Publication Year: 2008, Page(s):76 - 78
    Request permission for commercial reuse | PDF file iconPDF (1744 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2008, Page(s): 79
    Request permission for commercial reuse | PDF file iconPDF (136 KB) | HTML iconHTML
    Freely Available from IEEE
  • Contracts as Trust Substitutes in Collaborative Business

    Publication Year: 2008, Page(s):80 - 83
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2637 KB) | HTML iconHTML

    The globalization of business through mergers and acquisitions requires the interoperation of established heterogeneous systems within the enterprise. Supply-chain management and collaboration between companies likewise necessitate interoperation between enterprise systems. Companies must break down system silos to increase utilization rates. Automated contract management can mitigate the risks of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org