By Topic

Computer

Issue 5 • May 2014

Filter Results

Displaying Results 1 - 25 of 31
  • [Front cover]

    Publication Year: 2014, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1556 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (769 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2014, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1096 KB)
    Freely Available from IEEE
  • Power-Performance Tradeoff in a Federated Cloud

    Publication Year: 2014, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (769 KB)
    Freely Available from IEEE
  • Conferences in the Palm of Your Hand [advertisement]

    Publication Year: 2014, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (838 KB)
    Freely Available from IEEE
  • Nathaniel Borenstein: Multipurpose Internet Mail Extensions (MIME)

    Publication Year: 2014, Page(s):9 - 11
    Request permission for commercial reuse | PDF file iconPDF (859 KB) | HTML iconHTML
    Freely Available from IEEE
  • 32 & 16 Years Ago

    Publication Year: 2014, Page(s):12 - 13
    Request permission for commercial reuse | PDF file iconPDF (428 KB) | HTML iconHTML
    Freely Available from IEEE
  • Stay Connected [advertisement]

    Publication Year: 2014, Page(s): 14
    Request permission for commercial reuse | PDF file iconPDF (416 KB)
    Freely Available from IEEE
  • Letters

    Publication Year: 2014, Page(s):15 - 17
    Request permission for commercial reuse | PDF file iconPDF (1034 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2014, Page(s):18 - 22
    Request permission for commercial reuse | PDF file iconPDF (1629 KB) | HTML iconHTML
    Freely Available from IEEE
  • Smart Camera Networks [Guest editors' introduction]

    Publication Year: 2014, Page(s):23 - 25
    Cited by:  Papers (5)
    Request permission for commercial reuse | PDF file iconPDF (2290 KB) | HTML iconHTML
    Freely Available from IEEE
  • Camera Networks for Healthcare, Teleimmersion, and Surveillance

    Publication Year: 2014, Page(s):26 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2926 KB) | HTML iconHTML

    Markerless technology is a game changer for motion-capture applications, such as the monitoring of patients outside the hospital, realistic face-to-face communication across continents, and observation across large spaces. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Smart Camera Networks for the Surveillance of Public Spaces

    Publication Year: 2014, Page(s):37 - 44
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (695 KB) | HTML iconHTML

    A taxonomy of wireless visual sensor networks for surveillance offers design goals that try to balance energy efficiency and application performance requirements. SWEETcam, a wireless smart camera network platform, tries to address the challenges raised by achieving adequate energy-performance tradeoffs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Consumer Smart Cameras into Camera Networks: Opportunities and Obstacles

    Publication Year: 2014, Page(s):45 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1422 KB) | HTML iconHTML

    Integrating personal camera-equipped mobile devices in traditional camera networks could enable a new class of mobile vision applications, but although integration is becoming technically feasible, consumer buy-in could be a thorny problem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Compressive Camera Networks

    Publication Year: 2014, Page(s):52 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3794 KB) | HTML iconHTML

    Compressive sensing lets researchers reconstruct high-resolution data from fewer samples, which could alleviate the data deluge in large-scale and multimodal camera networks. The Web extra at http://youtu.be/oVwdIr836WI is a video demonstrating how compressive sensing lets researchers reconstruct high-resolution data from fewer samples, which could alleviate the data deluge in large-scale multimod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud-Assisted Smart Camera Networks for Energy-Efficient 3D Video Streaming

    Publication Year: 2014, Page(s):60 - 66
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1328 KB) | HTML iconHTML

    Despite current obstacles, smart camera networks that offload computationally intensive tasks to remote servers could allow energy-efficient 3D and multiview video encoding and delivery yet still ensure high-quality multiple-device video streaming. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Reconfigurable Smart Camera Networks

    Publication Year: 2014, Page(s):67 - 73
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1885 KB) | HTML iconHTML

    Camera networks that reconfigure while performing multiple tasks have unique requirements, such as concurrent task allocation with limited resources, the sharing of data among fields of view across the network, and coordination among heterogeneous devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent Average Memory Access Time

    Publication Year: 2014, Page(s):74 - 80
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (550 KB) | HTML iconHTML

    Traditional memory performance metrics, such as average memory access time (AMAT), are designed for sequential data accesses and can prove misleading for contemporary cache technologies that increasingly rely on access concurrency. C-AMAT, a new performance metric, accounts for concurrency at both the component and system levels for modern memory design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Standards for Advanced Audio and Video Coding in Emerging Applications

    Publication Year: 2014, Page(s):81 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2308 KB) | HTML iconHTML

    The IEEE Standards Association recently approved a comprehensive set of standards that cover advanced audio and video coding for storage and transmission, targeting emerging applications such as Internet media streaming and smart-camera surveillance. The standards' basic goal is to facilitate reliable and efficient exchange of audiovisual data streams between content creators and target users to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Multimedia Crawling for Mining and Search

    Publication Year: 2014, Page(s):84 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2234 KB) | HTML iconHTML

    Social multimedia can be leveraged for a wide range of applications, but mining and search systems require innovative crawling solutions to meet both technical and policy-related obstacles. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dmail: A Globally Authenticated Email Service

    Publication Year: 2014, Page(s):88 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1908 KB) | HTML iconHTML

    The global public-key authentication infrastructure standardized in the Domain Name System Security Extension (DNSSEC) paves the way for Dmail (DNSSEC-enabled email), a framework that allows secure email address authentication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing End-to-End Energy Consumption for Digital Services

    Publication Year: 2014, Page(s):92 - 95
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1216 KB) | HTML iconHTML

    Here, we present results of work developed through a partnership between Guardian News and Media (GNM), a London-based content provider, and the University of Bristol that provide insight into the overall energy consumption for a digital service's end-to-end production and delivery. Specifically, we break down how the service's various technical subsystems-networks, third-party servers, end-user d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cosmetic Contact Lenses and Iris Recognition Spoofing

    Publication Year: 2014, Page(s):96 - 98
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1053 KB) | HTML iconHTML

    Automatically detecting novel types of cosmetic contact lenses in iris images is a very difficult pattern-recognition problem, but experimental datasets that enable researchers to study this problem have recently become available. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Doorway into Time

    Publication Year: 2014, Page(s):99 - 101
    Request permission for commercial reuse | PDF file iconPDF (860 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
University of Florida
sumi.helal@computer.org