Computer

Issue 2 • Feb. 2016

Filter Results

Displaying Results 1 - 25 of 28
  • Front Cover 
  • Front Cover

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (7132 KB)
    Freely Available from IEEE
  • Move Your Career Forward

    Publication Year: 2016, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (6468 KB)
    Freely Available from IEEE
  • 70th Anniversary Milestones 
  • Computer Society IEEE Fellows

    Publication Year: 2016, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (1532 KB) | HTML iconHTML
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2016, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Elsewhere in the CS 
  • Computer Highlights Society Magazines

    Publication Year: 2016, Page(s):5 - 6
    Request permission for commercial reuse | PDF file iconPDF (1697 KB)
    Freely Available from IEEE
  • Computing Conversations 
  • Bruce Schneier: The Security Mindset

    Publication Year: 2016, Page(s):7 - 8
    Request permission for commercial reuse | PDF file iconPDF (414 KB) | HTML iconHTML
    Freely Available from IEEE
  • Spotlight on Transactions 
  • Securing Mobile Applications

    Publication Year: 2016, Page(s): 9
    Request permission for commercial reuse | PDF file iconPDF (501 KB)
    Freely Available from IEEE
  • 32 & 16 Years Ago 
  • 32 & 16 Years Ago

    Publication Year: 2016, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (902 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editor's Introduction 
  • Cloud Computing

    Publication Year: 2016, Page(s):12 - 13
    Request permission for commercial reuse | PDF file iconPDF (5386 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cloud Computing 
  • Extending Amdahl's Law for the Cloud Computing Era

    Publication Year: 2016, Page(s):14 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3196 KB) | HTML iconHTML

    By extending Amdahl's law, software developers can weigh the pros and cons of moving their applications to the cloud. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Computer Society: Be at the Center of It All

    Publication Year: 2016, Page(s): 23
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Cloud Computing 
  • Dimensions for Evaluating Cloud Resource Orchestration Frameworks

    Publication Year: 2016, Page(s):24 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3224 KB) | HTML iconHTML

    Despite the proliferation of cloud resource orchestration frameworks (CROFs), DevOps managers and application developers still have no systematic tool for evaluating their features against desired criteria. The authors present generic technical dimensions for analyzing CROF capabilities and understanding prominent research to refine them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Trust in the Cloud: State of the Art and Research Challenges

    Publication Year: 2016, Page(s):34 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2627 KB) | HTML iconHTML

    Cloud computing is a highly promising technology, but deficient trust management is hindering market growth. A proposed framework for analyzing trust management systems can help researchers develop innovative solutions to challenges such as identification, privacy, personalization, integration, security, and scalability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Efficient Workload Placement in Enterprise Datacenters

    Publication Year: 2016, Page(s):46 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2662 KB) | HTML iconHTML

    Power loss from an uninterruptible power supply can account for 15 percent of a datacenter's energy. A rack-level power model that relates IT workload and its power dissipation allows optimized workload placement that can save a datacenter roughly $1.4 million in annual energy costs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Focus on Your Job Search

    Publication Year: 2016, Page(s): 53
    Request permission for commercial reuse | PDF file iconPDF (1071 KB)
    Freely Available from IEEE
  • Research Feature 
  • A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining

    Publication Year: 2016, Page(s):54 - 62
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1148 KB) | HTML iconHTML

    To protect sensitive information in mined data, researchers need a way to organize a variety of ongoing work. The Rampart framework categorizes protection approaches and encourages interdisciplinary solutions to the growing variety of privacy problems associated with knowledge discovery from data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Out of Band 
  • Secretocracy

    Publication Year: 2016, Page(s):63 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (1358 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cloud Cover 
  • Protecting Privacy in the Cloud: Current Practices, Future Directions

    Publication Year: 2016, Page(s):68 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2836 KB) | HTML iconHTML

    Cloud computing has become popular because of its benefits to users, which include having access to the resources they need at any time without having to invest in or manage an extensive computing infrastructure. However, users also lose control of the systems they depend on, which creates privacy and security concerns. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society

    Publication Year: 2016, Page(s): 73
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Cybertrust 
  • Gambling with Source Code

    Publication Year: 2016, Page(s):74 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1785 KB) | HTML iconHTML

    Tech companies required to comply with controversial regulations in foreign countries as a cost of doing business there must trade off the potential economic benefits with the risk of long-term harm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Science Fiction Prototyping 
  • Futures We Want to Inhabit

    Publication Year: 2016, Page(s):78 - 79
    Request permission for commercial reuse | PDF file iconPDF (1400 KB) | HTML iconHTML
    Freely Available from IEEE
  • The IoT Connection 
  • Taking the Internet to the Next Physical Level

    Publication Year: 2016, Page(s):80 - 86
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2775 KB) | HTML iconHTML

    Our physical universe has been transformed by computing's ubiquity. The authors describe the challenges and delights we'll find in a future enabled by the Internet of Things. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Connection 
  • CS Connection

    Publication Year: 2016, Page(s):87 - 88
    Request permission for commercial reuse | PDF file iconPDF (2278 KB)
    Freely Available from IEEE
  • Call and Calendar 
  • Call and Calendar

    Publication Year: 2016, Page(s):89 - 93
    Request permission for commercial reuse | PDF file iconPDF (726 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org