By Topic

Computer

Issue 3 • Date March 2010

Filter Results

Displaying Results 1 - 25 of 26
  • [Front cover]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (2377 KB)
    Freely Available from IEEE
  • IEEE CS Press [advertisement]

    Publication Year: 2010, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (385 KB)
    Freely Available from IEEE
  • GIDS 2010

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (501 KB)
    Freely Available from IEEE
  • Verizon Advertisement

    Publication Year: 2010, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (2202 KB)
    Freely Available from IEEE
  • Letters to the Editor

    Publication Year: 2010, Page(s):6 - 9
    Request permission for commercial reuse | PDF file iconPDF (698 KB) | HTML iconHTML
    Freely Available from IEEE
  • HOTI

    Publication Year: 2010, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (211 KB)
    Freely Available from IEEE
  • Someday, You Will Understand

    Publication Year: 2010, Page(s):11 - 13
    Request permission for commercial reuse | PDF file iconPDF (533 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 and16 Years Ago

    Publication Year: 2010, Page(s):14 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1978 and 1994. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is It Really Time for Real-Time Search?

    Publication Year: 2010, Page(s):16 - 19
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (851 KB) | HTML iconHTML

    Due largely to the rise of social networking, the Internet constantly receives large quantities of new material that traditional search technology won't find in real-time. Real-time search addresses this shortcoming. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2010, Page(s):20 - 22
    Request permission for commercial reuse | PDF file iconPDF (12654 KB) | HTML iconHTML
    Freely Available from IEEE
  • CSDL [advertisement]

    Publication Year: 2010, Page(s): 23
    Request permission for commercial reuse | PDF file iconPDF (328 KB)
    Freely Available from IEEE
  • Parallelism via Multithreaded and Multicore CPUs

    Publication Year: 2010, Page(s):24 - 32
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1493 KB) | HTML iconHTML

    Multicore and multithreaded CPUs have become the new approach to obtaining increases in CPU performance. Numeric applications mostly benefit from a large number of computationally powerful cores. Servers typically benefit more if chip circuitry is used for maximizing throughput via multiple threads per core. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [CS Info Page]

    Publication Year: 2010, Page(s): 33
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Analyzing Parallel Programs with PIN

    Publication Year: 2010, Page(s):34 - 41
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1312 KB) | HTML iconHTML

    Software instrumentation provides the means to collect information on and efficiently analyze parallel programs. Using Pin, developers can build tools to detect and examine dynamic behavior including data races, memory system behavior, and parallelizable loops. Pin is a software system that performs runtime binary instrumentation of Linux and Microsoft Windows applications. Pin's aim is to provide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auto-Pipe: Streaming Applications on Architecturally Diverse Systems

    Publication Year: 2010, Page(s):42 - 49
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1788 KB) | HTML iconHTML

    Architecturally diverse systems can improve streaming application performance by orders of magnitude, albeit with enormous programmer effort. To simplify the programming of such systems, we have constructed the Auto-Pipe application development environment, which supports the flexible mapping of application components onto computational resources and the automatic delivery of data between these co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tools for Very Fast Regular Expression Matching

    Publication Year: 2010, Page(s):50 - 58
    Cited by:  Papers (4)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3527 KB) | HTML iconHTML

    Regular expressions, or regex, are a common choice for defining configurable rules for data parsing because of their expressiveness in detecting recurrent patterns and information. For many data-intensive applications, regex matching is the first line of defense in performing online data filtering. Unfortunately, few solutions can keep up with the increasing data rates and the complexity posed by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Runtime Verification of Web Service Interface Contracts

    Publication Year: 2010, Page(s):59 - 66
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1302 KB) | HTML iconHTML

    Asynchronous JavaScript and XML (Ajax) is a collection of technologies used to develop rich and interactive Web applications. A typical Ajax client runs locally in the user's Web browser and refreshes its interface on the fly in response to user input. Using this method with the AWS-ECS let us automatically generate test sequences and detect two deviations of their service implementation with resp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IntellBatt: Toward a Smarter Battery

    Publication Year: 2010, Page(s):67 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1586 KB) | HTML iconHTML

    IntellBatt, a novel multicell battery design, exploits cell characteristics to increase battery lifetime, ensure safe operation, and improve performance. Simulations using Li-ion cells in a portable DVD player show a 22 percent battery lifetime enhancement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career opportunities

    Publication Year: 2010, Page(s):72 - 76
    Request permission for commercial reuse | PDF file iconPDF (877 KB)
    Freely Available from IEEE
  • Computer Society Names Award Recipients

    Publication Year: 2010, Page(s):77 - 80
    Request permission for commercial reuse | PDF file iconPDF (905 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2010, Page(s):81 - 82
    Request permission for commercial reuse | PDF file iconPDF (557 KB)
    Freely Available from IEEE
  • Trading in Green IT

    Publication Year: 2010, Page(s):83 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (757 KB) | HTML iconHTML

    Using green IT techniques can significantly reduce an organization's-and ultimately a country's-carbon footprint. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Viewpoint: The Future of Computing Practice and Education

    Publication Year: 2010, Page(s):86 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1519 KB) | HTML iconHTML

    Computer science holds a special position among engineering disciplines. First, it is a relatively new field characterized by underlying exponential performance improvements. Second, its subfields include modeling all other engineered, natural, and human systems. Over the past 70 years, computing practice and education have had to adapt to rapidly changing technology, applications, and the evoluti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auditing 2.0: Using Process Mining to Support Tomorrow's Auditor

    Publication Year: 2010, Page(s):90 - 93
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1436 KB) | HTML iconHTML

    Auditors validate information about organizations and their business processes. Reliable information is needed to determine whether these processes are executed within certain boundaries set by managers, governments, and other stakeholders. Violations of specific rules enforced by law or company policies may indicate fraud, malpractice, risks, or inefficiencies. Traditionally, an audit can only pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Filtering and Censoring

    Publication Year: 2010, Page(s):94 - 97
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1168 KB) | HTML iconHTML

    The public perceives the Web as a wildly uncensored medium, the embodiment of complete freedom of expression (for good or bad). In reality, information on the Web is not as uncontrolled as it may appear. According to the OpenNet Initiative (www.opennet.net), more than 40 countries actively filter Web access- selectively blocking content to a billion Internet users worldwide-and many others are con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com