Computer

Issue 2 • Feb. 2015

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (2637 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2015, Page(s): c2
    Request permission for commercial reuse | |PDF file iconPDF (546 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (1642 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2015, Page(s): 3
    Request permission for commercial reuse | |PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2015, Page(s):4 - 5
    Request permission for commercial reuse | |PDF file iconPDF (1882 KB)
    Freely Available from IEEE
  • Denial-of-Service Attacks to UMTS

    Publication Year: 2015, Page(s): 6
    Request permission for commercial reuse | |PDF file iconPDF (538 KB)
    Freely Available from IEEE
  • Guido van Rossum: The Early Years of Python

    Publication Year: 2015, Page(s):7 - 9
    Request permission for commercial reuse | |PDF file iconPDF (538 KB) | HTML iconHTML
    Freely Available from IEEE
  • BYOD? OMG!

    Publication Year: 2015, Page(s):10 - 11
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (744 KB) | HTML iconHTML

    Bring Your Own Device--allowing employees to bring personally owned technology to their workplaces might improve productivity, but it also creates risks for employers. The Web extra at http://youtube/t2UpGr1AmiQ is an audio recording of Brian M. Gaff reading his Computing and the Law column, in which he discusses how bring your own device (BYOD) allows employees to bring personally owned technolog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago

    Publication Year: 2015, Page(s):12 - 13
    Request permission for commercial reuse | |PDF file iconPDF (930 KB) | HTML iconHTML
    Freely Available from IEEE
  • News

    Publication Year: 2015, Page(s):14 - 20
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3012 KB) | HTML iconHTML

    Topics include hackers attacking the Internet naming authority, a new Bluetooth version offering online connectivity and showing promise for the Internet of Things, companies looking for ways to enable mobile apps to communicate with one another, the US planning the world's most powerful supercomputer, a set of prosthetic arms that users can control with their thoughts, hackers hitting a German st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technological Advances in Medicine: It's Personal [Guest editors' introduction]

    Publication Year: 2015, Page(s):21 - 23
    Request permission for commercial reuse | |PDF file iconPDF (3499 KB) | HTML iconHTML
    Freely Available from IEEE
  • Ensuring Privacy in a Personal Health Record System

    Publication Year: 2015, Page(s):24 - 31
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2023 KB) | HTML iconHTML

    Personal health records are integral to self-managed healthcare, but patient-controlled access comes with serious concerns that require a better balance of personalization, privacy protection, and security controls. The Web extra at http://youtu.be/yb29cOXeoKY is an audio recording of Alf Weaver interviewing Jingquan Li about his article "Ensuring Privacy in a Personal Health Record System" and ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Disease Self-Management with Mobile Technology

    Publication Year: 2015, Page(s):32 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2194 KB) | HTML iconHTML

    Cost-effective mobile healthcare must consider not only technological performance but also the division of responsibilities between the patient and care provider, the context of the patient's condition, and ways to implement patient decision support and tailored interaction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medical-Grade Quality of Service for Real-Time Mobile Healthcare

    Publication Year: 2015, Page(s):41 - 49
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1349 KB) | HTML iconHTML

    A wireless electrocardiogram case study suggests that current CDMA2000 cellular technology has considerable potential in medical telemetry. Modifications to the network protocol stack ensure the highest data integrity and lowest service delay. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Healthcare Data Integration and Informatics in the Cloud

    Publication Year: 2015, Page(s):50 - 57
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1887 KB) | HTML iconHTML

    An information integration and informatics framework for healthcare applications leverages the parallel computing capability of a cloud-based, large-scale distributed batch-processing infrastructure built with commodity hardware. The result is new flexibility for developers of advanced healthcare applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?

    Publication Year: 2015, Page(s):58 - 66
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1947 KB) | HTML iconHTML

    Whole genome sequencing will soon become affordable for many individuals, but thorny privacy and ethical issues could jeopardize its popularity and thwart the large-scale adoption of genomics in healthcare and slow potential medical advances. The Web extra at http://youtu.be/As3J9NYsbbY is an audio recording of Alf Weaver interviewing Bradley Malin and Jacques Fellay about the possibilities and ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating Substance from a Cloud: Low-Cost Product Generation

    Publication Year: 2015, Page(s):67 - 74
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (3083 KB) | HTML iconHTML

    With a more controlled way to capture images, services to generate and process 3D data point clouds, and a 3D printer, amateur photographers can convert 2D photos into physical 3D objects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spotlighting Student Innovation

    Publication Year: 2015, Page(s):75 - 76
    Request permission for commercial reuse | |PDF file iconPDF (1693 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cyber Chutzpah: The Sony Hack and the Celebration of Hyperbole

    Publication Year: 2015, Page(s):77 - 80
    Cited by:  Papers (3)
    Request permission for commercial reuse | |PDF file iconPDF (978 KB) | HTML iconHTML
    Freely Available from IEEE
  • KnowLang: Knowledge Representation for Self-Adaptive Systems

    Publication Year: 2015, Page(s):81 - 84
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1581 KB) | HTML iconHTML

    The KnowLang framework models uncertainty into the development of software-intensive systems to create enhanced possibilities for self-adaptation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attribute-Based Access Control

    Publication Year: 2015, Page(s):85 - 88
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1867 KB) | HTML iconHTML

    Attribute-based access control (ABAC) is a flexible approach that can implement AC policies limited only by the computational language and the richness of the available attributes, making it ideal for many distributed or rapidly changing environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Connection

    Publication Year: 2015, Page(s):89 - 90
    Request permission for commercial reuse | |PDF file iconPDF (1021 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2015, Page(s):91 - 92
    Request permission for commercial reuse | |PDF file iconPDF (664 KB)
    Freely Available from IEEE
  • The Tyranny of Geography

    Publication Year: 2015, Page(s): 100
    Request permission for commercial reuse | |PDF file iconPDF (358 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org