Computer

Issue 9 • Sept. 2010

Filter Results

Displaying Results 1 - 25 of 26
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2990 KB)
    Freely Available from IEEE
  • Marsh Affinity Group [advertisement]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1271 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1065 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2010, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (628 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2010, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (422 KB) | HTML iconHTML
    Freely Available from IEEE
  • Finding What You Want

    Publication Year: 2010, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (550 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 and 16 Years Ago

    Publication Year: 2010, Page(s):11 - 12
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1978 and 1994. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Whatever Happened to Network-Access-Control Technology?

    Publication Year: 2010, Page(s):13 - 16
    Request permission for commercial reuse | PDF file iconPDF (824 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2010, Page(s):17 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (2719 KB) | HTML iconHTML
    Freely Available from IEEE
  • Advancing Software Assurance with Public-Private Collaboration

    Publication Year: 2010, Page(s):21 - 30
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2744 KB) | HTML iconHTML

    The Department of Homeland Security National Cyber Security Division's Software Assurance Program promotes the collaborative development of reliable measurement instruments and standards, opportunities for the exchange and dissemination of knowledge, a skilled workforce, and a secure software supply chain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moving Toward Trustworthy Systems: R&D Essentials

    Publication Year: 2010, Page(s):31 - 40
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1749 KB) | HTML iconHTML

    Under the game-change metaphor, strategies developed to address hard problems will potentially lead to breakthroughs in many different interrelated cybersecurity areas. For software assurance, a game change should focus on improving resiliency and hardening new technologies that implement moving-target defenses and tailored trustworthy spaces. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fitting Software Assurance into Higher Education

    Publication Year: 2010, Page(s):41 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1717 KB) | HTML iconHTML

    As software dependence reaches critical levels, threats become more pervasive, and losses become more costly, higher education must place more value on the tenets of software assurance. Courses must focus not only on security but on providing justified confidence in the software or system throughout its life cycle. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interview: Software Security in the Real World

    Publication Year: 2010, Page(s):47 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1512 KB) | HTML iconHTML

    In an interview conducted by Computer editorial board member Ann E.K. Sobel, Cigital CTO Gary McGraw discusses the state of software security and the BSIMM—a data-driven research project describing and measuring what successful organizations are doing to ensure software security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Analysis of Scientific Workflows: A Gateway to Reuse

    Publication Year: 2010, Page(s):54 - 61
    Cited by:  Papers (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3039 KB) | HTML iconHTML

    Online workflow repositories let scientists share successful experimental routines and compose new workflows from best practices and existing service components. The authors share the results of a social network analysis of the myExperiment workflow repository to assess the state of scientific workflow reuse and propose the CASE framework to facilitate such reuse. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effect of Omitted-Variable Bias on the Evaluation of Compiler Optimizations

    Publication Year: 2010, Page(s):62 - 67
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (974 KB) | HTML iconHTML

    Experiments that do not account for all relevant variables can produce misleading results. The authors identify two variables that compiler optimization evaluations often omit, resulting in significant omittedvariable bias, and discuss how to identify new OVB sources and incorporate them in an experimental design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career opportunities

    Publication Year: 2010, Page(s):68 - 73
    Request permission for commercial reuse | PDF file iconPDF (2068 KB)
    Freely Available from IEEE
  • Society Honors Five Top Computing Professionals

    Publication Year: 2010, Page(s):74 - 76
    Request permission for commercial reuse | PDF file iconPDF (1781 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2010, Page(s):77 - 78
    Request permission for commercial reuse | PDF file iconPDF (798 KB)
    Freely Available from IEEE
  • IT Value: From Moore's Law to a Flat World

    Publication Year: 2010, Page(s):79 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (14441 KB) | HTML iconHTML
    Freely Available from IEEE
  • Online Experiments: Practical Lessons

    Publication Year: 2010, Page(s):82 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (1168 KB) | HTML iconHTML
    Freely Available from IEEE
  • A Tale of Two Green Lists

    Publication Year: 2010, Page(s):86 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (847 KB) | HTML iconHTML

    The SPECpower benchmark and the Green500 list make it possible to track energy-efficiency gains in both servers and supercomputers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICPP

    Publication Year: 2010, Page(s): 89
    Request permission for commercial reuse | PDF file iconPDF (453 KB)
    Freely Available from IEEE
  • Seven Digital Steps to Avoid Utter Hell

    Publication Year: 2010, Page(s):92 - 91
    Request permission for commercial reuse | PDF file iconPDF (432 KB) | HTML iconHTML
    Freely Available from IEEE
  • Compsac [advertisement]

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (891 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org