By Topic

Computer

Issue 2 • Feb. 2014

Filter Results

Displaying Results 1 - 25 of 28
  • [Front cover]

    Publication Year: 2014, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2349 KB)
    Freely Available from IEEE
  • IEEE Computer Society Membership [Advertisement]

    Publication Year: 2014, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (652 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (697 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2014, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1017 KB)
    Freely Available from IEEE
  • Object Detection with Discriminatively Trained Part-Based Models

    Publication Year: 2014, Page(s):6 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (1056 KB) | HTML iconHTML
    Freely Available from IEEE
  • Joseph Hardin: NCSA Mosaic

    Publication Year: 2014, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (5743 KB) | HTML iconHTML
    Freely Available from IEEE
  • IP 2013-2014: Looking Forward and Looking Back

    Publication Year: 2014, Page(s):11 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1077 KB) | HTML iconHTML

    There were some interesting developments last year in intellectual property law, and 2014 is shaping up to bring about some significant court decisions, particularly in patent and copyright law. The Web extra at http://youtu.be/Od5gQNnD_8Y is an audio recording from the Computing and the Law column, in which author Brian M. Gaff discusses recent intellectual property court cases, particularly rega... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2014, Page(s):14 - 15
    Request permission for commercial reuse | PDF file iconPDF (429 KB)
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2014, Page(s):16 - 20
    Request permission for commercial reuse | PDF file iconPDF (2519 KB) | HTML iconHTML
    Freely Available from IEEE
  • Software Testing [Guest editors' introduction]

    Publication Year: 2014, Page(s):21 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (1283 KB) | HTML iconHTML
    Freely Available from IEEE
  • An Extensible Framework for Online Testing of Choreographed Services

    Publication Year: 2014, Page(s):23 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1086 KB) | HTML iconHTML

    Service choreographies present numerous engineering challenges, particularly with respect to testing activities, that traditional design-time approaches cannot properly address. A proposed online testing solution offers a powerful, extensible framework to effectively assess service compositions, leading to a more trustworthy and reliable service ecosystem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Penetration Testing for Web Services

    Publication Year: 2014, Page(s):30 - 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1778 KB) | HTML iconHTML

    Web services are often deployed with critical software security faults that open them to malicious attack. Penetration testing using commercially available automated tools can help avoid such faults, but new analysis of several popular testing tools reveals significant failings in their performance. The Web extra at http://youtu.be/COgKs9e679o is an audio interview in which authors Nuno Antunes an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moving Forward with Combinatorial Interaction Testing

    Publication Year: 2014, Page(s):37 - 45
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1246 KB) | HTML iconHTML

    Combinatorial interaction testing (CIT) is an effective failure detection method for many types of software systems. This review discusses the current approaches CIT uses in detecting parameter interactions, the difficulties of applying it in practice, recent advances, and opportunities for future research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Application Testing: A Tutorial

    Publication Year: 2014, Page(s):46 - 55
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB) | HTML iconHTML

    To cope with frequent upgrades of mobile devices and technologies, engineers need a reusable and cost-effective environment for testing mobile applications and an elastic infrastructure to support large-scale test automation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Transparency and Manipulation

    Publication Year: 2014, Page(s):56 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2099 KB) | HTML iconHTML

    Most users do not understand why Web applications behave the way they do and what providers do with user data. Although some network-related aspects of application behavior will always be invisible to users, making applications more transparent will increase their utility and trustworthiness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced IP: IPv4 with 64-Bit Addresses

    Publication Year: 2014, Page(s):62 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (871 KB) | HTML iconHTML

    Enhanced IP (EnIP) offers a solution to the problem of IPv4 address depletion without replacing IPv4, as IPv6 does, but by building on top of IPv4, maximizing backward compatibility. An experimental EnIP deployment between nodes at the University of Maryland and the University of Delaware, requiring neither software modification nor modification of in-path routers, demonstrates EnIP's potential. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges in Engineering Cyber-Physical Systems

    Publication Year: 2014, Page(s):70 - 72
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2165 KB) | HTML iconHTML

    To successfully make the transition from traditional physical products to next-generation cyber-physical systems, many manufacturers will have to reinvent their innovation and development processes and take a user-centric engineering approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moral Hazards, Negative Externalities, and the Surveillance Economy

    Publication Year: 2014, Page(s):73 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (909 KB) | HTML iconHTML

    Modern economics includes the art of making common sense abstruse. Terms like moral hazard and negative externality both describe states of transactional imbalance. And this imbalance isn't limited to economics. When governments are involved, even digital technology can be threatening. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Importance of Entropy to Information Security

    Publication Year: 2014, Page(s):78 - 81
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB) | HTML iconHTML

    True randomness can't be left to chance. Adopting improved entropy sources that feed into good deterministic random bit generators, together with rigorous estimation of available entropy, will help achieve the guarantees promised by cryptography to protect sensitive information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Undergraduates Teach Game Programming Using Scratch

    Publication Year: 2014, Page(s):82 - 84
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1134 KB) | HTML iconHTML

    A new class at the University of Washington Bothell trains undergraduate computer science majors to teach coding concepts to middle school students using the game-programming language Scratch. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context Variability for Context-Aware Systems

    Publication Year: 2014, Page(s):85 - 87
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB) | HTML iconHTML

    Many software systems must adapt to suit the particular context in which they are operating. Runtime variability mechanisms are suitable for systems that must configure optimally during execution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Nature of Scholarship in Computing Education: An Approach from IEEE Transactions on Education

    Publication Year: 2014, Page(s):88 - 90
    Request permission for commercial reuse | PDF file iconPDF (1564 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer Society Connection

    Publication Year: 2014, Page(s): 91
    Request permission for commercial reuse | PDF file iconPDF (406 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2014, Page(s):92 - 93
    Request permission for commercial reuse | PDF file iconPDF (633 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org