By Topic

Computer

Issue 10 • Date Oct. 2010

Filter Results

Displaying Results 1 - 25 of 30
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2927 KB)
    Freely Available from IEEE
  • Citrix [advertisement]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (2459 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1315 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2010, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (629 KB)
    Freely Available from IEEE
  • Letters

    Publication Year: 2010, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (410 KB) | HTML iconHTML
    Freely Available from IEEE
  • In Memoriam: Scott Hamilton

    Publication Year: 2010, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (126 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Curious and the Confident

    Publication Year: 2010, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (535 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 and 16 Years Ago

    Publication Year: 2010, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1978 and 1994. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network-Usage Changes Push Internet Traffic to the Edge

    Publication Year: 2010, Page(s):13 - 15
    Cited by:  Papers (9)
    Request permission for commercial reuse | PDF file iconPDF (659 KB) | HTML iconHTML
    Freely Available from IEEE
  • UNCC

    Publication Year: 2010, Page(s): 16
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • News briefs

    Publication Year: 2010, Page(s):17 - 20
    Request permission for commercial reuse | PDF file iconPDF (2517 KB) | HTML iconHTML
    Freely Available from IEEE
  • [CS Info Page]

    Publication Year: 2010, Page(s): 21
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Reforming ICT Graduate Programs to Meet Professional Needs

    Publication Year: 2010, Page(s):22 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2164 KB) | HTML iconHTML

    A cross-analysis of EU masters' programs and professional profiles in information and communication technology reveals deficiencies in many areas. Reform initiatives are already addressing some of these deficiencies, but work remains. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ending Piracy of Integrated Circuits

    Publication Year: 2010, Page(s):30 - 38
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4507 KB) | HTML iconHTML

    An effective technique to combat IC piracy is to render infringement impractical by making physical tampering unprofitable and attacks computationally infeasible. EPIC accomplishes this using a novel low-overhead combinational chip-locking system and a chip-activation protocol based on public-key cryptography. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trustworthy Hardware: Identifying and Classifying Hardware Trojans

    Publication Year: 2010, Page(s):39 - 46
    Cited by:  Papers (100)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (15857 KB) | HTML iconHTML

    For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new hardware Trojan taxonomy provides a first step in better understanding existing and potential threats. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Computing in Developing Economies

    Publication Year: 2010, Page(s):47 - 55
    Cited by:  Papers (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1320 KB) | HTML iconHTML

    The developing world must exploit the opportunities afforded by cloud computing while minimizing the associated risks to allow access to advanced IT infrastructure, data centers, and applications and protect sensitive information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scenario-Based Resource Prediction for QoS-Aware Media Processing

    Publication Year: 2010, Page(s):56 - 63
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1704 KB) | HTML iconHTML

    Media streams can be annotated with platform-independent scenario information to reflect frame-level decode complexity. This enables energy-efficient decoding, resource prediction, and quality-of-service management on single-core as well as multicore processors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Society Forms New Technical Committee on Semantic Computing

    Publication Year: 2010, Page(s):64 - 65
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2010, Page(s):66 - 67
    Request permission for commercial reuse | PDF file iconPDF (808 KB)
    Freely Available from IEEE
  • Career opportunities

    Publication Year: 2010, Page(s):68 - 75
    Request permission for commercial reuse | PDF file iconPDF (2054 KB)
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2010, Page(s): 76
    Request permission for commercial reuse | PDF file iconPDF (401 KB) | HTML iconHTML
    Freely Available from IEEE
  • Mining Electronic Health Records

    Publication Year: 2010, Page(s):77 - 81
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2725 KB) | HTML iconHTML

    Initial efforts to mine electronic health records are unlikely to yield many Eureka insights, but there are many opportunities for improving the delivery, efficiency, and effectiveness of healthcare. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What Should All CS Graduates Know?

    Publication Year: 2010, Page(s):82 - 84
    Request permission for commercial reuse | PDF file iconPDF (1206 KB) | HTML iconHTML
    Freely Available from IEEE
  • In Trust We Trust

    Publication Year: 2010, Page(s):85 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1389 KB) | HTML iconHTML

    Trust isn't a static property; it must be evaluated perpetually. Can we regain trust? Can the level of trust ever be the same? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com