By Topic

Computer

Issue 9 • Date Sept. 2011

Filter Results

Displaying Results 1 - 25 of 35
  • [Front cover]

    Publication Year: 2011 , Page(s): c1
    Request Permissions | PDF file iconPDF (2912 KB)  
    Freely Available from IEEE
  • ICPP

    Publication Year: 2011 , Page(s): c2
    Request Permissions | PDF file iconPDF (794 KB)  
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2011 , Page(s): 1
    Request Permissions | PDF file iconPDF (191 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): 2 - 3
    Request Permissions | PDF file iconPDF (446 KB)  
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2011 , Page(s): 4 - 5
    Request Permissions | PDF file iconPDF (869 KB)  
    Freely Available from IEEE
  • Leisure Science

    Publication Year: 2011 , Page(s): 6 - 8
    Request Permissions | PDF file iconPDF (644 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • 32 and 16 Years Ago

    Publication Year: 2011 , Page(s): 9 - 10
    Request Permissions | PDF file iconPDF (359 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Ten Things to Know When Your Patent Application Is Allowed

    Publication Year: 2011 , Page(s): 11 - 13
    Request Permissions | PDF file iconPDF (1479 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • IPv6: Any Closer to Adoption?

    Publication Year: 2011 , Page(s): 14 - 16
    Cited by:  Papers (1)
    Request Permissions | PDF file iconPDF (638 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • APC Ad

    Publication Year: 2011 , Page(s): 17
    Request Permissions | PDF file iconPDF (1376 KB)  
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2011 , Page(s): 18 - 20
    Request Permissions | PDF file iconPDF (712 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Security and Privacy in an Online World

    Publication Year: 2011 , Page(s): 21 - 22
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1421 KB) |  | HTML iconHTML  

    Due to the amazing advances in information and communications technologies, we're heading for an online world in which convenience goods have unprecedented computing power and are permanently connected to the Internet or stored in the cloud. The Internet is everywhere, and now people are talk ing about the Internet of Things (IoT). Look at your own belongings; it's likely that you carry around at ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Malicious and Spam Posts in Online Social Networks

    Publication Year: 2011 , Page(s): 23 - 28
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1977 KB) |  | HTML iconHTML  

    A large-scale study of more than half a million Facebook posts suggests that members of online social networks can expect a significant chance of encountering spam posts and a much lower but not negligible chance of coming across malicious links. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives

    Publication Year: 2011 , Page(s): 29 - 36
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1101 KB) |  | HTML iconHTML  

    The same-origin policy, a fundamental security mechanism within Web browsers, overly restricts Web application development while creating an ever-growing list of security holes, reinforcing the argument that the SOP is not an appropriate security model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [CS Info Page]

    Publication Year: 2011 , Page(s): 37
    Request Permissions | PDF file iconPDF (128 KB)  
    Freely Available from IEEE
  • Secure Collaborative Supply-Chain Management

    Publication Year: 2011 , Page(s): 38 - 43
    Cited by:  Papers (3)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1424 KB) |  | HTML iconHTML  

    The SecureSCM project demonstrates the practical applicability of secure multiparty computation to online business collaboration. A prototype supply-chain management system protects the confidentiality of private data while rapidly adapting to changing business needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Final Frontier: Confidentiality and Privacy in the Cloud

    Publication Year: 2011 , Page(s): 44 - 50
    Cited by:  Papers (5)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2336 KB) |  | HTML iconHTML  

    The boundary between the trusted inside and the untrusted outside blurs when a company adopts cloud computing. The organization's applications-and data-are no longer onsite, fundamentally changing the definition of a malicious insider. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing the Internet of Things

    Publication Year: 2011 , Page(s): 51 - 58
    Cited by:  Papers (25)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2131 KB) |  | HTML iconHTML  

    This paper presents security of Internet of things. In the Internet of Things vision, every physical object has a virtual component that can produce and consume services Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. The Internet and its users are already under continual attack, and a grow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement - CS Jobs]

    Publication Year: 2011 , Page(s): 59
    Request Permissions | PDF file iconPDF (10520 KB)  
    Freely Available from IEEE
  • Sticky Policies: An Approach for Managing Privacy across Multiple Parties

    Publication Year: 2011 , Page(s): 60 - 68
    Cited by:  Papers (3)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1435 KB) |  | HTML iconHTML  

    Machine-readable policies can stick to data to define allowed usage and obligations as it travels across multiple parties, enabling users to improve control over their personal information. The EnCoRe project has developed such a technical solution for privacy management that is suitable for use in a broad range of domains. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trends in Server Energy Proportionality

    Publication Year: 2011 , Page(s): 69 - 72
    Cited by:  Papers (7)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1748 KB) |  | HTML iconHTML  

    Energy proportionality should be a key target in future server design. Although energy proportionality, as quantified by the proposed EP metric, has improved significantly in recent years, much more can be done to move systems closer to ideal energy proportionality. Toward this end, we are pursuing a workload characterization and large-scale system simulation methodology for advising data center s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Three Rs of Cyberphysical Spaces

    Publication Year: 2011 , Page(s): 73 - 79
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2508 KB) |  | HTML iconHTML  

    The ability to identify people and answer questions about their where abouts in a cyberphysical space is critical to many applications. Integrating recognition with spatiotemporal reasoning enhances the overall performance of information retrieval. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career opportunities

    Publication Year: 2011 , Page(s): 80 - 86
    Request Permissions | PDF file iconPDF (6486 KB)  
    Freely Available from IEEE
  • Bookshelf

    Publication Year: 2011 , Page(s): 87
    Request Permissions | PDF file iconPDF (291 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Barrett Wins Pre-College Education Award

    Publication Year: 2011 , Page(s): 88 - 90
    Request Permissions | PDF file iconPDF (1371 KB)  
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com