Computer

Issue 11 • Nov. 2015

Filter Results

Displaying Results 1 - 25 of 32
  • Front Cover

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (1201 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (1244 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2015, Page(s): 3
    Request permission for commercial reuse | |PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2015, Page(s):4 - 5
    Request permission for commercial reuse | |PDF file iconPDF (1688 KB)
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Seamless Learning: Using Location-Aware Technology to Support Art Education

    Publication Year: 2015, Page(s): 6
    Request permission for commercial reuse | |PDF file iconPDF (496 KB)
    Freely Available from IEEE
  • Computing and the Law 
  • Patent Infringement Damages

    Publication Year: 2015, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (765 KB) | HTML iconHTML

    Patent infringement-related damages are typically calculated in one of two ways, and those calculations can lead to very large numbers, but recent court decisions have significantly limited their size. The Web extra at https://youtu.be/UJRCtoXP210 is an audio recording from author Brian M. Gaff reading his Computing and the Law column, in which he discusses how patent infringement-related damages ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 & 16 Years Ago 
  • 32 & 16 Years Ago

    Publication Year: 2015, Page(s):10 - 11
    Request permission for commercial reuse | |PDF file iconPDF (902 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editor's Introduction 
  • Scientific Grand Challenges: Toward Exascale Supercomputing and Beyond

    Publication Year: 2015, Page(s):12 - 14
    Request permission for commercial reuse | |PDF file iconPDF (1371 KB) | HTML iconHTML
    Freely Available from IEEE
  • Grand Challenges in Scientific Computing 
  • Big Ensemble Data Assimilation in Numerical Weather Prediction

    Publication Year: 2015, Page(s):15 - 21
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (5810 KB) | HTML iconHTML

    Powerful computers and advanced sensors enable precise simulations of the atmospheric state, requiring data assimilation to connect simulations to real-world sensor data using statistical mathematics and dynamical systems theory. Numerical weather prediction (NWP) thus enables simulations that more closely represent the real world. The authors explore the NWP-associated challenges in managing big ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COMPSAC 2016

    Publication Year: 2015, Page(s): 22
    Request permission for commercial reuse | |PDF file iconPDF (1204 KB)
    Freely Available from IEEE
  • Grand Challenges in Scientific Computing 
  • Protecting Our Shorelines: Modeling the Effects of Tsunamis and Storm Waves

    Publication Year: 2015, Page(s):23 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (4791 KB) | HTML iconHTML

    Predicting the complex behavior and aftermath of coastal tsunamis and storm surges is inherently difficult. Real-time disaster warning requires rapid computation with reliable accuracy and effective output presentation. The authors present two ways to leverage high-performance computing resources to address these challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum Molecular Dynamics in the Post-Petaflops Era

    Publication Year: 2015, Page(s):33 - 41
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2242 KB) | HTML iconHTML

    As the scale of quantum molecular dynamics simulations has grown in time and system size, QMD codes must increase intranode and instruction-level parallelism to take advantage of emerging supercomputer architectures. The authors present one promising parallelization approach and illustrate its success on one of the world's most powerful systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The TOP500 List and Progress in High-Performance Computing

    Publication Year: 2015, Page(s):42 - 49
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (667 KB) | HTML iconHTML

    For more than two decades, the TOP500 list has enjoyed incredible success as a metric for supercomputing performance and as a source of data for identifying technological trends. The project's editors reflect on its usefulness and limitations for guiding large-scale scientific computing into the exascale era. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research Feature 
  • Using GPUs to Enable Simulation with Computational Gravitational Dynamics in Astrophysics

    Publication Year: 2015, Page(s):50 - 58
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1761 KB) | HTML iconHTML

    Optimizations for individual N-body techniques allow the simulation of collisonal or collisionless systems, but not both together. Hybrid code running on GPUs meets this requirement, and enabled the efficient and accurate simulation of 11 interacting galaxies with a massive black hole in each of their nuclei. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Get the Recognition You Deserve

    Publication Year: 2015, Page(s): 59
    Request permission for commercial reuse | |PDF file iconPDF (267 KB)
    Freely Available from IEEE
  • Research Feature 
  • Scalable Testing of Mobile Antivirus Applications

    Publication Year: 2015, Page(s):60 - 68
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (762 KB) | HTML iconHTML

    AndroTotal, a scalable antivirus evaluation system for mobile devices, creates reproducible, self-contained testing environments for each antivirus application and malware pair and stores them in a repository, benefiting both the research community and Android device users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Move Your Career Forward

    Publication Year: 2015, Page(s): 69
    Request permission for commercial reuse | |PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Computing Practices 
  • High-Throughput Geocomputational Workflows in a Grid Environment

    Publication Year: 2015, Page(s):70 - 80
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1984 KB) | HTML iconHTML

    A grid-computing platform facilitates geocomputational workflow composition to process big geosciences data while fully using idle resources to accelerate processing speed. An experiment with aerosol optical depth retrieval from satellite data shows a 25 percent improvement in runtime over a single high-performance computer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Out of Band 
  • The Dystory of Ahmed's Clock

    Publication Year: 2015, Page(s):82 - 85
    Request permission for commercial reuse | |PDF file iconPDF (881 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cloud Cover 
  • Deciding When and How to Move HPC Jobs to the Cloud

    Publication Year: 2015, Page(s):86 - 89
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1414 KB) | HTML iconHTML

    Now used for high-performance computing applications, the cloud presents a challenge for users who must decide, based on efficiency and cost-effectiveness, when and how to run jobs on cloud-based resources versus when to use on-premise clusters. The authors propose a decision-support system to help make these determinations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Science Fiction Prototyping 
  • We Can Build the Future

    Publication Year: 2015, Page(s):90 - 91
    Request permission for commercial reuse | |PDF file iconPDF (953 KB) | HTML iconHTML
    Freely Available from IEEE
  • Security 
  • Expanding Continuous Authentication with Mobile Devices

    Publication Year: 2015, Page(s):92 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2049 KB) | HTML iconHTML

    More sophisticated methods of detecting user interaction with computers and smartphones are needed for better security and usability. Multimodal continuous authentication is one of the more promising authentication methods on the horizon. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Education 
  • Insanity, Hiring, and the Software Industry

    Publication Year: 2015, Page(s):96 - 101
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1427 KB) | HTML iconHTML

    Software project and product outcomes strongly suggest that the software industry still suffers from dismal performance. A brief survey of job postings reveals a significant gap between what hiring managers of software developer positions are asking for and what they actually need. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Computing 
  • Absence Privacy Loss

    Publication Year: 2015, Page(s):102 - 105
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2170 KB) | HTML iconHTML

    In the emerging Internet of Things era, an adversary can use ubiquitous computing devices and sensors to determine a person's absence from one place while predicting his or her presence at another. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standards 
  • SE 2014: Curriculum Guidelines for Undergraduate Degree Programs in Software Engineering

    Publication Year: 2015, Page(s):106 - 109
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (789 KB) | HTML iconHTML

    Revised curriculum guidelines help university faculty create or update undergraduate software engineering programs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org