Scheduled System Maintenance
On Wednesday, December 20, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Computer

Issue 8 • Aug. 2015

Filter Results

Displaying Results 1 - 25 of 34
  • Front Cover

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (3192 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2015, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (3047 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (2396 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2015, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2015, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1712 KB)
    Freely Available from IEEE
  • Multivariate Network Exploration and Presentations

    Publication Year: 2015, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (860 KB)
    Freely Available from IEEE
  • Move Your Career Forward [Advertisement]

    Publication Year: 2015, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Anil Jain: 25 Years of Biometric Recognition

    Publication Year: 2015, Page(s):8 - 10
    Request permission for commercial reuse | PDF file iconPDF (1079 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Computer Society [Advertisement]

    Publication Year: 2015, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • 32 & 16 Years Ago

    Publication Year: 2015, Page(s):12 - 13
    Request permission for commercial reuse | PDF file iconPDF (910 KB) | HTML iconHTML
    Freely Available from IEEE
  • Irregular Applications: From Architectures to Algorithms [Guest editors' introduction]

    Publication Year: 2015, Page(s):14 - 16
    Request permission for commercial reuse | PDF file iconPDF (6264 KB) | HTML iconHTML
    Freely Available from IEEE
  • 2016 Richard E. Merwin Distinguished Service Award

    Publication Year: 2015, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (6355 KB)
    Freely Available from IEEE
  • In-Memory Data Rearrangement for Irregular, Data-Intensive Computing

    Publication Year: 2015, Page(s):18 - 25
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1572 KB) | HTML iconHTML

    The data rearrangement engine (DRE) performs in-memory data restructuring to accelerate irregular, data-intensive applications. An emulation on a field-programmable gate array shows how the DRE could improve speedup, memory bandwidth, and energy consumption on three representative benchmarks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Sparse Linear Algebra for Large-Scale Graph Analytics

    Publication Year: 2015, Page(s):26 - 34
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2676 KB) | HTML iconHTML

    Emerging data-intensive applications attempt to process and provide insight into vast amounts of online data. A new class of linear algebra algorithms can efficiently execute sparse matrix-matrix and matrix-vector multiplications on large-scale, shared memory multiprocessor systems, enabling analysts to more easily discern meaningful data relationships, such as those in social networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling Runtimes for Irregular Algorithms to Large-Scale NUMA Systems

    Publication Year: 2015, Page(s):35 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1909 KB) | HTML iconHTML

    The Galois system can automatically parallelize irregular algorithms written in a serial programming model and execute them efficiently on nonuniform memory access (NUMA) machines. Experimental results for five complex irregular algorithms show that the system scales up to 420× on large NUMA systems at 512 threads. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rock Stars of Wearables [Advertisement]

    Publication Year: 2015, Page(s): 45
    Request permission for commercial reuse | PDF file iconPDF (1126 KB)
    Freely Available from IEEE
  • Codesign Lessons Learned from Implementing Graph Matching on Multithreaded Architectures

    Publication Year: 2015, Page(s):46 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1886 KB) | HTML iconHTML

    Executing irregular, data-intensive workloads on multithreaded architectures can result in performance losses and scalability problems. Codesigning algorithms and architectures can realize high performance on irregular applications. A codesign study reveals four key lessons learned from implementing matching algorithms on various platforms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automated Vehicle License Plate Recognition System

    Publication Year: 2015, Page(s):56 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1179 KB) | HTML iconHTML

    License plate recognition is a computer vision method that identifies vehicles from their license plates. The most crucial step of such a system is accurate localization of the plate. The authors propose a system for automatic recognition that has three phases: image capture, plate localization, and license plate number recognition. They tested their methodology on 40 different car models with dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural Aspects of Self-Aware and Self-Expressive Computing Systems: From Psychology to Engineering

    Publication Year: 2015, Page(s):62 - 70
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB) | HTML iconHTML

    Work on human self-awareness is the basis for a framework to develop computational systems that can adaptively manage complex dynamic tradeoffs at runtime. An architectural case study in cloud computing illustrates the framework's potential benefits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Richard E. Merwin Scholarship

    Publication Year: 2015, Page(s): 71
    Request permission for commercial reuse | PDF file iconPDF (743 KB)
    Freely Available from IEEE
  • Cycling through Cyberspace

    Publication Year: 2015, Page(s):72 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3170 KB) | HTML iconHTML

    Students at the University of Brasília set out to build a better exercise bike. The Web extra at http://youtu.be/NCSb_sDJL7c is a video demonstration of the Bike-X simulator, a virtual cycling experience designed by engineering students at the University of Brasília's Gama Campus. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Modernization Revisited: Challenges and Prospects

    Publication Year: 2015, Page(s):76 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1543 KB) | HTML iconHTML

    The authors discuss important factors to consider when migrating software to the cloud and offer recommendations to maximize the chance of success. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying and Authenticating IoT Objects in a Natural Context

    Publication Year: 2015, Page(s):81 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1369 KB) | HTML iconHTML

    A proposed property-aware name service simultaneously supports what, where, and when properties of each IoT object through unique, text-based, and human-readable identity assignments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taming the Engineering of Information Services Websites with Standards

    Publication Year: 2015, Page(s):84 - 89
    Request permission for commercial reuse | PDF file iconPDF (2118 KB) | HTML iconHTML
    Freely Available from IEEE
  • TSA: Mission Creep Meets Waste

    Publication Year: 2015, Page(s):90 - 94
    Request permission for commercial reuse | PDF file iconPDF (1045 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org