By Topic

Computer

Issue 6 • Date June 2013

Filter Results

Displaying Results 1 - 25 of 33
  • Front Cover

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1098 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (839 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2013, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1115 KB)
    Freely Available from IEEE
  • Gordon Bell: Building Blocks of Computing

    Publication Year: 2013, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (349 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2013, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (75 KB) | HTML iconHTML
    Freely Available from IEEE
  • Are You Exhausted by Your First Sale?

    Publication Year: 2013, Page(s):9 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Products protected by patents, copyrights, or trademarks sometimes lose those protections when they're sold, leaving the holders of those IP rights with little recourse if those products are later resold. The Web extra at http://youtu.be/MhI9uiDxbzI is an audio recording of author Brian M. Gaff discussing how products protected by patents, copyrights, or trademarks sometimes lose those protections... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2013, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB)

    A summary of articles published in Computer 32 and 16 years ago. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Game Accessibility: Enabling Everyone to Play

    Publication Year: 2013, Page(s):14 - 18
    Request permission for commercial reuse | PDF file iconPDF (5802 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2013, Page(s):19 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Topics include researchers developing an interplanetary Internet, a technology that protects websites from attack, a game developer that pirated its own product to dramatize piracy problems, a material that could replace silicon in chips, a smart fork that helps users lose weight, and IBM making the world's smallest stop-motion movie using molecules as pixels. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big Data: New Opportunities and New Challenges [Guest editors' introduction]

    Publication Year: 2013, Page(s):22 - 24
    Cited by:  Papers (17)
    Request permission for commercial reuse | PDF file iconPDF (534 KB) | HTML iconHTML
    Freely Available from IEEE
  • Public Policy Considerations for Data-Driven Innovation

    Publication Year: 2013, Page(s):25 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (909 KB) | HTML iconHTML

    To achieve the maximum benefits from data-driven innovation, policymakers must take into account the possibility that regulation could preclude economic and societal benefits. The proposed framework for policy discussions examines three main areas of policy interest: privacy and security, ownership and transfer, and infrastructure and data civics. The Web extra at http://youtu.be/8GzGcM0aud8 is a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Corporate Governance of Big Data: Perspectives on Value, Risk, and Cost

    Publication Year: 2013, Page(s):32 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1311 KB) | HTML iconHTML

    Finding data governance practices that maintain a balance between value creation and risk exposure is the new organizational imperative for unlocking competitive advantage and maximizing value from the application of big data. The first Web extra at http://youtu.be/B2RlkoNjrzA is a video in which author Paul Tallon expands on his article "Corporate Governance of Big Data: Perspectives on Value, Ri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2013, Page(s): 39
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Transforming Big Data into Collective Awareness

    Publication Year: 2013, Page(s):40 - 45
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1071 KB) | HTML iconHTML

    Integrating social and sensor networks can transform big data, if treated as a knowledge commons, into a higher form of collective awareness that can motivate users to self-organize and create innovative solutions to various socioeconomic problems. The Web extra at http://youtu.be/xSoAvMNZSL8 is a video in which author Jeremy Pitt expands on his article "Transforming Big Data into Collective Aware... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big Data's Big Unintended Consequences

    Publication Year: 2013, Page(s):46 - 53
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (996 KB) | HTML iconHTML

    Businesses and governments exploit big data without regard for issues of legality, data quality, disparate data meanings, and process quality. This often results in poor decisions, with individuals bearing the greatest risk. The threats harbored by big data extend far beyond the individual, however, and call for new legal structures, business processes, and concepts such as a Private Data Commons.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big Data in Neonatal Intensive Care

    Publication Year: 2013, Page(s):54 - 59
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1816 KB) | HTML iconHTML

    The effective use of big data within neonatal intensive care units has great potential to support a new wave of clinical discovery, leading to earlier detection and prevention of a wide range of deadly medical conditions. The Web extra at http://youtu.be/OIQBCboQs0g is a video in which author Carolyn McGregor expands on her article "Big Data in Neonatal Intensive Care" and discusses how the effect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Networking Privacy: Understanding the Disconnect from Policy to Controls

    Publication Year: 2013, Page(s):60 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1452 KB) | HTML iconHTML

    A proposed method for mapping privacy policy statements to privacy controls can help providers improve data management transparency, thereby increasing user trust. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gaining Insights into Epidemics by Mining Historical Newspapers

    Publication Year: 2013, Page(s):68 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1891 KB) | HTML iconHTML

    A collaborative project combines innovative algorithmic techniques with traditional textual analysis of newspapers to learn more about past health events, guiding preparedness for future crises. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ad Index and Jobs Board [Advertisement]

    Publication Year: 2013, Page(s): 73
    Request permission for commercial reuse | PDF file iconPDF (704 KB)
    Freely Available from IEEE
  • Empirical Research through Ubiquitous Data Collection

    Publication Year: 2013, Page(s):74 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB) | HTML iconHTML

    Ubiquitous computing technologies enable new in situ data-collection opportunities that can reveal insights into mobile users' behaviors and preferences. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Now Advertisement

    Publication Year: 2013, Page(s): 77
    Request permission for commercial reuse | PDF file iconPDF (1222 KB)
    Freely Available from IEEE
  • Making Programming Accessible and Exciting

    Publication Year: 2013, Page(s):78 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1551 KB) | HTML iconHTML

    The gap between supply and demand for computer scientists has its roots in children's perception that programming is "hard and boring." The Web extra at http://youtu.be/5FSbA_YMsNE is a video showing students at Aspen Creek K-8 in Broomfield, Colorado, using AgentSheets, a program developed by author Alex Repenning to design video games in an after-school program. Repenning designed AgentSheets to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Modern Educator

    Publication Year: 2013, Page(s):82 - 83
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    Today's educators must wear multiple hats-entertainer, personal coach, emergency responder, gizmo wizard, and social media guru-to be judged as informed and effective. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empowering Users through Secure On-Demand Data Provisioning

    Publication Year: 2013, Page(s):84 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    A virtualized on-demand infrastructure coupled with multidimensional encryption lets users retain control over their stored data and securely access that data from anywhere. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com