Computer

Issue 2 • Feb. 1974

Filter Results

Displaying Results 1 - 15 of 15
  • Front cover

    Publication Year: 1974, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1037 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 1974, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (418 KB)
    Freely Available from IEEE
  • From the President

    Publication Year: 1974, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (892 KB)
    Freely Available from IEEE
  • Calendar

    Publication Year: 1974, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (353 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 1974, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (336 KB)
    Freely Available from IEEE
  • Update

    Publication Year: 1974, Page(s):6 - 10
    Request permission for commercial reuse | PDF file iconPDF (3376 KB)
    Freely Available from IEEE
  • Computer networks and communications

    Publication Year: 1974, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1788 KB)

    A computer system including related peripherals, integrated as part of a network of one form or another, is becoming more and more a standard configuration being implemented by system designers today. Made possible through advances in communication technology and network concepts, these new configurations of telecommunications networks vary from simple arrangements of a minicomputer plus a few rem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecommunications turbulence and the computer network evolution

    Publication Year: 1974, Page(s):13 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2309 KB)

    Recent papers in this and other publications have addressed the current status of computer networks in some detail43, 14, 49, 11. This paper is intended to provide complementary material by updating portions of previous works concerned with the telecommunications aspects of computer networks. This is a notably difficult task for several reasons, including common carrier competition, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data security in the computer communication environment

    Publication Year: 1974, Page(s):23 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2914 KB)

    Data security is the protection of data against unauthorized disclosure, modification, restriction, or destruction. Recognition1 that data in a computer system must be protected was a development brought on by three factors which caused a significant increase in the vulnerability of computer systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data communication standards

    Publication Year: 1974, Page(s):32 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3629 KB)

    Effective communication of data among computer centers and remote terminals is essential to maximum utilization of current data processing resources. However, there are significant compatibility problems to be solved due to the broad differences inherent in existing ADP and communications systems and equipment. Steps are being taken to solve these problems by identifying and developing uniform sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiminiprocessor system implemented through pipelining

    Publication Year: 1974, Page(s):42 - 51
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2549 KB)

    Several recent and proposed computer systems have employed parallel and pipelined architectures to increase instruction execution rate, or throughput. These vary from the giant ILLIAC IV1 with its large number of processing elements constrained to perform nearly identical computations in unison (single instruction stream-multiple data stream9) to the Carnegie-Mellon C. mmp sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New products

    Publication Year: 1974, Page(s):52 - 56
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (7490 KB)
    Freely Available from IEEE
  • New applications

    Publication Year: 1974, Page(s):57 - 59
    Request permission for commercial reuse | PDF file iconPDF (6348 KB)
    Freely Available from IEEE
  • Repository

    Publication Year: 1974, Page(s):60 - 69
    Request permission for commercial reuse | PDF file iconPDF (6966 KB)
    Freely Available from IEEE
  • Computer Society publications [advertisement]

    Publication Year: 1974, Page(s):70 - 72
    Request permission for commercial reuse | PDF file iconPDF (3563 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org