Computer

Issue 2 • Feb. 2010

Filter Results

Displaying Results 1 - 25 of 32
  • [Front cover]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (19233 KB)
    Freely Available from IEEE
  • Verizon Ad

    Publication Year: 2010, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (2199 KB)
    Freely Available from IEEE
  • Saturn 2010: Sixth Annual SEI Architecture Technology User Network Conference

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (626 KB)
    Freely Available from IEEE
  • Seapine Software [advertisement]

    Publication Year: 2010, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (3083 KB)
    Freely Available from IEEE
  • IPDPS [advertisement]

    Publication Year: 2010, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (368 KB)
    Freely Available from IEEE
  • Raising Barns

    Publication Year: 2010, Page(s):7 - 9
    Request permission for commercial reuse | PDF file iconPDF (1251 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 and 16 Years Ago

    Publication Year: 2010, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1278 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1978 and 1994. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will NoSQL Databases Live Up to Their Promise?

    Publication Year: 2010, Page(s):12 - 14
    Cited by:  Papers (62)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2629 KB) | HTML iconHTML

    Many organizations collect vast amounts of customer, scientific, sales, and other data for future analysis. Traditionally, most of these organizations have stored structured data in relational databases for subsequent access and analysis. However, a growing number of developers and users have begun turning to various types of nonrelational, now frequently called NoSQL-databases. Nonrelational data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2010, Page(s):15 - 18
    Request permission for commercial reuse | PDF file iconPDF (8913 KB) | HTML iconHTML
    Freely Available from IEEE
  • Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe

    Publication Year: 2010, Page(s):19 - 26
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1254 KB) | HTML iconHTML

    Aspect-oriented software development techniques provide a means to modularize crosscutting concerns in software systems. A survey of industrial projects reveals the benefits and potential pitfalls of aspectoriented technologies.The past decade has seen the increased use of aspect-oriented software development (AOSD) technique as a means to modularize crosscutting concerns in software systems, ther... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VisWeek 2010 Ad

    Publication Year: 2010, Page(s): 27
    Request permission for commercial reuse | PDF file iconPDF (477 KB)
    Freely Available from IEEE
  • Authentication by Biometric Verification

    Publication Year: 2010, Page(s):28 - 29
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1017 KB) | HTML iconHTML

    Biometric systems encompass the development of capture devices to acquire biometric signals, software algorithms for effective identification, and databases that store biometric data for comparison. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iris Recognition: The Path Forward

    Publication Year: 2010, Page(s):30 - 35
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2322 KB) | HTML iconHTML

    Iris recognition systems have made tremendous inroads over the past decade, but work remains to improve their accuracy in environments characterized by unfavorable lighting, large stand-off distances, and moving subjects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fingerprint Matching

    Publication Year: 2010, Page(s):36 - 44
    Cited by:  Papers (48)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4140 KB) | HTML iconHTML

    Fingerprint matching has been successfully used by law enforcement for more than a century. The technology is now finding many other applications such as identity management and access control. The authors describe an automated fingerprint recognition system and identify key challenges and research opportunities in the field. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Security & Privacy [advertisement]

    Publication Year: 2010, Page(s): 45
    Request permission for commercial reuse | PDF file iconPDF (3095 KB)
    Freely Available from IEEE
  • Face Recognition by Computers and Humans

    Publication Year: 2010, Page(s):46 - 55
    Cited by:  Papers (36)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4482 KB) | HTML iconHTML

    This article talks about how the study of how humans perceive faces can be used to help design practical systems for face recognition. Besides applications related to identification and verification-such as access control, law enforcement, ID and licensing, and surveillance-face recognition has also proven useful in applications such as human-computer interaction, virtual reality, database retriev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unconstrained Biometric Identification: Emerging Technologies

    Publication Year: 2010, Page(s):56 - 62
    Cited by:  Papers (12)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3703 KB) | HTML iconHTML

    Biometric identification is the topic discussed. In this paper, research from the Center for Advanced Studies in Identity Sciences is aggressively addressing the challenges of face and iris recognition when the subjects of interest are operating in an unconstrained environment, typically far away from the sensor, partially obscured, or moving. Emerging technologies in face recognition and iris rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Raise your standards [advertisement]

    Publication Year: 2010, Page(s): 63
    Request permission for commercial reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • Compliance with Information Security Policies: An Empirical Investigation

    Publication Year: 2010, Page(s):64 - 71
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2405 KB) | HTML iconHTML

    Information security was the main topic in this paper. An investigation of the compliance to information security policies were discussed. The author mentions that the insignificant relationship between rewards and actual compliance with information security policies does not make sense. Quite possibly this relationship results from not applying rewards for security compliance. Also mentions that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career opportunities

    Publication Year: 2010, Page(s):72 - 76
    Request permission for commercial reuse | PDF file iconPDF (1292 KB)
    Freely Available from IEEE
  • Ad Index

    Publication Year: 2010, Page(s): 77
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Bookshelf [Three book reviews]

    Publication Year: 2010, Page(s): 78
    Request permission for commercial reuse | PDF file iconPDF (242 KB) | HTML iconHTML
    Freely Available from IEEE
  • Moore Wins Karlsson Award [Computer Society Connection]

    Publication Year: 2010, Page(s):79 - 84
    Request permission for commercial reuse | PDF file iconPDF (12440 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2010, Page(s):85 - 86
    Request permission for commercial reuse | PDF file iconPDF (1021 KB)
    Freely Available from IEEE
  • Strategic Intelligence, Social Networking, and Knowledge Retention

    Publication Year: 2010, Page(s):87 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (831 KB) | HTML iconHTML

    Artificial intelligence was the main topic of this paper. AI in the triad of strategic intelligence, social networking, and knowledge retention were discussed. The author mentions that AI techniques can help organizations achieve success in today's demanding environment. Researchers can use AI to help identify relationships among persons, teams, departments, and other entities within organizations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org