Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 7 • July 2011

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (28098 KB)
    Freely Available from IEEE
  • CSDA and CSDP [advertisement]

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (6608 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1137 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2011, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (748 KB)
    Freely Available from IEEE
  • Experienced Hands

    Publication Year: 2011, Page(s):6 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    Social networking has neither altered the way that technical knowledge is presented nor has it dislodged computer science from its central place in the technical canon. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 and 16 Years Ago

    Publication Year: 2011, Page(s):9 - 10
    Request permission for commercial reuse | PDF file iconPDF (361 KB) | HTML iconHTML
    Freely Available from IEEE
  • Ten Things to Know When Applying for a Patent

    Publication Year: 2011, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1407 KB) | HTML iconHTML

    The first in a series of three articles provides basic points to keep in mind when filing for a patent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Problem with Cloud-Computing Standardization

    Publication Year: 2011, Page(s):13 - 16
    Cited by:  Papers (8)
    Request permission for commercial reuse | PDF file iconPDF (1201 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2011, Page(s):17 - 19
    Request permission for commercial reuse | PDF file iconPDF (1306 KB) | HTML iconHTML
    Freely Available from IEEE
  • [CS Info Page]

    Publication Year: 2011, Page(s): 20
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • The Emergence of Social and Community Intelligence

    Publication Year: 2011, Page(s):21 - 28
    Cited by:  Papers (63)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1313 KB) | HTML iconHTML

    Social and community intelligence research aims to reveal individual and group behaviors, social interactions, and community dynamics by mining the digital traces that people leave while interacting with Web applications, static infrastructure, and mobile and wearable devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Career Center [advertisement]

    Publication Year: 2011, Page(s): 29
    Request permission for commercial reuse | PDF file iconPDF (681 KB)
    Freely Available from IEEE
  • Computational Archaeology: Reviving the Past with Present-Day Tools

    Publication Year: 2011, Page(s):30 - 31
    Request permission for commercial reuse | PDF file iconPDF (15054 KB) | HTML iconHTML
    Freely Available from IEEE
  • Using Computation to Decode the First Known Computer

    Publication Year: 2011, Page(s):32 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5410 KB) | HTML iconHTML

    Researchers have used many different kinds of software to analyze the structure and astronomical functions of the Antikythera mechanism's surviving fragments. This ancient Greek calculator contains 30 gear wheels and has an extraordinarily sophisticated mechanical design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Sites to Landscapes: How Computing Technology Is Shaping Archaeological Practice

    Publication Year: 2011, Page(s):40 - 46
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7972 KB) | HTML iconHTML

    Remote sensing, powerful computing engines, and agent-based models offer new ways to interpret data and broaden data collection, moving archaeologists closer to their ultimate goal of approximating the individual within an extensive, interpreted, digital environment. The first Web extra is a video that demonstrates how the advanced acquisition and processing of magnetic data has led to new discove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Digital Library [advertisement]

    Publication Year: 2011, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (4372 KB)
    Freely Available from IEEE
  • 3D Models for Cultural Heritage: Beyond Plain Visualization

    Publication Year: 2011, Page(s):48 - 55
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7785 KB) | HTML iconHTML

    Digital technologies are transforming the way cultural heritage researchers, archaeologists, and curators work by providing new ways to collaborate, record excavations, and restore artifacts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dealing with Archaeology's Data Avalanche

    Publication Year: 2011, Page(s):56 - 60
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5653 KB) | HTML iconHTML

    The increasing availability and relatively low cost of digital data collection technologies have created a data avalanche for archaeologists. In this paper, we discuss a system that integrates geographic information system (GlS)-based artifact and material sample data sets with massive point clouds within an interactive visual analysis environment. Our system lets researchers revisit archeological... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Membership [advertisement]

    Publication Year: 2011, Page(s): 61
    Request permission for commercial reuse | PDF file iconPDF (556 KB)
    Freely Available from IEEE
  • Computer-Assisted Archaeological Line Drawing

    Publication Year: 2011, Page(s):62 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5081 KB) | HTML iconHTML

    Traditional 2D line-drawing methods are mostly manual and hence quite laborious. A new 3D-model-assisted approach makes archaeological reports more accurate, efficient, and informative. The Web extra is a video that shows a new computer-assisted archaeological line drawing approach and its application in the investigation of the Longmen Grottoes, a cultural heritage site in China. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges

    Publication Year: 2011, Page(s):66 - 74
    Cited by:  Papers (36)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2167 KB) | HTML iconHTML

    Globalization of the semiconductor industry and associated supply chains have made integrated circuits increasingly vulnerable to Trojans. Researchers must expand efforts to verify trust in intellectual property cores and ICs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf

    Publication Year: 2011, Page(s): 75
    Request permission for commercial reuse | PDF file iconPDF (593 KB) | HTML iconHTML
    Freely Available from IEEE
  • Career opportunities

    Publication Year: 2011, Page(s):76 - 87
    Request permission for commercial reuse | PDF file iconPDF (1857 KB)
    Freely Available from IEEE
  • Computer Society Connection

    Publication Year: 2011, Page(s):88 - 90
    Request permission for commercial reuse | PDF file iconPDF (1419 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org