Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Computer

Issue 11 • Date Nov. 2011

Filter Results

Displaying Results 1 - 25 of 31
  • [Front cover]

    Publication Year: 2011 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (5991 KB)  
    Freely Available from IEEE
  • chist-era Ad

    Publication Year: 2011 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (1655 KB)  
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2011 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (193 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (881 KB)  
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2011 , Page(s): 4 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (948 KB)  
    Freely Available from IEEE
  • The Honest Give-and-Take

    Publication Year: 2011 , Page(s): 6 - 8
    Save to Project icon | Request Permissions | PDF file iconPDF (1115 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • 32 and 16 Years Ago

    Publication Year: 2011 , Page(s): 9 - 10
    Save to Project icon | Request Permissions | PDF file iconPDF (365 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Turning on the Lights for Wireless Communications

    Publication Year: 2011 , Page(s): 11 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1124 KB) |  | HTML iconHTML  

    In the ongoing search for better ways to transmit data, researchers have turned to a wireless approach that has been discussed for years: visible light communications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System Identifies User Location without GPS or Wi-Fi

    Publication Year: 2011 , Page(s): 15 - 17
    Save to Project icon | Request Permissions | PDF file iconPDF (2090 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Computer Digital [advertisement]

    Publication Year: 2011 , Page(s): 18
    Save to Project icon | Request Permissions | PDF file iconPDF (3096 KB)  
    Freely Available from IEEE
  • Codesign for Systems and Applications: Charting the Path to Exascale Computing

    Publication Year: 2011 , Page(s): 19 - 21
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | PDF file iconPDF (791 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Rethinking Hardware-Software Codesign for Exascale Systems

    Publication Year: 2011 , Page(s): 22 - 30
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2911 KB) |  | HTML iconHTML  

    The rapid and disruptive changes anticipated in hardware design over this next decade necessitate a more agile development process, such as the hardware-software co-design processes developed for rapid product development in the embedded space. This article will describe the structure of the co-design process as applied to supercomputing systems, introduce the role of architectural simulation and code analysis to enable co-design, and describe the CoDEx project that is developing tools to accelerate the iterative co-design cycle for the DOE exascale computing program. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Codesign for InfiniBand Clusters

    Publication Year: 2011 , Page(s): 31 - 36
    Multimedia
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1593 KB) |  | HTML iconHTML  

    Codesigning applications and communication libraries to leverage underlying network features is imperative for achieving optimal performance on modern computing clusters. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Codesign Challenges for Exascale Systems: Performance, Power, and Reliability

    Publication Year: 2011 , Page(s): 37 - 43
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2091 KB) |  | HTML iconHTML  

    The complexity of large-scale parallel systems necessitates the simultaneous optimization of multiple hardware and software components to meet performance, efficiency, and fault-tolerance goals. A codesign methodology using modeling can benefit systems on the path to exascale computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The iPlant Collaborative: Cyberinfrastructure to Feed the World

    Publication Year: 2011 , Page(s): 44 - 52
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2896 KB) |  | HTML iconHTML  

    As plant biology becomes a data-driven science, new computing technologies are needed to address many formidable challenges. The iPlant Collaborative provides cyberinfrastructure for researchers and developers to collaborate in creating better tools, workflows, algorithms, and ontologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending against Buffer-Overflow Vulnerabilities

    Publication Year: 2011 , Page(s): 53 - 60
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1126 KB) |  | HTML iconHTML  

    A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithmic Trading

    Publication Year: 2011 , Page(s): 61 - 69
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2386 KB) |  | HTML iconHTML  

    In electronic financial markets, algorithmic trading refers to the use of computer programs to automate one or more stages of the trading process: pretrade analysis (data analysis), trading signal generation (buy and sell recommendations), and trade execution. Trade execution is further divided into agency/broker execution (when a system optimizes the execution of a trade on behalf of a client) and principal/proprietary trading (where an institution trades on its own account). Each stage of this trading process can be conducted by humans, by humans and algorithms, or fully by algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chuck Seitz Wins Cray Award

    Publication Year: 2011 , Page(s): 70 - 72
    Save to Project icon | Request Permissions | PDF file iconPDF (1656 KB)  
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2011 , Page(s): 73 - 74
    Save to Project icon | Request Permissions | PDF file iconPDF (582 KB)  
    Freely Available from IEEE
  • End-to-End Energy Management

    Publication Year: 2011 , Page(s): 75 - 77
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (708 KB) |  | HTML iconHTML  

    In reality, energy is task- not system-centric. Several disparate systems, or systems of systems, collectively use energy to accomplish a given task and satisfy service-level expectations. Consider, for example, someone who takes a photo with a smartphone and sends it to a friend. Taking and transmitting the photo consumes energy from the smart phone, the data transfer consumes energy from the Internet routers, and the recipient's local system consumes energy to display the image. To improve energy efficiency, we must consider the end-to-end energy use of a task involving multiple computer systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Info Page

    Publication Year: 2011 , Page(s): 78
    Save to Project icon | Request Permissions | PDF file iconPDF (133 KB)  
    Freely Available from IEEE
  • Human Ear Recognition

    Publication Year: 2011 , Page(s): 79 - 81
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1767 KB) |  | HTML iconHTML  

    Currently, there are no commercially available ear recognition systems. However, the future holds tremendous potential for incorporating ear images with face images in a multibiometric configuration, even as researchers continue to refine the technology. For example, assigning an ear image to one of several predefined categories could allow for rapid retrieval of candidate identities from a large database. In addition, the use of ear thermograms could help mitigate the problem of occlusion due to hair and accessories. As the technology matures, both forensic and biometric domains will benefit from this biometric. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Pubs Ad

    Publication Year: 2011 , Page(s): 82
    Save to Project icon | Request Permissions | PDF file iconPDF (3980 KB)  
    Freely Available from IEEE
  • Opportunities in the Mobile Search Market

    Publication Year: 2011 , Page(s): 83 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (753 KB) |  | HTML iconHTML  

    Success in the mobile search market will come to those who provide value-added apps that exploit unique mobile functionalities, especially those related to personalized and context-based services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Social Media Ad

    Publication Year: 2011 , Page(s): 86
    Save to Project icon | Request Permissions | PDF file iconPDF (2986 KB)  
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes highly acclaimed peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com