By Topic

Computer

Issue 3 • Date March 2012

Filter Results

Displaying Results 1 - 25 of 33
  • Front Cover

    Publication Year: 2012 , Page(s): c1
    Request Permissions | PDF file iconPDF (1579 KB)  
    Freely Available from IEEE
  • Advertisement - 1&1 dynamic cloud server

    Publication Year: 2012 , Page(s): c2
    Request Permissions | PDF file iconPDF (8195 KB)  
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2012 , Page(s): 1
    Request Permissions | PDF file iconPDF (209 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): 2 - 3
    Request Permissions | PDF file iconPDF (1020 KB)  
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2012 , Page(s): 4 - 5
    Request Permissions | PDF file iconPDF (997 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Monash Museum of Computing History

    Publication Year: 2012 , Page(s): 6 - 7
    Request Permissions | PDF file iconPDF (823 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Privacy and Data Security

    Publication Year: 2012 , Page(s): 8 - 10
    Multimedia
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2266 KB) |  | HTML iconHTML  

    The third in a series of articles providing basic information on legal issues facing people and businesses that operate in computing-related markets focuses on the responsibility to ensure privacy and data security. The featured Web extra is an audio podcast by Brian M. Gaff and Thomas J. Smedinghoff, two of the article's coauthors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 years ago

    Publication Year: 2012 , Page(s): 11 - 12
    Request Permissions | PDF file iconPDF (381 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Wi-Fi Races into a Faster Future

    Publication Year: 2012 , Page(s): 13 - 16
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (10438 KB) |  | HTML iconHTML  

    For wireless adoption to continue growing, mobile devices' capabilities may have to expand, particularly in areas such as video streaming, gaming, and graphics-intensive applications. Cloud streaming promises to let resource-constrained mobile devices provide such capabilities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • APC Advertisement

    Publication Year: 2012 , Page(s): 17
    Request Permissions | PDF file iconPDF (1376 KB)  
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2012 , Page(s): 18 - 20
    Request Permissions | PDF file iconPDF (1390 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • CS Info Page

    Publication Year: 2012 , Page(s): 21
    Cited by:  Papers (1)
    Request Permissions | PDF file iconPDF (151 KB)  
    Freely Available from IEEE
  • Guest Editor's Introduction: Computationally Driven Experimental Biology

    Publication Year: 2012 , Page(s): 22 - 23
    Request Permissions | PDF file iconPDF (816 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Close Encounters of the Collaborative Kind

    Publication Year: 2012 , Page(s): 24 - 30
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1436 KB) |  | HTML iconHTML  

    The participants in a collaborative interdisciplinary project found that developing a shared, project-specific communication style helped them overcome cultural barriers, understand the nuances of each other's work, and enhance the accuracy, interpretability, and utility of their models. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Protein Interaction Networks to Understand Complex Diseases

    Publication Year: 2012 , Page(s): 31 - 38
    Multimedia
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2529 KB) |  | HTML iconHTML  

    Recent developments in biotechnology have enabled interrogation of the cell at various levels, leading to many types of "omic" data that provide valuable information on multiple genetic and environmental factors and their interactions. The featured Web extra is a video interview with Mehmet Koyutürk of Case Western Reserve about how biotechnology can track genetic markers to advance cancer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithms and Genome Sequencing: Identifying Driver Pathways in Cancer

    Publication Year: 2012 , Page(s): 39 - 46
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1622 KB) |  | HTML iconHTML  

    Two proposed algorithms predict which combinations of mutations in cancer genomes are priorities for experimental study. One relies on interaction network data to identify recurrently mutated sets of genes, while the other searches for groups of mutations that exhibit specific combinatorial properties. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Redesigning Viral Genomes

    Publication Year: 2012 , Page(s): 47 - 53
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2755 KB) |  | HTML iconHTML  

    The advent of low-cost, large-scale DNA synthesis, coupled with advanced algorithmic tools, opens the door to a host of exciting new biotechnology applications, including vaccines. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hot Chips 2012

    Publication Year: 2012 , Page(s): 54
    Request Permissions | PDF file iconPDF (743 KB)  
    Freely Available from IEEE
  • Defending against Cross-Site Scripting Attacks

    Publication Year: 2012 , Page(s): 55 - 62
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1161 KB) |  | HTML iconHTML  

    Researchers have proposed multiple solutions to cross-site scripting, but vulnerabilities continue to exist in many Web applications due to developers' lack of understanding of the problem and their unfamiliarity with current defenses' strengths and limitations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Computer Advertisement

    Publication Year: 2012 , Page(s): 63
    Request Permissions | PDF file iconPDF (2742 KB)  
    Freely Available from IEEE
  • Link Graph Analysis for Business Site Selection

    Publication Year: 2012 , Page(s): 64 - 69
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2116 KB) |  | HTML iconHTML  

    This study proposes a graph-based method to address the business site selection problem from a perspective of "intraspecific competition," which takes into account the fact that most business firms are not isolated but rather are connected and can be clustered as geographical agglomerations. The proposed method treats complex interconnections among business establishments as a graph, in which each... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WikiLeaks and the Matter of Private Manning

    Publication Year: 2012 , Page(s): 70 - 73
    Request Permissions | Click to expandAbstract | PDF file iconPDF (636 KB) |  | HTML iconHTML  

    The release of significant documents by WikiLeaks, the international online not-for-profit organization, has become front-page news that has significant implications for computing professionals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Xplore Advertisement

    Publication Year: 2012 , Page(s): 74
    Request Permissions | PDF file iconPDF (3842 KB)  
    Freely Available from IEEE
  • Generalizing Amdahl's Law for Power and Energy

    Publication Year: 2012 , Page(s): 75 - 77
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1049 KB) |  | HTML iconHTML  

    Extending Amdahl's law to identify optimal power-performance configurations requires considering the interactive effects of power, performance, and parallel overhead. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICSE 2012 Advertisement

    Publication Year: 2012 , Page(s): 78
    Request Permissions | PDF file iconPDF (2481 KB)  
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com