By Topic

Computer

Issue 4 • Date Apr. 2014

Filter Results

Displaying Results 1 - 25 of 32
  • [Front cover]

    Publication Year: 2014, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1815 KB)
    Freely Available from IEEE
  • Fuel Your Imagination [advertisement]

    Publication Year: 2014, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1430 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (876 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2014, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1099 KB)
    Freely Available from IEEE
  • Service Selection and Recommendation through Collective Intelligence

    Publication Year: 2014, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (351 KB) | HTML iconHTML
    Freely Available from IEEE
  • Doug Van Houweling: Building the NSFNet

    Publication Year: 2014, Page(s):7 - 9
    Request permission for commercial reuse | PDF file iconPDF (1295 KB) | HTML iconHTML
    Freely Available from IEEE
  • Readers' Choice [Intellectual Property laws]

    Publication Year: 2014, Page(s):10 - 12
    Request permission for commercial reuse | PDF file iconPDF (1058 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 Years Ago

    Publication Year: 2014, Page(s):13 - 14
    Request permission for commercial reuse | PDF file iconPDF (478 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2014, Page(s):15 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2425 KB) | HTML iconHTML

    Topics include the biggest distributed denial-of-service ever measured, the IPv4 address shortage, the cooling of supercomputers by immersing them in liquid, a report naming Java as the leading malware target, a new headset that beams video directly into users' eyes, an ear-based computer controlled by facial movements, software that makes cloud operations more efficient, new technology that lets ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aware Computing [Guest editors' introduction]

    Publication Year: 2014, Page(s):20 - 21
    Request permission for commercial reuse | PDF file iconPDF (1612 KB) | HTML iconHTML
    Freely Available from IEEE
  • Rethinking Context: Leveraging Human and Machine Computation in Disaster Response

    Publication Year: 2014, Page(s):22 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (999 KB) | HTML iconHTML

    Human-computer systems that treat context simply as enumerated facts, rules, or axioms about the surrounding physical and social environment will always have trouble handling information requiring human pragmatic interpretation. One way to overcome such limitations is to draw upon human pragmatic awareness to create hybrid systems capable of both extracting large quantities of data and processing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rich Nonverbal Sensing Technology for Automated Social Skills Training

    Publication Year: 2014, Page(s):28 - 35
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2127 KB) | HTML iconHTML

    Automated nonverbal sensing and feedback technologies, such as My Automated Conversation coacH (MACH), can provide a personalized means to better understand, evaluate, and improve human social interaction--for both practical and therapeutic purposes, and to advance future communications research. The first Web extra at http://youtu.be/l3ztu9shfMg discusses My Automated Conversation coacH (MACH), a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking Mental Well-Being: Balancing Rich Sensing and Patient Needs

    Publication Year: 2014, Page(s):36 - 43
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2402 KB) | HTML iconHTML

    Serious mental illnesses are among the most pressing public healthcare concerns. Continuous and unobtrusive sensing of social and physical functioning has tremendous potential to support lifelong health management by acting as an early warning system to detect changes in mental well-being, delivering context-aware micro-interventions to patients when and where they need them and significantly acce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet Voting: An Empirical Evaluation

    Publication Year: 2014, Page(s):44 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1575 KB) | HTML iconHTML

    The results of testing an Internet voting system, introduced as a pilot program in the Canton of Zurich in 2004, provide hard evidence of attitudes toward electronic voting and underline the need to rely on more advanced technology and centralized infrastructure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Experts Summit

    Publication Year: 2014, Page(s): 51
    Request permission for commercial reuse | PDF file iconPDF (1540 KB)
    Freely Available from IEEE
  • New Opportunities for Computer Vision-Based Assistive Technology Systems for the Visually Impaired

    Publication Year: 2014, Page(s):52 - 58
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1364 KB) | HTML iconHTML

    Computing advances and increased smartphone use gives technology system designers greater flexibility in exploiting computer vision to support visually impaired users. Understanding these users' needs will certainly provide insight for the development of improved usability of computing devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active versus Passive Malware Collection

    Publication Year: 2014, Page(s):59 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (893 KB) | HTML iconHTML

    An exploration of active and passive malware honeypots reveals that the two systems yield vastly different malware collections and that peer-to-peer file sharing is an important, but often overlooked, malware source. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mr. Snowden's Legacy

    Publication Year: 2014, Page(s):66 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    Edward Snowden's ongoing NSA disclosures seem to have the same effect on neoconservative and big-government politicians that a full moon has on werewolves--it just drives them crazy! What did he do to incur all of this acrimony? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beauty Technology: Body Surface Computing

    Publication Year: 2014, Page(s):71 - 75
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3540 KB) | HTML iconHTML

    As wearable technology assumes an increasingly important function in daily life, sensors and other electronic devices applied directly to the skin, in forms like artificial nails and makeup, might further revolutionize human experience. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standardizing 3D Medical Imaging

    Publication Year: 2014, Page(s):76 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3187 KB) | HTML iconHTML

    Great progress has been made in standardizing 2D medical images, but the standardization of 3D medical models is still lacking. The first Web extra at http://youtu.be/J_h3Pcono7A is a video in which a shoulder muscle is rendered based on a fresh cadaver and then laid out on a computer. The pattern is then applied to a 3D model of a shoulder, with corresponding muscle layers and connections to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making Software Engineering Research Relevant

    Publication Year: 2014, Page(s):80 - 83
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1301 KB) | HTML iconHTML

    Practitioners perceive research on global software engineering as useful, yet they rarely read academic articles on the topic. Instead, they look to books, blogs, colleagues, forums, and their own experiences for solutions. Making research more relevant to practice requires a new mindset. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big Data, Networked Worlds

    Publication Year: 2014, Page(s):84 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6530 KB) | HTML iconHTML

    Big data analytics poses significant challenges for privacy protection. Meeting these challenges requires thinking hard about the increasingly critical role autonomous embedded networks play in all aspects of life. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning while Building Games for Teaching

    Publication Year: 2014, Page(s):88 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1883 KB) | HTML iconHTML

    An innovative learning project brings students together with faculty and digital design studio staff to create videogames that help teach basic programming concepts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Future of Online Instruction, Part 1

    Publication Year: 2014, Page(s):92 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    Part one of a two-part series explores the failure of e-learning to meet the expectations of its 20th century proponents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@gmail.com