By Topic

Computer

Issue 8 • Date August 2013

Filter Results

Displaying Results 1 - 25 of 32
  • Front Cover

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1035 KB)
    Freely Available from IEEE
  • Computing Now Advertisement

    Publication Year: 2013, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (4795 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (616 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2013, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1099 KB)
    Freely Available from IEEE
  • Len Kleinrock: The Theory of Packets [Computing Conversations]

    Publication Year: 2013, Page(s):6 - 8
    Request permission for commercial reuse | PDF file iconPDF (978 KB) | HTML iconHTML
    Freely Available from IEEE
  • Ten Things to Know about Applying for Non-US Patents

    Publication Year: 2013, Page(s):9 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (739 KB) | HTML iconHTML

    Although US patent protection ends at the border, knowing the key factors to consider for non-US patents can help inventors extend the scope of protection. The Web extra at http://youtu.be/B6PIyXcs7H8 is an audio recording of the Computing and the Law column, in which the authors discuss how knowing the key factors to consider for non-US patents can help inventors extend the scope of protection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2013, Page(s):12 - 13
    Request permission for commercial reuse | PDF file iconPDF (462 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Lowly API Is Ready to Step Front and Center

    Publication Year: 2013, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    The API is taking on new roles and is becoming critical to important technologies such as cloud computing and to the use of both Web and mobile applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2013, Page(s):18 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Topics include a new Chinese supercomputer that ranks as the world's most powerful, research into using millimeter-wave frequencies to enable 5G wireless communications, security experts finding the first ransomware that affects mobile devices, Google beginning work on a project to provide broad Internet access via a network of high-altitude balloons, an innovative robotic jellyfish that could ser... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next-Generation Memory [Guest editors' introduction]

    Publication Year: 2013, Page(s):21 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (362 KB) | HTML iconHTML
    Freely Available from IEEE
  • NAND Flash Memory: Challenges and Opportunities

    Publication Year: 2013, Page(s):23 - 29
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1129 KB) | HTML iconHTML

    NAND flash offers a range of compelling benefits that will keep attracting mobile and enterprise application developers as engineers tackle the hard problems of scaling the technology to sub-20 nm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What Lies Ahead for Resistance-Based Memory Technologies?

    Publication Year: 2013, Page(s):30 - 36
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1927 KB) | HTML iconHTML

    Phase-change RAM, magnetic RAM, and resistive RAM offer strong scalability, speed, and power consumption advantages over conventional capacitance-based memory. Recent work shows the feasibility of mass producing these new devices and their suitability for next-generation technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Digital Magazines

    Publication Year: 2013, Page(s): 37
    Request permission for commercial reuse | PDF file iconPDF (1944 KB)
    Freely Available from IEEE
  • The Nonvolatile Memory Transformation of Client Storage

    Publication Year: 2013, Page(s):38 - 44
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1231 KB) | HTML iconHTML

    The introduction of solid-state drives in mainstream computing systems is reshaping the client storage landscape. PCI Express is supplanting Serial ATA to deliver higher performance, while novel caching solutions are extending the benefits of nonvolatile memory to a wider segment of users at a more affordable price. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Persistent Memory Will Change Software Systems

    Publication Year: 2013, Page(s):45 - 51
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1800 KB) | HTML iconHTML

    Persistent memory promises to be byte addressable, fast, and nonvolatile as well as provide higher capacity and more efficient power consumption. System applications designers stand to gain much from these features, but some work is necessary to fully exploit them. The Web extra at http://youtu.be/nJBMJ2cLpcg is a an audio interview in which guest editor Simon S.Y. Shim interviews Anirudh Badam ab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refactor, Reduce, Recycle: Restructuring the I/O Stack for the Future of Storage

    Publication Year: 2013, Page(s):52 - 59
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB) | HTML iconHTML

    Emerging nonvolatile storage technologies promise orders-of-magnitude bandwidth increases and latency reductions, but fully realizing their potential requires minimizing storage software overhead and rethinking the roles of hardware and software in storage systems. The Web extra at http://youtu.be/pAALQ6k-CbE is an audio interview in which guest editor Simon S.Y. Shim interviews Steven Swanson abo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Binary Code Analysis

    Publication Year: 2013, Page(s):60 - 68
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (794 KB) | HTML iconHTML

    Static and dynamic analysis of binary code can provide useful information to security researchers without access to assembly code. However, these approaches currently require separate tools, forcing users to perform distinct analysis and then combine the results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2013, Page(s): 69
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Moving Tangible Interaction Systems to the Next Level

    Publication Year: 2013, Page(s):70 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1057 KB) | HTML iconHTML

    Understanding tangible interaction's foundational concepts can lead to systems with direct, integrated, and meaningful data control and representation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Getting Diagonal on the Xbox One Trifecta

    Publication Year: 2013, Page(s):77 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1291 KB) | HTML iconHTML

    Xbox One's three-OS architecture offers multiple possibilities for developers willing to exploit new ways of thinking. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Putting a Kinder Face on Public Cameras

    Publication Year: 2013, Page(s):79 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Surveillance cameras should have features to support interactivity between the public and those behind the cameras. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomy Requirements Engineering

    Publication Year: 2013, Page(s):82 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    Using autonomy requirements engineering, software developers can determine what autonomic features to develop for a particular system as well as what artifacts that process might generate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Bespoke Interactive Devices

    Publication Year: 2013, Page(s):85 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2331 KB) | HTML iconHTML

    Advances in both software tools and digital fabrication technology have brought down the cost, time, and expertise required to design and prototype interconnected interactive devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bixplorer: Visual Analytics with Biclusters

    Publication Year: 2013, Page(s):90 - 94
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1589 KB) | HTML iconHTML

    A prototype visual analytics tool uses data mining algorithms to find patterns in textual datasets and then supports exploration of these patterns in the form of biclusters on a high-resolution display. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com