Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Computer

Issue 2 • Feb. 2012

Filter Results

Displaying Results 1 - 25 of 34
  • Front Cover

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1236 KB)
    Freely Available from IEEE
  • IEEE Xplore Digital Library [advertisement]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (239 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (979 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2012, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1476 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2012, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (140 KB) | HTML iconHTML
    Freely Available from IEEE
  • JavaScript: Designing a Language in 10 Days

    Publication Year: 2012, Page(s):7 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1349 KB) | HTML iconHTML

    The evolution and use of JavaScript, a language developed in 10 days back in 1995, is really just getting started. The featured Web extra is a video interview with Mozilla's Chief Technology Officer (and JavaScript's creator), Brendan Eich. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intellectual Property, Part II

    Publication Year: 2012, Page(s):9 - 11
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5341 KB) | HTML iconHTML

    The second in a series of articles providing basic information on legal issues facing people and businesses that operate in computing-related markets focuses on the enforcement of intellectual property rights. The featured Web extra is an audio podcast by Brian M. Gaff and Ralph A. Loren, two of the article's coauthors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 years ago

    Publication Year: 2012, Page(s):12 - 13
    Request permission for commercial reuse | PDF file iconPDF (377 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cloud Streaming Brings Video to Mobile Devices

    Publication Year: 2012, Page(s):14 - 16
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1344 KB) | HTML iconHTML

    For wireless adoption to continue growing, mobile devices' capabilities may have to expand, particularly in areas such as video streaming, gaming, and graphics-intensive applications. Cloud streaming promises to let resource-constrained mobile devices provide such capabilities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2012, Page(s):17 - 19
    Cited by:  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (1051 KB) | HTML iconHTML
    Freely Available from IEEE
  • [CS Info Page]

    Publication Year: 2012, Page(s): 20
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • Guest Editor's Introduction: The CAP Theorem's Growing Impact

    Publication Year: 2012, Page(s):21 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (872 KB) | HTML iconHTML
    Freely Available from IEEE
  • CAP twelve years later: How the "rules" have changed

    Publication Year: 2012, Page(s):23 - 29
    Cited by:  Papers (86)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5711 KB) | HTML iconHTML

    The CAP theorem asserts that any networked shared-data system can have only two of three desirable properties. However, by explicitly handling partitions, designers can optimize consistency and availability, thereby achieving some trade-off of all three. The featured Web extra is a podcast from Software Engineering Radio, in which the host interviews Dwight Merriman about the emerging NoSQL moveme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perspectives on the CAP Theorem

    Publication Year: 2012, Page(s):30 - 36
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1710 KB) | HTML iconHTML

    The CAP theorem is one example of a more general tradeoff between safety and liveness in unreliable systems. Viewing CAP in this context provides insight into the inherent tradeoffs and the manner in which they can be circumvented in practice. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistency Tradeoffs in Modern Distributed Database System Design: CAP is Only Part of the Story

    Publication Year: 2012, Page(s):37 - 42
    Cited by:  Papers (66)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB) | HTML iconHTML

    The CAP theorem's impact on modern distributed database system design is more limited than is often perceived. Another tradeoff-between consistency and latency -has had a more direct influence on several well-known DDBSs. A proposed new formulation, PACELC, unifies this tradeoff with CAP. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CAP and Cloud Data Management

    Publication Year: 2012, Page(s):43 - 49
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1229 KB) | HTML iconHTML

    Novel systems that scale out on demand, relying on replicated data and massively distributed architectures with clusters of thousands of machines, particularly those designed for real-time data serving and update workloads, amply illustrate the realities of the CAP theorem. The featured Web extra is a video interview with Yahoo's Raghu Ramakrishnan about CAP and the cloud. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overcoming CAP with Consistent Soft-State Replication

    Publication Year: 2012, Page(s):50 - 58
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3811 KB) | HTML iconHTML

    New data-consistency models make it possible for cloud computing developers to replicate soft state without encountering the limitations associated with the CAP theorem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Security: New Threats or Familiar Problems?

    Publication Year: 2012, Page(s):59 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2689 KB) | HTML iconHTML

    Although attack vectors on data and telecommunications infrastructures have changed in the past 40 years, attack types remain eerily similar. Perhaps the focus should be less on computers and networks and more on the threat itself. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending against Web Application Vulnerabilities

    Publication Year: 2012, Page(s):66 - 72
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2869 KB) | HTML iconHTML

    Although no single tool or technique can guard against the host of possible attacks, a defense-in-depth approach, with overlapping protections, can help secure Web applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering the Ebb and Flow of Ideas from Text Corpora

    Publication Year: 2012, Page(s):73 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5912 KB) | HTML iconHTML

    Changes in word usage patterns in text corpora can yield insight into historic events and discoveries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tabletops: Interactive Horizontal Displays for Ubiquitous Computing

    Publication Year: 2012, Page(s):78 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2358 KB) | HTML iconHTML

    The hype cycle points to widespread adoption of tabletop systems within the next decade. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Security into Off-the-Shelf Smartphones

    Publication Year: 2012, Page(s):82 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1994 KB) | HTML iconHTML

    Quantifying mobile application functionality and enforcing a finer-grained permission model would identify and thus thwart a wide range of malware. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Independent Social Game Company's Perspective

    Publication Year: 2012, Page(s):85 - 87
    Request permission for commercial reuse | PDF file iconPDF (1639 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Next Step for Ethics Education Is Enforcing the Code

    Publication Year: 2012, Page(s):88 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB) | HTML iconHTML

    If the university's corporate culture doesn't encourage compliance with our code of ethics, our classroom teaching on the topic is unlikely to be effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org