Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 11 • Nov. 1993

Filter Results

Displaying Results 1 - 6 of 6
  • Lattice-based access control models

    Publication Year: 1993, Page(s):9 - 19
    Cited by:  Papers (205)  |  Patents (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1217 KB)

    Lattice-based access control models were developed in the early 1970s to deal with the confidentiality of military information. In the late 1970s and early 1980s, researchers applied these models to certain integrity concerns. Later, application of the models to the Chinese Wall policy, a confidentiality policy unique to the commercial sector, was demonstrated. A balanced perspective on lattice-ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • General-purpose systolic arrays

    Publication Year: 1993, Page(s):20 - 31
    Cited by:  Papers (42)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1320 KB)

    The extension of systolic array architecture from fixed- or special-purpose architectures to general-purpose, SIMD (single-instruction stream, multiple-data stream), MIMD (multiple-instruction stream, multiple-data stream) architectures, and hybrid architectures that combine both commercial and FPGA (field-programmable gate array) technologies is chronicled. The authors present a taxonomy for syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative user-interface design

    Publication Year: 1993, Page(s):32 - 41
    Cited by:  Papers (72)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1065 KB)

    A method for developing user interfaces by refining them iteratively over several versions is presented. Each iteration is subjected to user testing or other usability-evaluation methods designed to uncover usability problems. This method not only eliminates problems of this nature, but also allows designers to take advantage of any insights into user needs that emerge from the tests. The author d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending Unix for scalable computing

    Publication Year: 1993, Page(s):43 - 53
    Cited by:  Papers (8)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2113 KB)

    Because it retrieves all instructions and data from a single memory, the von Neumann computer architecture has a fundamental speed limit. The scalable multicomputer architecture, which uses many microprocessors together to solve a single problem and can run at teraflop speeds, may be a solution. While teraflop processor technology is known, the scalable operating and I/O system technology necessar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems engineering of computer-based systems

    Publication Year: 1993, Page(s):54 - 65
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1412 KB)

    This report from the State of Practice Working Group of the IEEE Computer Society Task Force on Engineering of Computer-Based Systems (ECBS) advocates a new discipline at the systems engineering level. The report addresses the need for an ECBS discipline, identifies current practice and needed research, and suggests improvements that are achievable today. It addresses problem areas: the ECBS proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital libraries

    Publication Year: 1993, Page(s):79 - 81
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB)

    The history of modern information processing and the technology underlying it is reviewed. The development of hypertext is examined. Current technology and current efforts to expand information processing are discussed. The future of digital libraries is outlined.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org