Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Computer

Issue 12 • Dec. 2011

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2077 KB)
    Freely Available from IEEE
  • Saint Ad

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (375 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2011, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (975 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2011, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1201 KB)
    Freely Available from IEEE
  • Letters

    Publication Year: 2011, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (2903 KB) | HTML iconHTML
    Freely Available from IEEE
  • Looking Back, Looking Forward

    Publication Year: 2011, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (923 KB) | HTML iconHTML
    Freely Available from IEEE
  • CS Info Page

    Publication Year: 2011, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Uncharted Territory

    Publication Year: 2011, Page(s):12 - 14
    Request permission for commercial reuse | PDF file iconPDF (671 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 and 16 Years Ago

    Publication Year: 2011, Page(s):15 - 16
    Request permission for commercial reuse | PDF file iconPDF (369 KB) | HTML iconHTML
    Freely Available from IEEE
  • Internet Security under Attack: The Undermining of Digital Certificates

    Publication Year: 2011, Page(s):17 - 20
    Cited by:  Papers (10)
    Request permission for commercial reuse | PDF file iconPDF (1529 KB) | HTML iconHTML
    Freely Available from IEEE
  • Serious Security Flaws Identified in Cloud Systems

    Publication Year: 2011, Page(s):21 - 23
    Request permission for commercial reuse | PDF file iconPDF (4000 KB) | HTML iconHTML
    Freely Available from IEEE
  • Morgan Kaufmann Ad

    Publication Year: 2011, Page(s): 24
    Request permission for commercial reuse | PDF file iconPDF (3350 KB)
    Freely Available from IEEE
  • Two Approaches to Interdisciplinary Computing+Music Courses

    Publication Year: 2011, Page(s):25 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3174 KB) | HTML iconHTML

    The developers of a university curriculum designed to bridge the gaps between the two disciplines have found that there are numerous ways to introduce arts majors to computing, and science and engineering majors to the arts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adapting a Virtual World for Theatrical Performance

    Publication Year: 2011, Page(s):33 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2501 KB) | HTML iconHTML

    Virtual reality technology now makes it possible to completely realize theatrical performances in a virtual space, but existing virtual world interfaces are too cumbersome for this purpose. Researchers are working to develop virtual theatre systems with more natural and intuitive interfaces. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cultural Analytics in Large-Scale Visualization Environments

    Publication Year: 2011, Page(s):39 - 48
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5818 KB) | HTML iconHTML

    Researchers can use a large-scale collaborative digital workspace combined with visual analysis techniques to progressively develop and refine hypotheses to apply in gaining new insights into large, digital image collections. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Back to Thin-Core Massively Parallel Processors

    Publication Year: 2011, Page(s):49 - 54
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (890 KB) | HTML iconHTML

    Examination of the innovations of the past three decades that brought chips to the point at which many-core processors are possible reveals that there are multiple roads ahead, and each is full of challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rural Outsourcing: Delivering ITO and BPO Services from Remote Domestic Locations

    Publication Year: 2011, Page(s):55 - 62
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2645 KB) | HTML iconHTML

    IT and business process outsourcing providers are building delivery centers in remote domestic locations for several reasons, including to access a more stable, lower-cost workforce and to fulfill social missions such as employing underprivileged or minority populations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering City Dynamics through Sports Tracking Applications

    Publication Year: 2011, Page(s):63 - 68
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3882 KB) | HTML iconHTML

    Researchers can use kernel density estimation to analyze spatiotemporal data from mobile devices to uncover human mobility patterns in urban spaces. Such analysis can support various applications ranging from location-based services to urban planning. To better understand city dynamics, we analyzed a large dataset of mobility tracks related to various sports activities. For this purpose, we applie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grier Voted 2012 Computer Society President-Elect

    Publication Year: 2011, Page(s):69 - 70
    Request permission for commercial reuse | PDF file iconPDF (713 KB)
    Freely Available from IEEE
  • North America New PhD Numbers Hold Steady

    Publication Year: 2011, Page(s):71 - 73
    Request permission for commercial reuse | PDF file iconPDF (4662 KB) | HTML iconHTML
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2011, Page(s):74 - 76
    Request permission for commercial reuse | PDF file iconPDF (936 KB)
    Freely Available from IEEE
  • Using Process Mining to Bridge the Gap between BI and BPM

    Publication Year: 2011, Page(s):77 - 80
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1933 KB) | HTML iconHTML

    Process mining techniques enable process-centric analytics through automated process discovery, conformance checking, and model enhancement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Computer Science a Relevant Academic Discipline for the 21st Century?

    Publication Year: 2011, Page(s):81 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3322 KB) | HTML iconHTML

    The current view of computing as technology overlooks the discipline's theoretical and scientific foundations in computer science, weakening the entire computing enterprise. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PossessedHand: Controlling Hand Movements with Computer Output

    Publication Year: 2011, Page(s):84 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2249 KB) | HTML iconHTML

    A prototype HCI system demonstrates the effectiveness of using computer-generated electrical stimulation to control muscles. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org