Computer

Issue 5 • May 2010

Filter Results

Displaying Results 1 - 25 of 30
  • [Front cover]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (3245 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2010, Page(s): 2
    Request permission for commercial reuse | |PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • APC [advertisement]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (1321 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):2 - 3
    Request permission for commercial reuse | |PDF file iconPDF (1212 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2010, Page(s):4 - 5
    Request permission for commercial reuse | |PDF file iconPDF (691 KB)
    Freely Available from IEEE
  • The Age of Accountability

    Publication Year: 2010, Page(s):6 - 8
    Request permission for commercial reuse | |PDF file iconPDF (527 KB) | HTML iconHTML
    Freely Available from IEEE
  • Verizon Ad

    Publication Year: 2010, Page(s): 9
    Request permission for commercial reuse | |PDF file iconPDF (2302 KB)
    Freely Available from IEEE
  • 32 and 16 Years Ago

    Publication Year: 2010, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (327 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1978 and 1994. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fighting Intrusions into Wireless Networks

    Publication Year: 2010, Page(s):12 - 15
    Request permission for commercial reuse | |PDF file iconPDF (1278 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2010, Page(s):16 - 19
    Request permission for commercial reuse | |PDF file iconPDF (2713 KB) | HTML iconHTML
    Freely Available from IEEE
  • What's Next for Shopbots?

    Publication Year: 2010, Page(s):20 - 26
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2705 KB) | HTML iconHTML

    BargainFinder, one of the earliest shopbot projects to receive media and public attention, debuted on 30 June 1995. Now, on the project's 15th anniversary, the authors review its progress and the many applications it's influenced. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [CS Info Page]

    Publication Year: 2010, Page(s): 27
    Request permission for commercial reuse | |PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction: Evolving Critical Systems

    Publication Year: 2010, Page(s):28 - 33
    Cited by:  Papers (3)
    Request permission for commercial reuse | |PDF file iconPDF (2377 KB) | HTML iconHTML
    Freely Available from IEEE
  • Evolving Embedded Systems

    Publication Year: 2010, Page(s):34 - 40
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3064 KB) | HTML iconHTML

    Embedded systems pose special challenges to system evolution: they're embedded in a changing environment, often interacting with evolving processes of human organizations, and thus must be verified because of their critical nature. Complicating the situation, the analyses and testing regimens used to verify them must evolve as well. Both software engineering research and industrial practice need t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSDA [advertisement]

    Publication Year: 2010, Page(s): 41
    Request permission for commercial reuse | |PDF file iconPDF (5787 KB)
    Freely Available from IEEE
  • Evolving Software Architecture Descriptions of Critical Systems

    Publication Year: 2010, Page(s):42 - 48
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2223 KB) | HTML iconHTML

    To manage the complexity of developing, maintaining, and evolving a critical software-intensive system, its architecture description must be accurately and traceably linked to its implementation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution in Relation to Risk and Trust Management

    Publication Year: 2010, Page(s):49 - 55
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1392 KB) | HTML iconHTML

    In this paper, a methodology within risk and trust management in general, and risk and trust assessment in particular, isn't well equipped to address trust issues in evolution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why Critical Systems Need Help to Evolve

    Publication Year: 2010, Page(s):56 - 63
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2964 KB) | HTML iconHTML

    Classical engineering fails to model all the ways in which a critical sociotechnical system fits into a larger system. A study of orthotics clinics used projective analysis to better understand the clinics' role in a healthcare system and to identify risks to the clinics' evolution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Roadmap for Comprehensive Requirements Modeling

    Publication Year: 2010, Page(s):64 - 72
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1318 KB) | HTML iconHTML

    Most large software systems result from weaving together many independently developed systems. Like Shelley's Frankenstein, such systems risk inheriting undesirable properties. Requirements monitoring can sound the alert should these creations fail to meet their obligations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf

    Publication Year: 2010, Page(s): 73
    Request permission for commercial reuse | |PDF file iconPDF (247 KB) | HTML iconHTML
    Freely Available from IEEE
  • Career opportunities

    Publication Year: 2010, Page(s):74 - 76
    Request permission for commercial reuse | |PDF file iconPDF (361 KB)
    Freely Available from IEEE
  • Bertrand Meyer Receives 2010 Mills Award

    Publication Year: 2010, Page(s):77 - 79
    Request permission for commercial reuse | |PDF file iconPDF (914 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2010, Page(s):80 - 81
    Request permission for commercial reuse | |PDF file iconPDF (607 KB)
    Freely Available from IEEE
  • The Challenges of Energy-Proportional Computing

    Publication Year: 2010, Page(s):82 - 83
    Cited by:  Papers (5)
    Request permission for commercial reuse | |PDF file iconPDF (382 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Future of Embedded Software: Adapting to Drastic Change

    Publication Year: 2010, Page(s):84 - 86
    Request permission for commercial reuse | |PDF file iconPDF (13539 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org