By Topic

Computer

Issue 1 • Date Jan. 2010

Filter Results

Displaying Results 1 - 25 of 26
  • CS Digital Editions [advertisement]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (324 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (887 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (1540 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2010, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (612 KB)
    Freely Available from IEEE
  • Computer Society 2010: Innovation, Leadership, Community, and Careers [President's Message]

    Publication Year: 2010, Page(s):6 - 8
    Request permission for commercial reuse | PDF file iconPDF (1307 KB) | HTML iconHTML
    Freely Available from IEEE
  • Designing the Future

    Publication Year: 2010, Page(s):9 - 11
    Request permission for commercial reuse | PDF file iconPDF (969 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 and 16 Years Ago

    Publication Year: 2010, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1978 and 1994. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is 3D Finally Ready for the Web?

    Publication Year: 2010, Page(s):14 - 16
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB) | HTML iconHTML

    3D content still is not widely found on the Web. Now, though, several new technologies may widen 3D's presence on the Web by transforming browsers into computing platforms powerful enough to play the content. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2010, Page(s):19 - 20
    Request permission for commercial reuse | PDF file iconPDF (2510 KB) | HTML iconHTML
    Freely Available from IEEE
  • [CS Info Page]

    Publication Year: 2010, Page(s): 21
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Project GreenLight: Optimizing Cyber-infrastructure for a Carbon-Constrained World

    Publication Year: 2010, Page(s):22 - 27
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1416 KB) | HTML iconHTML

    Even with a variety of aggressive energy efficiency measures, the ICT sector's carbon emissions will nearly triple from 2002 to 2020. We must accelerate ICT energy efficiency so that we can increase the use of ICT in smart infrastructure capable of reducing global greenhouse gas emissions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Really Rethinking 'Formal Methods'

    Publication Year: 2010, Page(s):28 - 34
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1786 KB) | HTML iconHTML

    We must question the assumptions underlying the well-known current formal software development methods to see why they have not been widely adopted and what should be changed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fulfilling the Vision of Autonomic Computing

    Publication Year: 2010, Page(s):35 - 41
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1708 KB) | HTML iconHTML

    Efforts since 2001 to design self-managing systems have yielded many impressive achievements, yet the original vision of autonomic computing remains unfulfilled. Researchers must develop a comprehensive systems engineering approach to create effective solutions for next-generation enterprise and sensor systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opportunities in Opportunistic Computing

    Publication Year: 2010, Page(s):42 - 50
    Cited by:  Papers (103)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1555 KB) | HTML iconHTML

    When two devices come into contact, albeit opportunistically, it provides a great opportunity to match services to resources, exchange information, cyberforage, execute tasks remotely, and forward messages. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Discrete Stock Price Prediction Engine Based on Financial News

    Publication Year: 2010, Page(s):51 - 56
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12849 KB) | HTML iconHTML

    The Arizona Financial Text system leverages statistical learning to make trading decisions based on numeric price predictions. Research demonstrates that AZFinText outperforms the market average and performs well against existing quant funds. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online Security Threats and Computer User Intentions

    Publication Year: 2010, Page(s):58 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1650 KB) | HTML iconHTML

    Although computer users are aware of spyware, they typically do not take protective steps against it. A recent study looks into the reasons for this apathy and suggests boosting users' confidence in installing and operating antispyware solutions as an effective remedy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Programs Serve Members

    Publication Year: 2010, Page(s):65 - 69
    Request permission for commercial reuse | PDF file iconPDF (1254 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2010, Page(s):70 - 71
    Request permission for commercial reuse | PDF file iconPDF (3521 KB)
    Freely Available from IEEE
  • IEEE CS Press [advertisement]

    Publication Year: 2010, Page(s): 72
    Request permission for commercial reuse | PDF file iconPDF (2052 KB)
    Freely Available from IEEE
  • Web 3.0: The Dawn of Semantic Search

    Publication Year: 2010, Page(s):77 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2974 KB) | HTML iconHTML

    Emerging Web 3.0 applications use semantic technologies to augment the underlying Web system's functionalities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Supercomputers for the Next-Generation Cell Phone

    Publication Year: 2010, Page(s):81 - 85
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1373 KB) | HTML iconHTML

    AnySP demonstrates that power efficiency can be achieved on a fully programmable processor in the context of a future mobile terminal supporting 4G wireless and high-definition video coding. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Economic Case for Open Source Foundations

    Publication Year: 2010, Page(s):86 - 90
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2848 KB) | HTML iconHTML

    By establishing a successful open source platform, software firms can compete more effectively across technology stacks and thereby increase their addressable market. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proxying: The Next Step in Reducing IT Energy Use

    Publication Year: 2010, Page(s):91 - 93
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    Proxying is a simple and effective means of allowing network hosts to sleep while maintaining network presence. It is the use of a low-power entity to maintain presence on the network for a high-power device like a PC. The component that does this, the proxy, can be internal to a device (for example, in the network interface chip within a PC), in an immediately adjacent network switch or router, o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Profession

    Publication Year: 2010, Page(s):94 - 95
    Request permission for commercial reuse | PDF file iconPDF (526 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Computer Society Membership [advertisement]

    Publication Year: 2010, Page(s): 993
    Request permission for commercial reuse | PDF file iconPDF (10111 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com