Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

Computer

Issue 7 • July 2015

Filter Results

Displaying Results 1 - 25 of 30
  • Front Cover

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (5326 KB)
    Freely Available from IEEE
  • Rock Stars of Wearables [Advertisement]

    Publication Year: 2015, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1111 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (2796 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2015, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • The Times They Are A-Changin'

    Publication Year: 2015, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (5005 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • Call for Participation and Celebration

    Publication Year: 2015, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (1716 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2015, Page(s):8 - 9
    Request permission for commercial reuse | PDF file iconPDF (2567 KB)
    Freely Available from IEEE
  • Increasing Interconnection Network Throughput with Virtual Channels

    Publication Year: 2015, Page(s): 10
    Request permission for commercial reuse | PDF file iconPDF (494 KB)
    Freely Available from IEEE
  • "Curiouser and Curiouser!"--The Fallout from Alice

    Publication Year: 2015, Page(s):12 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1033 KB) | HTML iconHTML

    The ramifications of last year's US Supreme Court decision in Alice Corp. v. CLS Bank International concerning software patentability have become apparent as other courts grapple with and implement that decision. The Web extra at http://youtu.be/Boa67CXBqPU is an audio recording of Brian M. Gaff reading his Computing and the Law column, in which he discusses how the ramifications of last year's US... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society

    Publication Year: 2015, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • 32 & 16 years ago

    Publication Year: 2015, Page(s):16 - 17
    Request permission for commercial reuse | PDF file iconPDF (892 KB) | HTML iconHTML
    Freely Available from IEEE
  • Self-Aware and Self-Expressive Systems

    Publication Year: 2015, Page(s):18 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (5473 KB) | HTML iconHTML
    Freely Available from IEEE
  • Self-Aware and Self-Expressive Camera Networks

    Publication Year: 2015, Page(s):21 - 28
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2529 KB) | HTML iconHTML

    Smart cameras perform on-board image analysis, adapt their algorithms to changes in their environment, and collaborate with other networked cameras to analyze the dynamic behavior of objects. A proposed computational framework adopts the concepts of self-awareness and self-expression to more efficiently manage the complex tradeoffs among performance, flexibility, resources, and reliability. The We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Collective Self-Awareness and Self-Expression in Distributed Systems

    Publication Year: 2015, Page(s):29 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3099 KB) | HTML iconHTML

    Simultaneously applying hierarchy and recursion enables self-awareness and self-expression in distributed systems, which can provide greater efficiency and scalability in tasks such as network exploration and message routing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Benefits of Self-Awareness and Attention in Fog and Mist Computing

    Publication Year: 2015, Page(s):37 - 45
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3166 KB) | HTML iconHTML

    Self-awareness facilitates a proper assessment of cost-constrained cyber-physical systems, allocating limited resources where they are most needed. Together, situation awareness and attention are key enablers for self-awareness in efficient distributed sensing and computing networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Expressive Management of Business-Critical Workloads in Virtualized Datacenters

    Publication Year: 2015, Page(s):46 - 54
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1509 KB) | HTML iconHTML

    The Mnemos resource management and scheduling architecture uses portfolio scheduling, topology-aware virtual-resource management, and state information to self-adapt to significant workload changes and to analyze risks. Simulations with real-world workload traces reveal the potential for significant cost savings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Amdahl's Reliability Law: A Simple Quantification of the Weakest-Link Phenomenon

    Publication Year: 2015, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (803 KB) | HTML iconHTML

    Amdahl's performance law is a useful conceptual and pedagogical tool for imparting key ideas about performance limits and the importance of balanced system design to students and practitioners in the field. The weakest-link maxim of reliability engineering can be expressed in terms of an identical formula, giving it a quantitative basis and thus making it more convincing. Calling it "Amdahl's reli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Farewell to Air Gaps, Part 2

    Publication Year: 2015, Page(s):59 - 63
    Request permission for commercial reuse | PDF file iconPDF (2667 KB) | HTML iconHTML
    Freely Available from IEEE
  • Recent US Cybersecurity Policy Initiatives: Challenges and Implications

    Publication Year: 2015, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1015 KB) | HTML iconHTML

    In recent years, the US government has introduced several policy measures aimed at tackling the growing cyberthreats facing the country, but many challenges and concerns could arise as a result of their implementation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steve the Steampunk Robot

    Publication Year: 2015, Page(s):70 - 72
    Request permission for commercial reuse | PDF file iconPDF (2198 KB) | HTML iconHTML
    Freely Available from IEEE
  • Multilingual Information Access on the Web

    Publication Year: 2015, Page(s):73 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2995 KB) | HTML iconHTML

    Named entities (NEs) can facilitate access to multilingual knowledge sources--which have exploded in recent years--but the identification, classification, and retrieval of NEs remain challenging tasks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Efficiency in Education

    Publication Year: 2015, Page(s):76 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1621 KB) | HTML iconHTML

    If computing is to remain the discipline that carries us into the future, computing education must promote energy efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Big Data to Big Service

    Publication Year: 2015, Page(s):80 - 83
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1934 KB) | HTML iconHTML

    Big service-the convergence and collaboration of big data systems-presents a solid solution to the challenges brought by big data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next-Generation Text Entry

    Publication Year: 2015, Page(s):84 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (949 KB) | HTML iconHTML

    Letting users seamlessly switch among typing, speaking, and gesturing will facilitate communication via emerging smart devices in a wide variety of situations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Connection

    Publication Year: 2015, Page(s):88 - 89
    Request permission for commercial reuse | PDF file iconPDF (1285 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org