Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 4 • April 2012

Filter Results

Displaying Results 1 - 25 of 34
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1042 KB)
    Freely Available from IEEE
  • AMD advertisement

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (582 KB)
    Freely Available from IEEE
  • Computer [masthead]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (210 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1485 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2012, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1619 KB) | HTML iconHTML
    Freely Available from IEEE
  • Discovering JavaScript Object Notation

    Publication Year: 2012, Page(s):6 - 8
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1678 KB) |  Multimedia Media

    JSON is moving from being an underground secret, known and used by very few, to becoming the clear choice for mainstream data applications. The first Web extra is a video interview with Douglas Crockford on the creation of JavaScript Object Notation (JSON). The second Web extra is an audio podcast by Charles Severance, author of Computing Conversations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending Against Patent Infringement

    Publication Year: 2012, Page(s):9 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1156 KB) | HTML iconHTML Multimedia Media

    The fourth in a series of articles providing basic information on legal issues facing people and businesses that operate in computing-related markets explores patent litigation from the defendant's perspective. The featured Web extra is an audio podcast by Brian M. Gaff, Brian P. Murphy, and Peter J. Cuomo, three of the article's coauthors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2012, Page(s):13 - 14
    Request permission for commercial reuse | PDF file iconPDF (383 KB) | HTML iconHTML
    Freely Available from IEEE
  • New Approach Keeps Security in Context

    Publication Year: 2012, Page(s):15 - 17
    Request permission for commercial reuse | PDF file iconPDF (1645 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2012, Page(s):18 - 20
    Request permission for commercial reuse | PDF file iconPDF (1966 KB) | HTML iconHTML
    Freely Available from IEEE
  • Interaction Beyond the Keyboard

    Publication Year: 2012, Page(s):21 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (3228 KB) | HTML iconHTML Multimedia Media
    Freely Available from IEEE
  • John Wiley [advertisement]

    Publication Year: 2012, Page(s): 25
    Request permission for commercial reuse | PDF file iconPDF (443 KB)
    Freely Available from IEEE
  • Brain-Computer Interfaces: Beyond Medical Applications

    Publication Year: 2012, Page(s):26 - 34
    Cited by:  Papers (72)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3068 KB) | HTML iconHTML

    Brain-computer interaction has already moved from assistive care to applications such as gaming. Improvements in usability, hardware, signal processing, and system integration should yield applications in other nonmedical areas. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Member Digital Library [advertisement]

    Publication Year: 2012, Page(s): 35
    Request permission for commercial reuse | PDF file iconPDF (1519 KB)
    Freely Available from IEEE
  • Novel Interactions on the Keyboard

    Publication Year: 2012, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3595 KB) | HTML iconHTML Multimedia Media

    A new type of device retains the physicality of the conventional keyboard but includes extensions with touch sensing and dynamic graphics output that enable novel interactions with computers. The featured Web extra is a video of the authors demonstrating the novel uses of a device that combines a conventional keyboard with touch sensing and dynamic graphics output. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [CS Info Page]

    Publication Year: 2012, Page(s): 41
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Gestural Interaction in Vehicular Applications

    Publication Year: 2012, Page(s):42 - 47
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2651 KB) | HTML iconHTML

    In-vehicle gestural interfaces are easy to use and increase safety by reducing visual demand on the driver. Prototype capacitive proximity sensing and depth-camera-based systems demonstrate that current technologies can recognize finger and hand gestures of varying complexity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multisurface Interaction in the WILD Room

    Publication Year: 2012, Page(s):48 - 56
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (10070 KB) | HTML iconHTML Multimedia Media

    The WILD (wall-sized interaction with large datasets) room serves as a testbed for exploring the next generation of interactive systems by distributing interaction across diverse computing devices, enabling multiple users to easily and seamlessly create, share, and manipulate digital content. The featured Web extra is a video of Michel Beaudouin-Lafon and his colleagues demonstrating how the WILD ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital computer [advertisement]

    Publication Year: 2012, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (2744 KB)
    Freely Available from IEEE
  • Open Sesame: Design Guidelines for Invisible Passwords

    Publication Year: 2012, Page(s):58 - 65
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2846 KB) | HTML iconHTML Multimedia Media

    Invisible input and output modalities, such as haptics and audio, are a potentially effective defense against observation-based attacks on PIN entry systems. However, the successful implementation of such systems calls for some general design guidelines. The featured Web extra is a video of Andrea Bianchi, Ian Oakley and Dong-Soo Kwon showing how haptics and audio input and output modalities can h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interop

    Publication Year: 2012, Page(s): 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (1564 KB)
    Freely Available from IEEE
  • Parallel Logic Simulation: Myth or Reality?

    Publication Year: 2012, Page(s):67 - 73
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1626 KB) | HTML iconHTML

    The rapid adoption of multiprocessor computers creates a perfect environment for parallel EDA algorithms. Among various EDA applications, parallel logic simulation seems the most promising. As processors become faster and designs grow larger, better performance might well be expected from parallel simulation. However, this is typically not the case. Speedup is difficult to achieve, and pitfalls in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized Interactive Processes

    Publication Year: 2012, Page(s):74 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2214 KB) | HTML iconHTML

    Optimized interactive processes (OIPs) could help transform traditional business process management systems into dynamic, context-driven systems that better coordinate physical, digital, and human assets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making Technology Invisible in the Developing World

    Publication Year: 2012, Page(s):82 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3111 KB) | HTML iconHTML

    To be a catalyst for social development, the ubiquitous cell phone must be able to access locally relevant and freely available data. The featured Web extra is a video of Computer's Invisible Computing column editor Albrecht Schmidt discussing the lessons learned from his research project on using mobile phones for education in rural Panama. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing Tuition's Affordability

    Publication Year: 2012, Page(s):86 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2987 KB) | HTML iconHTML

    Universities around the country are working in a challenging fiscal environment to find ways to make college affordable while increasing educational quality, outcomes, and accessibility. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org