By Topic

Computer

Issue 8 • Date Aug. 2008

Filter Results

Displaying Results 1 - 25 of 36
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1021 KB)
    Freely Available from IEEE
  • IEEE CS Press [advertisement]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (347 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (2140 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2008, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • Figures in the Distance

    Publication Year: 2008, Page(s):5 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (831 KB) | HTML iconHTML

    The technologies that we have deployed over the past two decades have given us new ability to manage activities at a distance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2008, Page(s):8 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1976 and 1992. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Ways to Build Rich Internet Applications

    Publication Year: 2008, Page(s):10 - 12
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (990 KB) | HTML iconHTML

    Ajax has become a popular open approach for developing rich Internet applications. Now, some vendors are releasing their own Ajax-based development platforms, while others have released proprietary platforms not based on Ajax. RIAs feature responsive user interfaces and interactive capabilities. This makes Internet-based programs easier to use and more functional, and also overcomes problems with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtualization Sparks Security Concerns

    Publication Year: 2008, Page(s):13 - 15
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB) | HTML iconHTML

    Virtualization is rapidly becoming a standard technology for businesses. The technology lets a single PC or server simultaneously run multiple operating systems or multiple sessions of a single OS. The approach is thus becoming a common way for users to optimize their hardware utilization by maximizing the number and kinds of jobs a single CPU can handle. Organizations now face the challenge of se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2008, Page(s):16 - 18
    Request permission for commercial reuse | PDF file iconPDF (1177 KB) | HTML iconHTML
    Freely Available from IEEE
  • [CS Info Page]

    Publication Year: 2008, Page(s): 19
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Cybersecurity Strategies: The QuERIES Methodology

    Publication Year: 2008, Page(s):20 - 26
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1512 KB) | HTML iconHTML

    QuERIES offers a novel multidisciplinary approach to quantifying risk associated with security technologies resulting in investment-efficient cybersecurity strategies. R esearchers can use the QuERIES methodology to rigorously determine, for the first time, appropriate investment levels and strategies for the protection of intellectual property in complex systems. As a result, it can have a signif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-Assurance Service-Oriented Architectures

    Publication Year: 2008, Page(s):27 - 28
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (714 KB) | HTML iconHTML

    Assuring multiple quality attributes-such as reliability, availability, performance, security, and real-time response-for a variety of critical applications makes it essential to develop practical techniques for implementing high-assurance service-oriented systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Now [advertisement]

    Publication Year: 2008, Page(s): 29
    Request permission for commercial reuse | PDF file iconPDF (1741 KB)
    Freely Available from IEEE
  • CROWN-C: A High-Assurance Service-Oriented Grid Middleware System

    Publication Year: 2008, Page(s):30 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1691 KB) | HTML iconHTML

    A proposed grid middleware system includes specific enhancements to support the development and assessment of highly secure, dependable, service-oriented grid systems and applications. Service-oriented architectures can be defined as application architectures "within which all functions are defined as independent services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Contributor Call

    Publication Year: 2008, Page(s): 39
    Request permission for commercial reuse | PDF file iconPDF (6621 KB)
    Freely Available from IEEE
  • On Testing and Evaluating Service-Oriented Software

    Publication Year: 2008, Page(s):40 - 46
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1353 KB) | HTML iconHTML

    As service-oriented architecture matures and more Web services become available, developers must test an ever-increasing volume of services. A framework that defines and evaluates test-case potency based on coverage relationships can reduce testing effort while maintaining testing's effectiveness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Careers [advertisement]

    Publication Year: 2008, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (515 KB)
    Freely Available from IEEE
  • QoS-Reconfigurable Web Services and Compositions for High-Assurance Systems

    Publication Year: 2008, Page(s):48 - 55
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2037 KB) | HTML iconHTML

    A service-oriented architecture (SOA) is an ideal vehicle for achieving reconfigurable systems that can select and compose services statically or dynamically to satisfy changing system requirements. The authors have developed a rule-based parameterization technique to convert components into reconfigurable services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assuring Timeliness in an e-Science Service-Oriented Architecture

    Publication Year: 2008, Page(s):56 - 62
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1311 KB) | HTML iconHTML

    An improvement to public-resource e-science portals shows promise in solving a well-known dilemma: how to dynamically discover a provider PC that is ready to deliver computing power when the scientific community requires it. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BYC [advertisement]

    Publication Year: 2008, Page(s): 63
    Request permission for commercial reuse | PDF file iconPDF (885 KB)
    Freely Available from IEEE
  • Specifying High-Assurance Services

    Publication Year: 2008, Page(s):64 - 71
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1386 KB) | HTML iconHTML

    An enhanced approach to service specification strikes a better balance between machine processibility and human readability, and emphasizes testing- as well as reasoning-based assurance techniques. Built-in tests check the compatibility of interacting services at runtime and automatically pinpoint contract mismatches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE President-Elect Candidates Address Computer Society Concerns

    Publication Year: 2008, Page(s):72 - 77
    Request permission for commercial reuse | PDF file iconPDF (931 KB)
    Freely Available from IEEE
  • Computer Society Connection

    Publication Year: 2008, Page(s):78 - 79
    Request permission for commercial reuse | PDF file iconPDF (595 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2008, Page(s):80 - 82
    Request permission for commercial reuse | PDF file iconPDF (486 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com