By Topic

Computer

Issue 9 • Date Sept. 2009

Filter Results

Displaying Results 1 - 25 of 30
  • Computer [masthead]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (580 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2009, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (273 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2009, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1410 KB)
    Freely Available from IEEE
  • Letters to the Editor

    Publication Year: 2009, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (496 KB) | HTML iconHTML
    Freely Available from IEEE
  • Data of the Night

    Publication Year: 2009, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2280 KB) | HTML iconHTML

    Gunshot detection systems are a form of geographical information system, a technology that has expanded rapidly in the past two decades and has substantially altered how we deal with the physical landscape. For the past decade, our beloved city has confronted the problems of nightly gunfire with a shot detection network, a web of sensors and computers that identifies a shot's location before the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 and 16 Years Ago

    Publication Year: 2009, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1977 and 1993. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICPP

    Publication Year: 2009, Page(s): 14
    Request permission for commercial reuse | PDF file iconPDF (324 KB)
    Freely Available from IEEE
  • Routing Faces Dramatic Changes

    Publication Year: 2009, Page(s):15 - 17
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (606 KB) | HTML iconHTML

    As networking has become more complex, routers-which historically have been very basic pieces of equipment-are adding functions formerly found in other devices. In addition, new approaches and alternatives are emerging. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2009, Page(s):18 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (2199 KB) | HTML iconHTML
    Freely Available from IEEE
  • Dynamic Privacy in Public Surveillance

    Publication Year: 2009, Page(s):22 - 28
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4083 KB) | HTML iconHTML

    In implementing privacy protection in surveillance systems, designers must maximize privacy while retaining the system's purpose. One way to achieve this is to combine data-hiding techniques with context-aware policies governing access to securely collected and stored data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer [masthead]

    Publication Year: 2009, Page(s): 29
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Faultless Systems: Yes We Can!

    Publication Year: 2009, Page(s):30 - 36
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    This paper presents simple ideas that offer suggestions on how to improve the situation of computerized system development. Gradually introducing some simple features will eventually result in a global improvement in the software development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Versus Agile: Survival of the Fittest

    Publication Year: 2009, Page(s):37 - 45
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    Many research have focused on new formal methods, integrating formal methods into agile ones, and assessing the agility of formal methods. This paper proves that formal methods can survive in an agile world; they are not obsolete and can be integrated into it. The potential for combining agile and formal methods holds promise. It might not always be an easy partnership, and succeeding will depend ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programs That Test Themselves

    Publication Year: 2009, Page(s):46 - 55
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2443 KB) | HTML iconHTML

    The AutoTest framework automates the software testing process by relying on programs that contain the instruments of their own verification, in the form of contract-oriented specifications of classes and their individual routines. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taking Parnas's Principles to the Next Level: Declarative Language Design

    Publication Year: 2009, Page(s):56 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (918 KB) | HTML iconHTML

    SequenceL is a general-purpose functional programming language that exploits information hiding in language design, shielding the programmer from the need to know how the language is implemented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing the Skies: In Requirements We Trust

    Publication Year: 2009, Page(s):64 - 72
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1019 KB) | HTML iconHTML

    The authors describe their experiences applying a security requirements analysis to an air traffic control project using a framework that offers different forms of structured argumentation. In deploying the framework, they also learned several lessons about security requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Election

    Publication Year: 2009, Page(s):73 - 80
    Request permission for commercial reuse | PDF file iconPDF (1451 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2009, Page(s):81 - 82
    Request permission for commercial reuse | PDF file iconPDF (532 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2009, Page(s): 83
    Request permission for commercial reuse | PDF file iconPDF (238 KB) | HTML iconHTML
    Freely Available from IEEE
  • Career opportunities

    Publication Year: 2009, Page(s):84 - 87
    Request permission for commercial reuse | PDF file iconPDF (380 KB)
    Freely Available from IEEE
  • University-Industry Synergy: An Eclectic Dialog for Revised Relationships

    Publication Year: 2009, Page(s):88 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2938 KB) | HTML iconHTML

    The Industry Perspective column will address many of the hot issues that cross industry-academia boundaries and interests. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Web as the Ubiquitous Computer

    Publication Year: 2009, Page(s):90 - 92
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1299 KB) | HTML iconHTML

    With the convergence of mobile smart devices, cloud computing, and software as a service, the Web is enabling anywhere, anytime computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Driven Engineering and Safety-Critical Embedded Software

    Publication Year: 2009, Page(s):93 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    Implementations embodied in a formally defined language with unambiguous semantics and a sound surrounding correctness for preserving refinement methodology make safety-critical software even safer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IS Innovation: Thinking Beyond the Silo

    Publication Year: 2009, Page(s):96 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (902 KB) | HTML iconHTML

    The IS discipline must shift its focus from current platforms, application areas, and comfort zones to societal engagement of technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com