By Topic

Computer

Issue 11 • Date Nov. 2012

Filter Results

Displaying Results 1 - 25 of 27
  • [Front cover]

    Publication Year: 2012 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (905 KB)  
    Freely Available from IEEE
  • Masthead

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (199 KB)  
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2012 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (827 KB)  
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2012 , Page(s): 4 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (1144 KB)  
    Freely Available from IEEE
  • Inventing PHP: Rasmus Lerdorf

    Publication Year: 2012 , Page(s): 6 - 7
    Save to Project icon | Request Permissions | PDF file iconPDF (834 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • A Brief Overview of the America Invents Act

    Publication Year: 2012 , Page(s): 8 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (448 KB) |  | HTML iconHTML  

    The eleventh in a series of articles providing basic information on legal issues facing people and businesses that operate in computing-related markets discusses the America Invents Act. The Web extra at http://youtu.be/WUjsIQOabxs is an audio recording of authors Brian M. Gaff, Ralph A. Loren, and Amy M. DeCloux discussing the America Invents Act. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2012 , Page(s): 12 - 13
    Save to Project icon | Request Permissions | PDF file iconPDF (589 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Big Iron Moves Toward Exascale Computing

    Publication Year: 2012 , Page(s): 14 - 17
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | PDF file iconPDF (656 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2012 , Page(s): 18 - 20
    Save to Project icon | Request Permissions | PDF file iconPDF (2194 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • The Move Toward Electronic Health Records

    Publication Year: 2012 , Page(s): 22 - 23
    Save to Project icon | Request Permissions | PDF file iconPDF (1075 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Electronic Health Records: The HHS Perspective

    Publication Year: 2012 , Page(s): 24 - 26
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (800 KB) |  | HTML iconHTML  

    Electronic health records can deliver complete and accurate health information to patients and their providers, allowing better access to that information and, ulti-mately, empowering patients to take an active role in their healthcare. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal Health Records: New Means to Safely Handle Health Data?

    Publication Year: 2012 , Page(s): 27 - 33
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3817 KB) |  | HTML iconHTML  

    Personal health records offer a way to manage health data while lessening healthcare costs, improving patient data quality, and fostering healthcare efficiency, but privacy and security issues are particularly important considerations for PHR designers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic Case Records in a Box: Integrating Patient Data in Healthcare Networks

    Publication Year: 2012 , Page(s): 34 - 40
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1291 KB) |  | HTML iconHTML  

    An innovative deployment concept de- couples document sources and electronic health records to provide an easy-to-use, seamless, yet secure platform for use in the cumbersome task of integrating an EHR platform into a regional healthcare network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fusion: Managing Healthcare Records at Cloud Scale

    Publication Year: 2012 , Page(s): 42 - 49
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1834 KB) |  | HTML iconHTML  

    An experimental open, cloud-based platform for large-scale, low-cost delivery of healthcare applications enables broader use of patient-centric management of electronic health records and facilitates the secure and seamless sharing of EHRs among stakeholders within a healthcare system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing the Nation's Healthcare Information Infrastructure: NIST Perspective

    Publication Year: 2012 , Page(s): 50 - 57
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1337 KB) |  | HTML iconHTML  

    The National Institute of Standards and Technology is enabling the development of an integrated healthcare information infrastructure by developing test tools and techniques that will facilitate seamless exchange of information across the healthcare enterprise. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Debugging on the Shoulders of Giants: Von Neumann's Programs 65 Years Later

    Publication Year: 2012 , Page(s): 59 - 68
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (16121 KB) |  | HTML iconHTML  

    A study that examined and executed the programs John von Neumann wrote for the IAS machine reveals time-tested truths about computer architecture, side effects, instruction set design, and automatic programming-truths all foreseen by von Neumann and his team more than 50 years ago. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2012 , Page(s): 69
    Save to Project icon | Request Permissions | PDF file iconPDF (168 KB)  
    Freely Available from IEEE
  • China's Indigenous Innovation Policy: Impact on Multi-national R&D

    Publication Year: 2012 , Page(s): 70 - 78
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (488 KB) |  | HTML iconHTML  

    Multinational corporations seeking access to China's burgeoning consumer markets and human resources are establishing R&D centers in the country and developing ways to thread a path through its complex innovation policies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sustainable IT: Challenges, Postures, and Outcomes

    Publication Year: 2012 , Page(s): 79 - 81
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (991 KB) |  | HTML iconHTML  

    Sustainable IT capabilities benefit not only the environment but also business value. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stratfor or Stratagainst

    Publication Year: 2012 , Page(s): 82 - 85
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1238 KB) |  | HTML iconHTML  

    Based on what you know about WikiLeaks and Stratfor, which group seems to be the greater threat to society? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Jobs Board Advertisement

    Publication Year: 2012 , Page(s): 86
    Save to Project icon | Request Permissions | PDF file iconPDF (10553 KB)  
    Freely Available from IEEE
  • Biometric Authentication: System Security and User Privacy

    Publication Year: 2012 , Page(s): 87 - 92
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2264 KB) |  | HTML iconHTML  

    While biometric systems aren't foolproof, the research community has made significant strides to identify vulnerabilities and develop measures to counter them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customer Service 2.0: Where Social Computing Meets Customer Relations

    Publication Year: 2012 , Page(s): 93 - 95
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (793 KB) |  | HTML iconHTML  

    Social computing is moving customer relations from private spaces into the public space. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Connection

    Publication Year: 2012 , Page(s): 96 - 98
    Save to Project icon | Request Permissions | PDF file iconPDF (484 KB)  
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2012 , Page(s): 99 - 101
    Save to Project icon | Request Permissions | PDF file iconPDF (2043 KB)  
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com