By Topic

Computer

Issue 12 • Date Dec. 2013

Filter Results

Displaying Results 1 - 25 of 31
  • [Front cover]

    Publication Year: 2013 , Page(s): c1
    Request Permissions | PDF file iconPDF (847 KB)  
    Freely Available from IEEE
  • IEEE Cloud Computing

    Publication Year: 2013 , Page(s): c2
    Request Permissions | PDF file iconPDF (197 KB)  
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2013 , Page(s): 1
    Request Permissions | PDF file iconPDF (96 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): 2 - 3
    Request Permissions | PDF file iconPDF (581 KB)  
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2013 , Page(s): 4 - 5
    Request Permissions | PDF file iconPDF (1100 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • The Cycles of Continuous Improvement

    Publication Year: 2013 , Page(s): 6 - 8
    Request Permissions | PDF file iconPDF (1121 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Andrew Tanenbaum: Writing the Book on Networks

    Publication Year: 2013 , Page(s): 9 - 10
    Request Permissions | PDF file iconPDF (711 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Legal Careers for Engineers

    Publication Year: 2013 , Page(s): 11 - 13
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2331 KB) |  | HTML iconHTML  

    Engineers thinking about a career change should consider opportunities available to them as lawyers, patent agents, and expert witnesses. The Web extra at http://youtu.be/uXBS1J1gBd8 is an audio recording from the Computing and the Law column, in which the authors discuss how engineers thinking about a career change should consider opportunities available to them as lawyers, patent agents, and exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2013 , Page(s): 14 - 15
    Request Permissions | PDF file iconPDF (453 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Robot OS: A New Day for Robot Design

    Publication Year: 2013 , Page(s): 16 - 20
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1690 KB) |  | HTML iconHTML  

    The Robot Operating System promises to make designing robotic software easier and less expensive. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2013 , Page(s): 21 - 23
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    Topics include soaring mobile-broadband adoption, a controversial proposal to close the WHOIS system, a massive hack against Adobe Systems, researchers saying a flaw could undermine the Bitcoin system, a programming language for less-than-perfect computing, and GPS "bullets" that police can shoot at cars during chases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Laws: Origins, Standing, and Impact [Guest editors' introduction]

    Publication Year: 2013 , Page(s): 24 - 25
    Request Permissions | PDF file iconPDF (1026 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Metcalfe's Law after 40 Years of Ethernet

    Publication Year: 2013 , Page(s): 26 - 31
    Request Permissions | Click to expandAbstract | PDF file iconPDF (965 KB) |  | HTML iconHTML  

    Critics have declared Metcalfe's law, which states that the value of a network grows as the square of the number of its users, a gross overestimation of the network effect, but nobody has tested the law with real data. Using a generalization of the sigmoid function called the netoid, Ethernet's inventor and the law's originator models Facebook user growth over the past decade and fits his law to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implications of Makimoto's Wave

    Publication Year: 2013 , Page(s): 32 - 37
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1307 KB) |  | HTML iconHTML  

    In 1987, Makimoto's wave described the semiconductor industry's cyclical alternation between standardization and customization, providing insight about chip innovation's great impact on the computer revolution. The wave's originator reviews its past and current predictive abilities, offering a glimpse of where computing might be headed. The Web extra at http://youtu.be/FCmfcfPt4T4 is a video in wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Architecture and Amdahl's Law

    Publication Year: 2013 , Page(s): 38 - 46
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1163 KB) |  | HTML iconHTML  

    An autobiographical overview of Gene Amdah's professional career reviews his early achievements and describes for the first time some important details of his talk at the 1967 Spring Joint Computer Conference in Atlantic City and the heated discussions that followed. The author provides much-needed clarifications, most notably his original performance formula as presented nearly 50 years ago. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moore's Law: The First Ending and a New Beginning

    Publication Year: 2013 , Page(s): 48 - 53
    Request Permissions | Click to expandAbstract | PDF file iconPDF (936 KB) |  | HTML iconHTML  

    Moore's law has accurately predicted roughly biennial doubling of component capacity at minimal cost for almost 50 years. Recent flash memory scaling exhibits increased density, but reduced write and read lifetimes effectively constitute an ending of Moore's law. However, new resilience techniques, including adaptive management algorithms, and storage technologies based on information theory could... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When the Cloud Goes Local: The Global Problem with Data Localization

    Publication Year: 2013 , Page(s): 54 - 59
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1073 KB) |  | HTML iconHTML  

    Ongoing efforts to legally define cloud computing and regulate separate parts of the Internet are unlikely to address underlying concerns about data security and privacy. Data localization initiatives, led primarily by European countries, could actually bring the cloud to the ground and make the Internet less secure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Blood-Flow Dynamics: New Challenges for Visualization

    Publication Year: 2013 , Page(s): 60 - 67
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1651 KB) |  | HTML iconHTML  

    Modern simulation and imaging techniques are providing intricate blood-flow velocity data, the analysis of which can lead to new insights into how blood flow relates to the development of cardiovascular disease. Rapidly interpreting this complex data requires novel comprehensive visual representations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blindfolded Data Search via Secure Pattern Matching

    Publication Year: 2013 , Page(s): 68 - 75
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (886 KB) |  | HTML iconHTML  

    Balancing security and privacy concerns with information sharing is a top priority for corporations, law enforcement agencies, governments, and other organizations. Secure pattern matching (SPM) addresses some of the challenges faced in sharing and searching private data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passwords, Privacy, and Policies: Can They Do Business Together?

    Publication Year: 2013 , Page(s): 76 - 79
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1172 KB) |  | HTML iconHTML  

    By separating the burden of securing different types of personal information from the all-in-one website solutions that are provided today, significant improvements can be made in securing personal information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Civil Unrest through Social Media

    Publication Year: 2013 , Page(s): 80 - 84
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3087 KB) |  | HTML iconHTML  

    Mining and analyzing data from social networks such as Twitter can reveal new insights into the causes of civil disturbances, including trigger events and the role of political entrepreneurs and organizations in galvanizing public opinion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Escalating Cost of College

    Publication Year: 2013 , Page(s): 85 - 87
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1875 KB) |  | HTML iconHTML  

    Controlling skyrocketing college tuition costs will require parents, students, and other stakeholders in higher education to recognize that maintaining academic quality means accepting trade-offs in nonessential aspects of the college experience. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Busted: A Digital Group Game to Help At-Risk Youth Stay out of Jail

    Publication Year: 2013 , Page(s): 88 - 90
    Request Permissions | Click to expandAbstract | PDF file iconPDF (909 KB) |  | HTML iconHTML  

    Originally developed in board format, Busted--It's Up to You is a video game designed to help at-risk youth in institutional settings gain greater self-awareness, recognize the consequences of their actions, and make better, more productive life choices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Intimidation Factor: How a Surveillance State Can Affect What You Read in Professional Publications

    Publication Year: 2013 , Page(s): 91 - 95
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1673 KB) |  | HTML iconHTML  

    As the world watches the continuing fallout from Edward Snowden's leaks, it's useful to reflect on the implications these leaks have on professional publications. This column is a first-hand account. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mashup technology: Beyond open programming interfaces

    Publication Year: 2013 , Page(s): 96 - 99
    Request Permissions | Click to expandAbstract | PDF file iconPDF (957 KB) |  | HTML iconHTML  

    Web application integration at the presentation and logic layers is an appealing approach to enhancing Web services technologies. However, it's certainly not without challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by professionals representing the full spectrum of computing technology from hardware to software and from current research to new applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com