By Topic

Computer

Issue 11 • Nov. 2013

Filter Results

Displaying Results 1 - 25 of 29
  • [Front cover]

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (649 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (579 KB)
    Freely Available from IEEE
  • IEEE Computer Society Membership [Advertisement]

    Publication Year: 2013, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1638 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2013, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (1120 KB) | HTML iconHTML
    Freely Available from IEEE
  • Ian Horrocks: Standardizing OWL

    Publication Year: 2013, Page(s):8 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (619 KB) | HTML iconHTML

    Ian Horrocks describes the early days of the Web Ontology Language (OWL) and the effort it took to standardize it and other languages. The first Web extra at http://youtu.be/MVTNSRwSCxM is an audio interview in which author Charles Severance speaks with Ian Horrocks about the early days of the Web Ontology Language (OWL) and the effort it took to standardize it and other languages. The second Web ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding US Trade Controls

    Publication Year: 2013, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2274 KB) | HTML iconHTML

    US trade controls, including export controls and trade sanctions, impose complex and ever-changing requirements and restrictions on transactions and transfers of goods, technology, software, and services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2013, Page(s):14 - 15
    Request permission for commercial reuse | PDF file iconPDF (462 KB) | HTML iconHTML
    Freely Available from IEEE
  • Today's Mobile Security Requires a New Approach

    Publication Year: 2013, Page(s):16 - 19
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1406 KB) | HTML iconHTML

    Companies are looking for new ways to secure their data and networks now that many employees are using their own mobile devices in the workplace. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2013, Page(s):20 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Topics include Apple being named the world's most valuable brand, hackers hitting major data aggregators, a new technology that improves cellular reception inside buildings, researchers building the first carbon-nanotube computer, a survey finding that computer-related college majors lead to higher salaries, and a system that uses patients' heartbeats to keep hackers from successfully attacking th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simplicity in IT: The Power of Less

    Publication Year: 2013, Page(s):23 - 25
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (942 KB) | HTML iconHTML
    Freely Available from IEEE
  • ITSy--Simplicity Research in Information and Communication Technology

    Publication Year: 2013, Page(s):26 - 32
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1052 KB) | HTML iconHTML

    Basic to information and communication technology design, simplicity as a driving concept receives little formal attention from the ICT community. A recent literature review and survey of scholars, researchers, and practitioners conducted through the Information Technology Simply Works (ITSy) European Support Action reveals key findings about current perceptions of and future directions for simpli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving Simplicity with the Three-Layer Product Model

    Publication Year: 2013, Page(s):34 - 39
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1230 KB) | HTML iconHTML

    Increased system complexity has historically been treated as an inevitable consequence of architecture evolution over time. The three-layer product model offers an innovative framework for managing system growth that encourages greater efficiency, nimbler responsiveness, and more opportunities for innovation during all stages of the software development life cycle. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component Models for Reasoning

    Publication Year: 2013, Page(s):40 - 47
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (995 KB) | HTML iconHTML

    The world of component-based systems is as appealing as it is challenging. Components, as first-class citizens of component-based systems, serve as the main units of encapsulated functionality and also units of composition, with the intention to improve development efficiency and software quality through reusability, extensibility and analyzability of software. These benefits are obtained especial... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variability Management beyond Feature Models

    Publication Year: 2013, Page(s):48 - 54
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    When new customer and regulatory requirements arise, the ability to quickly adapt business information system processes is crucial to stay ahead of competitors. A proposed synthesis-based framework enables the development of business processes that automatically yield fully executable variants. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plug-and-Play Higher-Order Process Integration

    Publication Year: 2013, Page(s):56 - 62
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1075 KB) | HTML iconHTML

    Unexpected hurdles in dealing with integration, variability, and interoperability in software development can be overcome using higher-order process integration. Even in its simplicity-oriented, tamed version, this approach fosters a powerful plug-and-play discipline, where processes and services are moved around like data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taking Control of Your Engineering Tools

    Publication Year: 2013, Page(s):63 - 66
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    Traditionally software development tools, such as compilers, linkers and build engines, were designed for use by individual engineers on dedicated desktop machines. As these tools evolved, they scaled-up by exploiting more powerful development machines. The same tools were adapted for team development to run on small, project-specific clusters by dedicating a server to process a single job at a ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2013, Page(s): 67
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • A Tool Integration Framework for Sustainable Embedded Systems Development

    Publication Year: 2013, Page(s):68 - 71
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1017 KB) | HTML iconHTML

    Tool integration in the context of embedded systems development and maintenance is challenging due to such systems' lengthy life cycles and adaptability to process specifications. The iFEST framework provides flexibility in development processes and extends support for long product life cycles. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying KISS to Healthcare Information Technology

    Publication Year: 2013, Page(s):72 - 74
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (554 KB) | HTML iconHTML

    Current public and private healthcare information technology initiatives have failed to achieve secure integration among providers. Applying the "keep it simple, stupid" principle offers key guidance for solving this problem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rapid Prototyping of Multitier Cloud-Based Services and Systems

    Publication Year: 2013, Page(s):76 - 83
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    With the authors' approach, developers build and deploy complex cloud-based applications according to the application's logical functional decomposition, using loosely coupled components that exploit cloud computing's advantages without the restrictions of a particular programming style or architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does Security Trump Reliability?

    Publication Year: 2013, Page(s):84 - 86
    Request permission for commercial reuse | PDF file iconPDF (2226 KB)
    Freely Available from IEEE
  • Enhancing Data Integrity and Privacy in the Cloud: An Agenda

    Publication Year: 2013, Page(s):87 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1432 KB) | HTML iconHTML

    To address users' security concerns, cloud service providers must implement strategies that enhance data integrity and privacy. New data auditing and encryption methods open a path toward these goals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Case Study of Automated Face Recognition: The Boston Marathon Bombings Suspects

    Publication Year: 2013, Page(s):91 - 94
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2056 KB) | HTML iconHTML

    While face recognition can be a useful tool, helping authorities to narrow leads and confirm a criminal suspect's identity, the media tended to highlight the technology's limitations in the Boston Marathon bombings investigation. Consequently, we were motivated to reexamine the efficacy of unconstrained face recognition using this incident as a case study. We chose two automated face recognition s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jimmy Takes Manhattan

    Publication Year: 2013, Page(s):95 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1461 KB) | HTML iconHTML

    What if you could design a robot to suit your own personality and behaviors, just as you can make apps to do just about anything your imagination can dream up? The Web extra at http://youtu.be/DjydM5cgBy8 is an audio recording in which author Brian David Johnson talks about taking the 3D printed exoskeleton of Jimmy, a 21st century robot, through New York City and interviews Dr. Simon Egerton, rob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@computer.org