By Topic

Computer

Issue 1 • Date Jan. 2012

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1223 KB)
    Freely Available from IEEE
  • Advertisement - Jobs Board

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (10531 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (969 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2012, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1162 KB)
    Freely Available from IEEE
  • Creating Our Future

    Publication Year: 2012, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (266 KB) | HTML iconHTML
    Freely Available from IEEE
  • Digital Computer: The Next-Generation Flagship Publication

    Publication Year: 2012, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (414 KB) | HTML iconHTML Multimedia Media
    Freely Available from IEEE
  • The Second-Order Effects of Steve Jobs

    Publication Year: 2012, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (604 KB) | HTML iconHTML Multimedia Media
    Freely Available from IEEE
  • 32 & 16 years ago

    Publication Year: 2012, Page(s):12 - 13
    Request permission for commercial reuse | PDF file iconPDF (550 KB)
    Freely Available from IEEE
  • Intellectual Property, Part I

    Publication Year: 2012, Page(s):14 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10153 KB) | HTML iconHTML Multimedia Media

    The first in a series of articles providing basic information on legal issues facing people and businesses that operate in computing-related markets focuses on protection and enforcement of intellectual property rights. This Web extra podcast features Brian M. Gaff and Ralph A. Loren of Edwards Wildman Palmer LLP discuss protection and enforcement of intellectual property (IP) rights. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Challenges of Securing the Virtualized Environment

    Publication Year: 2012, Page(s):17 - 20
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (472 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2012, Page(s):21 - 23
    Request permission for commercial reuse | PDF file iconPDF (920 KB) | HTML iconHTML
    Freely Available from IEEE
  • [CS Info Page]

    Publication Year: 2012, Page(s): 24
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Imagining the Future: Thoughts on Computing

    Publication Year: 2012, Page(s):25 - 30
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML Multimedia Media

    New and compelling ideas are transforming the future of computing, bringing about a plethora of changes that have significant implications for our profession and our society and raising some profound technical questions. This Web extra video interview features Dan Reed of Microsoft giving us a sense of how new cloud architectures and cloud capabilities will begin to move computer science education... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Society's Nervous System: Building Effective Government, Energy, and Public Health Systems

    Publication Year: 2012, Page(s):31 - 38
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5569 KB) | HTML iconHTML

    What is the potential for pervasive sensing and mobile computing over the next decade, and what are the challenges that researchers will have to face to realize this potential? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Data Protection for the Masses

    Publication Year: 2012, Page(s):39 - 45
    Cited by:  Papers (23)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1190 KB) | HTML iconHTML

    Offering strong data protection to cloud users while enabling rich applications is a challenging task. Researchers explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertisement - Stay connected

    Publication Year: 2012, Page(s): 46
    Request permission for commercial reuse | PDF file iconPDF (3000 KB)
    Freely Available from IEEE
  • Software Development for Infrastructure

    Publication Year: 2012, Page(s):47 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1826 KB) | HTML iconHTML Multimedia Media

    Infrastructure software needs more stringent correctness, reliability, efficiency, and maintainability requirements than non- essential applications. This implies greater emphasis on up-front design, static structure enforced by a type system, compact data structures, simplified code structure, and improved tool support. Education for infrastructure and application developers should differ to refl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward More Precise Radiotherapy Treatment of Lung Tumors

    Publication Year: 2012, Page(s):59 - 65
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2535 KB) | HTML iconHTML

    A computational framework for modeling the respiratory motion of lung tumors provides a 4D parametric representation that tracks, analyzes, and models movement to provide more accurate guidance in the planning and delivery of lung tumor radiotherapy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Service Federation Trustworthiness through Online Testing

    Publication Year: 2012, Page(s):66 - 72
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1219 KB) | HTML iconHTML

    Security, data protection, trust management, authentication, and authorization are crucial assets in the Internet of Services. Online testing enhances trustworthiness among federated services that are often independently developed, deployed, and maintained. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two CS Members Win US Presidential Honors

    Publication Year: 2012, Page(s):73 - 76
    Request permission for commercial reuse | PDF file iconPDF (3390 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2012, Page(s):77 - 78
    Request permission for commercial reuse | PDF file iconPDF (353 KB)
    Freely Available from IEEE
  • Automatic Detection of Altered Fingerprints

    Publication Year: 2012, Page(s):79 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6215 KB) | HTML iconHTML Multimedia Media

    A new algorithm detects changes to fingerprints due to mutilation and other similar measures criminals use to evade identification. This Web extra video features Karl Ricanek of the University of North Carolina Wilmington providing an overview of the 2011 International Joint Conference on Biometrics, and Charles Severance, Computer's multimedia editor, interviewing several conference attendees fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Java Tree Withers

    Publication Year: 2012, Page(s):83 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (686 KB) | HTML iconHTML

    One of Java's key strengths is its portability. The Java virtual machine (JVM) is a high-performance, portable, and successful substrate. However, the tectonic shift in Java ownership (from Sun to Oracle) has caused aftershocks, destabilizing Java APIs. This has been exacerbated by neglect and deprecation. Deprecation warnings aren't generally deemed serious, as programs continue to run. However, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identity Theft and Financial Fraud: Some Strangeness in the Proportions

    Publication Year: 2012, Page(s):86 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    If we can't trust banks, healthcare providers, colleges, and government entities to protect our privacy, who can we trust? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com