Computer

Issue 5 • May 2009

Filter Results

Displaying Results 1 - 25 of 32
  • [Front cover]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1704 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (945 KB)
    Freely Available from IEEE
  • Elsewhere in the CS

    Publication Year: 2009, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (552 KB)
    Freely Available from IEEE
  • The Dictator and the Web Design

    Publication Year: 2009, Page(s):6 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    As Web technology moved from the laboratory to the public sphere, website design moved from being the product of a single individual to become the responsibility of a group. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 and 16 Years Ago

    Publication Year: 2009, Page(s):9 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1977 and 1993. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vendors Draw up a New Graphics-Hardware Approach

    Publication Year: 2009, Page(s):11 - 13
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    For the past five years, there have been two major approaches to providing graphics hardware in PCs, notebooks, game consoles, and workstations. The older technique has been to put graphics processing units (GPUs) on video cards. For example, Nvidia places its G92 GPU on its GeForce GTS 250 card, and AMD places its RV770 GPU on its ATI Radeon HD 4850 card. More recently, the most popular approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Changing Face of Open Source

    Publication Year: 2009, Page(s):14 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    The inability of vendors to make money using pure open source approaches caused many to change their business models. They also now view open source as just one efficient way to develop software, not as a social movement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2009, Page(s):18 - 21
    Request permission for commercial reuse | PDF file iconPDF (1739 KB) | HTML iconHTML
    Freely Available from IEEE
  • [CS Info Page]

    Publication Year: 2009, Page(s): 22
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Trustworthy Voting: From Machine to System

    Publication Year: 2009, Page(s):23 - 29
    Cited by:  Papers (12)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1466 KB) | HTML iconHTML

    The authors describe an electronic voting approach that takes a system view, incorporating a trustworthy process based on open source software, simplified procedures, and built-in redundant safeguards that prevent tampering. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems

    Publication Year: 2009, Page(s):30 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6453 KB) | HTML iconHTML

    The ubiquitous deployment of systems for collecting, processing, and sharing personally identifiable information for service delivery makes every person vulnerable to online theft of identity data, thus undermining confidence in information technologies. This has led to the expansion of research on several digital identity management topics, including improving trustworthiness and privacy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attribute Aggregation in Federated Identity Management

    Publication Year: 2009, Page(s):33 - 40
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1890 KB) | HTML iconHTML

    Most federated identity management systems are limited by users' ability to choose only one identity provider per service session. A proposed linking service lets users securely link their various identity provider (IdP) accounts, enabling the system to aggregate attributes from multiple authoritative sources automatically without requiring users to authenticate separately to each IdP. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BYC [advertisement]

    Publication Year: 2009, Page(s): 41
    Request permission for commercial reuse | PDF file iconPDF (877 KB)
    Freely Available from IEEE
  • Challenges to Supporting Federated Assurance

    Publication Year: 2009, Page(s):42 - 49
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3208 KB) | HTML iconHTML

    Federation is an identity management model in which various tasks associated with an identity transaction are distributed among the actors involved in the transaction. This model works from the premise that distributing tasks among the actors can achieve usability and privacy advantages for the user, as well as business efficiencies for businesses or applications. Typically, federated identity man... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Interoperable Approach to Multifactor Identity Verification

    Publication Year: 2009, Page(s):50 - 57
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2630 KB) | HTML iconHTML

    Naming heterogeneity occurs in digital identity management systems when the various parties involved in managing digital identities use different vocabularies to denote identity attribute names. To resolve potential interoperability issues due to naming heterogeneity, the authors propose a new protocol that uses lookup tables, dictionaries, and ontology mapping techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A SWIFT Take on Identity Management

    Publication Year: 2009, Page(s):58 - 65
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1409 KB) | HTML iconHTML

    A proposed identity management framework provides privacy protection, by means of virtual identities, and cross-layer single sign-on for users who subscribe to multiple service and identity providers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boosting the Robustness of Controller Area Networks: CANcentrate and ReCANcentrate

    Publication Year: 2009, Page(s):66 - 73
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3067 KB) | HTML iconHTML

    This paper discusses two proposed star architectures for systems based on the controller area network (CAN) protocol aim to improve CAN's error containment and fault tolerance for general distributed embedded systems and safety-critical applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career opportunities

    Publication Year: 2009, Page(s):74 - 75
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • CS membership forms

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (356 KB)
    Freely Available from IEEE
  • CS membership forms

    Publication Year: 2009, Page(s): 77
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • CS membership forms

    Publication Year: 2009, Page(s): 78
    Request permission for commercial reuse | PDF file iconPDF (782 KB)
    Freely Available from IEEE
  • Computer Society Connection

    Publication Year: 2009, Page(s):79 - 83
    Request permission for commercial reuse | PDF file iconPDF (2370 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2009, Page(s):84 - 85
    Request permission for commercial reuse | PDF file iconPDF (409 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2009, Page(s): 86
    Request permission for commercial reuse | PDF file iconPDF (227 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Road to Greener IT Pastures

    Publication Year: 2009, Page(s):87 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1433 KB) | HTML iconHTML

    Developing a green IT strategy for any organization, large or small, is critical to establishing a culture where the focus is on reducing cost and addressing both imminent regulatory pressure and increased scrutiny of carbon-neutral strategies. This paper discusses the "green practices" that can be used by organisations for energy efficiency improvements and also to avoid potential disruptions to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org